Learn More
It is commonly recognized that today's Internet routing and addressing system is facing serious scaling problems, which are mainly caused by the overloading of IP address semantics. That is, an IP address represents not only the location but also the identity of a host. To address this problem, several recent schemes propose to replace the IP namespace in(More)
The current Internet was originally designed for ''fixed " terminals and can hardly support mobility. It is necessary to develop new mobility management schemes for the future Internet. This paper proposes an Identifiers Separating and Mapping Scheme (ISMS), which is a candidate for the future Internet mobility management, and discusses the basic principles(More)
Segment protection has been recognized as an efficient way to avoid " traps " in survivable WDM mesh network. In this article, we present some insights on this kind of protection. We first prove the correctness of segment protection used for avoiding traps. We then investigate the effect of the number of segments on the blocking performance in several(More)
Vertical handover refers to the process that the interface connecting to wireless network changes across heterogeneous networks. The delay caused by vertical handover affects the quality of the ongoing applications, especially the real-time applications like VoIP. Authentication and security association is one of the major components of delay during(More)
Most Internet traffic is associated with applications where users are interested in the data and not in the source where the data resides. On the other hand, the current Internet architecture is host-centric rather than data-centric, and it is not practical to deploy a pure data-centric architecture overnight. This motivates an incrementally deployable(More)
The nuclear protein I2(PP2A)/SET, an endogenous inhibitor of protein phosphatase-2A (PP2A), is increased and translocated to the cytoplasm in the neurons of Alzheimer's disease (AD) brains, and PP2A activity in cytoplasm is compromised. However, it is not fully understood how SET is retained in the cytoplasm. By generating a phosphorylation site-specific(More)
In this article, we describe an information-centric Internet architecture called CoLoR that couples service location and inter-domain routing while decoupling them from forwarding. Preliminary results based on implementation and analysis show that CoLoR is promising since it satisfies many requirements of the future Internet, including being(More)
In this paper, we analyze the security threats of a newly proposed future Internet architecture called CoLoR. In particular, we describe how CoLoR defends against the most prevalent attacks existing in both the current Internet and some recently proposed information-centric networks such as named data networking (NDN). We also present attacks that are(More)
Reliability has been well recognized as an important design objective in the design of modern high-speed networks. While traditional approaches offer either 100% protection in the presence of single link failure or no protection at all, connections in real networks may have multiple reliability requirements. The concept of differentiated reliability (DiR)(More)