By Topic

Mobility support for next-generation Internet signaling protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xiaoming Fu ; Inst. for Informatics, Goettingen Univ., Germany ; Schulzrinne, Henning ; Tschofenig, H.

Internet signaling protocols establish, maintain and remove state along the data path. Next-generation signaling protocols design must meet the scaling requirements imposed by the various tasks of the Internet signaling applications, such as resource reservation and middlebox configuration, and to meet the demand for general functionality in signaling protocols, including strong security, reliability, congestion control, support for various signaling purposes and message sizes, and efficient support for mobility. This paper presents a generic signaling architecture, the cross-application signaling protocol (CASP) and describes how it supports efficient and secure signaling in IP mobility scenarios. In this approach, the signaling functionality is splitted into two layers: a generic messaging layer which provides the generic functionality for message delivery, and a client layer consisting of a next-hop discovery client and any number of client protocols which perform the actual signaling tasks. The essential mechanisms required to support mobility are: (1) a session identifier uniquely selected by the initiator and effective discovery of the cross-over node; (2) a branch identifier incrementally assigned for the new branch and efficient release of state in the abandoned branch; (3) ensuring discovery messages are delivered exactly following the path that mobile IP packets are encapsulated; and (4) effective hop-by-hop authentication and re-authorization provided by the messaging layer, non hop-by-hop security for signaling clients and denial-of-service protection in the discovery client.

Published in:

Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th  (Volume:3 )

Date of Conference:

6-9 Oct. 2003