Professional Documents
Culture Documents
Contents
Names, identifiers, and addresses...............................................................................................1
Identifier.............................................................................................................................................1
Flat naming........................................................................................................................................2
Client stub/server stub chart.............................................................................................................2
Home-Based Approaches.................................................................................................................3
Principle of Mobile IP.........................................................................................................................3
Distributed hash table........................................................................................................................3
Hierarchical Approaches (lookup operation exploits locality).......................................................4
Identifier
A true identifier is another type of name with properties:
1. An identifier refers to at most one entity.
2. Each entity is referred to by at most one identifier.
3. An identifier always refers to the same entity (i.e., it is never reused).
E.g., MAC address. A media access control address (MAC address) is a
unique identifier
Human-friendly name:
2
Flat naming
Flat name, or structured name, does not contain any information on how to
locate the access point of its associated entity;
• E.g., identifier.
Solutions for flat-name resolution issue:
• Broadcast and multicast;
• Forwarding pointer:
When an entity moves from A to B, it leaves behind in A a reference
to its
new location at B.
Advantage: Easily traced.
Disadvantages:
• Long chains; • Intermediate points’ burden; • Broken links;
Challenges:
• Keep chains short, • Ensure that forwarding pointers are
robust.
(the vulnerability of broken links. As soon as any forwarding pointer is
lost (for whatever reason) the entity can no longer be reached)
Home-Based Approaches
3
Disadvantage:
Solution: register the home at a traditional naming service and to let a client
first look up the location of the home. Because the home location can be
assumed to be relatively stable, that location can be effectively cached after it
has been looked up.
In a hierarchical scheme:
This leads to a tree of directory nodes. The directory node of the top-level
domain, called the root (directory) node, knows about all entities.
The advantage of the latter is that an address becomes available for lookups
as soon as possible. Consequently, if a parent node is temporarily
unreachable, the address can still be looked up within the domain represented
by the current node.