Programmable overlays via openoverlayrouter

A Rodriguez-Natal, J Paillisse, F Coras… - IEEE …, 2017 - ieeexplore.ieee.org
OpenOverlayRouter (OOR) is an open source software router to deploy programmable
overlay networks. OOR leverages the Locator/ID Separation Protocol (LISP) to map overlay …

SIF: Flexible Identifier Based Forwarding for Heterogeneous Non-Terrestrial Network

X Zhang, Y Zhuang, Y Zhang, M Liu… - 2024 Asia …, 2024 - ieeexplore.ieee.org
Non-Terrestrial Network (NTN) provide reliable and extensive coverage, which is crucial for
communication in remote and underserved areas. However, using traditional IP …

On the scalability of LISP map**s caches

F Coras, J Domingo-Pascual, A Cabellos-Aparicio - Computer Networks, 2015 - Elsevier
Abstract The Locator/ID Separation Protocol (LISP) limits the growth of the Default-Free
Zone routing tables by creating a highly aggregatable and quasi-static Internet core …

DACS: DHT-Based Distributed Access-Control System for a Secure Locator/Identifier Separation Network

K Wang - 網際網路技術學刊, 2016 - airitilibrary.com
Locator/Identifier Separation Network (LISN) is an ideal solution to the scalability issues of
current routing infrastructure, and how to achieve a secure LISN attracts remarkable …

Master's Thesis: LISP Map** System Under Attack

M Gabriel - 2020 - matheo.uliege.be
The Locator/Identifier Separation Protocol (LISP) is an encapsulation protocol currently in
development. It is based on the potential need to reorganize the routing architecture of the …

[PDF][PDF] LISP Map** System under attack

M GABRIEL, PB DONNET, PG LEDUC, PB BOIGELOT - matheo.uliege.be
Abstract The Locator/Identifier Separation Protocol (LISP) is an encapsulation protocol
currently in development. It is based on the potential need to reorganize the routing …

Novel method for transferring access control list rules to synchronize security protection in a locator/identifier separation protocol environment with cross‐segment host …

TT Lu - International Journal of Communication Systems, 2019 - Wiley Online Library
Extended access control lists (ACLs) are used to filter packets for network security. However,
in current network frameworks, ACL rules are not transferred simultaneously with devices …

[PDF][PDF] Internet Engineering Task Force (IETF) D. Saucez Request for Comments: 7834 INRIA Category: Informational L. Iannone

A Cabellos, F Coras - 2016 - dl.xkwy2018.com
Abstract The Locator/ID Separation Protocol (LISP) aims to improve the Internet routing
scalability properties by leveraging three principles: address role separation, encapsulation …

On the scalability of LISP and advanced overlaid services

F Coras - 2015 - upcommons.upc.edu
In just four decades the Internet has gone from a lab experiment to a worldwide, business
critical infrastructure that caters to the communication needs of almost a half of the Earth's …