{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T04:30:06Z","timestamp":1718944206868},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,2,3]],"date-time":"2013-02-03T00:00:00Z","timestamp":1359849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s11277-013-1031-1","type":"journal-article","created":{"date-parts":[[2013,2,2]],"date-time":"2013-02-02T00:35:13Z","timestamp":1359765313000},"page":"581-596","source":"Crossref","is-referenced-by-count":2,"title":["Mobility Management in WLAN-Based Virtualized Networks"],"prefix":"10.1007","volume":"72","author":[{"given":"Kunho","family":"Hong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"SuKyoung","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"MyungKi","family":"Shin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,2,3]]},"reference":[{"key":"1031_CR1","unstructured":"GENI Consortium. GENI\u2013Global Environment for Network Innovations. URL http:\/\/www.geni.net\/ ."},{"key":"1031_CR2","unstructured":"Paul, S., & Seshan, S. (2006). Virtualization and slicing of wireless networks. GENI Wireless Working Group: Technical Report. GENI Design Document."},{"key":"1031_CR3","unstructured":"Jeong, S., & Otsuki, H. (2009). Framework of network virtualization. ITU-T FG-FN OD-17."},{"key":"1031_CR4","unstructured":"OpenFlow Consortium. (2009). OpenFlow specification 1.0.0. URL http:\/\/www.openflowswitch.org ."},{"issue":"5","key":"1031_CR5","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","volume":"54","author":"N Chowdhury","year":"2010","unstructured":"Chowdhury, N., & Boutaba, R. (2010). A survey of network virtualization. Computer Networks, 54(5), 862\u2013876.","journal-title":"Computer Networks"},{"key":"1031_CR6","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., et al. (2003). Xen and the art of virtualization. In Proceedings of symposium of operating systems principles.","DOI":"10.1145\/1165389.945462"},{"key":"1031_CR7","doi-asserted-by":"crossref","unstructured":"Egi, N., Greenhalgh, A., Handley, M., Hoerdt, M., Mathy, L., & Schooley, T. (2007). Evaluating XEN for router virtualization. In Proceedings of ICCN.","DOI":"10.1109\/ICCCN.2007.4317993"},{"key":"1031_CR8","unstructured":"Anhalt, F., & Primet, P. V.-B. (2008). Analysis and evaluation of a Xen based virtual router. Technical Report 6658, Inria."},{"key":"1031_CR9","doi-asserted-by":"crossref","unstructured":"Turner, J. S. (2006). A proposed architecture for the GENI backbone platform. In Proceedings of ACM\/IEEE symposium on architectures for networking and Communication systems (ANCS).","DOI":"10.1145\/1185347.1185349"},{"key":"1031_CR10","unstructured":"Pfaff, B., Pettit, J., Amidon, K., Casado, M., Koponen, T., & Shenker, S. (2009). Extending networking into the virtualization layer. In 8th ACM workshop on hot topics in networks (HotNets)."},{"key":"1031_CR11","unstructured":"Shin, M., & Kim, H. (2010). Network virtualization : A way forward for accommodating multiple. In Proceedings of international conference on advanced communication technology: Heterogeneous architectures in a single snfrastructure."},{"key":"1031_CR12","unstructured":"Sherwood, R., Chan, M., Gibb, G., Handigol, N., Huang, T.-Y., Kazemian, P., et al. (2009). Carving research slices out of your production network with openflow. In Proceedings of ACM sigcomm, Demo Session."},{"key":"1031_CR13","unstructured":"Yap, K. K., Huang, T. Y., Kobayashi, M., Chan, M., Sherwood, R., Parulkar, G., et al. (2009). Lossless Handover with n-casting between WiFi-WiMAX on OpenRoads. Mobicom (Demo)."},{"key":"1031_CR14","unstructured":"Smith, G., Chaturvedi, A., Mishra, A., & Banerjee, S. (2007). Wireless virtualization on commodity 802.11 Hardware. In ACM WinTECH workshop (co-located with ACM Mobicom)."},{"key":"1031_CR15","doi-asserted-by":"crossref","unstructured":"Mahindra, R., Bhanage, G., Hadjichristofi, G., Seskar, I., & Raychaudhuri, D. (2008). Space versus time separation For wireless virtualization on an indoor grid. In Proceedings of IEEE NGI.","DOI":"10.1109\/NGI.2008.36"},{"key":"1031_CR16","doi-asserted-by":"crossref","unstructured":"Bhanage, G., Vete, D., Seskar, I., & Raychaudhuri, D. (2010). SplitAP: Leveraging wireless network virtualization for s sharing Of WLANs. In Proceedings of IEEE Globecom.","DOI":"10.1109\/GLOCOM.2010.5684328"},{"key":"1031_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility support in IPv6. RFC 3775.","DOI":"10.17487\/rfc3775"},{"key":"1031_CR18","unstructured":"Gundavelli, S., et al. (2007). Proxy mobile IPv6. RFC 5213."},{"key":"1031_CR19","unstructured":"Yokota, H., Chowdhury, K., Koodli, R., Patil, B., & Xia, F. (2010). Fast handovers for PMIPv6. IETF RFC 5949."},{"key":"1031_CR20","unstructured":"Lee, S., Latchman, H., & Park, B. (2010). Efficient handover scheme of proxy mobile IPv6 in wireless local area networks. International Journal of Multimedia and Ubiquitous Engineering, 5(2), 1\u201318."},{"key":"1031_CR21","doi-asserted-by":"crossref","unstructured":"Li, R., Li, J., Wu, K., Xiao, Y., & Xie, J. (2008). An enhanced fast handover with low latency for mobile IPv6. IEEE Transcations Wireless Communications, 7(1), 334\u2013342.","DOI":"10.1109\/TWC.2008.060582"},{"key":"1031_CR22","doi-asserted-by":"crossref","unstructured":"Kang, J., Kum, D., Li, Y., & Cho, Y. (2008). Seamless handover scheme for proxy mobile IPv6. In Proceedings of IEEE international conference on wireless and mobile computing.","DOI":"10.1109\/WiMob.2008.105"},{"key":"1031_CR23","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.ins.2012.07.016","volume":"219","author":"M Kim","year":"2013","unstructured":"Kim, M., Lee, S., Cypher, D., & Golmie, N. (2013). Performance analysis of fast handover for proxy mobile IPv6. Information Sciences, 219, 208\u2013224.","journal-title":"Information Sciences"},{"key":"1031_CR24","unstructured":"Sato, O., Potter, R., Yamamoto, M., & Hagiya, M. (2003). UML scrapbook and realization of snapshot programming environment. In Proceedings of the second Mext-NSF-JSPS. International symposium on software security (ISSS)."},{"key":"1031_CR25","doi-asserted-by":"crossref","unstructured":"Tutschku, K. (2009). Towards the future internet: Virtual networks for convergent services. Elektrotechnik & informationstechnik.","DOI":"10.1007\/s00502-009-0652-2"},{"key":"1031_CR26","unstructured":"Gast, M. S. (2002). 802.11 Wireless networks: The definitive guide. Chicago: OReilly."},{"key":"1031_CR27","unstructured":"Latze, C., Ultes-Nitsche, U., & Baumgartner, F. (2008). Towards a zero configuration authentication scheme for 802.11 based networks. In Proceedings of IEEE LCN."},{"issue":"2","key":"1031_CR28","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2008.4492976","volume":"15","author":"K Kong","year":"2008","unstructured":"Kong, K., Han, Y., Shin, M., Yoo, H., & Lee, W. (2008). Mobility management for All-IP mobile networks: Mobile IPv6 versus proxy mobile IPv6. IEEE Wireless Communications, 15(2), 36\u201345.","journal-title":"IEEE Wireless Communications"},{"key":"1031_CR29","doi-asserted-by":"crossref","unstructured":"Makaya, C., & Pierre, S. (2008). An analytical framework for performance evaluation of IPv6-based mobility management protocols. IEEE Transcations on Wireless Communicationsm, 7(3), 972\u2013983.","DOI":"10.1109\/TWC.2008.060725"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1031-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1031-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1031-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T04:25:51Z","timestamp":1562646351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1031-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,3]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1031-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,3]]}}}