{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:22Z","timestamp":1750307962867,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2007,4,1]],"date-time":"2007-04-01T00:00:00Z","timestamp":1175385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2007,4]]},"abstract":"<jats:p>In the current TCP\/IP inter-networking architecture, a transport layer connection or session is uniquely identified by the underlying 5-tuple information, viz. {Src IP, Src Port, Dest IP, Dest Port, Protocol}. This strong coupling between the session and the end-point attributes implies that any change to one or more of the elements in this 5-tuple invariably leads to session failure. We present an architecture (STEM) that decouples this strong association to enable seamless migration of active transport sessions across IP addresses and interfaces. We achieve this migration by directly communicating between the peers and dynamically updating the 5-tuple elements associated with the session. The migration is done in a transparent, simple and secure way.<\/jats:p>\n          <jats:p>Our architecture enables new and exciting applications such as fault-tolerant transport sessions (e.g. in BGP) and end-host mobility in the absence of mobile IP infrastructure. Although STEM can be used as an alternative to mobile IP, the two may co-exist as well, if desired. The novelty of this architecture is that it does not require any modifications to standard protocols or applications. In other words, no changes are needed to the finite state machine or protocol messages. We present an implementation of the STEM architecture and validate it by means of experimental results.<\/jats:p>","DOI":"10.1145\/1282221.1282222","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["STEM"],"prefix":"10.1145","volume":"11","author":[{"given":"Furquan","family":"Ansari","sequence":"first","affiliation":[{"name":"Bell Laboratories, Holmdel, NJ"}]},{"given":"Ajay","family":"Sathyanath","sequence":"additional","affiliation":[{"name":"Bell Laboratories, Holmdel, NJ"}]}],"member":"320","published-online":{"date-parts":[[2007,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J. Ash and et. al. Appicability statement for cr-ldp. RFC 3213 January 2002.   J. Ash and et. al. Appicability statement for cr-ldp. RFC 3213 January 2002.","DOI":"10.17487\/rfc3213"},{"volume-title":"Rutgers University","year":"1994","author":"Bakre A.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"R. Braden. Requirements for internet hosts - communication layers. RFC 1122 October 1989.   R. Braden. Requirements for internet hosts - communication layers. RFC 1122 October 1989.","DOI":"10.17487\/rfc1122"},{"key":"e_1_2_1_4_1","unstructured":"CERT Co-ordination Center. Cert advisory ca-2000-01 denial-of-service developments. http:\/\/www.cert.org\/advisories\/CA-2000-01.html 2000.  CERT Co-ordination Center. Cert advisory ca-2000-01 denial-of-service developments. http:\/\/www.cert.org\/advisories\/CA-2000-01.html 2000."},{"key":"e_1_2_1_5_1","first-page":"T-22","author":"Diffie W.","year":"1976","journal-title":"New directions in cryptography. In IEEE Transactions on Information Theory"},{"volume-title":"IETF Internet Draft (Expired)","year":"1995","author":"Huitema C.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. Security architecture for the internet protocol. RFC 2401 November 1998.   S. Kent and R. Atkinson. Security architecture for the internet protocol. RFC 2401 November 1998.","DOI":"10.17487\/rfc2401"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.662913"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/262116.262144"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"C. Perkins. Ip mobility support for ipv4. RFC 3344 August 2002.   C. Perkins. Ip mobility support for ipv4. RFC 3344 August 2002.","DOI":"10.17487\/rfc3220"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J. Postel. Transmission control protocol - darpa internet protocol program specification. STD 7 RFC 793 September 1981.  J. Postel. Transmission control protocol - darpa internet protocol program specification. STD 7 RFC 793 September 1981.","DOI":"10.17487\/rfc0793"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Y. Rekhter and T. Li. A border gateway protocol 4 (bgp-4). RFC 1771 March 1995.   Y. Rekhter and T. Li. A border gateway protocol 4 (bgp-4). RFC 1771 March 1995.","DOI":"10.17487\/rfc1771"},{"volume-title":"Inc.","year":"1996","author":"Schneier B.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"R. Stewart and et. al. Stream control transmission protocol. RFC 2960 October 2000.  R. Stewart and et. al. Stream control transmission protocol. RFC 2960 October 2000.","DOI":"10.17487\/rfc2960"},{"key":"e_1_2_1_18_1","unstructured":"S. Tilak and N. Abu-Ghazaleh. An extension to dns-based end-to-end mobility scheme. Mobile Computing and Communications Review 1(2).  S. Tilak and N. Abu-Ghazaleh. An extension to dns-based end-to-end mobility scheme. Mobile Computing and Communications Review 1(2)."},{"key":"e_1_2_1_19_1","unstructured":"P. Vixie and et. al. Dynamic updates in the domain name system (dns update). RFC 2136 April 1997.   P. Vixie and et. al. Dynamic updates in the domain name system (dns update). RFC 2136 April 1997."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570657"},{"volume-title":"4th International conference on Computer Communications and Networks (ICCCN)","year":"1995","author":"Zhang Y.","key":"e_1_2_1_21_1"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282221.1282222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1282221.1282222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:07Z","timestamp":1750258687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282221.1282222"}},"subtitle":["seamless transport endpoint mobility"],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4]]}},"alternative-id":["10.1145\/1282221.1282222"],"URL":"https:\/\/doi.org\/10.1145\/1282221.1282222","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2007,4]]},"assertion":[{"value":"2007-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}