{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:58Z","timestamp":1750221118882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Research Foundation of Korea (NRF) funded by the Korean government (MSIP)","award":["2017R1A2B4005865"],"award-info":[{"award-number":["2017R1A2B4005865"]}]},{"name":"The Ministry of Oceans and Fisheries, Korea."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3286978.3286996","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"264-273","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Live Migration of Virtual Machines and Containers over Wide Area Networks with Distributed Mobility Management"],"prefix":"10.1145","author":[{"given":"Jaehee","family":"Ha","sequence":"first","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Jaehyun","family":"Park","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Sangyup","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Myungchul","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1122"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254834"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251223"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.009"},{"key":"e_1_3_2_1_5_1","volume-title":"Live migration of virtual machines among edge networks via WAN links. Future Network and Mobile Summit","author":"Darsena Donatella","year":"2013","unstructured":"Donatella Darsena , Giacinto Gelli , Antonio Manzalini , and Fulvio Melito . 2013. Live migration of virtual machines among edge networks via WAN links. Future Network and Mobile Summit ( 2013 ). Donatella Darsena, Giacinto Gelli, Antonio Manzalini, and Fulvio Melito. 2013. Live migration of virtual machines among edge networks via WAN links. Future Network and Mobile Summit (2013)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784881.1784885"},{"key":"e_1_3_2_1_7_1","volume-title":"The Internet of Things - How the Next Evolution of the Internet is Changing Everything. CISCO white paper","author":"Evans Dave","year":"2011","unstructured":"Dave Evans . 2011. The Internet of Things - How the Next Evolution of the Internet is Changing Everything. CISCO white paper ( 2011 ). Dave Evans. 2011. The Internet of Things - How the Next Evolution of the Internet is Changing Everything. CISCO white paper (2011)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6830","volume-title":"The Locator\/ID Separation Protocol (LISP). RFC 6830","author":"Farinacci Dino","year":"2013","unstructured":"Dino Farinacci , Darrel Lewis , David Meyer , and Vince Fuller . 2013. The Locator\/ID Separation Protocol (LISP). RFC 6830 ( 2013 ). Dino Farinacci, Darrel Lewis, David Meyer, and Vince Fuller. 2013. The Locator\/ID Separation Protocol (LISP). RFC 6830 (2013)."},{"key":"e_1_3_2_1_9_1","volume-title":"An Updated Performance Comparison of Virtual Machines and Linux Containers. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)","author":"Felter Wes","year":"2015","unstructured":"Wes Felter , Alexandre Ferreira , Ram Rajamony , and Juan Rubio . 2015 . An Updated Performance Comparison of Virtual Machines and Linux Containers. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (2015). Wes Felter, Alexandre Ferreira, Ram Rajamony, and Juan Rubio. 2015. An Updated Performance Comparison of Virtual Machines and Linux Containers. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (2015)."},{"key":"e_1_3_2_1_10_1","unstructured":"Gartner. 2015. By 2020 a Quarter Billion Connected Vehicles Will Enable New In-Vehicle Services and Automated Driving Capabilities. (2015).  Gartner. 2015. By 2020 a Quarter Billion Connected Vehicles Will Enable New In-Vehicle Services and Automated Driving Capabilities. (2015)."},{"key":"e_1_3_2_1_11_1","volume-title":"Proxy Mobile IPv6. RFC 5213","author":"Gundavelli Sri","year":"2008","unstructured":"Sri Gundavelli , Kent Leung , Vijay Devarapalli , Kuntal Chowdhury , and Basavaraj Patil . 2008. Proxy Mobile IPv6. RFC 5213 ( 2008 ). Sri Gundavelli, Kent Leung, Vijay Devarapalli, Kuntal Chowdhury, and Basavaraj Patil. 2008. Proxy Mobile IPv6. RFC 5213 (2008)."},{"key":"e_1_3_2_1_12_1","volume-title":"Efficient Routing for Peer-to-Peer Overlays. NSDI","author":"Gupta Anjali","year":"2004","unstructured":"Anjali Gupta , Barbara Liskov , and Rodrigo Rodrigues . 2004. Efficient Routing for Peer-to-Peer Overlays. NSDI ( 2004 ). Anjali Gupta, Barbara Liskov, and Rodrigo Rodrigues. 2004. Efficient Routing for Peer-to-Peer Overlays. NSDI (2004)."},{"key":"e_1_3_2_1_13_1","volume-title":"XIA: Efficient Support for Evolvable Internetworking. USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Han Dongsu","year":"2012","unstructured":"Dongsu Han , Ashok Anand , Fahad Dogar , Boyan Li , Hyeontaek Lim , Michel Machado , Arvind Mukundan , Wenfei Wu , Aditya Akella , David G Andersen , John W Byers , Seshan Srinivasan , and Peter Steenkiste . 2012 . XIA: Efficient Support for Evolvable Internetworking. USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012). Dongsu Han, Ashok Anand, Fahad Dogar, Boyan Li, Hyeontaek Lim, Michel Machado, Arvind Mukundan, Wenfei Wu, Aditya Akella, David G Andersen, John W Byers, Seshan Srinivasan, and Peter Steenkiste. 2012. XIA: Efficient Support for Evolvable Internetworking. USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038363"},{"key":"e_1_3_2_1_15_1","unstructured":"Iperf. 2016. The ultimate speed test tool for TCP UDP and SCTP. https:\/\/iperf.fr\/  Iperf. 2016. The ultimate speed test tool for TCP UDP and SCTP. https:\/\/iperf.fr\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Distributed Mobility Management for the Future Mobile Networks: A Comprehensive Analysis of Key Design Options","author":"Jeon Seil","year":"2017","unstructured":"Seil Jeon , Sergio Figueiredo , Rui L Aguiar , and Hyunseung Choo . 2017. Distributed Mobility Management for the Future Mobile Networks: A Comprehensive Analysis of Key Design Options . IEEE Access ( 2017 ). Seil Jeon, Sergio Figueiredo, Rui L Aguiar, and Hyunseung Choo. 2017. Distributed Mobility Management for the Future Mobile Networks: A Comprehensive Analysis of Key Design Options. IEEE Access (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925109.1925110"},{"key":"e_1_3_2_1_18_1","unstructured":"KVM. 2016. Kernel-based Virtual Machine. https:\/\/www.linux-kvm.org\/  KVM. 2016. Kernel-based Virtual Machine. https:\/\/www.linux-kvm.org\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.19"},{"key":"e_1_3_2_1_20_1","volume-title":"Generating USD1.6 Trillion Revenue in 2024.","author":"Research Machina","year":"2015","unstructured":"Machina Research . 2015. Global M2M Market to Grow to 27 Billion Devices , Generating USD1.6 Trillion Revenue in 2024. ( 2015 ). Machina Research. 2015. Global M2M Market to Grow to 27 Billion Devices, Generating USD1.6 Trillion Revenue in 2024. (2015)."},{"key":"e_1_3_2_1_21_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazieres . 2002 . Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems , Springer Lecture Notes in Computer Science (2002). Petar Maymounkov and David Mazieres. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems, Springer Lecture Notes in Computer Science (2002)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the Linux Symposium","author":"Mirkin Andrey","year":"2008","unstructured":"Andrey Mirkin , Alexey Kuznetsov , and Kir Kolyshkin . 2008 . Containers checkpointing and live migration . Proceedings of the Linux Symposium (2008). Andrey Mirkin, Alexey Kuznetsov, and Kir Kolyshkin. 2008. Containers checkpointing and live migration. Proceedings of the Linux Symposium (2008)."},{"key":"e_1_3_2_1_23_1","volume-title":"SHA-384, and SHA-512","author":"NIST.","year":"2001","unstructured":"NIST. 2001. Descriptions of SHA-256 , SHA-384, and SHA-512 . National Institute of Standards and Technology (NIST) ( 2001 ). NIST. 2001. Descriptions of SHA-256, SHA-384, and SHA-512. National Institute of Standards and Technology (NIST) (2001)."},{"key":"e_1_3_2_1_24_1","unstructured":"OpenVZ. 2018. Virtuozzo Containers. https:\/\/openvz.org\/Main_Page  OpenVZ. 2018. Virtuozzo Containers. https:\/\/openvz.org\/Main_Page"},{"key":"e_1_3_2_1_25_1","volume-title":"Mobility Support for IPv6. RFC 6275","author":"Perkins Charles","year":"2011","unstructured":"Charles Perkins , David Johnson , and Jari Arkko . 2011. Mobility Support for IPv6. RFC 6275 ( 2011 ). Charles Perkins, David Johnson, and Jari Arkko. 2011. Mobility Support for IPv6. RFC 6275 (2011)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3220"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"e_1_3_2_1_28_1","unstructured":"SSH. 2018. Package Secure Shell of Debian. https:\/\/packages.debian.org\/wheezy\/ssh  SSH. 2018. Package Secure Shell of Debian. https:\/\/packages.debian.org\/wheezy\/ssh"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826279"},{"key":"e_1_3_2_1_30_1","unstructured":"OpenVZ Templates. 2018. Precreated template caches for different distributions. https:\/\/openvz.org\/Download\/template\/precreated  OpenVZ Templates. 2018. Precreated template caches for different distributions. https:\/\/openvz.org\/Download\/template\/precreated"},{"key":"e_1_3_2_1_31_1","unstructured":"TomP2P. 2015. A P2P-based high performance keyvalue pair storage library. http:\/\/tomp2p.net\/  TomP2P. 2015. A P2P-based high performance keyvalue pair storage library. http:\/\/tomp2p.net\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.03.007"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.07.017"},{"key":"e_1_3_2_1_34_1","unstructured":"Ubuntu. 2014. Ubuntu 14.04 archive. http:\/\/kr.archive.ubuntu.com\/ubuntu\/dists\/trusty\/main\/installer-amd64\/  Ubuntu. 2014. Ubuntu 14.04 archive. http:\/\/kr.archive.ubuntu.com\/ubuntu\/dists\/trusty\/main\/installer-amd64\/"},{"key":"e_1_3_2_1_35_1","unstructured":"VIM. 2014. Package Vi IMproved of Debian. https:\/\/packages.debian.org\/wheezy\/vim  VIM. 2014. Package Vi IMproved of Debian. https:\/\/packages.debian.org\/wheezy\/vim"},{"key":"e_1_3_2_1_36_1","unstructured":"Open vSwitch. 2018. Open Virtual Switch. http:\/\/openvswitch.org\/  Open vSwitch. 2018. Open Virtual Switch. http:\/\/openvswitch.org\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"e_1_3_2_1_38_1","volume-title":"Secure DNS Dynamic Update. RFC 3007","author":"Wellington Brian","year":"2000","unstructured":"Brian Wellington . 2000. Secure DNS Dynamic Update. RFC 3007 ( 2000 ). Brian Wellington. 2000. Secure DNS Dynamic Update. RFC 3007 (2000)."},{"key":"e_1_3_2_1_39_1","unstructured":"WordPress. 2018. WordPress 4.9.8. https:\/\/wordpress.org\/  WordPress. 2018. WordPress 4.9.8. https:\/\/wordpress.org\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks","author":"Zhuang Shelley","year":"2005","unstructured":"Shelley Zhuang , Kevin Lai , Ion Stoica , Randy Katz , and Scott Shenker . 2005. Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks ( 2005 ). Shelley Zhuang, Kevin Lai, Ion Stoica, Randy Katz, and Scott Shenker. 2005. Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks (2005)."}],"event":{"name":"MobiQuitous '18: Computing, Networking and Services","sponsor":["EAI The European Alliance for Innovation"],"location":"New York NY USA","acronym":"MobiQuitous '18"},"container-title":["Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3286996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286978.3286996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:07Z","timestamp":1750208527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3286996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":40,"alternative-id":["10.1145\/3286978.3286996","10.1145\/3286978"],"URL":"https:\/\/doi.org\/10.1145\/3286978.3286996","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}