Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Harry Chandra Tanuwidjaja

20165650

Paper 3 Review – A Survey of Identifier-locator Split Addressing Architectures

This paper is a survey paper about addressing problems on Internet and how to cope with them. There
are five main problems discussed here, including mobility, multihoming, site renumbering, routing
scalability, and Internet transparency. Mobility issue is about device movement, resulting in IP address
change. Multihoming is caused by multiple possible paths to end host. Site renumbering issues arise
because of manually configured IP address or cached IP address. Routing scalability is caused by the use
of Provider Independent (PI) addresses over Provider Allocated (PA) addresses which are not aggregate
well and causing routing scalability issue. Internet transparency is closely related to security issue. As the
number of Internet user grows, there can be adversaries between them. Man in the middle attack is one
example of Internet transparency issue. In order to solve those issues, the writer listed three kind of
methods, such as: solution based on core-edge elimination, gateway-based solutions, and solutions based
on core-edge separation. They analyzed the architecture characteristics of each solution based on method
used, deployment type, legacy apps support, and changes of infrastructure required. Weakness of this
paper is no implementation, at least simulation for the proposed solutions. As a result, we can’t get the
approximation of performance, and what kind of hindrance that appear in actual condition. How is the
performance of each method in real life? How much cost needed for infrastructure changes for each
method and which one is the most cost effective for each case?

Paper 4 Review - Host Identity Protocol (HIP): Connectivity, Mobility, Multi-


homing, Security, and Privacy over IPv4 and IPv6 Networks

This paper is a survey paper about Host Identity Protocol (HIP), including it architecture, design, benefits,
potential drawback, and ongoing work. HIP main function is to overcome the security flaw in TCP/IP, which
uses an IP address for identity and location. HIP separates the end-point identifier and locator roles of IP
address, so we can ensure secure networking. The weakness of this paper is not much analysis in
deployment issue. They also give little explanation about the handover problem, aside from break before
make and make before break concept in HIP. However, I think it will be better to include things about
tracking mobile host and network prefix assignment during handover. I wonder how is the performance
of HIP in terms of latency and signaling overhead? Is it possible to use HIP in Software Defined Networks?

You might also like