Home as you go: an engineering approach to mobility-capable extended home networking
Pages 89 - 95
Abstract
In this paper we describe and discuss the design choices of Apple Inc.'s Back to My Mac (BTMM) service. BTMM provides an integrated solution to host mobility support, NAT traversal, and secure end-to-end data delivery through a combination of several existing protocols and software tools. We discuss BTMM's design tradeoffs and examine its applicability as a general solution to mobility-capable extended home networks.
References
[1]
http://www.apple.com/mobileme/.
[2]
www.upnp.org.
[3]
http://ipsec-tools.sourceforge.net/.
[4]
Guidelines for 64-bit global identifier (eui-64) registration authority. http://standards.ieee.org/develop/regauth/tut/eui64.pdf.
[5]
R. Atkinson, S. Bhatti, and S. Hailes. Evolving the internet architecture through naming. IEEE Journal on Selected Areas in Communication (JSAC), October 2010.
[6]
S. Cheshire, M. Krochmal, and K. Sekar. Dns long-lived queries. IETF draft-sekar-dns-llq-01.txt, August 2006.
[7]
S. Cheshire, M. Krochmal, and K. Sekar. Dynamic dns update leases. IETF draft-sekar-dns-ul-01.txt, August 2006.
[8]
S. Cheshire, M. Krochmal, and K. Sekar. Nat port mapping protocol (nat-pmp). IETF draft-cheshire-nat-pmp-03.txt, April 2008.
[9]
A. Gulbrandsen, P. Vixie, and L. Esibov. A dns rr for specifying the location of services (dns srv). IETF RFC 2782, February 2000.
[10]
R. Hinden and B. Haberman. Unique local ipv6 unicast address. IETF RFC 4193, October 2005.
[11]
A. Huttunen, B. Swander, V. Volpe, L. Diburro, and M. Stenberg. Udp encapsulation of ipsec esp packets. IETF RFC 3948, January 2005.
[12]
D. Johnson, C. Perkins, and J. Arkko. Mobility support in ipv6. IETF RFC 3775, June 2004.
[13]
C. Kaufman. Internet key exchange (ikev2) protocol. IETF RFC 4306, December 2005.
[14]
S. Kent. Ip encapsulation security payload (esp). IETF RFC 4303, December 2005.
[15]
T. Kivinen and H. Tschofenig. Design of ikev2 mobility and multihoming (mobike) protocol. IETF RFC 4621, August 2006.
[16]
R. Moskowitz, R. Nikander, and T. Henderson. Host identity protocol. IETF RFC 5201, April 2008.
[17]
B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, September 1994.
[18]
Nokia. The evolution for mobile vpn and its implications for security. White Paper, June 2005.
[19]
H. Park, I. Lee, T. Hwang, and N. Kim. Architecture of home gateway for device collaboration in extended home space. IEEE Transactions on Consumer Electronic, November 2008.
[20]
Y. Rekhter, B. Moskowtiz, D. Karrenberg, G. J. de Groot, and E. Lear. Address allocation for private internets. IETF RFC 1918, February 1996.
[21]
J. Rosenberg, R. Mahy, P. Matthews, and D. Wing. Stun - simple traversal of user datagram protocol (udp) through network address translators (nats). IETF RFC 5389, October 2008.
[22]
P. Vixie, O. Gudmundsson, D. E. 3rd, and B. Wellington. Security key transaction authentication for dns (tsig). IETF RFC 2845, May 2000.
[23]
P. Vixie, S. Thomson, Y. Rehter, and J. Bound. Dynamic updates in the domain name system(dns update). IETF RFC 2136, April 1997.
Index Terms
- Home as you go: an engineering approach to mobility-capable extended home networking
Recommendations
NTMobile: new end-to-end communication architecture in IPv4 and IPv6 networks
MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networkingWith the spread of mobile devices, there is a growing demand for direct communication between users. However, under recent complex IP networks, it is extremely hard to establish a direct connection between devices. In order to solve the problem, authors ...
Comments
Information & Contributors
Information
Published In
Copyright © 2011 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 09 November 2011
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
AINTEC '11
Sponsor:
Acceptance Rates
Overall Acceptance Rate 15 of 38 submissions, 39%
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 117Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in