Artigo Acesso aberto Revisado por pares

IDNet: Beyond All-IP Network

2015; Electronics and Telecommunications Research Institute; Volume: 37; Issue: 5 Linguagem: Inglês

10.4218/etrij.15.2415.0045

ISSN

2233-7326

Autores

Heeyoung Jung, Wan‐Seon Lim, Jungha Hong, Cinyoung Hur, Joochul Lee, Taewan You, Jee-Sook Eun, B.-J. Kwak, J.H. Kim, Hae Sook Jeon, Taewhan KIM, Woojik Chun,

Tópico(s)

Software-Defined Networks and 5G

Resumo

ETRI JournalVolume 37, Issue 5 p. 833-844 ArticleFree Access IDNet: Beyond All-IP Network Heeyoung Jung, Corresponding Author Heeyoung Jung hyjung@etri.re.kr Corresponding Authorhyjung@etri.re.krSearch for more papers by this authorWan-Seon Lim, Wan-Seon Lim wslim@etri.re.kr Search for more papers by this authorJungha Hong, Jungha Hong jhong@etri.re.kr Search for more papers by this authorCinyoung Hur, Cinyoung Hur cyhur@etri.re.kr Search for more papers by this authorJoo-Chul Lee, Joo-Chul Lee rune@etri.re.kr Search for more papers by this authorTaewan You, Taewan You twyou@etri.re.kr Search for more papers by this authorJeesook Eun, Jeesook Eun jseun@etri.re.kr Search for more papers by this authorByeongok Kwak, Byeongok Kwak kwakbok@etri.re.kr Search for more papers by this authorJeonghwan Kim, Jeonghwan Kim ditto@etri.re.kr Search for more papers by this authorHae Sook Jeon, Hae Sook Jeon hsjeon88@etri.re.kr Search for more papers by this authorTae Hwan Kim, Tae Hwan Kim thkimetri@etri.re.kr Search for more papers by this authorWoojik Chun, Woojik Chun woojikchun@gmail.com Search for more papers by this author Heeyoung Jung, Corresponding Author Heeyoung Jung hyjung@etri.re.kr Corresponding Authorhyjung@etri.re.krSearch for more papers by this authorWan-Seon Lim, Wan-Seon Lim wslim@etri.re.kr Search for more papers by this authorJungha Hong, Jungha Hong jhong@etri.re.kr Search for more papers by this authorCinyoung Hur, Cinyoung Hur cyhur@etri.re.kr Search for more papers by this authorJoo-Chul Lee, Joo-Chul Lee rune@etri.re.kr Search for more papers by this authorTaewan You, Taewan You twyou@etri.re.kr Search for more papers by this authorJeesook Eun, Jeesook Eun jseun@etri.re.kr Search for more papers by this authorByeongok Kwak, Byeongok Kwak kwakbok@etri.re.kr Search for more papers by this authorJeonghwan Kim, Jeonghwan Kim ditto@etri.re.kr Search for more papers by this authorHae Sook Jeon, Hae Sook Jeon hsjeon88@etri.re.kr Search for more papers by this authorTae Hwan Kim, Tae Hwan Kim thkimetri@etri.re.kr Search for more papers by this authorWoojik Chun, Woojik Chun woojikchun@gmail.com Search for more papers by this author First published: 01 October 2015 https://doi.org/10.4218/etrij.15.2415.0045Citations: 12 Heeyoung Jung (corresponding author, hyjung@etri.re.kr), Wan-Seon Lim (wslim@etri.re.kr), Jungha Hong (jhong@etri.re.kr), Cinyoung Hur (cyhur@etri.re.kr), Joo-Chul Lee (rune@etri.re.kr), Taewan You (twyou@etri.re.kr), Jeesook Eun (jseun@etri.re.kr), Byeongok Kwak (kwakbok@etri.re.kr), Jeonghwan Kim (ditto@etri.re.kr), Hae Sook Jeon (hsjeon88@etri.re.kr), and Tae Hwan Kim (thkimetri@etri.re.kr) are with the Communications & Internet Research Laboratory, ETRI, Daejeon, Rep. of Korea. Woojik Chun (woojikchun@gmail.com) is with the Department of Information & Communications Engineering, Hankuk University of Foreign Studies, Yongin, Rep. of Korea. AboutSectionsPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinkedInRedditWechat Abstract Recently, new network systems have begun to emerge (for instance, 5G, IoT, and ICN) that require capabilities beyond that provided by existing IP networking. To fulfill the requirements, some new networking technologies are being proposed. The promising approach of the new networking technology is to try to overcome the architectural limitations of IP networking by adopting an identifier (ID)-based networking concept in which communication objects are identified independently from a specific location and mechanism. However, we note that existing ID-based networking proposals only partially meet the requirements of emerging and future networks. This paper proposes a new ID-based networking architecture and mechanisms, named IDNet, to meet all of the requirements of emerging and future networks. IDNet is designed with four major functional blocks — routing, forwarding, mapping system, and application interface. For the proof of concept, we develop numeric models for IDNet and implement a prototype of IDNet. I. Introduction With the huge rise in popularity of Internet services, IP networking is becoming the base technology for most kinds of fixed, mobile networks. The networks based on IP networking are usually known as "All-IP networks" and provide an effective solution for network providers in terms of capital expenditures and operating expenses. However, recently, new network systems have begun to emerge that require capabilities beyond that provided by existing IP networking. For instance, the 5G system envisions large traffic volume for mobile data, a greater number of connected devices, lower latency, and longer battery life for low-power devices [1]. Existing IP networking has difficulty in satisfying these visions, especially in terms of scalability, traffic distribution, and the support of constraint environments. In a similar sense, the Internet of Things (IoT) is another big challenge for IP networking because of its limited capability to support essential IoT requirements, such as scalability, resource constraints, different traffic characteristics, handling mobility, and so on [2]. In addition, it is argued that IP networking cannot efficiently support data or information-centric networking, which is a crucial requirement in the popular information-based applications of today, because of its location-centric feature [3]. Due to the limited capability of IP networking, new networking technologies have been proposed in evolutionary and revolutionary manner. We note that the promising approach is to try to overcome the architectural limitations of IP networking, which originate from the fact that an IP address is tightly coupled with a specific location and forwarding mechanism, by adopting an identifier (ID)-based networking concept. In ID-based networking, an ID uniquely identifies communication objects irrespective of specific locations and mechanisms. As evolutional approaches, many kinds of ID/locator (ID/LOC) split proposals pursue the separation of an ID from location information to solve problems of location-based routing and forwarding in IP networking. However typical ID/LOC split proposals, such as Locator/ID Separation Protocol (LISP), Host Identity Protocol (HIP), and Identifier/Locator Network Protocol (ILNP), still have a high dependency on existing IP networking; thus, they inherit some limitations [4]–[6]. In these proposals, some existing mechanisms (such as IP address–based identification, location based routing/forwarding mechanisms, and BSD socket API) are still used. Furthermore, we note that they focus on specific problems such as BGP scalability and security rather than provide a holistic solution. Recently, there have been more revolutionary proposals for ID-based networking — Mobile Oriented Future Internet (MOFI), Named Data Networking (NDN), Network of Information (NetInf), expressive Internet Architecture (XIA), and MobilityFirst (MF) being some typical examples [7]–[11]. These proposals not only adopt the ID-based networking concept but also introduce new architectures and mechanisms to support emerging networking environments. However, they still have some critical open issues, such as support for various kinds of communication objects, scalable routing/forwarding, support for constrained environments, practical deployment, and so on. Based on an analysis of existing ID-based networking proposals, we conclude that there is no such proposal that can yet adequately meet all of the needs of the newly emerging networks. Section II will discuss the limitations of the evolutionary and revolutionary approaches in detail. In this paper, we propose a new ID-based networking architecture and mechanisms, named IDNet, to meet the requirements for emerging and future networks. IDNet is aiming to resolve most of today's critical issues to realize ID-based networking, such as ID-based identification, scalable routing/forwarding, and efficient support of dynamic network environments. IDNet is functionally composed of four major blocks — routing, forwarding, mapping system, and application interface. We also evaluate the scalability of IDNet with numerical models and develop a prototype of IDNet on Linux and Android platforms. This paper is organized as follows. Section II describes related work. Section III introduces the overall architecture and procedures of IDNet. Section IV shows our numerical analysis and implementation results. Finally, Section V briefly summarizes the main features of IDNet and concludes this paper. II. Related Work ID/LOC split protocols are mainly proposed to overcome routing scalability, multi-homing, and mobility problems by introducing host IDs into the current Internet. LISP, ILNP, and HIP are typical examples of ID/LOC split protocols. LISP [4] separates an End host ID (EID) from Routing Locators (RLOC) to mainly address board gateway protocol (BGP) routing scalability. In LISP, both EID and RLOC have identical formats to a current IPv4 or IPv6 address, which are allocated to a network interface rather than a host. The major benefit of LISP is to reduce growth of BGP routing table size without disruption of current Internet architecture. On the other hand, ILNP [5] creates an EID by splitting IP addresses into two distinct namespaces. In the case of ILNPv6, the first 64 bits are used as a locator and the last 64 bits are used as an ID. From the perspective of practical deployment, ILNP is considered the most applicable ID/LOC split protocol. However, in both protocols, ID assignment to network-interface and IP address–based networking mechanisms remains unchanged from conventional IP networking; so, they have to inherit some limitations of IP networking. Unlike LISP and ILNP, HIP [6] introduces a new namespace for a host to decouple the role of endpoint ID from IP address while the IP address is still used as a locator. The Host ID (HI) is a public cryptographic key and is used to easily implement an IP security protocol for security enhancement. HIP acts as a limited form of trust mechanism between two end hosts, enhanced mobility, and multi-homing. However, HIP, as with LISP, still uses an IP networking mechanism for the communication between two hosts. MOFI, NDN, NetInf, XIA, and MF are typical revolutionary proposals. MOFI [7] is targeting a new networking technology optimized for a mobile oriented environment. MOFI introduces a new namespace for the host ID and provides two-tier ID/LOC, intra- and inter-mapping systems, and adopts a query-first-packet delivery mechanism. MOFI provides an optimized solution for a mobile-host-dominant environment; however, it considers only hosts as communication objects and does not provide ID-based routing/forwarding mechanism. NDN [8] replaces a network service model from delivering data to a given destination address with the aim of fetching data identified by a given name. In NDN, hierarchical names are used as IDs to identify various types of data. Also, NDN reduces network traffic and latency with an in-network caching mechanism in which intermediate NDN routers maintain copies of original data. However, NDN primarily focuses only on specific communication objects (data); thus, there are some critical issues, such as scalable name-based routing, that have yet to be realized. NetInf [9] also uses the data name as the ID and proposes a hybrid name/address-based routing and name resolution scheme for Information Centric Networking (ICN). NetInf forwards a Name Data Object request and transfers the corresponding objects by using name-based routing and forwarding or with the assistance of name resolution services. The hybrid routing approach also provides efficient mobility and multi-homing support. However, the realization of a scalable mapping system and name-based routing are still open issues. XIA [10] supports IDs for multiple communication objects with abstraction principals. XIA defines four basic XIA Identifier (XID) types — Host XIDs, Service XIDs (SIDs), Content XIDs, and Network XIDs — and these four XIDs are formed in self-certifying IDs to achieve intrinsic security properties. XIA also supports technology evolvability with a fallback mechanism using directed acyclic graphs (DAGs). However, the representation of various communication types should be included into DAGs in advance and provision of additional information to declare service types in a scalable manner are still open issues. MF [11] proposes a globally unique ID (GUID) for various types of communication objects and dynamic network address (NA) to improve mobility and trustworthiness. MF considers two different forwarding ways in which routers directly use NA as fast path and resolve GUID again as slow path. MF, as with NetInf, is required to verify scalable resolution systems, such as Name Certification Service and Global Name Resolution Service, to support a large quantity of content or devices. III. IDNet 1. Design Principles Based on the observations on the requirements for new networking technology and the limitations of existing solutions, we have identified the following design principles for a new ID-based networking architecture. A. Location and Mechanism–Independent ID If an ID contains certain information regarding a location or packet forwarding, then it is likely to cause an inefficient delivery path in a dynamic network environment (for instance, mobility) or act as a barrier against the future evolution of the network. Therefore, ID-based networking should use an ID in such a way so that it is independent of a location and an underlying mechanism. In addition, a fixed size ID is preferred for fast exact-matching (EM) forwarding in intermediate nodes. Note that an ID can also be a non-aggregatable flat ID so as to provide a secure function; for instance, a hash of a public key. B. Gateway (GW)-Based Internetworking Considering emerging heterogeneous or constrained networking environments (for instance, 5G and IoT), ID-based networking should adopt GW-based internetworking rather than existing end host–based networking, which requires high capability of the end host. GW-based internetworking allows a minimum implementation in constrained communication objects, by placing most network functions on GW, and allows each domain to use its own networking technologies for optimized intranetworking. C. Dynamic and Scalable Routing Protocol It has been noted that many kinds of newly emerging networks are designed for supporting mobile or wireless environments having a dynamic network topology. Also, a destination object can reside at multiple locations due to the existence of copies. Accordingly, a routing protocol for ID-based networking should support the aforementioned dynamics in an efficient manner. In addition, considering the huge number of communication objects, such as in the IoT, services, and contents, the routing protocol should provide scalability too. Note that scalability is also closely coupled with network dynamics, as can be seen in the BGP routing table size explosion problem. D. Scalable and Fast ID-Based Forwarding Mechanism Not only a huge number of hosts but also various kinds of communication objects, such as contents and services, should be considered in ID-based networking. In such a case, if IDs are non-aggregatable, then the size of the forwarding table for IDs will be of crucial concern. To overcome this problem, a scalable ID-based forwarding mechanism should be provided. In addition, to support futuristic services requiring low latency, the processing delay for packet forwarding should be minimized as much as possible. In this context, EM using a fixed-size flat ID is preferred to longest prefix matching (LPM) of existing IP networking. E. Scalable Mapping System Supporting Locality From the point of view of scalability, a Lookup by ID (LBI) mechanism is generally preferred to that of a Route by ID (RBI). In the case of an LBI, a mapping system for mapping IDs to locators is an essential element. To support a tremendous number of non-aggregatable IDs, the mapping system should be scalable. In addition, it should provide locality to make the location keeping the mapping information manageable, from an administrative perspective. Quick responses to location queries are another essential requirement for real-time services. F. Application Interface with Separation of Intent from Location and Mechanism The separation of intent (for instance, data, user, or service) of a communication initiator from a specific location and an underlying delivery mechanism is a common requirement for ID-based networking. Therefore, an application interface for ID-based networking should separate any intent from a predefined location and mechanism to deliver the intent. 2. Overall Architecture In IDNet, we assume a fixed-size flat ID, which uniquely identifies a communication object without the need for additional information regarding location and underlying mechanisms. An ID can be allocated to any type of object, such as a host, a user, a content, a service, and can be a self-certifying form for trustworthy communication, if required. A hash of a public key could be a typical example of a self-certifying ID. The four major functional blocks of IDNet are illustrated in Fig. 1. Note that packet delivery within a domain is accomplished with an underlying networking technology and applications use new ID-based application interfaces. Figure 1Open in figure viewerPowerPoint Four major blocks of IDNet. A. Recursive Inter-domain Routing For scalable inter-domain routing, IDNet proposes recursive hierarchical domain structures, as shown in Fig. 2(a). The domains may be aggregated into a larger domain by federating domains with either parent-child or peer-to-peer relations. Based on the structure, we propose a recursive inter-domain routing (RDR) protocol for IDNet. The proposed protocol is based on the link-state protocol and adopts a link state advertisement (LSA) filtering mechanism to reduce routing table size. In particular, each IDGW, which is an entry or exit point of a domain, broadcasts link states of equal or higher-tier domain only by sending LSAs. With the information gathered from the LSAs, each IDGW builds a global topology DB and generates a routing table. Figure 2(b) shows a routing table of IDGW at domain "A:1" in Fig. 2(a). Since the change in a specific domain affects only peer and lower domains, RDR can rapidly respond to a change of network topology and efficiently address network dynamics. Figure 2Open in figure viewerPowerPoint RDR: (a) example topology and (b) corresponding routing table. B. Reactive ID Forwarding In IDNet, a forwarding path between communication objects is set up in a reactive manner and unused entries are removed on a timeout basis for scalability. With this reactive path setup, the size of a forwarding table can be reduced by a reasonable level. When an IDGW receives the first packet from the sending of an object and has no forwarding entry in the forwarding table for a destination ID, it obtains a locator of the destination ID in the form of concatenated domain IDs (for example, "A:1:c" in Fig. 2(a)) from an ID/LOC mapping system (ILMS). Then, it performs a path-setup procedure based on the locator and finds the next hop according to its routing table. After the path setup, two objects can communicate with each other. Note that packet forwarding after a path setup can be processed quickly by an EM using fixed-size flat-IDs. C. ID/LOC mapping system (ILMS) Since IDNet adopts an LBI approach, it essentially needs a system to provide a mapping between IDs and LOCs. We design an ILMS that stores and maintains the binding between ID and locator to provide a hint for the reactive path setup. As Fig. 3 shows, an ILMS is constructed hierarchically as a network of mapping servers (MSs) including peering relationships, where several distinct trees are fully peered on the top. A bloom filter (BF) is an aggregated form of flat-IDs. Each MS consists of a mapping table (MT) and BFs for itself, from children, and from peers. Each MS announces the union of all the BFs from children and the BF for itself through a bitwise 'OR' operation to parents and peers. Flat-IDs can be registered anywhere according to a user's request, and a BF update then transcends to the top of trees. A map-request message is forwarded toward the MS where the binding is actually stored by the BF test, and the map-reply message then takes the reverse path. Figure 3Open in figure viewerPowerPoint ILMS structure. To address the scalability on the ever-increasing number of IDs, flat-IDs are distributed and aggregated through the hierarchical structuring of a BF. Locality can be also easily supported since there is no constraint on registering flat-IDs in an ILMS. D. ID-Based API To achieve the decoupling of an ID from a specific location and networking mechanism, IDNet requires new ID-based APIs. Figure 4 shows the components of an API and the actions among them. Figure 4Open in figure viewerPowerPoint ID-based networking API components. The iPlug takes charge of application-specific capabilities and has customizable functions, such as a new naming scheme and flow control. The dSocket acts as the cut-off point of separation and contains the responsibilities of a network, such as addressing, mobility, and multi-homing. The dSocket Manager dynamically matches iPlug and dSocket by plugging in and out. In contrast with Internet BSD socket API that uses an IP address and port pairs, the ID-based API here allows applications to use both a source ID and a destination ID to identify communication entities. An application can also be dynamically bound to a specific communication environment by plugging its iPlug into a dSocket. Since applications can select, move between different communication environments, or join multiple environments simultaneously, an ID-based API can efficiently support mobility, multi-homing, N-screen, evolvability, and so on in an efficient manner. 3. Procedures Communication between two objects basically consists of ID registration, locator query/reply to/from ILMS, and packet delivery. Detailed procedures are given in the following subsections. A. ID Registration and Locator Query/Reply Figure 5 shows an example of procedures of ID registration and locator query, where three trees having nine MSs are fully peered on the top. When MS4 receives a registration message for an ID, it inserts the ID and locator into its MT and updates its own BF. Then, it sends a "BF update" message to its parents (MS1), and then MS1 updates BFs for its peers (MS2 and MS3). In the example shown in Fig. 5, we assume that MS4 receives a "Map-request" message for the ID registered in MS9. MS4 first searches its own BF, but it returns a negative answer. In the next step, a "Map-request" message is forwarded to its parents (MS1) and MS1 forwards it to MS3 through its BF search. Then, the "Map-request" message is forwarded from MS3 to MS9. MS9 looks up its MT and finds out the requested mapping information. Now, MS9 sends a "Map-reply" message on the locator of the ID to MS3. Finally, the "Map-request" message is forwarded to the map requester going through MS1 and MS4. Figure 5Open in figure viewerPowerPoint Procedures of ID registration and locator query/reply. B. Packet Delivery Figure 6 depicts an example of packet delivery between two hosts. If an application begins communication, then it should first bind its ID to an iPlug. After binding to the iPlug, the application becomes an entity of IDNet, called ID entity, and it can communicate with other ID entities by sending ID packets through the iPlug. The ID entity plugs into a dSocket to use the IDNet. The dSocket may be in a local host, which supports the IDGW functionalities or one of the IDGWs of the current domain. When the ID entity plugs into the dSocket, the owner of the dSocket becomes a default IDGW of the ID entity. The default IDGW updates the ID entity's current locator to ILMS. Then, ID packets sent from the ID entity are forwarded to the default IDGW via the dSocket. Figure 6Open in figure viewerPowerPoint Procedures of ID packet delivery. If the default IDGW has an entry for the destination ID in its forwarding cache, then the packet can be forwarded to a next-hop IDGW immediately. Otherwise, it performs the path setup procedure as follows. The IDGW queries a current locator for the destination ID from ILMS. After obtaining the locator, the IDGW sends a "Path request" message to the next IDGW based on the routing table information, which is generated via an RDR protocol. This message propagation repeats until the "Path request" message reaches a final IDGW, which is the default IDGW of the destination ID or an IDGW that has an existing forwarding cache entry for the destination ID. After the path setup procedure ends successfully, ID packets are forwarded according to the forwarding cache information. The ID entity can plug out of dSocket after finishing communication or to move to a different domain. If a locator of the destination ID changes during communication, then the path setup procedure is triggered by the previous default IDGW of the destination ID. The location-change scenarios will be described in detail in Section IV-2. IV. Numerical Analysis and Implementation A proof of concept of IDNet is accomplished in two ways — numerical analysis and the development of a prototype. The former is mainly to verify the scalability of the proposed routing protocol (RDR) and ILMS, and the latter is to prove superiority of IDNet in dynamic network environments. 1. Numerical Analysis To verify the scalability issues of RDR and ILMS, we have developed numerical models for each. A. RDR For analysis of RDR, we made the following assumptions: ■ With the exception of leaf domains, each domain has an equal number of child domains (or as equal as possible). ■ There is only one IDGW per domain. ■ The location shape of the peer domains in the same parent domain is of a grid type. ■ The total number of domains in the whole network is n. ■ The lowest tier number is denoted by t, where the tier number of the top-level domain is 1. We first derive equations for the topology graph size, which is the most intuitive metric for the routing scalability. Let d be the average number of child domains. We then have (1) If we fix the value of t, then we can obtain the value of d from (1). When a gateway belongs to tier ), the size of its topology graph is about owing to the LSA filtering rule in RDR. Therefore, we can obtain the average topology graph size by (2) Figure 7 shows the topology graph size obtained from (2) with varying t. Note that when , RDR works as a legacy link-state routing protocol with no hierarchy. When , because every IDGW has a complete topology graph, the topology graph size is n. As we can see in the figure, the topology graph size is dramatically reduced with an increase in the value of t (y-axis in the logarithmic scale). If we set , then we can keep the topology graph size under 100 until n is , which is much larger than the total number (66,249) of autonomous system numbers (ASNs) on the Internet today. Figure 7Open in figure viewerPowerPoint Average topology graph size of RDR with varying t. The main disadvantage of RDR over a legacy link-state routing is the route optimality. Since gateways in RDR maintain an abstracted topology graph, they cannot always find the optimal end-to-end routes. To test the route optimality, we measure the routing stretch of RDR, which is defined by the ratio between the length of the selected route in RDR and the length of the optimal route. Here, we only consider routes between two leaf domains. Let lk denote the average number of hops among peer routers, where k peer domains belong to the same parent domain. The probability of two leaf domains having a different top level domain is . In this case, the route length is (3) Otherwise, the probability of the two leaf domains having the same domains from the top tier to tier is , and the route length in this case is (4) Finally, the probability of the two leaf domains having the same domains from the top tier to tier is . In this case, the route length is ld because they are peer domains of each other. Therefore, the average route length is (5) Based on (5), we calculated the routing stretch of RDR. As shown in Fig. 8, the routing stretch is highly affected by the value of t. With RDR, the network administrator can opportunistically adjust the value of t by considering the total number of domains and the administrator's preference. For example, if routers have significant computing power and a low end-to-end delay is required, then t should be set to a small value. Otherwise, t can be set to a large value for reducing the overhead. Figure 8Open in figure viewerPowerPoint Routing stretch of RDR with varying t. B. ILMS In ILMS, it is important to minimize the number of queries to MSs, since a large number of queries will be translated to the additional burden of MSs, which eventually leads to performance degradation and inefficiency. Thus, we build an analytical model to calculate the average number of MS accesses per a locator query. We assume that ILMS is constructe

Referência(s)
Altmetric
PlumX