Achieving Mobility and Network Isolation Without Tunnels

Up until now the common wisdom has beenĀ to support mobility by usingĀ tunnelling protocols to create bearer flows, but with the drive towards network virtualisation this same common wisdom will lead to tunnels, within tunnels, within tunnels. Seems madly inefficient and likely not to work. However, what if mobility is looked at as nothing more than