Achieving Mobility and Network Isolation Without Tunnels

Up until now the common wisdom has been to support mobility by using tunnelling protocols to create bearer flows, but with the drive towards network virtualisation this same common wisdom will lead to tunnels, within tunnels, within tunnels. Seems madly inefficient and likely not to work. However, what if mobility is looked at as nothing more than