{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:38:07Z","timestamp":1747802287329,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319157047"},{"type":"electronic","value":"9783319157054"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15705-4_45","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T05:21:23Z","timestamp":1426483283000},"page":"463-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Implementation and Performance Testing of ID Layer Nodes for Hierarchized IoT Network"],"prefix":"10.1007","author":[{"given":"Jordi","family":"Mongay Batalla","sequence":"first","affiliation":[]},{"given":"Mariusz","family":"Gajewski","sequence":"additional","affiliation":[]},{"given":"Waldemar","family":"Latoszek","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Krawiec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Mongay Batalla, J., Krawiec, P.: Conception of ID layer performance at the network level for Internet of Things. Springer Personal and Ubiguitous Computing (2013)","DOI":"10.1007\/s00779-013-0664-0"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"B\u0119ben, A., Mongay Batalla, J., Wi\u015bniewski, P., Xilouris, G.: A Scalable and Flexible Packet Forwarding Method for Future Internet Networks. In: IEEE Globecom 2014. The source code for Flexible Packet Forwarding (FPF) method may be found in: http:\/\/tnt.tele.pw.edu.pl\/software_fpf.php","DOI":"10.1109\/GLOCOM.2014.7037099"},{"key":"45_CR3","unstructured":"Website of CAN in Automation (CiA). http:\/\/www.can-cia.de\/"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"\u015awi\u0105tek, P., Klukowski, P., Brzostowski, K., Drapa\u0142a, J.: Application of wearable smart system to support physical activity. In: Advances in Knowledge-Based and Intelligent Information and Engineering Systems, pp. 1418\u20131427. IOS Press (2012)","DOI":"10.1007\/978-3-642-42017-7_21"},{"key":"45_CR5","unstructured":"Hunt J.: Building automation migrates towards Ethernet and wireless, Industrial Wireless Book, Issue 69, April 2012. http:\/\/www.iebmedia.com\/wireless.php?id=8593&parentid=74&themeid=255&hft=69&showdetail=true&bb=1"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Sourabh, J., Yingying, C., Zhi-Li, Z.: VEIL: A \u201cPlug-&-Play\u201d virtual (ethernet) Id layer for below IP networking. In: 1st IEEE workshop on below IP Networking 2009 (In conjunction with IEEE Globecom 2009) (2009)","DOI":"10.1109\/GLOCOMW.2009.5360774"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Kim, C., Caesar, M., Rexford, J.: Floodless in SEATTLE: a scalable ethernet architecture for large enterprises. In: SIGCOMM (2008)","DOI":"10.1145\/1402958.1402961"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Caesar, M., Castro, M., Nightingale, E.B., O\u2019Shea, G., Rowstron, A.: Virtual ring routing: network routing inspired by DHTS. SIGCOMM Computer Communication Rev. (2006)","DOI":"10.1145\/1159913.1159954"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Caesar, M., Condie, T., Kannan, J., Lakshminarayanan, K., Stoica, I.: Rofl: routing on flat labels. In: SIGCOMM (2006)","DOI":"10.1145\/1159913.1159955"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Ford, B.: Unmanaged internet protocol: taming the edge network management crisis. SIGCOMM Computer Communication Rev. (2004)","DOI":"10.1145\/972374.972391"},{"key":"45_CR11","unstructured":"Website of PROFIBUS and PROFINET International (PI). http:\/\/www.profibus.com"},{"key":"45_CR12","unstructured":"Website of global standards development and trade association for Common Industrial Protocol or \u201cCIP\u201d \u2013 and the network adaptations of CIP \u2013 EtherNet\/IP, DeviceNet, CompoNet and ControlNet. http:\/\/www.odva.org\/"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Bradner, S., McQuaid, J.: Benchmarking Methodology for Network Interconnect Devices. Requests For Comments RFC 2544 (1999)","DOI":"10.17487\/rfc2544"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15705-4_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:16:12Z","timestamp":1747786572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15705-4_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319157047","9783319157054"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15705-4_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}