{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:46:45Z","timestamp":1762868805429,"version":"build-2065373602"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11227-022-04448-w","type":"journal-article","created":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:03:07Z","timestamp":1649062987000},"page":"14471-14503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Softwarization and virtualization of VoIP networks"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4968-2375","authenticated-orcid":false,"given":"Ahmadreza","family":"Montazerolghaem","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,4]]},"reference":[{"key":"4448_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.neucom.2019.12.072","volume":"386","author":"Z Hu","year":"2020","unstructured":"Hu Z, Yan H, Yan T, Geng H, Liu G (2020) Evaluating QoE in VoIP networks with QoS mapping and machine learning algorithms. Neurocomputing 386:63\u201383","journal-title":"Neurocomputing"},{"issue":"4","key":"4448_CR2","doi-asserted-by":"publisher","first-page":"518","DOI":"10.15837\/ijccc.2019.4.3563","volume":"14","author":"W Nazih","year":"2019","unstructured":"Nazih W, Hifny Y, Elkilani W, Abdelkader T, Faheem H (2019) Efficient detection of attacks in sip based VoIP networks using linear l1-SVM classifier. Int J Comput Commun Control 14(4):518\u2013529","journal-title":"Int J Comput Commun Control"},{"key":"4448_CR3","volume-title":"SIP: understanding the session initiation protocol","author":"AB Johnston","year":"2015","unstructured":"Johnston AB (2015) SIP: understanding the session initiation protocol. Artech House, Norwood"},{"key":"4448_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9781315218939","volume-title":"SIP handbook: services, technologies, and security of session initiation protocol","author":"SA Ahson","year":"2018","unstructured":"Ahson SA, Ilyas M (2018) SIP handbook: services, technologies, and security of session initiation protocol. CRC Press, Boca Raton"},{"issue":"2","key":"4448_CR5","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TNSM.2019.2908675","volume":"16","author":"E Coronado","year":"2019","unstructured":"Coronado E, Khan SN, Riggio R (2019) 5G-empower: a software-defined networking platform for 5G radio access networks. IEEE Trans Netw Serv Manag 16(2):715\u2013728","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"4448_CR6","doi-asserted-by":"crossref","unstructured":"Sarker Z, Perkins C, Singh V, Ramalho M (2021) RTP control protocol (RTCP) feedback for congestion control. Internet RFC, no\u00a08888","DOI":"10.17487\/RFC8888"},{"issue":"1","key":"4448_CR7","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TNSM.2017.2741258","volume":"15","author":"A Montazerolghaem","year":"2017","unstructured":"Montazerolghaem A, Moghaddam MHY, Leon-Garcia A (2017) OpenSIP: toward software-defined SIP networking. IEEE Trans Netw Serv Manag 15(1):184\u2013199","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"4448_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1002\/bltj.10","volume":"6","author":"VK Gurbani","year":"2002","unstructured":"Gurbani VK, Chiang T-C, Kumar S (2002) SIP: a routing protocol. Bell Labs Tech J 6(2):136\u2013152","journal-title":"Bell Labs Tech J"},{"issue":"21","key":"4448_CR9","doi-asserted-by":"publisher","first-page":"e6424","DOI":"10.1002\/cpe.6424","volume":"33","author":"A Montazerolghaem","year":"2021","unstructured":"Montazerolghaem A (2021) Optimizing VoIP server resources using linear programming model and autoscaling technique: an SDN approach. Concurr Comput Pract Exp 33(21):e6424","journal-title":"Concurr Comput Pract Exp"},{"key":"4448_CR10","doi-asserted-by":"crossref","unstructured":"Yang L, Ng B, Seah WK, Groves L, Singh D (2020) A survey on network forwarding in software-defined networking. J Netw Comput Appl 102947","DOI":"10.1016\/j.jnca.2020.102947"},{"key":"4448_CR11","doi-asserted-by":"crossref","unstructured":"Nisar K, Welch I, Hassan R, Sodhro AH, Pirbhulal S (2020) A survey on the architecture, application, and security of software defined networking. Internet Things 100289","DOI":"10.1016\/j.iot.2020.100289"},{"issue":"2","key":"4448_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TPDS.2020.3017001","volume":"32","author":"S Yang","year":"2020","unstructured":"Yang S, Li F, Trajanovski S, Yahyapour R, Fu X (2020) Recent advances of resource allocation in network function virtualization. IEEE Trans Parallel Distrib Syst 32(2):295\u2013314","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"10","key":"4448_CR13","doi-asserted-by":"publisher","first-page":"2218","DOI":"10.1109\/JSAC.2018.2869958","volume":"36","author":"X Cheng","year":"2018","unstructured":"Cheng X, Wu Y, Min G, Zomaya AY (2018) Network function virtualization in dynamic networks: a stochastic perspective. IEEE J Sel Areas Commun 36(10):2218\u20132232","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"4448_CR14","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Review 38(2):69\u201374","journal-title":"ACM SIGCOMM Comput Commun Review"},{"issue":"2","key":"4448_CR15","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/s12083-018-0632-6","volume":"12","author":"T Hu","year":"2019","unstructured":"Hu T, Lan J, Zhang J, Zhao W (2019) EASM: efficiency-aware switch migration for balancing controller loads in software-defined networking. Peer-to-Peer networking and applications 12(2):452\u2013464","journal-title":"Peer-to-Peer networking and applications"},{"key":"4448_CR16","doi-asserted-by":"publisher","first-page":"24290","DOI":"10.1109\/ACCESS.2019.2893283","volume":"7","author":"J Lu","year":"2019","unstructured":"Lu J, Zhang Z, Hu T, Yi P, Lan J (2019) A survey of controller placement problem in software-defined networking. IEEE Access 7:24290\u201324307","journal-title":"IEEE Access"},{"key":"4448_CR17","doi-asserted-by":"publisher","first-page":"98612","DOI":"10.1109\/ACCESS.2020.2995849","volume":"8","author":"MR Belgaum","year":"2020","unstructured":"Belgaum MR, Musa S, Alam MM, Suud MM (2020) A systematic review of load balancing techniques in software-defined networking. IEEE Access 8:98612\u201398636","journal-title":"IEEE Access"},{"issue":"3","key":"4448_CR18","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/COMST.2020.2997475","volume":"22","author":"W Rafique","year":"2020","unstructured":"Rafique W, Qi L, Yaqoob I, Imran M, Rasool RU, Dou W (2020) Complementing IoT services through software defined networking and edge computing: a comprehensive survey. IEEE Commun Surv Tutor 22(3):1761\u20131804","journal-title":"IEEE Commun Surv Tutor"},{"key":"4448_CR19","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.future.2017.11.012","volume":"80","author":"H Zhong","year":"2018","unstructured":"Zhong H, Fang Y, Cui J (2018) Reprint of LBBSRT: an efficient SDN load balancing scheme based on server response time. Future Gener Comput Syst 80:409\u2013416","journal-title":"Future Gener Comput Syst"},{"key":"4448_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comnet.2017.01.008","volume":"114","author":"S Khebbache","year":"2017","unstructured":"Khebbache S, Hadji M, Zeghlache D (2017) Virtualized network functions chaining and routing algorithms. Comput Netw 114:95\u2013110","journal-title":"Comput Netw"},{"key":"4448_CR21","doi-asserted-by":"crossref","unstructured":"Gedia D, Perigo L (2018) Performance evaluation of SDN-VNF in virtual machine and container. In: 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, pp\u00a01\u20137","DOI":"10.1109\/NFV-SDN.2018.8725805"},{"issue":"3","key":"4448_CR22","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/JSAC.2019.2895226","volume":"37","author":"H Hawilo","year":"2019","unstructured":"Hawilo H, Jammal M, Shami A (2019) Network function virtualization-aware orchestrator for service function chaining placement in the cloud. IEEE J Sel Areas Commun 37(3):643\u2013655","journal-title":"IEEE J Sel Areas Commun"},{"key":"4448_CR23","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.comnet.2018.01.021","volume":"133","author":"B Yi","year":"2018","unstructured":"Yi B, Wang X, Li K, Huang M et al (2018) A comprehensive survey of network function virtualization. Comput Netw 133:212\u2013262","journal-title":"Comput Netw"},{"key":"4448_CR24","doi-asserted-by":"crossref","unstructured":"Ilievski G, Latkoski P (2020) Efficiency of supervised machine learning algorithms in regular and encrypted VoIP classification within NFV environment. Radioengineering 29(1)","DOI":"10.13164\/re.2020.0243"},{"key":"4448_CR25","doi-asserted-by":"crossref","unstructured":"Hyun D, Kim J, Jeong JP, Kim H, Park J, Ahn T (2016) SDN-based network security functions for VoIP and volte services. In: 2016 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, pp\u00a0298\u2013302","DOI":"10.1109\/ICTC.2016.7763489"},{"key":"4448_CR26","doi-asserted-by":"crossref","unstructured":"Olariu C, Zuber M, Thorpe C (2017) Delay-based priority queueing for VoIP over software defined networks. In: 2017 IFIP\/IEEE symposium on integrated network and service management (IM). IEEE, pp\u00a0652\u2013655","DOI":"10.23919\/INM.2017.7987352"},{"key":"4448_CR27","doi-asserted-by":"crossref","unstructured":"Xezonaki M-E, Liotou E, Passas N, Merakos L (2018) An SDN QoE monitoring framework for VoIP and video applications. In: 2018 IEEE 19th international symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM). IEEE, pp\u00a01\u20136","DOI":"10.1109\/WoWMoM.2018.8449801"},{"key":"4448_CR28","unstructured":"Barakabitze AA, Sun L, Mkwawa I-H, Ifeachor E (2019) A novel QoE-aware SDN-enabled, NFV-based management architecture for future multimedia applications on 5G systems. arXiv preprint arXiv:1904.09917"},{"key":"4448_CR29","doi-asserted-by":"crossref","unstructured":"Kon\u00e9 B, Kora AD (2021) Management and orchestration for network function virtualization in a VoIP testbed: a multi-domain case. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP). IEEE, pp\u00a0372\u2013376","DOI":"10.1109\/TSP52935.2021.9522622"},{"issue":"2","key":"4448_CR30","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s00530-014-0446-1","volume":"22","author":"RC Streijl","year":"2016","unstructured":"Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213\u2013227","journal-title":"Multimed Syst"},{"issue":"4","key":"4448_CR31","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MIC.2005.92","volume":"9","author":"M Manousos","year":"2005","unstructured":"Manousos M, Apostolacos S, Grammatikakis I, Mexis D, Kagklis D, Sykas E (2005) Voice-quality monitoring and control for VoIP. IEEE Internet Comput 9(4):35\u201342","journal-title":"IEEE Internet Comput"},{"key":"4448_CR32","doi-asserted-by":"crossref","unstructured":"Ray PP, Kumar N (2021) SDN\/NFV architectures for edge-cloud oriented IoT: a systematic review. Comput Commun","DOI":"10.1016\/j.comcom.2021.01.018"},{"key":"4448_CR33","unstructured":"Floodlight controller. https:\/\/floodlight.atlassian.net\/wiki. Accessed: 2021-01-30"},{"key":"4448_CR34","unstructured":"Open vswitch. www.openvswitch.org. Accessed: 2021-01-30"},{"key":"4448_CR35","unstructured":"Open source sip proxy server. https:\/\/opensips.org\/. Accessed: 2021-01-30"},{"key":"4448_CR36","unstructured":"Network monitoring tool. https:\/\/oprofile.sourceforge.io. Accessed: 2021-01-30"},{"key":"4448_CR37","unstructured":"Open source test tool, traffic generator for the sip protocol. http:\/\/sipp.sourceforge.net\/. Accessed: 2021-01-30"},{"key":"4448_CR38","unstructured":"Software to test VoIP systems and IP networks. https:\/\/startrinity.com\/. Accessed: 2021-01-30"},{"key":"4448_CR39","doi-asserted-by":"crossref","unstructured":"Di\u00a0Mauro M, Galatro G, Postiglione F, Tambasco M (2021) Performability of network service chains: stochastic modeling and assessment of softwarized IP multimedia subsystem. IEEE Trans Depend Secure Comput","DOI":"10.1109\/TDSC.2021.3082626"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04448-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04448-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04448-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T16:43:55Z","timestamp":1658162635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04448-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,4]]},"references-count":39,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["4448"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04448-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,4,4]]},"assertion":[{"value":"13 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Confict of interest"}}]}}