{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:56:53Z","timestamp":1771955813600,"version":"3.50.1"},"reference-count":383,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2018.2837161","type":"journal-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T19:09:30Z","timestamp":1526584170000},"page":"3259-3306","source":"Crossref","is-referenced-by-count":302,"title":["Hybrid SDN Networks: A Survey of Existing Approaches"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3143-689X","authenticated-orcid":false,"given":"Rashid","family":"Amin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-233X","authenticated-orcid":false,"given":"Martin","family":"Reisslein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1173-4272","authenticated-orcid":false,"given":"Nadir","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100810"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.20"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2014.06.007"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342459"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2500960"},{"key":"ref277","first-page":"688","article-title":"Enhancing network management frameworks with SDN-like control","author":"sharma","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2270360"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939157"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2355255"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474344"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491207"},{"key":"ref270","first-page":"3","article-title":"Traffic engineering in software defined networks: A survey","volume":"2016","author":"abbasi","year":"2016","journal-title":"J Telecommun Inf Technol"},{"key":"ref273","article-title":"Systems and methods for traffic engineering in software defined networks","author":"mccormick","year":"2016"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2017.2711145"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2731419"},{"key":"ref172","author":"harte","year":"2017","journal-title":"Introduction to Cable TV (CATV) Systems Services Operation and Technology"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060490"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.16"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2017.2786032"},{"key":"ref176","first-page":"91","article-title":"Network configuration in OpenFlow networks","author":"zaalouk","year":"2014","journal-title":"Proc Int Conf Mobile Netw Manage"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/2627566.2627577"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45235-5_82"},{"key":"ref177","year":"2018","journal-title":"OFTest&#x2014;Validating OpenFlow Switches"},{"key":"ref168","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/3050220.3050229","article-title":"Magneto: Unified fine-grained path control in legacy and OpenFlow hybrid networks","author":"jin","year":"2017","journal-title":"Proc ACM Symp SDN Research"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/SBRC.2015.23"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.11.009"},{"key":"ref33","first-page":"1","author":"boucadair","year":"2014","journal-title":"Software-Defined Networking A Perspective from Within A Service Provider Environment"},{"key":"ref32","first-page":"1","article-title":"Framework for SDN: Scope and requirements","year":"2015"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342464"},{"key":"ref31","first-page":"1","article-title":"SDN-NFV reference architecture, version 1.0","year":"2016"},{"key":"ref30","first-page":"1","article-title":"Understanding and embracing SDN and NFV-based network solutions to drive operational efficiency&#x2014;An executive brief sponsored by AT&T","author":"honnachari","year":"2015"},{"key":"ref357","first-page":"1","article-title":"AeroFlux: A near-sighted controller architecture for software-defined wireless networks","author":"schulz-zander","year":"2014","journal-title":"Proc USENIX ONS"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3945"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2789339"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970705"},{"key":"ref268","article-title":"Programmable host-network traffic management","author":"sun","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218413"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032910.00019"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390250"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1074"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342465"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014149"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600404"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996839"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2592948"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.302"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1002\/0470867728"},{"key":"ref286","first-page":"1","article-title":"Sweet little lies: Fake topologies for flexible routing","author":"vissicchio","year":"2014","journal-title":"Proc 11th ACM Workshop Hot Topics Netw"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.73"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841819"},{"key":"ref181","author":"bollapragada","year":"2000","journal-title":"Inside Cisco IOS Software Architecture"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.07.008"},{"key":"ref180","year":"2010","journal-title":"CCNA The Explicit Deny All"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7158286"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288441"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559178"},{"key":"ref185","article-title":"Service chaining for hybrid network function","author":"huang","year":"0","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.329"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486012"},{"key":"ref182","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jnca.2017.07.004","article-title":"Enabling network innovation in data center networks with software defined networking: A survey","volume":"94","author":"dai","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref189","first-page":"879","article-title":"Building upon RouteFlow: A SDN development experience","author":"vidal","year":"2013","journal-title":"Proc XXXI Simpsio Brasileiro De Redes De Computadores (SBRC)"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541715"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4271"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553678"},{"key":"ref28","first-page":"1","article-title":"HP technical while paper: HP SDN hybrid network architecture: Scalable, low-risk network deployments using hybrid SDN","year":"2015"},{"key":"ref27","first-page":"1","article-title":"SDN component stack and hybrid introduction models","year":"2014"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref29","first-page":"1","article-title":"SDN v praxi","author":"ungerman","year":"2015"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2647981"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4365"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2789419"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2642586"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600117"},{"key":"ref24","first-page":"1","article-title":"A migration path to software-defined networking (SDN) in an enterprise network","year":"2016"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2605924"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-014-0533-8"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2014.7000328"},{"key":"ref26","article-title":"Huawei enterprise business: Four-dimensional SDN deployment","author":"zheng","year":"2018"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.015"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247205"},{"key":"ref25","article-title":"Software defined networking: Should do now? Should do never? Simply don&#x2019;t know!","author":"roper","year":"2018"},{"key":"ref383","author":"welsh","year":"2013","journal-title":"GNS3 network simulation guide"},{"key":"ref293","first-page":"1","article-title":"The transmission of compressed video over ATM networks","author":"ahmad","year":"1994","journal-title":"Proc IEE Teletraffic Symp Perform Eng Telecommun Netw"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588659"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/DANCE.2002.1003480"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2330903"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1262167"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626310"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/45.913204"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.11.004"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3031"},{"key":"ref299","article-title":"Network management system node and method for use in a network management system node for re-configuring a set of data network nodes in a data network","author":"wikstr\u00f6m","year":"2013"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417144"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2412971"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983189"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.349"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113225"},{"key":"ref150","author":"wagner","year":"2006","journal-title":"Address Resolution Protocol Spoofing and Man-in-the-middle Attacks"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973730.74"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.113012.120310"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.90"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6295708"},{"key":"ref146","article-title":"Link aggregation control protocol","author":"seaman","year":"1999"},{"key":"ref147","article-title":"Bidirectional forwarding detection","author":"katz","year":"2009"},{"key":"ref148","article-title":"Connectivity fault management (CFM) in networks with link aggregation group connections","author":"harel","year":"2010"},{"key":"ref149","article-title":"System for extending network resources to remote networks","author":"hart","year":"1995"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838227"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145321"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2553778"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2501026"},{"key":"ref377","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.004"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2439033"},{"key":"ref378","first-page":"29","article-title":"Software defined traffic measurement with OpenSketch","volume":"13","author":"yu","year":"2013","journal-title":"Proc 1st USENIX Symp Netw Syst Design Implement (NSDI '04)"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.12.019","article-title":"Quality of service (QoS) in software defined networking (SDN): A survey","volume":"80","author":"karakus","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.12.006"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2782482"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jnca.2017.03.004","article-title":"Multi-domain software defined networking: Research status and challenges","volume":"87","author":"wibowo","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2003.812723"},{"key":"ref372","first-page":"1","article-title":"Onix: A distributed control platform for large-scale production networks","volume":"10","author":"koponen","year":"2010","journal-title":"Proc USENIX OSDI"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2003.811564"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1007\/s11704-015-3448-z","article-title":"A survey on software defined networking and its applications","volume":"9","author":"gong","year":"2015","journal-title":"Front Comput Sci"},{"key":"ref374","first-page":"1","article-title":"DISCO: Distributed multi-domain SDN controllers","author":"phemius","year":"2014","journal-title":"Proc IEEE Netw Operat Manage Symp (NOMS)"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.91"},{"key":"ref376","doi-asserted-by":"publisher","DOI":"10.1109\/NETWKS.2016.7751168"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491193"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997162"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2017.8085416"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2014.6900880"},{"key":"ref164","first-page":"1","article-title":"Two-tier dynamic load balancing in sdn-enabled wi-fi networks","author":"lin","year":"2018","journal-title":"Wireless Networks"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/EFTA.2007.4416837"},{"key":"ref162","article-title":"Method and apparatus for supporting IP multicast","author":"bijwaard","year":"2017"},{"key":"ref161","first-page":"38","article-title":"OpenStack: Toward an open-source solution for cloud computing","volume":"55","author":"sefraoui","year":"2012","journal-title":"Int J Comput Appl"},{"key":"ref160","article-title":"Multiple VLAN architecture system","author":"mccloghrie","year":"2000"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2016.7821979"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2715220"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.014"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2720758"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2506984"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.25.153"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2012.6260853"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702538"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2013.2262766"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.020110.00040"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.004"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2009.03.003"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.016","article-title":"Software defined networks: A survey","volume":"67","author":"masoudi","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1364\/OE.24.012310"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.081313.00105"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.procs.2015.08.563","article-title":"A literature review on challenges and effects of software defined networking","volume":"64","author":"horvath","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829966"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626307"},{"key":"ref321","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1145\/2813885.2737980","article-title":"Efficient synthesis of network updates","volume":"50","author":"mcclurg","year":"2015","journal-title":"ACM SIGPLAN Notices"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2689819"},{"key":"ref71","article-title":"A survey of SDN security research","author":"coughlin","year":"2014"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6894466"},{"key":"ref317","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"kazemian","year":"2013","journal-title":"Proc NSDI"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.227"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939138"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993756"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926507"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2005.1543567"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"ref311","first-page":"808","article-title":"On double-link failure recovery in WDM optical networks","volume":"2","author":"choi","year":"2002","journal-title":"Proc IEEE InfoCom"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120042"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486005"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427150"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2597193"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600030NM"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959084"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.013"},{"key":"ref304","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/2829988.2787497","article-title":"Central control over distributed routing","volume":"45","author":"vissicchio","year":"2015","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6125-y"},{"key":"ref307","first-page":"27","article-title":"Design and implementation of monitoring schemes for software-defined routing over a federated multi-domain SDN testbed","volume":"42","author":"tsai","year":"2016","journal-title":"Proc Asia&#x2013;Pac Adv Netw"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749760"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1016\/S0040-1625(96)00180-1"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633579"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.03.001"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2719862"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7697"},{"key":"ref68","article-title":"Network monitoring in software-defined networking: A review","author":"tsai","year":"0","journal-title":"IEEE Syst J"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3784"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.012"},{"key":"ref302","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.jnca.2016.09.013","article-title":"High performance traffic classification based on message size sequence and distribution","volume":"76","author":"lu","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080474"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218482"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.38"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2507622"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2402432"},{"key":"ref194","article-title":"Wide area network (WAN) interface for a transmission control protocol\/Internet protocol TCP\/IP in a local area network (LAN)","author":"hirviniemi","year":"1998"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.79"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2489183"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2587900"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2630047"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403673"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2736886"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486243"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.07.007"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1364\/NFOEC.2012.JTh2A.41"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"ref336","first-page":"1","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"ISOC Symp Network and Distributed System Security"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.002"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2431074"},{"key":"ref333","first-page":"1","article-title":"Energy efficient software defined networks","author":"giroire","year":"2014","journal-title":"Proc IEEE 6th Int Conf Cloud Netw (CloudNet)"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2352118"},{"key":"ref339","first-page":"1","article-title":"HyperFlow: A distributed control plane for OpenFlow","author":"tootoonchian","year":"2010","journal-title":"Proc USENIX Internet Netw Manage Conf Res Enterprise Netw"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402617"},{"key":"ref338","article-title":"Flowvisor: A network virtualization layer","author":"sherwood","year":"2009"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2704899"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568569"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2655690","article-title":"Software-defined networking paradigms in wireless networks: A survey","volume":"47","author":"jagadeesan","year":"2015","journal-title":"ACM Comput Surveys"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2690823"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.026"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11107-014-0451-5"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4825-8"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.02.021"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2618874"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2571118"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1145\/2764464"},{"key":"ref323","article-title":"Survey of consistent network updates","author":"foerster","year":"2016","journal-title":"arXiv preprint arXiv 1609 09861"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.05.013"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2482988"},{"key":"ref325","first-page":"1","article-title":"Composing software defined networks","volume":"13","author":"monsanto","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1145\/1921151.1921160"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959061"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2507789"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535792"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2586999"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787495"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2746186"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"ref88","first-page":"932","article-title":"A hybrid software defined networking architecture for next-generation IoTs","volume":"12","author":"lee","year":"2018","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/SNCC.2014.6866528"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762291"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553677"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090409"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346900"},{"key":"ref201","first-page":"553","article-title":"Topology discovery, loop finding and alternative path solution in POX controller","author":"saha","year":"2016","journal-title":"Proc Int Multiconf Eng Comput Sci"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/SC.Companion.2012.76"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010546"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2012.6524222"},{"key":"ref205","article-title":"Policy-based network management system using dynamic policy generation","author":"putzolu","year":"2003"},{"key":"ref206","article-title":"Self configuring network management system","author":"cordray","year":"2015"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/2619287.2619299"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733664"},{"key":"ref212","first-page":"1","article-title":"Hybrid SDN architecture for resource consolidation in MPLS networks","author":"katov","year":"2015","journal-title":"Proc Wireless Telecommun Symp (WTS 04)"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140446"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502428"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/2837030.2837037"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140321"},{"key":"ref217","first-page":"97","article-title":"A framework for OpenFlow-like policy-based routing in hybrid software defined networks","author":"mishra","year":"2016","journal-title":"Proc IEEE 11th Int Conf Netw"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2641482"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264845"},{"key":"ref220","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/2740070.2631458","article-title":"Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework","volume":"44","author":"g\u00e4mperli","year":"2014","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref222","first-page":"1","article-title":"Enabling SDN in old school networks with software-controlled routing protocols","author":"vanbever","year":"2014","journal-title":"Proc USENIX ONS"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505663"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2016.7496525"},{"key":"ref228","article-title":"HP SDN hybrid network architecture: Scalable, low-risk network deployments using hybrid SDN","year":"2015","journal-title":"HP Team"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2013.13"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2790007"},{"key":"ref225","article-title":"Bringing energy aware routing closer to reality with SDN hybrid networks, version 1","author":"huin","year":"2017"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2451662"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.015"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.61"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/2541596.2541602"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2992"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912501"},{"key":"ref128","first-page":"1","article-title":"Telekinesis: Controlling legacy switch routing with OpenFlow in hybrid networks","author":"jin","year":"2015","journal-title":"Proc ACM SIGCOMM Symp Softw Defined Netw Res"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.35"},{"key":"ref133","first-page":"1","article-title":"Integrating legacy forwarding environment to OpenFlow\/SDN control plane","author":"farias","year":"2013","journal-title":"Proc Netw Oper Manage Symp (APNOMS)"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461196"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620738"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774997"},{"key":"ref232","article-title":"SDN-based resource allocation in MPLS networks: A hybrid approach","author":"tajiki","year":"2018","journal-title":"arXiv preprint arXiv 1803 11486"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2608827"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820682"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00226"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.3233\/SW-160224"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.83"},{"key":"ref235","article-title":"Weighted fair queuing approximation in a network switch using weighted round robin and token bucket filter","author":"appala","year":"2005"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860509"},{"key":"ref237","first-page":"105","article-title":"Distributed network performance test and analyses based on SNMP protocol","volume":"39","author":"ren","year":"2013","journal-title":"China Measurement & Test"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342462"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2014.6996572"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/2465839.2465840"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3010079.3010085"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342445"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.091"},{"key":"ref141","first-page":"1","article-title":"HybridFlow: A lightweight control plane for hybrid SDN in enterprise networks","author":"huang","year":"2016","journal-title":"Proc IEEE\/ACM 24th Int Symp Quality Service (IWQoS)"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47099-3_8"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2460"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref144","article-title":"Spanning tree protocol","author":"elder","year":"2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1331"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/2489791"},{"key":"ref242","first-page":"1","article-title":"Virtual routing engine: A way of migration towards SDN","author":"zhou","year":"2014","journal-title":"Proc USENIX ONS"},{"key":"ref243","article-title":"Management of mainframe resources in pre-boot environment","author":"dehaan","year":"2015"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.153"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2014.04.011"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.12.012"},{"key":"ref247","author":"jakma","year":"2011","journal-title":"Revisions to the BGP &#x2018;minimum route advertisement interval"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/65.826369"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNT.2010.66"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2585221"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366298"},{"key":"ref108","first-page":"1","article-title":"Design and implementation of SDN\/IP hybrid space information network prototype","author":"he","year":"2016","journal-title":"Proc IEEE\/CIC Int Conf Commun China (ICCC Workshops)"},{"key":"ref107","first-page":"390","article-title":"A service-based model for the hybrid software defined wireless mesh backhaul of small cells","author":"nu\u00f1ez-mart\u00ednez","year":"2015","journal-title":"Proc Int Conf IEEE Netw Service Manag (CNSM)"},{"key":"ref106","first-page":"1","article-title":"The perfect match: Optical bypass and SDN partitioning","author":"caria","year":"2015","journal-title":"Proc IEEE Int Conf High Perform Switch Routing (HPSR)"},{"key":"ref105","first-page":"1","article-title":"Joint deployment and routing in hybrid SDNs","author":"xu","year":"2017","journal-title":"Proc IEEE Int Symp Quality Service (IWQoS)"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057136"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2017.10.003","article-title":"A survey: Hybrid SDN","volume":"100","author":"rathee","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567024"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2875951.2875956"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140324"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249174"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258787"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800408"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600067CM"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2005.864128"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.12.004"},{"key":"ref253","author":"trotter","year":"2001","journal-title":"Terminology for Forwarding Information Base (FIB) based router performance"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.06.020"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2002.1039265"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1016\/j.landurbplan.2011.02.021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.01.005"},{"key":"ref258","article-title":"Static random access memory structures","author":"chen","year":"2015"},{"key":"ref11","article-title":"Configuration management delivers business resiliency","author":"kerravala","year":"2002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2026415"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602216"},{"key":"ref15","first-page":"333","article-title":"Panopticon: Reaping the benefits of incremental SDN deployment in enterprise networks","author":"levin","year":"2014","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.47"},{"key":"ref118","first-page":"519","article-title":"Achieving waypoint enforcement in multi-VLAN hybrid SDN","author":"rathee","year":"2018","journal-title":"Proc IEEE Int Conf Commun Syst Netw (COMSNETS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.330"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410320"},{"key":"ref18","article-title":"Hybrid SDN controller","author":"gasparakis","year":"2013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3504"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090108"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890959"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2585759"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598549"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2657643"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936161"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00031-9"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6915439"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7491"},{"key":"ref260","first-page":"139","article-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","volume":"5","author":"johnson","year":"2001","journal-title":"Ad Hoc Netw"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2496955"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2592481"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2691349"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2565621"},{"key":"ref265","first-page":"1","article-title":"Network slicing for conditional monitoring in the industrial Internet of Things","author":"wu","year":"2018","journal-title":"Proc IEEE Softwarization"},{"key":"ref266","author":"davie","year":"2000","journal-title":"MPLS Technology and Applications"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8540503\/08360763.pdf?arnumber=8360763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:41:26Z","timestamp":1643251286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8360763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":383,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2837161","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}