{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:20:27Z","timestamp":1765041627533,"version":"3.37.0"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858510","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Traffic in Public-Facing Data Centers Amid Internet Protocols"],"prefix":"10.1109","author":[{"given":"Sen","family":"Lin","sequence":"first","affiliation":[{"name":"Northwestern University,USA"}]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Oracle America, Inc."}]},{"given":"Aleksandar","family":"Kuzmanovic","sequence":"additional","affiliation":[{"name":"Northwestern University,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486031"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423613"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365430"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815719"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472887"},{"key":"ref11","article-title":"The Addition of Explicit Congestion Notification (ECN) to IP","author":"Floyd","year":"2001","journal-title":"RFC 3168"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934956"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9435"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836086"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"ref19","article-title":"Generic Routing Encapsulation (GRE)","author":"Li","year":"2000","journal-title":"RFC 2784"},{"key":"ref20","article-title":"Geneve: Generic Network Virtualization Encapsulation","author":"Gross","year":"2020","journal-title":"RFC 8926"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377710"},{"article-title":"HTTPS encryption on the web","volume-title":"Google Transparency Report","year":"2024","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"article-title":"HSTS Preloaded list","volume-title":"Chromium","year":"2024","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9114"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1012888.1005702"},{"key":"ref27","first-page":"455","article-title":"InformationAgnostic flow scheduling for commodity data centers","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Bai"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref29","first-page":"565","article-title":"Is advance knowledge of flow sizes a plausible assumption?","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"\u0110uki\u0107"},{"key":"ref30","first-page":"1345","article-title":"Tiara: A scalable and efficient hardware acceleration architecture for stateful layer-4 load balancing","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Zeng","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486026"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472922"},{"key":"ref33","first-page":"523","article-title":"Maglev: A fast and reliable software network load balancer","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Eisenbud"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"ref35","first-page":"667","article-title":"A High-Speed Load-Balancer design with guaranteed Per-Connection-Consistency","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Barbette"},{"key":"ref36","first-page":"125","article-title":"Stateless datacenter load-balancing with beamer","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Olteanu"},{"key":"ref37","first-page":"59","article-title":"SP-PIFO: Approximating Push-In First-Out behaviors using Strict-Priority queues","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Alcoz"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934896"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101580"},{"journal-title":"RFC 3177","article-title":"IAB\/IESG Recommendations on IPv6 Address Allocations to Sites","year":"2001","key":"ref42"},{"key":"ref43","article-title":"IP Version 6 Addressing Architecture","author":"Deering","year":"2006","journal-title":"RFC 4291"},{"key":"ref44","article-title":"IPv6 Global Unicast Address Format","author":"Nordmark","year":"2003","journal-title":"RFC 3587"},{"journal-title":"ipv6: Implement Any-IP support for IPv6 - Linux Kernel","year":"2010","author":"\u017benczykowski","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7323"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7323"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405819"},{"article-title":"The top 500 sites on the web","volume-title":"Alexa","year":"2022","key":"ref49"},{"article-title":"Data Plane Development Kit (DPDK)","volume-title":"Linux Foundation","year":"2024","key":"ref50"},{"article-title":"Berkeley Extensible Software Switch (BESS)","volume-title":"NetSys","year":"2023","key":"ref51"},{"volume-title":"Softnic: A software nic to augment hardware","year":"2015","author":"Han","key":"ref52"},{"article-title":"The Intel Tofino series of P4-programmable Ethernet switch ASICs","volume-title":"Intel","year":"2023","key":"ref53"},{"volume-title":"P4 Programming Language","year":"2022","key":"ref54"},{"journal-title":"Intel LAN Access Division","article-title":"PCI-SIG SR-IOV Primer: An Introduction to SR-IOV Technology (Revision 2.5)","year":"2011","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626309"},{"volume-title":"The Chrony Project","year":"2023","author":"Lichvar","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355567"},{"key":"ref59","article-title":"Scheduling network function chains under sub-millisecond latency slos","author":"Wang","year":"2023","journal-title":"arXiv preprint"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3542929.3563471"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431292"},{"key":"ref62","article-title":"Performant, scalable, and efficient deployment of network function virtualization","volume-title":"Ph.D. dissertation","author":"Wang","year":"2023"},{"volume-title":"Methods and systems for efficient and secure network function execution","year":"2023","author":"Raghavan","key":"ref63"},{"key":"ref64","article-title":"Cisco Systems NetFlow Services Export Version 9","author":"Claise","year":"2004","journal-title":"RFC 3954"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"journal-title":"The P4.org Applications Working Group","article-title":"In-band Network Telemetry (INT) Dataplane Specification (Version 2.1)","year":"2020","key":"ref66"},{"journal-title":"Palo Alto Networks","article-title":"SSL Forward Proxy","year":"2024","key":"ref67"},{"article-title":"IPv6 Statistics","volume-title":"Google","year":"2024","key":"ref68"},{"article-title":"Usage Statistics of QUIC for Websites","volume-title":"W3Techs","year":"2024","key":"ref69"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2024,10,28]]},"location":"Charleroi, Belgium","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858510.pdf?arnumber=10858510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T05:59:13Z","timestamp":1738735153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858510","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}