{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:13:40Z","timestamp":1760426020058,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J05003"],"award-info":[{"award-number":["2021J05003"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["20720210070"],"award-info":[{"award-number":["20720210070"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1109\/tnet.2021.3114448","type":"journal-article","created":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:42:44Z","timestamp":1633138964000},"page":"423-436","source":"Crossref","is-referenced-by-count":6,"title":["Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9672-7938","authenticated-orcid":false,"given":"Lizhao","family":"You","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6298-8374","authenticated-orcid":false,"given":"Jiahua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yili","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume-title":"Cisco Application Policy Infrastructure Controller (APIC)","year":"2020","key":"ref1"},{"volume-title":"Huawei Agile Controller","year":"2020","key":"ref2"},{"volume-title":"Virtual eXtensible Local Area Network (VXLAN)","year":"2020","key":"ref3"},{"volume-title":"Batfish","year":"2020","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2342441.2342452"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-319-49052-6_4"},{"key":"ref7","first-page":"735","article-title":"Delta-net: Real-time network verification using atoms","volume-title":"Proc. USENIX NSDI","author":"Horn"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICNP.2019.8888144"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICNP.2013.6733614"},{"key":"ref10","first-page":"241","article-title":"APKeep: Realtime verification for real networks","volume-title":"Proc. USENIX NSDI","author":"Zhang"},{"key":"ref11","first-page":"99","article-title":"Real time network policy checking using header space analysis","volume-title":"Proc. USENIX NSDI","author":"Kazemian"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.14722\/ndss.2017.23365"},{"volume-title":"BGP MPLS-Based Ethernet VPN","year":"2020","key":"ref13"},{"volume-title":"VXLAN Group Policy Option","year":"2021","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TNET.2017.2720172"},{"volume-title":"Huawei USG6000 Command Reference (Firewall Forward Cross-VSYS)","year":"2020","key":"ref16"},{"key":"ref17","first-page":"113","article-title":"Header space analysis: Static checking for networks","volume-title":"Proc. USENIX NSDI","author":"Kazemian"},{"year":"1997","author":"Andersen","article-title":"An introduction to binary decision diagrams","key":"ref18"},{"key":"ref19","first-page":"953","article-title":"Plankton: Scalable network configuration verification through model checking","volume-title":"Proc. USENIX NSDI","author":"Prabhu"},{"volume-title":"Java Library for Manipulating BDDS","year":"2020","author":"Whaley","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3422604.3425936"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICNP.2009.5339690"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2018436.2018470"},{"key":"ref24","first-page":"499","article-title":"Checking beliefs in dynamic networks","volume-title":"Proc. USENIX NSDI","author":"Lopes"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2018436.2018477"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3341302.3342094"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2914770.2837657"},{"key":"ref28","first-page":"469","article-title":"A general approach to network configuration analysis","volume-title":"Proc. USENIX NSDI","author":"Fogel"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2934872.2934876"},{"key":"ref30","first-page":"217","article-title":"Efficient network reachability analysis using a succinct control plane representation","volume-title":"Proc. USENIX OSDI","author":"Fayaz"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3098822.3098834"},{"key":"ref32","first-page":"201","article-title":"Tiramisu: Fast multilayer network verification","volume-title":"Proc. USENIX NSDI","author":"Abhashkumar"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3387514.3406217"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3230543.3230583"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3371110"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.comnet.2020.107326"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-030-25543-5_14"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2934872.2934881"},{"key":"ref39","first-page":"683","article-title":"Dataplane equivalence and its applications","volume-title":"Proc. USENIX NSDI","author":"Dumitrescu"},{"key":"ref40","first-page":"699","article-title":"Verifying reachability in networks with mutable datapaths","volume-title":"Proc. USENIX NSDI","author":"Panda"},{"key":"ref41","first-page":"181","article-title":"NetSMC: A custom symbolic model checker for stateful network verification","volume-title":"Proc. USENIX NSDI","author":"Yuan"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9714545\/09556518.pdf?arnumber=9556518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:35:14Z","timestamp":1705016114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9556518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2021.3114448","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}