{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:13Z","timestamp":1750306453695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T00:00:00Z","timestamp":1440115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,21]]},"DOI":"10.1145\/2785989.2785991","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T14:09:20Z","timestamp":1440425360000},"page":"31-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV"],"prefix":"10.1145","author":[{"given":"Franck","family":"Le","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Erich","family":"Nahum","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Vasilis","family":"Pappas","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Maroun","family":"Touma","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Dinesh","family":"Verma","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/876885.880054"},{"key":"e_1_3_2_1_2_1","unstructured":"Baracuda. VLAN deployments. https:\/\/techlib.barracuda.com\/bwf\/deplyvlan.  Baracuda. VLAN deployments. https:\/\/techlib.barracuda.com\/bwf\/deplyvlan."},{"key":"e_1_3_2_1_3_1","unstructured":"V. Bernat. Coping with the {TCP TIME-WAIT} state on busy linux servers. http:\/\/vincent.bernat.im\/en\/blog\/2014-tcp-time-wait-state-linux.html.  V. Bernat. Coping with the {TCP TIME-WAIT} state on busy linux servers. http:\/\/vincent.bernat.im\/en\/blog\/2014-tcp-time-wait-state-linux.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Blue Coat. Technology primer: VLAN tagging. https:\/\/www.bluecoat.com\/sites\/default\/files\/documents\/files\/VLAN_Tagging.1.pdf.  Blue Coat. Technology primer: VLAN tagging. https:\/\/www.bluecoat.com\/sites\/default\/files\/documents\/files\/VLAN_Tagging.1.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"Performance enhancing proxies intended to mitigate link-related degradations. IETF RFC 3135","author":"Border J.","year":"2001","unstructured":"J. Border , M. Kojo , J. Griner , G. Montero , and Z. Shelby . Performance enhancing proxies intended to mitigate link-related degradations. IETF RFC 3135 , 2001 . J. Border, M. Kojo, J. Griner, G. Montero, and Z. Shelby. Performance enhancing proxies intended to mitigate link-related degradations. IETF RFC 3135, 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/269790.269794"},{"key":"e_1_3_2_1_7_1","unstructured":"Cisco Systems. Cisco 8500 series wireless controllers. http:\/\/www.cisco.com\/c\/en\/us\/products\/wireless\/8500-series-wireless-controllers\/index.html.  Cisco Systems. Cisco 8500 series wireless controllers. http:\/\/www.cisco.com\/c\/en\/us\/products\/wireless\/8500-series-wireless-controllers\/index.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco Systems. Enterprise network architecture v. 3. http:\/\/www.cisco.com\/web\/strategy\/education\/us_education\/borderless_education.html.  Cisco Systems. Enterprise network architecture v. 3. http:\/\/www.cisco.com\/web\/strategy\/education\/us_education\/borderless_education.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Cisco Systems. Overlay Transport Virtualization (OTV). http:\/\/www.cisco.com\/c\/en\/us\/solutions\/data-center-virtualization\/overlay-transport-virtualization-otv\/index.html.  Cisco Systems. Overlay Transport Virtualization (OTV). http:\/\/www.cisco.com\/c\/en\/us\/solutions\/data-center-virtualization\/overlay-transport-virtualization-otv\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco Systems. WCCP version 2. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipapp\/configuration\/xe-3sg\/iap-xe-3sg-book\/iap-wccp-v2.html.  Cisco Systems. WCCP version 2. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipapp\/configuration\/xe-3sg\/iap-xe-3sg-book\/iap-wccp-v2.html."},{"key":"e_1_3_2_1_11_1","unstructured":"ETSI. Network functions virtualization: Architectural framework. http:\/\/www.etsi.org\/deliver\/etsi_gs\/nfv\/001_099\/002\/01.01.01_60\/gs_nfv002v010101p.pdf 2013.  ETSI. Network functions virtualization: Architectural framework. http:\/\/www.etsi.org\/deliver\/etsi_gs\/nfv\/001_099\/002\/01.01.01_60\/gs_nfv002v010101p.pdf 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_1_13_1","first-page":"3947","author":"Kivinen T.","year":"2005","unstructured":"T. Kivinen , B. Swander , A. Huttunen , and V. Volpe . Negotiation of NAT-Traversal in the IKE. IETF RFC 3947 , 2005 . T. Kivinen, B. Swander, A. Huttunen, and V. Volpe. Negotiation of NAT-Traversal in the IKE. IETF RFC 3947, 2005.","journal-title":"Negotiation of NAT-Traversal in the IKE. IETF RFC"},{"key":"e_1_3_2_1_14_1","unstructured":"Linux Kernel Sources. tproxy. http:\/\/www.kernel.org\/doc\/Documentation\/networking\/tproxy.txt.  Linux Kernel Sources. tproxy. http:\/\/www.kernel.org\/doc\/Documentation\/networking\/tproxy.txt."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879155"},{"key":"e_1_3_2_1_16_1","volume-title":"VXLAN: A framework for overlaying virtualized layer 2 networks over layer 3 networks. IETF RFC 7348","author":"Mahalingam M.","year":"2014","unstructured":"M. Mahalingam , D. Dutt , K. Duda , P. Agarwal , L. Kreeger , T. Sridhar , M. Bursell , and C. Wright . VXLAN: A framework for overlaying virtualized layer 2 networks over layer 3 networks. IETF RFC 7348 , 2014 . M. Mahalingam, D. Dutt, K. Duda, P. Agarwal, L. Kreeger, T. Sridhar, M. Bursell, and C. Wright. VXLAN: A framework for overlaying virtualized layer 2 networks over layer 3 networks. IETF RFC 7348, 2014."},{"key":"e_1_3_2_1_17_1","first-page":"4821","author":"Mathis M.","year":"2007","unstructured":"M. Mathis and J. Heffner . Packetization layer path MTU discovery. IETF RFC 4821 , 2007 . M. Mathis and J. Heffner. Packetization layer path MTU discovery. IETF RFC 4821, 2007.","journal-title":"Packetization layer path MTU discovery. IETF RFC"},{"key":"e_1_3_2_1_19_1","volume-title":"Hotnets","author":"Pfaff B.","year":"2009","unstructured":"B. Pfaff , J. Pettit , K. Amidon , M. Casado , T. Koponen , and S. Shenker . Extending networking into the virtualization layer . In Hotnets , 2009 . B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker. Extending networking into the virtualization layer. In Hotnets, 2009."},{"key":"e_1_3_2_1_20_1","first-page":"793","author":"Postel J.","year":"1981","unstructured":"J. Postel . Transmission control protocol. IETF RFC 793 , 1981 . J. Postel. Transmission control protocol. IETF RFC 793, 1981.","journal-title":"IETF RFC"},{"volume-title":"Proceedings of the 2012 USENIX NSDI.","author":"Sekar V.","key":"e_1_3_2_1_21_1","unstructured":"V. Sekar , N. Egi , S. Ratnasamy , M. K. Reiter , and G. Shi . Design and implementation of a consolidated middlebox architecture . In Proceedings of the 2012 USENIX NSDI. V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. Design and implementation of a consolidated middlebox architecture. In Proceedings of the 2012 USENIX NSDI."},{"volume-title":"Why would a server not send a {SYN\/ACK} packet in response to a SYN packet","key":"e_1_3_2_1_22_1","unstructured":"Serverfault. Why would a server not send a {SYN\/ACK} packet in response to a SYN packet . http:\/\/serverfault.com\/questions\/235965\/why-would-a-server-not-send-a-syn-ack-packet-in-response-to-a-syn-packet. Accessed: 2015-04-01. Serverfault. Why would a server not send a {SYN\/ACK} packet in response to a SYN packet. http:\/\/serverfault.com\/questions\/235965\/why-would-a-server-not-send-a-syn-ack-packet-in-response-to-a-syn-packet. Accessed: 2015-04-01."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"e_1_3_2_1_24_1","unstructured":"Squid Wiki. SquidFAQ interception proxy. http:\/\/wiki.squid-cache.org\/SquidFaq\/InterceptionProxy.  Squid Wiki. SquidFAQ interception proxy. http:\/\/wiki.squid-cache.org\/SquidFaq\/InterceptionProxy."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.1994.25"}],"event":{"name":"SIGCOMM '15: ACM SIGCOMM 2015 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"London United Kingdom","acronym":"SIGCOMM '15"},"container-title":["Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785989.2785991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785989.2785991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:14Z","timestamp":1750225394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785989.2785991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,21]]},"references-count":24,"alternative-id":["10.1145\/2785989.2785991","10.1145\/2785989"],"URL":"https:\/\/doi.org\/10.1145\/2785989.2785991","relation":{},"subject":[],"published":{"date-parts":[[2015,8,21]]},"assertion":[{"value":"2015-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}