{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:11:27Z","timestamp":1751688687451,"version":"3.41.0"},"reference-count":34,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Jean Frederic Myoupo"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13174-018-0085-4","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T12:50:10Z","timestamp":1526907010000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Conflict-free rerouting scheme through flow splitting for virtual networks using switches"],"prefix":"10.5753","volume":"9","author":[{"given":"Vianney Kengne","family":"Tchendji","sequence":"first","affiliation":[]},{"given":"Yannick Florian","family":"Yankam","sequence":"additional","affiliation":[]},{"given":"Jean Fr\u00e9d\u00e9ric","family":"Myoupo","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"85_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2009.5183468","volume":"7","author":"NM Chowdhury","year":"2009","unstructured":"Chowdhury NM, Boutaba R. Network virtualization: state of the art and research challenges. IEEE Commun Mag. 2009;7:20\u20136.","journal-title":"IEEE Commun Mag"},{"key":"85_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1869-0238-4-3","volume":"4","author":"GP Alkmim","year":"2013","unstructured":"Alkmim GP, Batista DM, da Fonseca NLS. Mapping virtual networks onto substrate networks. J Internet Serv Appl. 2013;4:3. https:\/\/doi.org\/10.1186\/1869-0238-4-3 .","journal-title":"J Internet Serv Appl"},{"key":"85_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-014-0015-z","volume":"6","author":"LR Bays","year":"2015","unstructured":"Bays LR, Oliveira RR, Barcellos MP, Gaspary LP, Mauro Madeira ER. Virtual network security: threats, countermeasures, and challenges. J Internet Serv Appl. 2015;6:1. https:\/\/doi.org\/10.1186\/s13174-014-0015-z .","journal-title":"J Internet Serv Appl"},{"key":"85_CR4","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1016\/j.comnet.2012.01.022","volume":"56","author":"X Cheng","year":"2012","unstructured":"Cheng X, Su S, Zhang Z, Shuang K, Yang F, Luo Y, Wang J. Virtual network embedding through topology awareness and optimization. Comput Netw. 2012;56:1797\u2013813.","journal-title":"Comput Netw"},{"key":"85_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1971162.1971168","volume":"41","author":"X Cheng","year":"2011","unstructured":"Cheng X, Su S, Zhang Z, Wang H, Yang F, Luo Y, Wang J. Virtual network embedding through topology-aware node ranking. ACM Comput Commun Rev. 2011;41:38\u201347.","journal-title":"ACM Comput Commun Rev"},{"key":"85_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12243-010-0208-9","volume":"66","author":"NC Fernandes","year":"2011","unstructured":"Fernandes NC, Moreira MD, Moraes IM, Ferraz LH, Couto RS, Carvalho HE, Campista ME, Costa LH, Duarte OC. Virtual networks: isolation, performance, and trends. Ann Telecommun. 2011;66:339\u201355.","journal-title":"Ann Telecommun"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Pham TS, Lattmann J, Lutton JL, Valeyre L, Carlier J, Nace D. A restoration scheme for virtual networks using switches: International Workshop on Reliable Networks Design and Modeling. USA: IEEE Press; 2012. p. 800\u20135.","DOI":"10.1109\/ICUMT.2012.6459773"},{"key":"85_CR8","unstructured":"Pham TS. Autonomous management of quality of service in virtual networks: PhD Thesis. Compiegne: the university of Technology of Compiegne; 2004."},{"key":"85_CR9","unstructured":"Atlas AK, Zinin A (2008) Basic specification for IP fast-reroute: loopfree alternates. https:\/\/tools.ietf.org\/pdf\/rfc5286.pdf . Accessed 20 July 2017."},{"key":"85_CR10","unstructured":"Bryant S, Shand M, Previdi S (2011) IP fast reroute using not-via addresses. https:\/\/www.ietf.org\/proceedings\/62\/slides\/rtgwg-3.pdf . Accessed 10 July 2017."},{"key":"85_CR11","doi-asserted-by":"crossref","unstructured":"Ho K-H, Wang N, Pavlou G, Botsiaris C. Optimizing post-failure network performance for IP fast reroute using tunnels. In: Proceedings of the 5th international ICST conference on heterogeneous networking for quality, reliability, security and robustness, article no 44. Hong Kong: ACM digital Library; 2008.","DOI":"10.4108\/ICST.QSHINE2008.3950"},{"key":"85_CR12","doi-asserted-by":"publisher","unstructured":"Kvalbein A, Hansen A, Cicic T, Gjessing S, Lysne O. Fast IP network recovery using multiple routing configurations, vol. 2006: Proceedings IEEE INFOCOM; 2006. https:\/\/doi.org\/10.1109\/INFOCOM.2006.227 .","DOI":"10.1109\/INFOCOM.2006.227"},{"key":"85_CR13","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/LCOMM.2004.833800","volume":"8","author":"A Zalesky","year":"2004","unstructured":"Zalesky A, LeVu H, Zukerman M. Reducing spare capacity through traffic splitting. IEEE Commun Lett. 2004;8:594\u20136. https:\/\/doi.org\/10.1109\/LCOMM.2004.833800 .","journal-title":"IEEE Commun Lett"},{"key":"85_CR14","doi-asserted-by":"crossref","unstructured":"Wang J, Nelakuditi S. IP fast reroute with failure inferencing. In: ACM proceedings of the 2007 SIGCOMM workshop on internet network management. Kyoto: ACM Digital Library; 2007. p. 268\u201373.","DOI":"10.1145\/1321753.1321764"},{"key":"85_CR15","doi-asserted-by":"crossref","unstructured":"Kang X, Chao HJ. IP fast rerouting for single-link\/node failure recovery. In: BROADNETS 2007, fourth international conference on broadband communications: Networks and Systems. USA: IEEE Press; 2007. p. 142\u201351.","DOI":"10.1109\/BROADNETS.2007.4550418"},{"key":"85_CR16","first-page":"1035","volume-title":"Proceedings of the 28th IEEE conference on global telecommunications","author":"X Kang","year":"2009","unstructured":"Kang X, Chao HJ. IP fast reroute for double-link failure recovery. In: Proceedings of the 28th IEEE conference on global telecommunications. Piscataway: GLOBECOM; 2009. p. 1035\u201342."},{"key":"85_CR17","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1364\/JOCN.5.001066","volume":"5","author":"A Sgambelluri","year":"2013","unstructured":"Sgambelluri A, Giorgetti A, Cugini F, Paolucci F, Castoldi P. Openflow based segment protection in ethernet networks. J Opt Commun Netw. 2013;5:1066\u201375. https:\/\/doi.org\/10.1364\/JOCN.5.001066 .","journal-title":"J Opt Commun Netw"},{"key":"85_CR18","unstructured":"Staessens D, Colle D, Pickavet M, Demeester P. A demonstration of automafic bootstrapping of resilient openFrow networks. In Poceedings of IFIP\/IEEE International Symposium on Integrated Network Managemenr (IM 2013). Ghent: IEEE Xplore Digital Library; 2013. pp. 1066\u20137."},{"key":"85_CR19","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1016\/j.comcom.2012.09.011","volume":"36","author":"S Sharma","year":"2013","unstructured":"Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. OpenFlow: meeting carrier- grade recovery requirements. Comput Commun. 2013;36:656\u201365. https:\/\/doi.org\/10.1016\/j.comcom.2012.09.011 .","journal-title":"Comput Commun"},{"key":"85_CR20","first-page":"l84","volume":"96","author":"S Kamamura","year":"2013","unstructured":"Kamamura S, Shimazaki D, Hiramatsu A, Nakazato H. Autonomous IP fast rerouting with compressed backup flow entries using OpenFlow. IEICE Tans Inf Sys, pp. 2013;96:l84\u2013192.","journal-title":"IEICE Tans Inf Sys, pp"},{"issue":"2","key":"85_CR21","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M Yu","year":"2008","unstructured":"Yu M, Yi Y, Rexford J, Chiang M. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput Commun Rev. 2008;38(2):17\u201329.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"85_CR22","doi-asserted-by":"crossref","unstructured":"Veerasamy J, Venkatesan S, Shah JC. Effect of traffic splitting on link and path restoration planning. In: The global telecommunications conference, 1994 IEEE GLOBECOM, vol. 3: Communications: The Global Bridge. USA: IEEE Press; 1994. p. 1867\u201371.","DOI":"10.1109\/GLOCOM.1994.513194"},{"key":"85_CR23","doi-asserted-by":"crossref","unstructured":"Fischer S, Kammenhuber N, Feldmann A. REPLEX: dynamic traffic engineering based on wardrop routing policies. In: Proceedings of the of the ACM CoNEXT\u201906. Lisboa: ACM Digital Library; 2006. p. 1\u201312.","DOI":"10.1145\/1368436.1368438"},{"key":"85_CR24","unstructured":"OpenFlow multipath proposal. http:\/\/openflowswitch.org\/wk\/index.php\/Multipath_Proposal . Accessed 26 Oct 2015."},{"key":"85_CR25","first-page":"332","volume-title":"Proceedings of INFOCOM\u201900","author":"Z Cao","year":"2000","unstructured":"Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for internet load balancing. In: Proceedings of INFOCOM\u201900, vol. 1. Israel: Tel Aviv; 2000. p. 332\u201341."},{"key":"85_CR26","doi-asserted-by":"crossref","unstructured":"Prabhavat S, Nishiyama H, Ansari N, Kato N. On the performance analysis of traffic splitting on load imbalancing and packet reordering of bursty traffic. In: IEEE international Conference on Network infrastructure and digital content, IC-NIDC, USA: IEEE Press. 2009, p. 236\u201340","DOI":"10.1109\/ICNIDC.2009.5360896"},{"issue":"6","key":"85_CR27","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/90.811445","volume":"7","author":"JC Bennett","year":"1999","unstructured":"Bennett JC, Partridge C, Shectman N. Packet reordering is not pathological network behavior. IEEE\/ACM Trans Networking. 1999;7(6):789\u201398.","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"5","key":"85_CR28","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2002.1035115","volume":"16","author":"M Laor","year":"2002","unstructured":"Laor M, Gendel L. The effect of packet reordering in a backbone link on application throughput. IEEE Netw. 2002;16(5):28\u201336.","journal-title":"IEEE Netw"},{"issue":"4","key":"85_CR29","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/TPDS.2007.1011","volume":"18","author":"KC Leung","year":"2007","unstructured":"Leung KC, Li VO, Yang D. An overview of packet reordering in transmission control protocol (TCP): problems, solutions, and challenges. IEEE Trans Parallel Distrib Syst. 2007;18(4):522\u201335.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"85_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1232919.1232925","volume":"37","author":"S Kandula","year":"2007","unstructured":"Kandula S, Katabi D, Sinha S, Berger A. Dynamic load balancing without packet reordering. ACM SIGCOMM Comput Commun Rev. 2007;37(2):51\u201362.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"4","key":"85_CR31","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/248157.248169","volume":"26","author":"H Adiseshu","year":"1996","unstructured":"Adiseshu H, Parulkar G, Varghese G. A reliable and scalable striping protocol. ACM SIGCOMM Comput Commun Rev. 1996;26(4):131\u201341.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"85_CR32","unstructured":"Partridge C, Milliken W. Method and apparatus for byte-by-byte multiplexing of data over parallel communications links: Patent number: 6160819, Assigned to GTE Internetworking Incorporated, December 2000, Cambridge, Massachusetts, USA."},{"key":"85_CR33","doi-asserted-by":"crossref","unstructured":"Boyd S, Vandenberghe L. Convex optimization, vol. 34. UK: Cambridge university press; 2004.","DOI":"10.1017\/CBO9780511804441"},{"key":"85_CR34","doi-asserted-by":"crossref","unstructured":"Khana AR, Bilalb SM, Othmana M. A performance comparison of network simulators for wireless networks. USA: Cornell University, Library. 2013;arXiv:1307.4129.","DOI":"10.1109\/ICCSCE.2012.6487111"}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-018-0085-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0085-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0085-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T17:14:51Z","timestamp":1751649291000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-018-0085-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1186\/s13174-018-0085-4","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"type":"print","value":"1867-4828"},{"type":"electronic","value":"1869-0238"}],"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"13 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"VKT and YFY are with the department of Mathematics and Computer Science of the University of Dschang, Cameroon. JFM is with the Computer Science Lab. MIS of the university of Picardie Jules Verne, Amiens, France.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Authors\u2019 information"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"13"}}