{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:00:57Z","timestamp":1773406857397,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2014]]},"DOI":"10.1587\/transcom.e97.b.375","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T23:09:35Z","timestamp":1391209775000},"page":"375-386","source":"Crossref","is-referenced-by-count":30,"title":["A Survey on OpenFlow Technologies"],"prefix":"10.23919","volume":"E97.B","author":[{"given":"Kazuya","family":"SUZUKI","sequence":"first","affiliation":[{"name":"Knowledge Discovery Research Laboratories, NEC Corporation"}]},{"given":"Kentaro","family":"SONODA","sequence":"additional","affiliation":[{"name":"Cloud System Research Laboratories, NEC Corporation"}]},{"given":"Nobuyuki","family":"TOMIZAWA","sequence":"additional","affiliation":[{"name":"Knowledge Discovery Research Laboratories, NEC Corporation"}]},{"given":"Yutaka","family":"YAKUWA","sequence":"additional","affiliation":[{"name":"Knowledge Discovery Research Laboratories, NEC Corporation"}]},{"given":"Terutaka","family":"UCHIDA","sequence":"additional","affiliation":[{"name":"Optical IP Development Division, NEC Corporation of America"}]},{"given":"Yuta","family":"HIGUCHI","sequence":"additional","affiliation":[{"name":"Optical IP Development Division, NEC Corporation of America"}]},{"given":"Toshio","family":"TONOUCHI","sequence":"additional","affiliation":[{"name":"Knowledge Discovery Research Laboratories, NEC Corporation"}]},{"given":"Hideyuki","family":"SHIMONISHI","sequence":"additional","affiliation":[{"name":"Knowledge Discovery Research Laboratories, NEC Corporation"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] &ldquo;FIND (Future Internet Design).&rdquo; http:\/\/www.nets-find.net\/"},{"key":"2","unstructured":"[2] &ldquo;NSF Future Internet Architecture Project.&rdquo; http:\/\/www.nets-fia.net"},{"key":"3","unstructured":"[3] &ldquo;Seventh Framework Programme (FP7).&rdquo; http:\/\/cordis.europa.eu\/fp7\/home_en.html"},{"key":"4","unstructured":"[4] &ldquo;The Global Environment for Network Innovations (GENI).&rdquo; http:\/\/www.geni.net\/"},{"key":"5","unstructured":"[5] &ldquo;New Generation Network Testbed JGN-X.&rdquo; http:\/\/www.jgn.nict.go.jp\/english\/"},{"key":"6","unstructured":"[6] L. Peterson, S. Sevinc, J. Lepreau, R. Ricci, J. Wroclawski, T. Faber, and S. Schwab, &ldquo;Slice-based facility architecture,&rdquo; Tech. Rep., http:\/\/svn.planet-lab.org\/attachment\/wiki\/GeniWrapper\/sfa.pdf, 2009."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, &ldquo;OpenFlow: Enabling innovation in campus networks,&rdquo; ACM SIGCOMM Computer Communication Review, vol.38, no.2, pp.69-74, 2008.","DOI":"10.1145\/1355734.1355746"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and J. Van Der Merwe, &ldquo;The case for separating routing from routers,&rdquo; Proc. ACM SIGCOMM Workshop on Future directions in network architecture, pp.5-12, 2004.","DOI":"10.1145\/1016707.1016709"},{"key":"9","unstructured":"[9] M. Casado, T. Garfinkel, A. Akella, M.J. Freedman, D. Boneh, N. McKeown, and S. Shenker, &ldquo;SANE: A protection architecture for enterprise networks,&rdquo; USENIX Security Symposium, 2006."},{"key":"10","unstructured":"[10] H. Shimonishi, S. Ishii, S. Lei, and Y. Kanaumi, &ldquo;Architecture, implementation, and experiments of programmable network using OpenFlow,&rdquo; IEICE Trans. Commun., vol.E94-B, no.10, pp.2715-2722, Oct. 2011."},{"key":"11","unstructured":"[11] &ldquo;OpenFlow Switch Specication Version 1.0.0 (Wire Protocol 0x01).&rdquo; OpenFlow Switch Consortium, 2009."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. Dierks and E. Rescorla, &ldquo;The Transport Layer Security (TLS) Protocol Version 1.2,&rdquo; RFC 5246, Internet Engineering Task Force, 2008.","DOI":"10.17487\/rfc5246"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] M. Al-Fares, A. Loukissas, and A. Vahdat, &ldquo;A scalable, commodity data center network architecture,&rdquo; ACM SIGCOMM Computer Communication Review, vol.38, no.4, pp.63-74, 2008.","DOI":"10.1145\/1402946.1402967"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] R. Niranjan Mysore, A. Pamboris, N. Farrington, N. Huang, P. Miri, S. Radhakrishnan, V. Subramanya, and A. Vahdat, &ldquo;PortLand: A scalable fault-tolerant layer 2 data center network fabric,&rdquo; ACM SIGCOMM Computer Communication Review, vol.39, no.4, pp.39-50, 2009.","DOI":"10.1145\/1594977.1592575"},{"key":"15","unstructured":"[15] A. Tavakoli, M. Casado, T. Koponen, and S. Shenker, &ldquo;Applying NOX to the datacenter,&rdquo; Proc. 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009."},{"key":"16","unstructured":"[16] B. Heller, S. Seetharaman, P. Mahadevan, Y. Yiakoumis, P. Sharma, S. Banerjee, and N. McKeown, &ldquo;ElasticTree: Saving energy in data center networks,&rdquo; Proc. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI'10), p.17, 2010."},{"key":"17","unstructured":"[17] R. Pries, M. Jarschel, and S. Goll, &ldquo;On the usability of OpenFlow in data center environments,&rdquo; Proc. IEEE International Conference on Communications (ICC), pp.5533-5537, 2012."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] T. Benson, A. Akella, and D.A. Maltz, &ldquo;Network traffic characteristics of data centers in the wild,&rdquo; Proc. 10th ACM SIGCOMM Conference on Internet Measurement (IMC), pp.267-280, 2010.","DOI":"10.1145\/1879141.1879175"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] M. Yu, J. Rexford, M.J. Freedman, and J. Wang, &ldquo;Scalable flow-based networking with DIFANE,&rdquo; ACM SIGCOMM Computer Communication Review, vol.41, no.4, pp.351-362, 2011.","DOI":"10.1145\/1851275.1851224"},{"key":"20","unstructured":"[20] S.H. Yeganeh and Y. Ganjali, &ldquo;Kandoo: A framework for efficient and scalable offloading of control applications,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.19-24, 2012."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] C.A. Macapuna, C.E. Rothenberg, and M.F. Magalhaes, &ldquo;In-packet Bloom filter based data center networking with distributed OpenFlow controllers,&rdquo; Proc. GLOBECOM Workshops, pp.584-588, 2010.","DOI":"10.1109\/GLOCOMW.2010.5700387"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Y. Chiba, Y. Shinohara, and H. Shimonishi, &ldquo;Source flow: Handling millions of flows on flow-based nodes,&rdquo; ACM SIGCOMM Computer Communication Review, vol.40, no.4, pp.465-466, 2010.","DOI":"10.1145\/1851275.1851266"},{"key":"23","unstructured":"[23] &ldquo;Virtual bridged local area networks,&rdquo; IEEE Std. 802.1Q, 2006."},{"key":"24","unstructured":"[24] L. Sun, K. Suzuki, Y. Chiba, Y. Hatano, and H. Shimonishi, &ldquo;A network management solution based on OpenFlow towards new challenges of multitenant data center,&rdquo; Proc. 9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), IEICE\/IEEE, 2012."},{"key":"25","unstructured":"[25] K. Barabash, R. Cohen, D. Hadas, V. Jain, R. Recio, and B. Rochwerger, &ldquo;A case for overlays in DCN virtualization,&rdquo; Proc. 3rd Workshop on Data Center-Converged and Virtual Ethernet Switching, pp.30-37, 2011."},{"key":"26","unstructured":"[26] J. Pettit, J. Gross, B. Pfaff, M. Casado, and S. Crosby, &ldquo;Virtual switching in an era of advanced edges,&rdquo; Proc. Workshop on Data Center-Converged and Virtual Ethernet Switching (DC-CAVES), 2010."},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] C. Argyropoulos, D. Kalogeras, G. Androulidakis, and V. Maglaris, &ldquo;PaFloMon &mdash; A slice aware passive flow monitoring framework for OpenFlow enabled experimental facilities,&rdquo; Proc. European Workshop on Software Defined Networking (EWSDN), pp.97-102, 2012.","DOI":"10.1109\/EWSDN.2012.13"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] E. Rosen, A. Viswanathan, and R. Callon, &ldquo;Multiprotocol label switching architecture,&rdquo; RFC3031, Internet Engineering Task Force, 2001.","DOI":"10.17487\/rfc3031"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] S. Das, A.R. Sharafat, G. Parulkar, and N. McKeown, &ldquo;MPLS with a simple OPEN control plane,&rdquo; Proc. Optical Fiber Communication Conference and Exposition, and the National Fiber Optic Engineers Conference (OFC\/NFOEC), 2011.","DOI":"10.1364\/OFC.2011.OWP2"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] J. Moy, &ldquo;OSPF Version 2,&rdquo; RFC 2328, Internet Engineering Task Force, 1998.","DOI":"10.17487\/rfc2328"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] L. Andersson, I. Minei, and B. Thomas, &ldquo;LDP Specification,&rdquo; RFC 5036, Internet Engineering Task Force, 2007.","DOI":"10.17487\/rfc5036"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow, &ldquo;RSVP-TE: Extensions to RSVP for LSP tunnels,&rdquo; RFC3209, Internet Engineering Task Force, 2001.","DOI":"10.17487\/rfc3209"},{"key":"33","unstructured":"[33] J. Kempf, S. Whyte, J. Ellithorpe, P. Kazemian, M. Haitjema, N. Beheshti, S. Stuart, and H. Green, &ldquo;OpenFlow MPLS and the open source label switched router,&rdquo; Proc. 23rd International Teletraffic Congress, pp.8-14, 2011."},{"key":"34","unstructured":"[34] &ldquo;OpenFlow switch specication version 1.1.0 implemented (Wire Protocol 0x02),&rdquo; OpenFlow Switch Consortium, 2011."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] O. El Ferkouss, S. Correia, R. Ben Ali, Y. Lemieux, M. Julien, M. Tatipamula, and O. Cherkaoui, &ldquo;On the flexibility of MPLS applications over an OpenFlow-enabled network,&rdquo; Proc. Global Communications Conference (GLOBECOM), 2011.","DOI":"10.1109\/GLOCOM.2011.6133848"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] A. Farrel, J.P. Vasseur, and J. Ash, &ldquo;A path computation element (PCE)-based architecture,&rdquo; RFC 4655, Internet Engineering Task Force, 2006.","DOI":"10.17487\/rfc4655"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] A. Giorgetti, F. Cugini, F. Paolucci, and P. Castoldi, &ldquo;Openflow and PCE architectures in wavelength switched optical networks,&rdquo; Proc. 16th International Conference on Optical Network Design and Modeling (ONDM), 2012.","DOI":"10.1109\/ONDM.2012.6210213"},{"key":"38","unstructured":"[38] &ldquo;The RouteFlow Project Web Site.&rdquo; https:\/\/sites.google.com\/site\/routeflow\/"},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] M. Nascimento, C. Rothenberg, M. Salvador, and M. Magalh&atilde;es, &ldquo;Quagflow: Partnering quagga with openflow,&rdquo; ACM SIGCOMM Computer Communication Review, vol.40, pp.441-442, 2010.","DOI":"10.1145\/1851275.1851252"},{"key":"40","doi-asserted-by":"crossref","unstructured":"[40] Y. Rekhter, T. Li, and S. Hares, &ldquo;A border gateway protocol 4 (BGP-4),&rdquo; RFC 4271, Internet Engineering Task Force, 2006.","DOI":"10.17487\/rfc4271"},{"key":"41","doi-asserted-by":"crossref","unstructured":"[41] D. Kotani, K. Suzuki, and H. Shimonishi, &ldquo;A design and implementation of OpenFlow controller handling IP multicast with fast tree switching,&rdquo; Proc. International Symposium on Applications and the Internet (SAINT), pp.60-67, 2012.","DOI":"10.1109\/SAINT.2012.17"},{"key":"42","doi-asserted-by":"crossref","unstructured":"[42] M. Casado, M.J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, &ldquo;Ethane: Taking control of the enterprise,&rdquo; ACM SIGCOMM Computer Communication Review, vol.37, no.4, pp.1-12, 2007.","DOI":"10.1145\/1282427.1282382"},{"key":"43","unstructured":"[43] H. Kim, A. Voellmy, S. Burnett, N. Feamster, and R. Clark, &ldquo;Lithium: Event-driven network control,&rdquo; Technical Report GT-CS-12-03, Georgia Institute of Technology, 2012."},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] T. Watanabe, S. Kinoshita, J. Yamato, H. Goto, and H. Sone, &ldquo;Flexible access control framework considering IdP-Side's authorization policy in roaming environment,&rdquo; Proc. Computer Software and Applications Conference Workshops (COMPSACW), pp.76-81, 2012.","DOI":"10.1109\/COMPSACW.2012.24"},{"key":"45","doi-asserted-by":"crossref","unstructured":"[45] M. Suenaga, M. Otani, H. Tanaka, and K. Watanabe, &ldquo;Opengate on OpenFlow: System outline,&rdquo; Proc. 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp.491-492, 2012.","DOI":"10.1109\/iNCoS.2012.84"},{"key":"46","unstructured":"[46] &ldquo;Shibboleth.&rdquo; http:\/\/shibboleth.net\/"},{"key":"47","doi-asserted-by":"crossref","unstructured":"[47] G. Yao, J. Bi, and P. Xiao, &ldquo;Source address validation solution with OpenFlow\/NOX architecture,&rdquo; Proc. International Conference on Network Protocols (ICNP), pp.7-12, 2011.","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"48","unstructured":"[48] S. Shin and G. Gu, &ldquo;CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks,&rdquo; Proc. International Conference on Network Protocols (ICNP), 2012."},{"key":"49","unstructured":"[49] S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, &ldquo;FRESCO: Modular composable security services for software-defined networks,&rdquo; Proc. ISOC Network and Distributed System Security Symposium, 2013."},{"key":"50","unstructured":"[50] S. Kumar, T. Kumar, G. Singh, and M.S. Nehra, &ldquo;Open flow switch with intrusion detection system,&rdquo; International J. Schientific Research Engineering &amp; Techonology (IJSRET), vol.1, pp.1-4, 2012."},{"key":"51","doi-asserted-by":"crossref","unstructured":"[51] A.T. Campbell, H.G. De Meer, M.E. Kounavis, K. Miki, J.B. Vicente, and D. Villela, &ldquo;A survey of programmable networks,&rdquo; ACM SIGCOMM Computer Communication Review, vol.29, no.2, pp.7-23, April 1999.","DOI":"10.1145\/505733.505735"},{"key":"52","doi-asserted-by":"crossref","unstructured":"[52] P. Lin, J. Bi, H. Hu, T. Feng, and X. Jiang, &ldquo;A quick survey on selected approaches for preparing programmable networks,&rdquo; Proc. Asian Internet Engineering Conference (AINTEC), pp.160-163, 2011.","DOI":"10.1145\/2089016.2089044"},{"key":"53","unstructured":"[53] G.J. Holzmann, Design and validation of computer protocols, Prentice-Hall, 1991."},{"key":"54","doi-asserted-by":"crossref","unstructured":"[54] K. Bhargavan, D. Obradovic, and C.A. Gunter, &ldquo;Formal verification of standards for distance vector routing protocols,&rdquo; J. ACM, vol.49, no.4, pp.538-576, 2002.","DOI":"10.1145\/581771.581775"},{"key":"55","unstructured":"[55] M. Musuvathi and D.R. Engler, &ldquo;Model checking large network protocol implementations,&rdquo; Proc. USENIX Symposium on Networked Systems Design and Implementation(NSDI), pp.12-12, 2004."},{"key":"56","doi-asserted-by":"crossref","unstructured":"[56] R.W. Ritchey and P. Ammann, &ldquo;Using model checking to analyze network vulnerabilities,&rdquo; Proc. IEEE Symposium on Security and Privacy, pp.156-165, 2000.","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"57","unstructured":"[57] N. McKeown, &ldquo;Making SDNs Work.&rdquo; Invited talk at Open Networking Summit, 2012. Slide and talk video are available at http:\/\/tiny-tera.stanford.edu\/~nickm\/talks\/index.html"},{"key":"58","unstructured":"[58] P. Kazemian, G. Varghese, and N. McKeown, &ldquo;Header space analysis: Static checking for networks,&rdquo; Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), p.9, 2012."},{"key":"59","doi-asserted-by":"crossref","unstructured":"[59] H. Zeng, P. Kazemian, G. Varghese, and N. McKeown, &ldquo;Automatic test packet generation,&rdquo; Proc. International Conference on Emerging Networking Experiments and Technologies (CoNEXT), pp.241-252, 2012.","DOI":"10.1145\/2413176.2413205"},{"key":"60","doi-asserted-by":"crossref","unstructured":"[60] N. Handigol, B. Heller, V. Jeyakumar, D. Mazi&eacute;res, and N. McKeown, &ldquo;Where is the debugger for my software-defined network?,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.55-60, 2012.","DOI":"10.1145\/2342441.2342453"},{"key":"61","unstructured":"[61] &ldquo;NOX\/POX Web Site.&rdquo; http:\/\/www.noxrepo.org\/"},{"key":"62","unstructured":"[62] &ldquo;Floodlight OpenFlow controller &mdash; Project floodlight.&rdquo; http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"63","unstructured":"[63] &ldquo;Trema: Full-Stack OpenFlow framework in ruby and C,&rdquo; http:\/\/trema.github.io\/trema\/"},{"key":"64","doi-asserted-by":"crossref","unstructured":"[64] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, &ldquo;NOX: Towards an operating system for networks,&rdquo; ACM SIGCOMM Computer Communication Review, vol.38, no.3, pp.105-110, 2008.","DOI":"10.1145\/1384609.1384625"},{"key":"65","unstructured":"[65] H. Shimonishi, Y. Takamiya, Y. Chiba, K. Sugyo, Y. Hatano, K. Sonoda, K. Suzuki, D. Kotani, and I. Akiyoshi, &ldquo;Programmable network using OpenFlow for network researches and experiments,&rdquo; Proc. 6th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2012), pp.164-171, 2012."},{"key":"66","doi-asserted-by":"crossref","unstructured":"[66] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, &ldquo;A security enforcement kernel for OpenFlow networks,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.121-126, 2012.","DOI":"10.1145\/2342441.2342466"},{"key":"67","doi-asserted-by":"crossref","unstructured":"[67] T.L. Hinrichs, N.S. Gude, M. Casado, J.C. Mitchell, and S. Shenker, &ldquo;Practical declarative network management,&rdquo; Proc. ACM Workshop on Research on Enterprise Networking (WREN), pp.1-10, 2009.","DOI":"10.1145\/1592681.1592683"},{"key":"68","unstructured":"[68] N. Praveen Katta, J. Rexford, and D. Walker, &ldquo;Logic programming for software defined networks,&rdquo; Proc. International Workshop on Cross-model Language Design and Implementation, 2012."},{"key":"69","doi-asserted-by":"crossref","unstructured":"[69] N. Foster, R. Harrison, M.J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker, &ldquo;Frenetic: A network programming language,&rdquo; Proc. ACM SIGPLAN International Conference on Functional Programming (ICFP), pp.279-291, 2011.","DOI":"10.1145\/2034574.2034812"},{"key":"70","doi-asserted-by":"crossref","unstructured":"[70] A. Voellmy and P. Hudak, &ldquo;Nettle: Taking the sting out of programming network routers,&rdquo; in Practical Aspects of Declarative Languages, pp.235-249, Springer, 2011.","DOI":"10.1007\/978-3-642-18378-2_19"},{"key":"71","doi-asserted-by":"crossref","unstructured":"[71] A. Voellmy, H. Kim, and N. Feamster, &ldquo;Procera: A language for high-level reactive network control,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.43-48, 2012.","DOI":"10.1145\/2342441.2342451"},{"key":"72","doi-asserted-by":"crossref","unstructured":"[72] C. Monsanto, N. Foster, R. Harrison, and D. Walker, &ldquo;A compiler and run-time system for network programming languages,&rdquo; Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pp.217-230, 2012.","DOI":"10.1145\/2103621.2103685"},{"key":"73","doi-asserted-by":"crossref","unstructured":"[73] A.D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, &ldquo;Hierarchical policies for software defined networks,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.37-42, 2012.","DOI":"10.1145\/2342441.2342450"},{"key":"74","unstructured":"[74] R. McGeer, &ldquo;Verification of switching network properties using satisfiability,&rdquo; Proc. IEEE International Conference on Communications (ICC), pp.6638-6644, 2012."},{"key":"75","doi-asserted-by":"crossref","unstructured":"[75] M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, and D. Walker, &ldquo;Abstractions for network update,&rdquo; Proc. ACM SIGCOMM Conference, pp.323-334, 2012.","DOI":"10.1145\/2377677.2377748"},{"key":"76","doi-asserted-by":"crossref","unstructured":"[76] R. McGeer, &ldquo;A safe, efficient update protocol for OpenFlow networks,&rdquo; Proc. ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), pp.61-66, 2012.","DOI":"10.1145\/2342441.2342454"},{"key":"77","unstructured":"[77] M. Canini, D. Venzano, P. Peresni, D. Kostic, and J. Rexford, &ldquo;A NICE way to test OpenFlow applications,&rdquo; Tech. Rep. EPFL-REPORT-169211, &Eacute;cole Polytechnique F&eacute;d&eacute;rale de Lausanne, 2011."},{"key":"78","unstructured":"[78] C. Baier and J.P. Katoen, Principles of Model Checking (Representation and Mind Series), The MIT Press, 2008."},{"key":"79","doi-asserted-by":"crossref","unstructured":"[79] C. Cadar and K. Sen, &ldquo;Symbolic execution for software testing: three decades later,&rdquo; Commun. ACM, vol.56, no.2, pp.82-90, Feb. 2013.","DOI":"10.1145\/2408776.2408795"},{"key":"80","doi-asserted-by":"crossref","unstructured":"[80] R.W. Skowyra, A. Lapets, A. Bestavros, and A. Kfoury, &ldquo;Verifiably-safe software-defined networks for CPS,&rdquo; Proc. ACM International Conference on High Confidence Networked Systems, pp.101-110, 2013.","DOI":"10.1145\/2461446.2461461"},{"key":"81","doi-asserted-by":"crossref","unstructured":"[81] E. Al-Shaer and S. Al-Haj, &ldquo;FlowChecker: Configuration analysis and verification of federated openflow infrastructures,&rdquo; Proc. ACM Workshop on Assurable and Usable Security configuration, pp.37-44, 2010.","DOI":"10.1145\/1866898.1866905"},{"key":"82","doi-asserted-by":"crossref","unstructured":"[82] A. Khurshid, W. Zhou, M. Caesar, and P.B. Godfrey, &ldquo;VeriFlow: Verifying network-wide invariants in real time,&rdquo; ACM SIGCOMM Computer Communication Review, vol.42, no.4, pp.467-472, Sept. 2012.","DOI":"10.1145\/2377677.2377766"},{"key":"83","doi-asserted-by":"crossref","unstructured":"[83] H. Mai, A. Khurshid, R. Agarwal, M. Caesar, P.B. Godfrey, and S.T. King, &ldquo;Debugging the data plane with anteater,&rdquo; ACM SIGCOMM Computer Communication Review, vol.41, no.4, pp.290-301, Aug. 2011.","DOI":"10.1145\/2043164.2018470"},{"key":"84","unstructured":"[84] A.D. Ferguson, A. Guha, J. Place, R. Fonseca, and S. Krishnamurthi, &ldquo;Participatory networking,&rdquo; Proc. USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), 2012."},{"key":"85","doi-asserted-by":"crossref","unstructured":"[85] A. Guha, M. Reitblatt, and F. Nate, &ldquo;Machine-verified network controllers,&rdquo; Proc. Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp.217-230, 2012.","DOI":"10.1145\/2491956.2462178"},{"key":"86","doi-asserted-by":"crossref","unstructured":"[86] M. Kuzniar, P. Peresini, M. Canini, D. Venzano, and D. Kostic, &ldquo;A SOFT way for openflow switch interoperability testing,&rdquo; Proc. International Conference on Emerging Networking Experiments and Technologies (CoNEXT), pp.265-276, 2012.","DOI":"10.1145\/2413176.2413207"},{"key":"87","doi-asserted-by":"crossref","unstructured":"[87] M. Kuzniar, M. Canini, and D. Kostic, &ldquo;OFTEN testing OpenFlow networks,&rdquo; Proc. European Workshop on Software Defined Networking (EWSDN), pp.54-60, 2012.","DOI":"10.1109\/EWSDN.2012.21"},{"key":"88","doi-asserted-by":"crossref","unstructured":"[88] D. Jin and D.M. Nicol, &ldquo;Parallel simulation of software defined networks,&rdquo; Proc. ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, pp.91-102, 2013.","DOI":"10.1145\/2486092.2486104"},{"key":"89","unstructured":"[89] A. Wundsam, D. Levin, S. Seetharaman, and A. Feldmann, &ldquo;OFRewind: Enabling record and replay troubleshooting for networks,&rdquo; Proc. USENIX Annual Technical Conference, pp.29-29, 2011."},{"key":"90","unstructured":"[90] C. Scott, A. Wundsam, S. Whitlock, A. Or, E. Huang, K. Zarifis, and S. Shenker, &ldquo;How did we get into this mess? Isolating fault-inducing inputs to SDN control software,&rdquo; Tech. Rep. UCB\/EECS-2013-8, Electrical Engineering and Computer Sciences, University of California, Berkeley, Feb. 2013."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E97.B\/2\/E97.B_375\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T18:50:29Z","timestamp":1746125429000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E97.B\/2\/E97.B_375\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":90,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.e97.b.375","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}