{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:46:01Z","timestamp":1771703161685,"version":"3.50.1"},"reference-count":41,"publisher":"Zhejiang University Press","issue":"7","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1631\/fitee.1601135","type":"journal-article","created":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T03:10:00Z","timestamp":1468293000000},"page":"682-700","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A subtree-based approach to failure detection and protection for multicast in SDN"],"prefix":"10.1631","volume":"17","author":[{"given":"Vignesh","family":"Renganathan Raja","sequence":"first","affiliation":[]},{"given":"Chung-Horng","family":"Lung","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Guo-ming","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2016,7,13]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4013\/jacr.2012.22.02"},{"key":"ref3","article-title":"Internet Group Management Protocol, Version 3. RFC 3376","volume-title":"Internet Engineering Task Force, Fermont.","author":"Cain","year":"2002"},{"key":"ref4","volume-title":"Link Layer Discovery Protocol. RFC 2922.","author":"Congdon","year":"2002"},{"key":"ref5","volume-title":"GroupFlow.","author":"Craig","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2015.7249245"},{"key":"ref7","volume-title":"PAC.C: a Unified Control Architecture for Packet and Circuit Network Convergence.","author":"Das","year":"2012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2001.937328"},{"key":"ref10","article-title":"Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification (Revised). RFC 4601","volume-title":"Internet Engineering Task Force, Fremont.","author":"Fenner","year":"2006"},{"key":"ref11","article-title":"Floodlight","volume-title":"Project Floodlight-Open Source Software for Building Software-Defined Networks.","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iccet.2009.138"},{"key":"ref13","article-title":"Bidirectional Forwarding Detection (BFD). RFC 5880","volume-title":"Internet Engineering Task Force, Fremont.","author":"Katz","year":"2010"},{"key":"ref14","first-page":"6606","article-title":"Scalable fault management for OpenFlow","volume-title":"Proc. IEEE Int. Conf. on Communications","author":"Kempf","year":"2012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1364\/jocn.7.000264"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/saint.2012.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2371999"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iwqos.2014.6914322"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2012.6249274"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/90.803380"},{"key":"ref23","article-title":"MOSPF: Analysis and Experience. RFC 1585","volume-title":"Internet Engineering Task Force, Fremont.","author":"Moy","year":"1994"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342460"},{"key":"ref25","article-title":"Software-Defined Networking: the New Norm for Networks","volume-title":"ONF White Paper.","year":"2012"},{"key":"ref26","volume-title":"Traffic Engineering with MPLS.","author":"Osborne","year":"2002"},{"key":"ref27","article-title":"Fast Reroute Extensions to RSVP-TE for LSP Tunnels. RFC 4090","volume-title":"Internet Engineering Task Force, Fremont.","author":"Pan","year":"2005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ntms.2015.7266517"},{"key":"ref29","volume-title":"Link Failure Recovery for MPLS Networks with Multicasting.","author":"Pointurier","year":"2002"},{"key":"ref30","article-title":"POXST","volume-title":"POX Spanning Tree.","year":"2016"},{"key":"ref31","article-title":"POXTD","volume-title":"POX Topology Discovery.","year":"2014"},{"key":"ref32","article-title":"Python","volume-title":"Python Time Complexity.","year":"2015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22572-2_15"},{"key":"ref34","article-title":"An Extended Study of DynSdm: Software-Defined Multicast Using Multi-trees","volume-title":"Technical Report, No. RS-TR-2015\u201301","author":"R\u00fcckert","year":"2015"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ngi.2006.1678265"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018516"},{"key":"ref37","volume-title":"Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP).","author":"Tiso","year":"2011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ewsdn.2014.13"},{"key":"ref39","first-page":"236","article-title":"Protecting a MPLS multicast session tree with bounded switchover time","author":"Wei","year":"2010","journal-title":"Int. Symp. on Performance Evaluation of Computer and Telecommunication Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/nosdav.1997.629385"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/iciecs.2009.5364380"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1601135\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:35:34Z","timestamp":1771655734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1601135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1601135","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}