{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:46:23Z","timestamp":1725680783618},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300448"},{"type":"electronic","value":"9783642300455"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30045-5_30","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T04:33:29Z","timestamp":1337056409000},"page":"397-408","source":"Crossref","is-referenced-by-count":4,"title":["A Local Approach to Fast Failure Recovery of LISP Ingress Tunnel Routers"],"prefix":"10.1007","author":[{"given":"Damien","family":"Saucez","sequence":"first","affiliation":[]},{"given":"Juhoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Iannone","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]},{"given":"Clarence","family":"Filsfils","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"BGP Routing Table Analysis Report, \n \n http:\/\/bgp.potaroo.net"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Quoitin, B., Iannone, L., de Launois, C., Bonaventure, O.: Evaluating the benefits of the locator\/identifier separation. In: The 2nd ACM\/IEEE Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2007) (August 2007)","DOI":"10.1145\/1366919.1366926"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Meyer, D., Zhang, L., Fall, K.: Report from the IAB Workshop on Routing and Addressing. RFC 4984, Internet Engineering Task Force (September 2007)","DOI":"10.17487\/rfc4984"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Farinacci, D., Fuller, V., Meyer, D., Lewis, D.: Locator\/ID separation protocol (LISP). IETF, Internet Draft draft-ietf-lisp-22.txt (February 2012)","DOI":"10.17487\/rfc6830"},{"key":"30_CR5","unstructured":"Locator\/ID Separation Protocol (LISP) Working Goup, \n \n http:\/\/datatracker.ietf.org\/wg\/lisp\/charter\/"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-642-20757-0_29","volume-title":"NETWORKING 2011","author":"J. Kim","year":"2011","unstructured":"Kim, J., Iannone, L., Feldmann, A.: A Deep Dive into the LISP Cache and What ISPs Should Know about It. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol.\u00a06640, pp. 367\u2013378. Springer, Heidelberg (2011)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, H., Chen, M., Zhu, Y.: Evaluating the Performance on ID\/Loc Mapping. In: The Global Communications Conference (Globecom 2008) (November 2008)","DOI":"10.1109\/GLOCOM.2008.ECP.438"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Iannone, L., Bonaventure, O.: On the cost of caching locator\/id mappings. In: The 3rd ACM Annual CoNEXT Conference (CoNEXT 2007) (December 2007)","DOI":"10.1145\/1364654.1364663"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Sriram, K., Gleichmann, P., Kim, Y.-T., Montgomery, D.: Enhanced Efficiency of Mapping Distribution Protocols in Scalable Routing and Addressing Architectures (August 2010)","DOI":"10.1109\/ICCCN.2010.5560114"},{"key":"30_CR10","unstructured":"Choi, N., You, T., Park, J., Kwon, T., Choi, Y.: ID\/LOC Separation Network Architecture for Mobility Support in Future Internet (February 2009)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Jakab, L., Cabellos-Aparicio, A., Coras, F., Saucez, D., Bonaventure, O.: LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System. IEEE Journal on Selected Areas in Communications (October 2010)","DOI":"10.1109\/JSAC.2010.101011"},{"key":"30_CR12","unstructured":"Meyer, D., Lewis, D.: Architectural Implications of Locator\/ID Separation. IETF, Internet Draft draft-meyer-loc-id-implications-01 (January 2009)"},{"key":"30_CR13","unstructured":"Fuller, V., Farinacci, D.: LISP Map Server. IETF, Internet Draft draft-ietf-lisp-ms-15.txt (January 2012)"},{"key":"30_CR14","unstructured":"Vasseur, J., Demeester, P., Pickavet, M.: Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS, Elsevier, Ed. (2004)"},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/CATCH.2009.38","volume-title":"Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security","author":"K. Claffy","year":"2009","unstructured":"Claffy, K., Hyun, Y., Keys, K., Fomenkov, M., Krioukov, D.: Internet mapping: From art to science. In: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 205\u2013211. IEEE Computer Society, Washington, DC (2009)"},{"key":"30_CR16","unstructured":"University of Oregon, Route views, University of Oregon Route Views project, \n \n http:\/\/www.routeviews.org\/"},{"key":"30_CR17","unstructured":"Ohmori, M., Okamura, K., Tanizaki, F.: Analyses on first packet drops of lisp in end-to-end bidirectional communications. In: Internet Conference, Fukuoka, Japan (October 2011)"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Luciani, J., Armitage, G., Halpern, J., Doraswamy, N.: Server Cache Synchronization Protocol (SCSP). RFC 2334 (Proposed Standard), Internet Engineering Task Force (April 1998), \n \n http:\/\/www.ietf.org\/rfc\/rfc2334.txt","DOI":"10.17487\/rfc2334"},{"key":"30_CR19","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/1057977.1057980","volume":"37","author":"Y. Saito","year":"2005","unstructured":"Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv.\u00a037, 42\u201381 (2005)","journal-title":"ACM Comput. Surv."},{"key":"30_CR20","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/49.669045","volume":"16","author":"K. Obraczka","year":"1998","unstructured":"Obraczka, K., Dazing, P.: Evaluating the performance of flood-d: A tool for efficiently replicating internet information services. IEEE Journal on Selected Areas in Communications\u00a016, 369\u2013382 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Petersen, K., Spreitzer, M., Terry, D., Theimer, M., Demers, A.: Flexible update propagation for weakly consistent replication. In: Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP), pp. 288\u2013301 (October 1997)","DOI":"10.1145\/269005.266711"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30045-5_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:25:50Z","timestamp":1620127550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30045-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300448","9783642300455"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30045-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}