{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T15:35:18Z","timestamp":1720280118371},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"ARC-SDN"},{"name":"Cisco URP"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1016\/j.comcom.2019.05.009","type":"journal-article","created":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T15:11:34Z","timestamp":1560957094000},"page":"223-233","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["SRv6Pipes: Enabling in-network bytestream functions"],"prefix":"10.1016","volume":"145","author":[{"given":"Fabien","family":"Duchene","sequence":"first","affiliation":[]},{"given":"David","family":"Lebrun","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2019.05.009_b1","doi-asserted-by":"crossref","unstructured":"B. Carpenter, S. Brim, Middleboxes: Taxonomy and Issues. RFC 3234 (Informational), February 2002.","DOI":"10.17487\/rfc3234"},{"issue":"4","key":"10.1016\/j.comcom.2019.05.009_b2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2377677.2377680","article-title":"Making middleboxes someone else\u2019s problem: network processing as a cloud service","volume":"42","author":"Sherry","year":"2012","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2019.05.009_b3","series-title":"Proceedings of the 2013 Conference on Internet Measurement Conference","first-page":"9","article-title":"Demystifying the dark side of the middle: a field study of middlebox failures in datacenters","author":"Potharaju","year":"2013"},{"issue":"6","key":"10.1016\/j.comcom.2019.05.009_b4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MIC.2016.112","article-title":"Network function virtualization","volume":"20","author":"Joshi","year":"2016","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.comcom.2019.05.009_b5","doi-asserted-by":"crossref","unstructured":"J. Halpern, C. Pignataro, Service Function Chaining (SFC) Architecture. RFC 7665 (Informational), October 2015.","DOI":"10.17487\/RFC7665"},{"key":"10.1016\/j.comcom.2019.05.009_b6","doi-asserted-by":"crossref","unstructured":"P. Quinn, U. Elzur, C. Pignataro, Network Service Header (NSH), Internet draft, draft-ietf-sfc-nsh-28, 2017.","DOI":"10.17487\/RFC8300"},{"issue":"4","key":"10.1016\/j.comcom.2019.05.009_b7","doi-asserted-by":"crossref","first-page":"2291","DOI":"10.1109\/TNET.2015.2453338","article-title":"Migrating the internet to ipv6: an exploration of the when and why","volume":"24","author":"Nikkhah","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.comcom.2019.05.009_b8","unstructured":"Mat Ford, Landmark ipv6 report published: State of deployment 2017, CircleID, 2017, http:\/\/www.circleid.com\/posts\/20170606_landmark_ipv6_report_published_state_of_deployment_2017\/."},{"key":"10.1016\/j.comcom.2019.05.009_b9","series-title":"2015 IEEE Global Communications Conference, GLOBECOM","first-page":"1","article-title":"The segment routing architecture","author":"Filsfils","year":"2015"},{"key":"10.1016\/j.comcom.2019.05.009_b10","unstructured":"Stefano Previdi, et al. IPv6 Segment Routing Header (SRH), Internet-Draft draft-ietf-6man-segment-routing-header-07, Internet Engineering Task Force, 2017 (in preparation)."},{"key":"10.1016\/j.comcom.2019.05.009_b11","unstructured":"Christian Kreibich, Mark Handley, V. Paxson, Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics, in: Proc. USENIX Security Symposium, vol. 2001, 2001."},{"key":"10.1016\/j.comcom.2019.05.009_b12","doi-asserted-by":"crossref","unstructured":"A. Ford, C. Raiciu, M. Handley, O. Bonaventure, TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6824 (Experimental), January 2013.","DOI":"10.17487\/rfc6824"},{"key":"10.1016\/j.comcom.2019.05.009_b13","article-title":"Multipath TCP deployments","volume":"2016","author":"Bonaventure","year":"2016","journal-title":"IETF J."},{"key":"10.1016\/j.comcom.2019.05.009_b14","unstructured":"Olivier Bonaventure, Mohamed Boucadair, Bart Peirens, SungHoon Seo, Anandatirtha Nandugudi, 0-RTT TCP Converter Internet-Draft draft-bonaventure-mptcp-converters-02, Internet Engineering Task Force, 2017 (in preparation)."},{"key":"10.1016\/j.comcom.2019.05.009_b15","unstructured":"Linux Virtual Server, http:\/\/www.linuxvirtualserver.org\/, (Accessed 31 December 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b16","series-title":"ACM SIGCOMM Computer Communication Review, Vol. 28","first-page":"178","article-title":"An active service framework and its application to real-time multimedia transcoding","author":"Amir","year":"1998"},{"issue":"1","key":"10.1016\/j.comcom.2019.05.009_b17","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/JPROC.2004.839620","article-title":"Digital video transcoding","volume":"93","author":"Xin","year":"2005","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.comcom.2019.05.009_b18","unstructured":"Amazon Elastic Transcoder, https:\/\/aws.amazon.com\/fr\/elastictranscoder\/, (Accessed 5 April 2018)."},{"key":"10.1016\/j.comcom.2019.05.009_b19","unstructured":"Clarence Filsfils, Stefano Previdi, Les Ginsberg, Bruno Decraene, Stephane Litkowski, Rob Shakir, Segment Routing Architecture, Internet-Draft draft-ietf-spring-segment-routing-14, Internet Engineering Task Force, 2017 (in preparation)."},{"key":"10.1016\/j.comcom.2019.05.009_b20","series-title":"Reaping the benefits of IPv6 segment routing","author":"Lebrun","year":"2017"},{"key":"10.1016\/j.comcom.2019.05.009_b21","doi-asserted-by":"crossref","unstructured":"David Lebrun, Mathieu Jadin, Fran\u00e7ois Clad, Clarence Filsfils, Olivier Bonaventure, Software resolved networks: Rethinking enterprise networks with ipv6 segment routing, in: SOSR\u201918: Symposium on SDN Research, 2018.","DOI":"10.1145\/3185467.3185471"},{"key":"10.1016\/j.comcom.2019.05.009_b22","series-title":"Proceedings of the 2013 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddlebox \u201913","first-page":"19","article-title":"Flowos: A flow-based platform for middleboxes","author":"Bezahaf","year":"2013"},{"key":"10.1016\/j.comcom.2019.05.009_b23","unstructured":"Francois Filsfils, Pablo Camarillo, Jose Liste, Prem Jonnalagadda, Milad Sharif, Stefano Salsano, Ahmed AbdelSalam, Ipv6 segment routing, in: SIGCOMM\u201917, Industrial demos, 2017."},{"key":"10.1016\/j.comcom.2019.05.009_b24","series-title":"Proceedings of the 2017 Applied Networking Research Workshop","article-title":"Implementing IPv6 Segment Routing in the Linux Kernel","author":"Lebrun","year":"2017"},{"key":"10.1016\/j.comcom.2019.05.009_b25","unstructured":"P. Camarillo, et al. Srv6 network programming. Internet draft, draft-filsfils-spring-srv6-network-programming-02, 2017 (in preparation)."},{"key":"10.1016\/j.comcom.2019.05.009_b26","unstructured":"RSS: Receive Side Scaling, https:\/\/www.kernel.org\/doc\/Documentation\/networking\/scaling.txt, (Accessed 28 August 2018)."},{"key":"10.1016\/j.comcom.2019.05.009_b27","unstructured":"wrk - a HTTP benchmarking tool, https:\/\/github.com\/wg\/wrk, (Accessed 31 December 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b28","unstructured":"perf: Linux profiling with performance counters, https:\/\/perf.wiki.kernel.org\/, (Accessed 29 March 2018)."},{"key":"10.1016\/j.comcom.2019.05.009_b29","unstructured":"OpenWRT, https:\/\/openwrt.org\/, (Accessed 28 August 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b30","unstructured":"Creating OpenWRT packages, https:\/\/wiki.openwrt.org\/doc\/devel\/packages, (Accessed 28 August 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b31","unstructured":"CZ.NIC, http:\/\/www.nic.cz\/en\/, (Accessed 28 August 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b32","unstructured":"Turris Omnia, https:\/\/omnia.turris.cz\/en\/, (Accessed 28 August 2017)."},{"key":"10.1016\/j.comcom.2019.05.009_b33","doi-asserted-by":"crossref","unstructured":"Ahmed AbdelSalam, Francois Clad, Clarence Filsfils, Stefano Salsano, Giuseppe Siracusano, Luca Veltri, Implementation of virtual network function chaining through segment routing in a linux-based nfv infrastructure, in: IEEE Conference on Network Softwarization, NetSoft, Bologna, Italy, 2017.","DOI":"10.1109\/NETSOFT.2017.8004208"},{"key":"10.1016\/j.comcom.2019.05.009_b34","series-title":"Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, NSDI\u201914","first-page":"445","article-title":"Netvm: High performance and flexible networking using virtualization on commodity platforms","author":"Hwang","year":"2014"},{"key":"10.1016\/j.comcom.2019.05.009_b35","series-title":"Proceedings of the Eighth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS \u201912","first-page":"49","article-title":"xomb: EXtensible open middleboxes with commodity servers","author":"Anderson","year":"2012"},{"key":"10.1016\/j.comcom.2019.05.009_b36","doi-asserted-by":"crossref","unstructured":"Motomu Utsumi, Hajime Tazaki, Hiroshi Esaki, \/dev\/stdpkt: A service chaining architecture with pipelined operating system instances in a unix shell, in: AINTEC \u201917: Asian Internet Engineering Conference, Bangkok, Thailand, November 20\u201322 2017.","DOI":"10.1145\/3154970.3154972"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366419304104?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366419304104?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T21:59:01Z","timestamp":1620856741000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366419304104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":36,"alternative-id":["S0140366419304104"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2019.05.009","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SRv6Pipes: Enabling in-network bytestream functions","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2019.05.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}