{"id":"https://openalex.org/W2783354802","doi":"https://doi.org/10.1109/glocom.2017.8254024","title":"Flow Entry Sharing in Protection Design for Software Defined Networks","display_name":"Flow Entry Sharing in Protection Design for Software Defined Networks","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2783354802","doi":"https://doi.org/10.1109/glocom.2017.8254024","mag":"2783354802"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8254024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Flow_entry_sharing_in_protection_design_for_software_defined_networks/20805712","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100423530","display_name":"Xiaoning Zhang","orcid":"https://orcid.org/0000-0002-7525-553X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoning Zhang","raw_affiliation_strings":["Education Ministry of China, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Education Ministry of China, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Information Technology, Deakin University"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036683049","display_name":"Zhichao Xu","orcid":"https://orcid.org/0000-0002-2370-4487"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Xu","raw_affiliation_strings":["Education Ministry of China, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Education Ministry of China, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100782551","display_name":"Yichao Li","orcid":"https://orcid.org/0000-0002-4657-0901"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichao Li","raw_affiliation_strings":["Education Ministry of China, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Education Ministry of China, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042112235","display_name":"Zijing Cheng","orcid":"https://orcid.org/0000-0001-7917-5716"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zijing Cheng","raw_affiliation_strings":["Beijing Institute of Satellite Information Engineering"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Satellite Information Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["School of Information Technology, Deakin University"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100423530"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.877,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79264327,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7955710887908936},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.717597246170044},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5881496071815491},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.5591894388198853},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5398077368736267},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4950467646121979},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.472674697637558},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4573932886123657},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.44088250398635864},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4252397119998932},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19627243280410767},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08613350987434387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955710887908936},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.717597246170044},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5881496071815491},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.5591894388198853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5398077368736267},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4950467646121979},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.472674697637558},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4573932886123657},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.44088250398635864},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4252397119998932},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19627243280410767},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08613350987434387},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/glocom.2017.8254024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30111968","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20805712","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Flow_entry_sharing_in_protection_design_for_software_defined_networks/20805712","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/133523","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/133523","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20805712","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Flow_entry_sharing_in_protection_design_for_software_defined_networks/20805712","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1524481615","https://openalex.org/W1546245124","https://openalex.org/W1984828902","https://openalex.org/W2041849649","https://openalex.org/W2062143991","https://openalex.org/W2074129740","https://openalex.org/W2078474261","https://openalex.org/W2134519279","https://openalex.org/W2140100092","https://openalex.org/W2147118406","https://openalex.org/W2155771881","https://openalex.org/W2290046661","https://openalex.org/W2481145384","https://openalex.org/W2560836441","https://openalex.org/W3102944677"],"related_works":["https://openalex.org/W2955195711","https://openalex.org/W2354454611","https://openalex.org/W2993266126","https://openalex.org/W2392283887","https://openalex.org/W4285278887","https://openalex.org/W2365237642","https://openalex.org/W2995925505","https://openalex.org/W3116484972","https://openalex.org/W2941986668","https://openalex.org/W4232431455"],"abstract_inverted_index":{"In":[0],"Software":[1],"Defined":[2],"Networks":[3],"(SDN),":[4],"though":[5],"we":[6,84],"can":[7],"design":[8,71,110],"protection":[9,74,91,132],"mechanism":[10],"to":[11,70,76,92],"enable":[12],"fast":[13],"recovery":[14],"against":[15],"a":[16,24,44,72,111],"single":[17],"link":[18,141],"failure,":[19],"it":[20,60,67],"requires":[21],"proactively":[22],"installing":[23],"large":[25],"number":[26],"of":[27],"flow":[28,41,78,86,137],"entries":[29,42,138],"in":[30,43,57,89,143],"switches":[31],"on":[32],"working":[33],"paths":[34],"and":[35,63,108,139],"backup":[36],"paths.":[37],"However,":[38],"these":[39],"additional":[40],"SDN":[45,90,131],"switch":[46],"may":[47],"exhaust":[48],"Ternary":[49],"Content":[50],"Addressable":[51],"Memory":[52],"(TCAM)":[53],"which":[54],"is":[55,61,68],"limited":[56],"size":[58],"since":[59],"expensive":[62],"power":[64],"hungry.":[65],"Accordingly,":[66],"emergent":[69],"new":[73],"technology":[75],"minimize":[77],"entry":[79,87],"occupation.":[80],"To":[81],"this":[82,94],"end,":[83],"leverage":[85],"sharing":[88],"solve":[93],"problem.":[95],"We":[96],"first":[97],"present":[98],"the":[99,129],"problem":[100],"as":[101],"an":[102],"ILP":[103],"(Integer":[104],"Linear":[105],"Programming)":[106],"model,":[107],"then":[109],"greedy":[112],"based":[113],"heuristic":[114],"algorithm":[115],"named":[116],"Flow":[117],"Entry":[118],"Sharing":[119],"Protection":[120],"(FESP).":[121],"Extensive":[122],"simulation":[123],"results":[124],"show":[125],"that":[126],"compared":[127],"with":[128],"previous":[130],"algorithms,":[133],"FESP":[134],"reduces":[135],"28.31%":[136],"27.65%":[140],"bandwidth":[142],"average.":[144]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
