{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:38Z","timestamp":1761401678362,"version":"3.44.0"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2009CB320505"],"award-info":[{"award-number":["2009CB320505"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170211"],"award-info":[{"award-number":["61170211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"publisher","award":["20110002110056"],"award-info":[{"award-number":["20110002110056"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1016\/j.comcom.2013.09.014","type":"journal-article","created":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T12:30:18Z","timestamp":1381149018000},"page":"40-52","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["A study of traffic from the perspective of a large pure IPv6 ISP"],"prefix":"10.1016","volume":"37","author":[{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0001-9782-0053","authenticated-orcid":false,"given":"Fuliang","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0002-2299-0135","authenticated-orcid":false,"given":"Changqing","family":"An","sequence":"additional","affiliation":[]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2013.09.014_b0005","unstructured":"Internet Society, Internet Society Statement on IPv4 Depletion. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/isoc.org\/wp\/newsletter\/?p=3139002E."},{"key":"10.1016\/j.comcom.2013.09.014_b0010","unstructured":"APNIC, Key Turning Point in Asia Pacific IPv4 Exhaustion. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.APNIC.net\/data\/assets\/pdf_file\/0018\/33246\/Key-Turning-Point-in-Asia-Pacific-IPv4-Exhaustion_English.pdf."},{"key":"10.1016\/j.comcom.2013.09.014_b0015","unstructured":"Google,Google ipv6 implementors conference, 2010. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/sites.google.com\/site\/ipv6implementors\/2010\/agenda."},{"key":"10.1016\/j.comcom.2013.09.014_b0020","unstructured":"R. Mohan, Will U.S. Government Directives Spur IPv6 Adoption?. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.circleid.com\/posts\/20100929_will_us_government_directives_spur_ipv6_adoption\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0025","unstructured":"Wikipedia, Pv6 deployment, 2012. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/en.wikipedia.org\/wiki\/IPv6_deployment#Deployment_by_country."},{"issue":"2","key":"10.1016\/j.comcom.2013.09.014_b0030","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1971162.1971170","article-title":"CNGI-CERNET2: an IPv6 Deployment in China","volume":"41","author":"Wu","year":"2011","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.comcom.2013.09.014_b0035","unstructured":"Y. Ma, Construction of CNGI-CERNET IPv6 CPN, 2009. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.apan.net\/meetings\/kaohsiung2009\/presentations\/ipv6\/cernet.pdf."},{"key":"10.1016\/j.comcom.2013.09.014_b0040","unstructured":"Olympic Games 2008, 2008. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ipv6.beijing2008.cn\/en."},{"key":"10.1016\/j.comcom.2013.09.014_b0045","unstructured":"Internet Society World IPv6 Day, 2011. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/isoc.org\/wp\/worldipv6day\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0050","doi-asserted-by":"crossref","unstructured":"L. Colitti, S.H. Gunderson, E. Kline, T. Refice, Evaluating IPv6 Adoption in the Internet, in: Proc. passive and active measurement (PAM), 2010, pp. 141\u2013150.","DOI":"10.1007\/978-3-642-12334-4_15"},{"key":"10.1016\/j.comcom.2013.09.014_b0055","doi-asserted-by":"crossref","unstructured":"D. Malone, Observations of IPv6 addresses, in: Proc. passive and active network measurement (PAM), 2008, pp. 21\u201330.","DOI":"10.1007\/978-3-540-79232-1_3"},{"key":"10.1016\/j.comcom.2013.09.014_b0060","doi-asserted-by":"crossref","unstructured":"E. Karpilovsky, A. Gerber, D. Pei, J. Rexford, A. Shaikh, Quantifying the Extent of IPv6 Deployment, in: Proc. passive and active measurement (PAM), 2009, pp. 13\u201322.","DOI":"10.1007\/978-3-642-00975-4_2"},{"issue":"3","key":"10.1016\/j.comcom.2013.09.014_b0065","first-page":"43","article-title":"Tracking IPv6 evolution: data we have and data we need","volume":"41","author":"Claffy","year":"2011"},{"key":"10.1016\/j.comcom.2013.09.014_b0070","unstructured":"P. Hicks, Fraction of IPv6 traffic (in packets and bytes) for monthly passive traces, May 2011. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.caida.org\/data\/passive\/trace_stats\/ipv6_traffic.xml."},{"key":"10.1016\/j.comcom.2013.09.014_b0075","doi-asserted-by":"crossref","unstructured":"W. Shen, Y. Chen, Q. Zhang, Y. Chen, B. Deng, X. Li, G. Lv, Observations of IPv6 Traffic, in: Proc. Computing, Communication, Control, and Management (CCCM), 2009, pp. 278\u2013282.","DOI":"10.1109\/CCCM.2009.5270414"},{"key":"10.1016\/j.comcom.2013.09.014_b0080","doi-asserted-by":"crossref","unstructured":"L. Gao, J. Yang, H. Zhang, D. Qin, B. Zhang, What\u2019s Going On in Chinese IPv6 World, in: Proc. Network Operations and Management Symposium (NOMS), 2012, pp. 534\u2013537.","DOI":"10.1109\/NOMS.2012.6211949"},{"key":"10.1016\/j.comcom.2013.09.014_b0085","unstructured":"Sandvine, Global Internet Phenomena Spotlight \u2013World IPv6 Day. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.sandvine.com\/downloads\/documents\/Sandvine."},{"key":"10.1016\/j.comcom.2013.09.014_b0090","unstructured":"R. Malan, World IPv6 Day: Final Look and \u201cWagon\u2019s Ho!\u201d. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/asert.arbornetworks.com\/2011\/06\/world-ipv6-day-final-look-and-wagons-ho\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0095","unstructured":"G. Huston, IPv6 Reports. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/bgp.potaroo.net\/index-v6.html."},{"key":"10.1016\/j.comcom.2013.09.014_b0100","doi-asserted-by":"crossref","unstructured":"M. Nikkhah, R. Gu\u00e9rin, Y. Lee, R. Woundy, Assessing IPv6 through web access a measurement study and its findings, in: Proc. Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2011, pp. 26:1\u201326:12.","DOI":"10.1145\/2079296.2079322"},{"key":"10.1016\/j.comcom.2013.09.014_b0105","doi-asserted-by":"crossref","unstructured":"A. Dhamdhere, M. Luckie, B. Huffaker, K. claffy, A. Elmokashfi E. Aben, Measuring the Deployment of IPv6: Topology, Routing and Performance, in: Proc. Internet measurement conference (IMC), 2012, pp. 537\u2013550.","DOI":"10.1145\/2398776.2398832"},{"issue":"5","key":"10.1016\/j.comcom.2013.09.014_b0110","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1109\/TNET.2011.2119327","article-title":"Twelve years in the evolution of the internet ecosystem","volume":"19","author":"Dhamdhere","year":"2011","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.comcom.2013.09.014_b0115","unstructured":"Spoofer Project. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/spoofer.csail.mit.edu\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0120","doi-asserted-by":"crossref","unstructured":"R. Beverly, A. Berger, Y. Hyun, K. claffy, Understanding the efficacy of deployed internet source address validation filtering, in: Proc. Internet measurement conference (IMC), 2009, pp. 356\u2013369.","DOI":"10.1145\/1644893.1644936"},{"key":"10.1016\/j.comcom.2013.09.014_b0125","unstructured":"The Asia-Pacific Advanced Network (APAN). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.apan.net\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0130","unstructured":"The Research and Education Network for Asia\u2013Pacific (TEIN3). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.tein3.net\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0135","unstructured":"Internet2. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.internet2.edu\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0140","unstructured":"GEANT2. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.geant2.net\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0145","unstructured":"J. Wu, J. Bi, M. Bagnulo, F. Baker C. Vogt, Source address validation improvement framework, 2010. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/datatracker.ietf.org\/doc\/draft-ietf-savi-framework\/."},{"key":"10.1016\/j.comcom.2013.09.014_b0150","doi-asserted-by":"crossref","unstructured":"S. Thomson, T. Narten, T. Jinmei, IPv6 stateless address autoconfiguration, RFC 4862, September 2007.","DOI":"10.17487\/rfc4862"},{"key":"10.1016\/j.comcom.2013.09.014_b0155","doi-asserted-by":"crossref","unstructured":"R. Droms, Dynamic host configuration protocol, RFC 2131, March 1997.","DOI":"10.17487\/rfc2131"},{"key":"10.1016\/j.comcom.2013.09.014_b0160","doi-asserted-by":"crossref","unstructured":"J. Bound, B. Volz, T. Lemon, C. Perkins, M. Carney, Dynamic host configuration protocol for ipv6 (DHCPv6), RFC 3315, July 2003.","DOI":"10.17487\/rfc3315"},{"key":"10.1016\/j.comcom.2013.09.014_b0165","unstructured":"J. Arkko, J. Kempf, B. Zill, P. Nikande, Secure neighbor discovery (SEND), RFC 3971, March 2005."},{"key":"10.1016\/j.comcom.2013.09.014_b0170","doi-asserted-by":"crossref","unstructured":"M. Zhang, M. Dusi, W. John, C. Chen, Analysis of UDP traffic usage on internet backbone links. in: Proc. Applications and the Internet (SAINT), 2009, pp. 280\u2013281.","DOI":"10.1109\/SAINT.2009.65"},{"key":"10.1016\/j.comcom.2013.09.014_b0175","doi-asserted-by":"crossref","unstructured":"C. Lee, D.K. Lee, S. Moon, Unmasking the growing UDP traffic in a campus network, in: Proc. passive and active, measurement (PAM). 2012, pp. 1\u201310.","DOI":"10.1007\/978-3-642-28537-0_1"},{"key":"10.1016\/j.comcom.2013.09.014_b0180","unstructured":"M. Kodama, PJLink Specifications, 2005. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/pjlink.jbmia.or.jp\/english\/data\/PJLinkSpecifications100.pdf."},{"key":"10.1016\/j.comcom.2013.09.014_b0185","doi-asserted-by":"crossref","unstructured":"M. Lottor. TCP port service Multiplexer (TCPMUX), RFC 1078, November 1988.","DOI":"10.17487\/rfc1078"},{"issue":"16","key":"10.1016\/j.comcom.2013.09.014_b0190","first-page":"1922","article-title":"A study of traffic, user behavior and pricing policies in a large campus network","volume":"34","author":"Wang","year":"2011","journal-title":"Computer Communications"},{"key":"10.1016\/j.comcom.2013.09.014_b0195","doi-asserted-by":"crossref","unstructured":"J. Wu, J. Bi, X. Li, G. Ren, K. Xu, A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience, RFC 5210, June 2008.","DOI":"10.17487\/rfc5210"},{"key":"10.1016\/j.comcom.2013.09.014_b0200","doi-asserted-by":"crossref","unstructured":"N. Sarrar, G. Maier, B. Ager, R. Sommer, S. Uhlig, Investigating IPv6 traffic \u2013 what happened at the world IPv6 day?, in: Proc. passive and active measurement (PAM), 2012, pp. 11\u201320.","DOI":"10.1007\/978-3-642-28537-0_2"},{"key":"10.1016\/j.comcom.2013.09.014_b0205","unstructured":"Internet Society, World ipv6 launch, June 2012. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.worldipv6launch.org\/."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366413002193?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366413002193?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:20:29Z","timestamp":1758842429000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366413002193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":41,"alternative-id":["S0140366413002193"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2013.09.014","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2014,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A study of traffic from the perspective of a large pure IPv6 ISP","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2013.09.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}