D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao. 2002. Overview and Principles of Internet Traffic Engineering. RFC 3272 (Informational). https://doi.org/10.17487/RFC3272
Alexander Azimov, Eugene Bogomazov, Randy Bush, Keyur Patel, and Job Snijders. 2020. Verification of AS-PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-Aspa-verification-04. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-Aspa-verification-04 Work in Progress
T. Bates and R. Chandra. 1996. BGP Route Reflection An alternative to full mesh IBGP. RFC 1966 (Experimental). https://doi.org/10.17487/RFC1966
Ryan Beckett, Ratul Mahajan, Todd Millstein, Jitendra Padhye, and David Walker. 2017. Network configuration synthesis with abstract topologies. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. 437-451
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, et al. 2014. P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review 44, 3 (2014), 87-95
R. Bush and R. Austein. 2013. The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard). https://doi.org/10.17487/RFC6810
Enke Chen, Naiming Shen, and Robert Raszuk. 2016. Carrying Geo Coordinates in BGP. Internet-Draft draft-chen-idr-geo-coordinates-02. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-chen-idr-geo-coordinates-02 Work in Progress
Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, et al. 2019. RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In Proceedings of the Internet Measurement Conference. 406-419
Guy Davies. 2004. Designing and Developing Scalable IP Networks. John Wiley & Sons
Quentin De Coninck, François Michel, Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, and Olivier Bonaventure. 2019. Pluginizing quic. In Proceedings of the ACM Special Interest Group on Data Communication. 59-74
Benoit Donnet and Olivier Bonaventure. 2008. On BGP communities. ACM SIGCOMM Computer Communication Review 38, 2 (2008), 55-59
Nick Feamster, Jennifer Rexford, and Ellen Zegura. 2014. The road to SDN: An intellectual history of programmable networks. ACM SIGCOMM Computer Communication Review 44, 2 (2014), 87-98
Ondrej Filip, Martin Mares, Ondrej Zajicek, and Jan Matejka. 2019. The BIRD Internet Routing Daemon. https://bird.network.cz/
A. Ford, C. Raiciu, M. Handley, and O. Bonaventure. 2013. TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6824 (Experimental). https://doi.org/10.17487/RFC6824 Obsoleted by RFC 8684
Tomonori Fujita et al [n.d.]. GoBGP. ([n. d.]). https://github.com/osrg/gobgp
Tomonori Fujita et al [n.d.]. RustyBGP: BGP implementation in Rust. ([n. d.]). https://github.com/osrg/rustybgp
Brendan Gregg. 2019. BPF Performance Tools. Addison-Wesley Professional
Andreas Haas, Andreas Rossberg, Derek L Schuff, Ben L Titzer, Michael Holman, Dan Gohman, Luke Wagner, Alon Zakai, and JF Bastien. 2017. Bringing the web up to speed with WebAssembly. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. 185-200
Mark Handley, Eddie Kohler, Atanu Ghosh, Orion Hodson, and Pavlin Radoslavov. 2005. Designing extensible IP router software. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2. 189-202
Per Brinch Hansen. 1970. The nucleus of a Multiprogramming System.commun. ACM 13, 4 (1970), 238-241. https://doi.org/10.1145/362258.362278
Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas Race, and David Hutchison. 2019. BGP: Rethinking BGP programmability. In IEEE/IFIP Network Operations and Management Symposium
G. Huston and G. Michaelson. 2012. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC 6483 (Informational). https://doi.org/10.17487/RFC6483
Jana Iyengar and Martin Thomson. 2020. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-Transport-31. IETF Secretariat. http://www.ietf.org/internet-drafts/draft-ietf-quic-Transport-31.txt http://www.ietf.org/internet-drafts/draft-ietf-quic-Transport-31.txt
Diego Kreutz, Fernando MV Ramos, Paulo Esteves Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig. 2014. Software-defined networking: A comprehensive survey. Proc. IEEE 103, 1 (2014), 14-76
Adam Langley, Janardhan Iyengar, Jeff Bailey, Jeremy Dorfman, Jim Roskind, Joanna Kulik, Patrik Westin, Raman Tenneti, Robbie Shade, Ryan Hamilton, Victor Vasiliev, Alistair Riddoch, Wan-Teh Chang, Zhongyi Shi, Alyssa Wilk, Antonio Vicente, Charles Krasic, Dan Zhang, Fan Yang, Fedor Kouranov, and Ian Swett. 2017. The QUIC Transport Protocol: Design and Internet-Scale Deployment. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication-SIGCOMM ?17. ACM Press, Los Angeles, CA, USA, 183-196. https://doi.org/10.1145/3098822.3098842
P. Lapukhov, A. Premji, and J. Mitchell (Ed.). 2016. Use of BGP for Routing in Large-Scale Data Centers. RFC 7938 (Informational). https://doi.org/10.17487/RFC7938
M. Lepinski and S. Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational). https://doi.org/10.17487/RFC6480
M. Lepinski (Ed.) and K. Sriram (Ed.). 2017. BGPsec Protocol Specification. RFC 8205 (Proposed Standard). https://doi.org/10.17487/RFC8205
Charles Lynn. 1999. X.509 Extensions for Authorization of IP Addresses, AS Numbers, and Routers within an AS. Internet-Draft draft-clynn-bgp-x509-Auth-00. Internet Engineering Task Force. https://psg.com/draft-clynn-bgp-x509-Auth-00.txt Work in Progress
Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. 2008. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review 38, 2 (2008), 69-74
Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, and Tim Stack. 2003. Upgrading Transport Protocols using Untrusted Mobile Code. ACM SIGOPS Operating Systems Review 37, 5 (2003), 1-14
Y. Rekhter (Ed.), T. Li (Ed.), and S. Hares (Ed.). 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). https://doi.org/10.17487/RFC4271
Andreas Reuter, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Thomas C Schmidt, and Matthias Wahlisch. 2018. Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering. ACM SIGCOMM Computer Communication Review 48, 1 (2018), 19-27
Jared M Smith and Max Schuchard. 2018. Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 599-617
The Linux Foundation. 2017. FRRouting. https://frrouting.org/
Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester. 2004. Network recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. Elsevier
Stefano Vissicchio, Luca Cittadini, and Giuseppe Di Battista. 2014. On iBGP routing policies. IEEE/ACM Transactions on Networking 23, 1 (2014), 227-240
Matthias Wahlisch, Fabian Holler, Thomas C Schmidt, and Jochen H Schiller. 2013. RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation. In Presented as part of the 6th Workshop on Cyber Security Experimentation and Test
Jordan Whited. 2019. CoreBGP. https://github.com/jwhited/corebgp
Thomas Wirtgen, Cyril Denos, Quentin De Coninck, Mathieu Jadin, and Olivier Bonaventure. 2019. The Case for Pluginized Routing Protocols. In 27th International Conference on Network Protocols (ICNP). IEEE, 1-12
Jonathan Woodruff, Robert NM Watson, David Chisnall, Simon W Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G Neumann, Robert Norton, and Michael Roe. 2014. The CHERI capability model: Revisiting RISC in an age of risk. In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA). IEEE, 457-468