{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:23Z","timestamp":1773510863776,"version":"3.50.1"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2011,7,5]],"date-time":"2011-07-05T00:00:00Z","timestamp":1309824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2011,7,5]]},"abstract":"<jats:p>We argue that the biggest problem with the current Internet architecture is not a particular functional deficiency, but its inability to accommodate innovation. To address this problem we propose a minimal architectural \"framework\" in which comprehensive architectures can reside. The proposed Framework for Internet Innovation (FII) --- which is derived from the simple observation that network interfaces should be extensible and abstract --- allows for a diversity of architectures to coexist, communicate, and evolve. We demonstrate FII's ability to accommodate diversity and evolution with a detailed examination of how information flows through the architecture and with a skeleton implementation of the relevant interfaces.<\/jats:p>","DOI":"10.1145\/2002250.2002256","type":"journal-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:24:59Z","timestamp":1310732699000},"page":"24-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Architecting for innovation"],"prefix":"10.1145","volume":"41","author":[{"given":"Teemu","family":"Koponen","sequence":"first","affiliation":[{"name":"Nicira Networks, Palo Alto, CA, USA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT, Boston, MA, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Igor","family":"Ganichev","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Ali","family":"Ghodsi","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"P. Brighten","family":"Godfrey","sequence":"additional","affiliation":[{"name":"UIUC, Urbana, IL, USA"}]},{"given":"Nick","family":"McKeown","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Guru","family":"Parulkar","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Barath","family":"Raghavan","sequence":"additional","affiliation":[{"name":"ICSI, Berkeley, CA, USA"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Somaya","family":"Arianfar","sequence":"additional","affiliation":[{"name":"Aalto University, Helsinki, Finland"}]},{"given":"Dmitriy","family":"Kuptsov","sequence":"additional","affiliation":[{"name":"HIIT, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2011,7,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Google protocol buffers. http:\/\/code.google.com\/p\/protobuf\/.  Google protocol buffers. http:\/\/code.google.com\/p\/protobuf\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319164"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941508"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_2_1_6_1","volume-title":"Proc. NSDI","author":"Andersen D. G.","year":"2005","unstructured":"D. G. Andersen , H. Balakrishnan , M. F. Kaashoek , and R. N. Rao . Improving web availability for clients with MONET . In Proc. NSDI , 2005 . D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. N. Rao. Improving web availability for clients with MONET. In Proc. NSDI, 2005."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_18"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646867.759748"},{"key":"e_1_2_1_10_1","first-page":"05","article-title":"Report of NSF workshop on a clean-slate design for the next-generation secure internet","author":"Bellovin S. M.","year":"2005","unstructured":"S. M. Bellovin , D. D. Clark , A. Perrig , and D. Song (Eds) . Report of NSF workshop on a clean-slate design for the next-generation secure internet . GENI Design Document 05 - 05 , 2005 . S. M. Bellovin, D. D. Clark, A. Perrig, and D. Song (Eds). Report of NSF workshop on a clean-slate design for the next-generation secure internet. GENI Design Document 05-05, 2005.","journal-title":"GENI Design Document"},{"key":"e_1_2_1_11_1","volume-title":"Proc. SRUTI","author":"Bender A.","year":"2007","unstructured":"A. Bender , N. Spring , D. Levin , and B. Bhattacharjee . Accountability as a service . In Proc. SRUTI , 2007 . A. Bender, N. Spring, D. Levin, and B. Bhattacharjee. Accountability as a service. In Proc. SRUTI, 2007."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715843"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52336"},{"key":"e_1_2_1_15_1","volume-title":"Manuscript","author":"Clark D.","year":"2009","unstructured":"D. Clark . Toward the design of a Future Internet . Manuscript , October 2009 . D. Clark. Toward the design of a Future Internet. Manuscript, October 2009."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944763"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_2_1_19_1","volume-title":"Proc. HotNets","author":"Ford B.","year":"2009","unstructured":"B. Ford and J. Iyengar . Efficient Cross-Layer Negotiation . In Proc. HotNets , 2009 . B. Ford and J. Iyengar. Efficient Cross-Layer Negotiation. In Proc. HotNets, 2009."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"e_1_2_1_22_1","volume-title":"Pathlet Routing. In Proc. HotNets","author":"Godfrey P. B.","year":"2008","unstructured":"P. B. Godfrey , S. Shenker , and I. Stoica . Pathlet Routing. In Proc. HotNets , 2008 . P. B. Godfrey, S. Shenker, and I. Stoica. Pathlet Routing. In Proc. HotNets, 2008."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_2_1_25_1","volume-title":"IETF","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti . HMAC: Keyed-hashing for message authentication. RFC 2104 , IETF , February 1997 . H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. RFC 2104, IETF, February 1997."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704290"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"issue":"3","key":"e_1_2_1_29_1","first-page":"221","article-title":"Plan 9 from bell labs","volume":"8","author":"Pike R.","year":"1995","unstructured":"R. Pike , D. Presotto , S. Dorward , B. Flandrena , K. Thompson , H. Trickey , and P. Winterbottom . Plan 9 from bell labs . Computing systems , 8 ( 3 ): 221 -- 254 , 1995 . R. Pike, D. Presotto, S. Dorward, B. Flandrena, K. Thompson, H. Trickey, and P. Winterbottom. Plan 9 from bell labs. Computing systems, 8(3):221--254, 1995.","journal-title":"Computing systems"},{"key":"e_1_2_1_30_1","unstructured":"L. Popa I. Stoica and S. Ratnasamy. Rule-based forwarding (RBF): Improving the  L. Popa I. Stoica and S. Ratnasamy. Rule-based forwarding (RBF): Improving the"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159917"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080128"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810906"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_2_1_35_1","volume-title":"Proc. HotNets","author":"Seehra A.","year":"2009","unstructured":"A. Seehra , J. Naous , M. Walfish , D. Mazieres , A. Nicolosi , and S. Shenker . A Policy Framework for the Future Internet . In Proc. HotNets , 2009 . A. Seehra, J. Naous, M. Walfish, D. Mazieres, A. Nicolosi, and S. Shenker. A Policy Framework for the Future Internet. In Proc. HotNets, 2009."},{"key":"e_1_2_1_36_1","volume-title":"Proc. SRUTI","author":"Shaw M.","year":"2006","unstructured":"M. Shaw . Leveraging Good Intentions to Reduce Unwanted Network Traffic . In Proc. SRUTI , 2006 . M. Shaw. Leveraging Good Intentions to Reduce Unwanted Network Traffic. In Proc. SRUTI, 2006."},{"key":"e_1_2_1_38_1","volume-title":"Proc. NSDI","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , I. Stoica , H. Balakrishnan , and R. H. Katz . OverQoS: An overlay based architecture for enhancing Internet QoS . In Proc. NSDI , 2004 . L. Subramanian, I. Stoica, H. Balakrishnan, and R. H. Katz. OverQoS: An overlay based architecture for enhancing Internet QoS. In Proc. NSDI, 2004."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544082"},{"key":"e_1_2_1_40_1","volume-title":"Proc. NSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , H. Balakrishnan , and S. Shenker . Untangling the Web from DNS . In Proc. NSDI , 2004 . M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. NSDI, 2004."},{"key":"e_1_2_1_41_1","volume-title":"Secure Data Delivery. In Proc. HotNets","author":"Wendlandt D.","year":"2006","unstructured":"D. Wendlandt , I. Avramopoulos , D. Andersen , and J. Rexford . Don't Secure Routing Protocols , Secure Data Delivery. In Proc. HotNets , 2006 . D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford. Don't Secure Routing Protocols, Secure Data Delivery. In Proc. HotNets, 2006."},{"key":"e_1_2_1_42_1","volume-title":"Workshop on Research Directions for the Next Generation Internet","author":"Wroclawski J.","year":"1997","unstructured":"J. Wroclawski . The metanet : White paper . In Workshop on Research Directions for the Next Generation Internet , May 1997 . J. Wroclawski. The metanet: White paper. In Workshop on Research Directions for the Next Generation Internet, May 1997."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002250.2002256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2002250.2002256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:19Z","timestamp":1750245739000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002250.2002256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,5]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7,5]]}},"alternative-id":["10.1145\/2002250.2002256"],"URL":"https:\/\/doi.org\/10.1145\/2002250.2002256","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2011,7,5]]},"assertion":[{"value":"2011-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}