{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T03:38:20Z","timestamp":1778125100190,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,7]]},"DOI":"10.1145\/3098822.3098854","type":"proceedings-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T13:48:54Z","timestamp":1501854534000},"page":"432-445","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":160,"title":["Taking the Edge off with Espresso"],"prefix":"10.1145","author":[{"given":"Kok-Kiong","family":"Yap","sequence":"first","affiliation":[{"name":"Google"}]},{"given":"Murtaza","family":"Motiwala","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Jeremy","family":"Rahe","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Steve","family":"Padgett","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Matthew","family":"Holliman","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Gary","family":"Baldus","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Marcus","family":"Hines","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Taeeun","family":"Kim","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Ashok","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Ankur","family":"Jain","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Victor","family":"Lin","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Colin","family":"Rice","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Brian","family":"Rogan","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Arjun","family":"Singh","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Bert","family":"Tanaka","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Manish","family":"Verma","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Puneet","family":"Sood","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Mukarram","family":"Tariq","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Matt","family":"Tierney","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Dzevad","family":"Trumic","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Vytautas","family":"Valancius","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Calvin","family":"Ying","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Mahesh","family":"Kallahalla","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Bikash","family":"Koley","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Amin","family":"Vahdat","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2017,8,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2010. GNU Quagga Project. www.nongnu.org\/quagga\/. (2010).  2010. GNU Quagga Project. www.nongnu.org\/quagga\/. (2010)."},{"key":"e_1_3_2_2_2_1","unstructured":"2013. Best Practices in Core Network Capacity Planning. White Paper. (2013).  2013. Best Practices in Core Network Capacity Planning. White Paper. (2013)."},{"key":"e_1_3_2_2_3_1","unstructured":"2017. Prometheus - Monitoring system & time series database. https:\/\/prometheus.io\/. (2017).  2017. Prometheus - Monitoring system & time series database. https:\/\/prometheus.io\/. (2017)."},{"key":"e_1_3_2_2_4_1","volume-title":"Building and scaling the Fastly network, part 1: Fighting the FIB. https:\/\/www.fastly.com\/blog\/building-and-scaling-fastly-network-part-1-fighting-fib. (2016). [Online","author":"Arajo Joo Taveira","year":"2016","unstructured":"Joo Taveira Arajo . 2016. Building and scaling the Fastly network, part 1: Fighting the FIB. https:\/\/www.fastly.com\/blog\/building-and-scaling-fastly-network-part-1-fighting-fib. (2016). [Online ; posted on May 11, 2016 ]. Joo Taveira Arajo. 2016. Building and scaling the Fastly network, part 1: Fighting the FIB. https:\/\/www.fastly.com\/blog\/building-and-scaling-fastly-network-part-1-fighting-fib. (2016). [Online; posted on May 11, 2016]."},{"key":"e_1_3_2_2_5_1","volume-title":"ISMP 2015 (International Symposium on Mathematical Programming).","author":"Bangla Ajay Kumar","year":"2015","unstructured":"Ajay Kumar Bangla , Alireza Ghaffarkhah , Ben Preskill , Bikash Koley , Christoph Albrecht , Emilie Danna , Joe Jiang , and Xiaoxue Zhao . 2015 . Capacity planning for the Google backbone network . In ISMP 2015 (International Symposium on Mathematical Programming). Ajay Kumar Bangla, Alireza Ghaffarkhah, Ben Preskill, Bikash Koley, Christoph Albrecht, Emilie Danna, Joe Jiang, and Xiaoxue Zhao. 2015. Capacity planning for the Google backbone network. In ISMP 2015 (International Symposium on Mathematical Programming)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298487"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation -","volume":"2","author":"Caesar Matthew","unstructured":"Matthew Caesar , Donald Caldwell , Nick Feamster , Jennifer Rexford , Aman Shaikh , and Jacobus van der Merwe. 2005. Design and Implementation of a Routing Control Platform . In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, Berkeley, CA, USA, 15--28. http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251205 Matthew Caesar, Donald Caldwell, Nick Feamster, Jennifer Rexford, Aman Shaikh, and Jacobus van der Merwe. 2005. Design and Implementation of a Routing Control Platform. In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, Berkeley, CA, USA, 15--28. http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251205"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342459"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018478"},{"key":"e_1_3_2_2_11_1","first-page":"1","article-title":"Creating Repeatable Computer Science and Networking Experiments on Shared","volume":"49","author":"Edwards Sarah","year":"2015","unstructured":"Sarah Edwards , Xuan Liu , and Niky Riga . 2015 . Creating Repeatable Computer Science and Networking Experiments on Shared , Public Testbeds. SIGOPS Oper. Syst. Rev. 49 , 1 (Jan. 2015), 90--99. https:\/\/doi.org\/10.1145\/2723872.2723884 10.1145\/2723872.2723884 Sarah Edwards, Xuan Liu, and Niky Riga. 2015. Creating Repeatable Computer Science and Networking Experiments on Shared, Public Testbeds. SIGOPS Oper. Syst. Rev. 49, 1 (Jan. 2015), 90--99. https:\/\/doi.org\/10.1145\/2723872.2723884","journal-title":"Public Testbeds. SIGOPS Oper. Syst. Rev."},{"key":"e_1_3_2_2_12_1","volume-title":"Revealing Utilization at Internet Interconnection Points. CoRR abs\/1603.03656","author":"Feamster Nick","year":"2016","unstructured":"Nick Feamster . 2016. Revealing Utilization at Internet Interconnection Points. CoRR abs\/1603.03656 ( 2016 ). http:\/\/arxiv.org\/abs\/1603.03656 Nick Feamster. 2016. Revealing Utilization at Internet Interconnection Points. CoRR abs\/1603.03656 (2016). http:\/\/arxiv.org\/abs\/1603.03656"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/963985.963988"},{"key":"e_1_3_2_2_14_1","unstructured":"O. Filip. 2013. BIRD internet routing daemon. http:\/\/bird.network.cz\/. (May 2013).  O. Filip. 2013. BIRD internet routing daemon. http:\/\/bird.network.cz\/. (May 2013)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486014"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2930611.2930612"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631473"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774771"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787475"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12334-4_5"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854146"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390239"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"S. Sangli E. Chen R. Fernando J. Scudder and Y. Rekhter. 2007. Graceful Restart Mechanism for BGP. RFC 4724 (Proposed Standard). (Jan. 2007). http:\/\/www.ietf.org\/rfc\/rfc4724.txt  S. Sangli E. Chen R. Fernando J. Scudder and Y. Rekhter. 2007. Graceful Restart Mechanism for BGP. RFC 4724 (Proposed Standard). (Jan. 2007). http:\/\/www.ietf.org\/rfc\/rfc4724.txt","DOI":"10.17487\/rfc4724"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"e_1_3_2_2_28_1","volume-title":"Building A Cheaper Peering Router. NANOG50. (2013). nLayer Communications","author":"Scholl Tom","unstructured":"Tom Scholl . 2013. Building A Cheaper Peering Router. NANOG50. (2013). nLayer Communications , Inc . Tom Scholl. 2013. Building A Cheaper Peering Router. NANOG50. (2013). nLayer Communications, Inc."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2975159"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108956.1108958"}],"event":{"name":"SIGCOMM '17: ACM SIGCOMM 2017 Conference","location":"Los Angeles CA USA","acronym":"SIGCOMM '17","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098822.3098854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:22Z","timestamp":1750273642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098854"}},"subtitle":["Scale, Reliability and Programmability for Global Internet Peering"],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":31,"alternative-id":["10.1145\/3098822.3098854","10.1145\/3098822"],"URL":"https:\/\/doi.org\/10.1145\/3098822.3098854","relation":{},"subject":[],"published":{"date-parts":[[2017,8,7]]},"assertion":[{"value":"2017-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}