{"id":361,"date":"2020-11-05T04:04:32","date_gmt":"2020-11-05T04:04:32","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=361"},"modified":"2025-02-04T19:36:48","modified_gmt":"2025-02-04T19:36:48","slug":"xbgpwhen-you-cant-wait-for-the-ietf-and-vendors","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=361","title":{"rendered":"xBGP: When You Can\u2019t Wait for the IETF and Vendors"},"content":{"rendered":"\n<p>Thomas Wirtgen, Quentin De Coninck, Randy Bush, Laurent Vanbever, Olivier Bonaventure; <em><a href=\"https:\/\/archive.psg.com\/201104.hotnets-xbgp.pdf\">xBGP: When You Can t Wait for the IETF and Vendors<\/a><\/em>, ACM HotNets 2020<\/p>\n\n\n\n<p>Thanks to the standardization of routing protocols such as BGP, OSPF or IS-IS, Internet Service Providers (ISP) and enterprise networks can deploy routers from various vendors. This prevents them from vendor-lockin problems. Unfortunately, this also slows innovation since any new feature must be standardized and implemented by all vendors before being deployed.<\/p>\n\n\n\n<p>We propose a paradigm shift that enables network operators to program the routing protocols used in their networks. We demonstrate the feasibility of this approach with <em>x<\/em>BGP. <em>x<\/em>BGP is a vendor neutral API that exposes the key data structures and functions of any BGP implementation. Each <em>x<\/em>BGP compliant implementation includes an eBPF virtual machine that executes the operator supplied programs. We extend FR- Routing and BIRD to support this new paradigm and demonstrate the flexibility of <em>x<\/em>BGP with four different use cases. Finally, we discuss how <em>x<\/em>BGP could affect future research on future routing protocols.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thomas Wirtgen, Quentin De Coninck, Randy Bush, Laurent Vanbever, Olivier Bonaventure; xBGP: When You Can t Wait for the IETF and Vendors, ACM HotNets 2020 Thanks to the standardization of routing protocols such as BGP, OSPF or IS-IS, Internet Service Providers (ISP) and enterprise networks can deploy routers from various vendors. This prevents them from [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,9],"tags":[],"class_list":["post-361","post","type-post","status-publish","format-standard","hentry","category-conferences","category-routers"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=361"}],"version-history":[{"count":2,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/361\/revisions"}],"predecessor-version":[{"id":371,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/361\/revisions\/371"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}