Bibliography
Every paper l2trace draws from, with stable identifiers. Where an open-access PDF exists at a stable URL, the link is included; for closed-access papers, only the DOI is provided. The PDFs themselves are not hosted on this site — see /reference/prior-art/ for the per-tier summaries.
Tier 1 — AFT-based topology discovery
Section titled “Tier 1 — AFT-based topology discovery”-
Breitbart et al. 2004 — Yuri Breitbart, Minos Garofalakis, Ben Jai, Cliff Martin, Rajeev Rastogi, Avi Silberschatz. Topology Discovery in Heterogeneous IP Networks: The NetInventory System. IEEE/ACM ToN 12(3):401–414, June 2004. DOI: 10.1109/TNET.2004.828963. Closed-access.
-
Lowekamp, O’Hallaron, Gross 2001 — Bruce Lowekamp, David R. O’Hallaron, Thomas R. Gross. Topology Discovery for Large Ethernet Networks. ACM SIGCOMM 2001, pp. 237–248. DOI: 10.1145/383059.383078. Closed-access.
-
Bejerano 2009 — Yigal Bejerano. Taking the Skeletons Out of the Closets: A Simple and Efficient Topology Discovery Scheme for Large Ethernet LANs. IEEE/ACM ToN 17(5):1385–1398, October 2009. DOI: 10.1109/TNET.2009.2022264. Closed-access. Extended journal version of INFOCOM 2006.
Tier 2 — Network verification
Section titled “Tier 2 — Network verification”-
Mai et al. 2011 (Anteater) — Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, Samuel T. King. Debugging the Data Plane with Anteater. SIGCOMM ‘11, pp. 290–301. DOI: 10.1145/2018436.2018470. Closed-access.
-
Kazemian, Varghese, McKeown 2012 (HSA) — Header Space Analysis: Static Checking for Networks. NSDI ‘12. No CrossRef DOI. Open access: https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/kazemian
-
Zeng et al. 2012 (ATPG) — Hongyi Zeng, Peyman Kazemian, George Varghese, Nick McKeown. Automatic Test Packet Generation. CoNEXT ‘12, pp. 241–252. DOI: 10.1145/2413176.2413205. Closed-access.
-
Khurshid et al. 2013 (VeriFlow) — Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey. VeriFlow: Verifying Network-Wide Invariants in Real Time. NSDI ‘13. No CrossRef DOI. Open access: https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/khurshid
-
Kazemian et al. 2013 (NetPlumber) — Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, Scott Whyte. Real Time Network Policy Checking using Header Space Analysis. NSDI ‘13. No CrossRef DOI. Open access: https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/kazemian
-
Lopes et al. 2015 (NoD) — Nuno P. Lopes, Nikolaj Bjørner, Patrice Godefroid, Karthick Jayaraman, George Varghese. Checking Beliefs in Dynamic Networks. NSDI ‘15, pp. 499–512. No CrossRef DOI. Open access: https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/lopes
Tier 3 — L2 standards lineage + post-STP fabrics
Section titled “Tier 3 — L2 standards lineage + post-STP fabrics”-
Perlman 1985 (STP) — Radia Perlman. An Algorithm for Distributed Computation of a Spanning Tree in an Extended LAN. SIGCOMM ‘85, pp. 44–53. DOI: 10.1145/319056.319004. Open access from ACM DL.
-
Myers, Ng, Zhang 2004 — Andy Myers, T. S. Eugene Ng, Hui Zhang. Rethinking the Service Model: Scaling Ethernet to a Million Nodes. HotNets-III, 2004. No canonical DOI; PDF not retrievable via standard channels.
-
Allan et al. 2010 (SPB) — David Allan, Peter Ashwood-Smith, Nigel Bragg, János Farkas, Don Fedyk, Michel Ouellette, Mick Seaman, Paul Unbehagen. Shortest Path Bridging: Efficient Control of Larger Ethernet Networks. IEEE Communications Magazine, October 2010, pp. 128–135. DOI: 10.1109/mcom.2010.5594687. Closed-access.
-
Rojas et al. 2015 (All-Path Bridging) — Elisa Rojas, Guillermo Ibáñez, José Manuel Giménez-Guzmán, Juan A. Carral, Alberto García-Martínez, Isaías Martínez-Yelmo, José M. Arco. All-Path Bridging: Path Exploration Protocols for Data Center and Campus Networks. Computer Networks 86:79–93, 2015. DOI: 10.1016/j.comnet.2015.01.002. Open access (Elsevier).
-
Mysore et al. 2009 (PortLand) — Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, Amin Vahdat. PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric. SIGCOMM ‘09, pp. 39–50. DOI: 10.1145/1592568.1592575. Closed-access.
-
Greenberg et al. 2009 (VL2) — Albert Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta. VL2: A Scalable and Flexible Data Center Network. SIGCOMM ‘09, pp. 51–62. DOI: 10.1145/1592568.1592576. Closed-access.
-
RFC 6325 (TRILL) — Radia Perlman, Donald Eastlake 3rd, Dinesh Dutt, Silvano Gai, Anoop Ghanwani. Routing Bridges (RBridges): Base Protocol Specification. RFC 6325 (Standards Track), IETF, July 2011. Open access: https://www.rfc-editor.org/rfc/rfc6325
-
IEEE 802.1Q-2018 — IEEE Standard for Local and Metropolitan Area Networks — Bridges and Bridged Networks. IEEE-SA. Paywalled.
Tier 4 — Bitemporal storage foundations
Section titled “Tier 4 — Bitemporal storage foundations”-
Snodgrass 2000 — Richard T. Snodgrass. Developing Time-Oriented Database Applications in SQL. Morgan Kaufmann, 2000. 528 pp. ISBN 1-55860-436-7. Open-access PDF: https://www2.cs.arizona.edu/~rts/tdbbook.pdf
-
Jensen, Dyreson et al. 1998 — Consensus Glossary of Temporal Database Concepts. In Temporal Databases — Research and Practice (LNCS 1399), pp. 367–405. Springer 1998. Subsumed by Snodgrass 2000 for citation purposes.
-
Kulkarni & Michels 2012 — Krishna Kulkarni, Jan-Eike Michels. Temporal Features in SQL:2011. SIGMOD Record 41(3):34–43, 2012. DOI: 10.1145/2380776.2380786. Secondary source for SQL:2011 description (ISO/IEC 9075:2011 itself is paywalled).
Where the BibTeX entries live
Section titled “Where the BibTeX entries live”A consolidated BibTeX file with every entry above is kept at
papers/bibliography.bib in the repository. Cite from there
when writing a related paper.
See also
Section titled “See also”- Prior art tier pages — per-paper summaries
- Prior-art synthesis — what l2trace borrowed (or didn’t) from each line of work