2013 Formal Methods in Computer-Aided Design 2013
DOI: 10.1109/fmcad.2013.6679403
|View full text |Cite
|
Sign up to set email alerts
|

Abstractions for model checking SDN controllers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
29
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 8 publications
1
29
1
Order By: Relevance
“…On the other hand, if the network administrator wants to determine the set of policies violated by the external domain, she executes AudIt with the minisatprover option and could take up to 1.5s. These measures are lower than the values reported on [20], for the same Fat Tree topology composed of 20 switches, 16 hosts, and 48 links. We test forwarding and reachability on a Intel i5 at 3.0 GHz, with 3.74 GB RAM.…”
Section: Experiments and Resultscontrasting
confidence: 69%
See 2 more Smart Citations
“…On the other hand, if the network administrator wants to determine the set of policies violated by the external domain, she executes AudIt with the minisatprover option and could take up to 1.5s. These measures are lower than the values reported on [20], for the same Fat Tree topology composed of 20 switches, 16 hosts, and 48 links. We test forwarding and reachability on a Intel i5 at 3.0 GHz, with 3.74 GB RAM.…”
Section: Experiments and Resultscontrasting
confidence: 69%
“…Test cases are divided into two groups: information gathering, and violation inferencing. We run the controller on a server and deploy a test-network using mininet 2 , which operate as external domain and implement the example topology used by Sethi in [20]. From another terminal, which operates as owner domain, we run our AudIt interface and extract traffic information from the controller.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Each connection between ports represents a bidirectional communication channel that may reorder packets. 11 message cm1 = add(r1) 12 message cm2 = add(r2) 13 message cm3 = add(r3) 14 for sw in [sw1, sw2]: 15 send_message(cm1, sw) 16 send_message(cm2, sw) 17 send_message(cm3, sw) Listing 1: Controller for SSH Moreover, the switches are connected to a controller through dedicated links. Packets are routed in the network using flow tables in switches.…”
Section: Introductionmentioning
confidence: 99%
“…Sethi et al [36] present dataand network-state abstractions for model checking SDN controllers. Their approach extends verification to an arbitrarily number of packets by considering only one concrete packet for the verification task.…”
Section: Related Workmentioning
confidence: 99%