Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication 2018
DOI: 10.1145/3230543.3230583
|View full text |Cite
|
Sign up to set email alerts
|

Control plane compression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 51 publications
(38 citation statements)
references
References 24 publications
0
38
0
Order By: Relevance
“…[69]- [71]), programming languages (e.g. [72]- [76]), safe network updates (e.g., [77]- [80]), data plane checking (e.g., [10], [11], [16], [25]), real-time checkers [12], [14], [30], [81], and more general network analyses (e.g., [6], [8], [9], [19], [82], [83]) together with suitable levels of abstractions (e.g., [84], [85]).…”
Section: E Discussion: Importance Of Empty Pecsmentioning
confidence: 99%
“…[69]- [71]), programming languages (e.g. [72]- [76]), safe network updates (e.g., [77]- [80]), data plane checking (e.g., [10], [11], [16], [25]), real-time checkers [12], [14], [30], [81], and more general network analyses (e.g., [6], [8], [9], [19], [82], [83]) together with suitable levels of abstractions (e.g., [84], [85]).…”
Section: E Discussion: Importance Of Empty Pecsmentioning
confidence: 99%
“…Kollaps only deals with data-plane, and it is hence complementary to CrystalNet. To enhance the efficiency of large-scale control-plane analysis, Bonsai [27] leveraged the idea of network compression while persevering the network properties. Kollaps' network collapsing achieves a similar goal, however, it targets a different set of network properties, again in the data-plane.…”
Section: Related Workmentioning
confidence: 99%
“…Static topology. element, either for changes to link properties (lines 21-23) or for addition and removal of services, links and bridges (lines [24][25][26][27][28][29][30][31][32][33][34][35][36]. A dedicated DSL to easily program more complex dynamic patterns on top of Kollaps is detailed in [55].…”
Section: The Kollaps Systemmentioning
confidence: 99%
“…To enable scalable analyses, it seems necessary to exploit the symmetries that exist in most large real networks. Indeed, other researchers have exploited symmetries to scale verification in the past [3,22]. However, it has never been possible to account for failures, as they introduce asymmetries that change routing behaviors in unpredictable ways.…”
Section: Introductionmentioning
confidence: 99%
“…To address this challenge, we develop a new algorithm for verifying reachability in networks in the presence of faults, based on the idea of counterexampleguided abstraction refinement (CEGAR) [5]. The algorithm starts by factoring out symmetries using techniques developed in prior work [3] and then attempts verification of the abstract network using an SMT solver. If verification succeeds, we are done.…”
Section: Introductionmentioning
confidence: 99%