2017
DOI: 10.1007/978-3-319-63390-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Network-Wide Configuration Synthesis

Abstract: Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reachability, security), operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they, collectively, compute a compatible forwarding state. Not surprisingly, operators often make mistakes which lead to downtimes. To address this problem, we present a novel synthesis approach that automatically computes correct network configurations that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
51
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(51 citation statements)
references
References 39 publications
0
51
0
Order By: Relevance
“…The boxes denote routers. Using terminology for fat tree networks [3], S [1][2] are spine routers, A [1][2][3][4][5][6][7][8] are aggregation routers, 3 and T [1][2][3][4][5][6][7][8] are top-of-rack (ToR) routers. The spine routers connect to the Internet through neighbors N [1][2].…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The boxes denote routers. Using terminology for fat tree networks [3], S [1][2] are spine routers, A [1][2][3][4][5][6][7][8] are aggregation routers, 3 and T [1][2][3][4][5][6][7][8] are top-of-rack (ToR) routers. The spine routers connect to the Internet through neighbors N [1][2].…”
Section: Motivationmentioning
confidence: 99%
“…The spine routers connect to the Internet through neighbors N [1][2]. The ToR routers attach to a set of servers ("a rack") that host services with address prefixes P [1][2][3][4][5][6][7][8].…”
Section: Motivationmentioning
confidence: 99%
“…Related Work. Several previous tools using automated theorem proving have been developed in an effort to answer questions about software defined networks (SDNs) [1,2,5,12,13,16,19,25]. Similar to our approach, these tools reduce the problems to automated reasoning engines.…”
Section: Introductionmentioning
confidence: 99%
“…In some cases, they employ overapproximative static analysis [18,19]. In other cases, they use general purpose reasoning engines such as Datalog [12,15], BDD [1], SMT [5,16], and SAT Solvers [2,25]. VeriCon [2], NICE [8], and VeriFlow [19] verify network invariants by analyzing software-defined-network (SDN) programs, with the former two applying formal software verification techniques, and the latter using static analysis to split routes into equivalence classes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation