A survey on network verification and testing with formal methods: Approaches and challenges
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …
compromise network availability and network reliability. Network operators need to ensure …
P4v: Practical verification for programmable data planes
We present the design and implementation of p4v, a practical tool for verifying data planes
described using the P4 programming language. The design of p4v is based on classic …
described using the P4 programming language. The design of p4v is based on classic …
Aquila: A unified, low-latency fabric for datacenter networks
D Gibson, H Hariharan, E Lance, M McLaren… - … USENIX Symposium on …, 2022 - usenix.org
Datacenter workloads have evolved from the data intensive, loosely-coupled workloads of
the past decade to more tightly coupled ones, wherein ultra-low latency communication is …
the past decade to more tightly coupled ones, wherein ultra-low latency communication is …
Plankton: Scalable network configuration verification through model checking
Network configuration verification enables operators to ensure that the network will behave
as intended, prior to deployment of their configurations. Although techniques ranging from …
as intended, prior to deployment of their configurations. Although techniques ranging from …
Hey, lumi! using natural language for {intent-based} network management
In this work, we ask: what would it take for, say, a campus network operator to tell the
network, using natural language, to" Inspect traffic for the dorm"? How could the network …
network, using natural language, to" Inspect traffic for the dorm"? How could the network …
Safely and automatically updating in-network acl configurations with intent language
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
Debugging P4 programs with Vera
We present Vera, a tool that verifies P4 programs using symbolic execution. Vera
automatically uncovers a number of common bugs including parsing/deparsing errors …
automatically uncovers a number of common bugs including parsing/deparsing errors …
The disruptions of 5G on data-driven technologies and applications
With 5G on the verge of being adopted as the next mobile network, there is a need to
analyze its impact on the landscape of computing and data management. In this paper, we …
analyze its impact on the landscape of computing and data management. In this paper, we …
Enhancing network management using code generated by large language models
Analyzing network topologies and communication graphs is essential in modern network
management. However, the lack of a cohesive approach results in a steep learning curve …
management. However, the lack of a cohesive approach results in a steep learning curve …
A large scale study of data center network reliability
The ability to tolerate, remediate, and recover from network incidents (caused by device
failures and fiber cuts, for example) is critical for building and operating highly-available web …
failures and fiber cuts, for example) is critical for building and operating highly-available web …