A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

P4v: Practical verification for programmable data planes

J Liu, W Hallahan, C Schlesinger, M Sharif… - Proceedings of the …, 2018 - dl.acm.org
We present the design and implementation of p4v, a practical tool for verifying data planes
described using the P4 programming language. The design of p4v is based on classic …

Aquila: A unified, low-latency fabric for datacenter networks

D Gibson, H Hariharan, E Lance, M McLaren… - … USENIX Symposium on …, 2022 - usenix.org
Datacenter workloads have evolved from the data intensive, loosely-coupled workloads of
the past decade to more tightly coupled ones, wherein ultra-low latency communication is …

Plankton: Scalable network configuration verification through model checking

S Prabhu, KY Chou, A Kheradmand, B Godfrey… - … USENIX Symposium on …, 2020 - usenix.org
Network configuration verification enables operators to ensure that the network will behave
as intended, prior to deployment of their configurations. Although techniques ranging from …

Hey, lumi! using natural language for {intent-based} network management

AS Jacobs, RJ Pfitscher, RH Ribeiro… - 2021 USENIX Annual …, 2021 - usenix.org
In this work, we ask: what would it take for, say, a campus network operator to tell the
network, using natural language, to" Inspect traffic for the dorm"? How could the network …

Safely and automatically updating in-network acl configurations with intent language

B Tian, X Zhang, E Zhai, HH Liu, Q Ye… - Proceedings of the …, 2019 - dl.acm.org
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …

Debugging P4 programs with Vera

R Stoenescu, D Dumitrescu, M Popovici… - Proceedings of the …, 2018 - dl.acm.org
We present Vera, a tool that verifies P4 programs using symbolic execution. Vera
automatically uncovers a number of common bugs including parsing/deparsing errors …

The disruptions of 5G on data-driven technologies and applications

D Loghin, S Cai, G Chen, TTA Dinh… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
With 5G on the verge of being adopted as the next mobile network, there is a need to
analyze its impact on the landscape of computing and data management. In this paper, we …

Enhancing network management using code generated by large language models

SK Mani, Y Zhou, K Hsieh, S Segarra, T Eberl… - Proceedings of the …, 2023 - dl.acm.org
Analyzing network topologies and communication graphs is essential in modern network
management. However, the lack of a cohesive approach results in a steep learning curve …

A large scale study of data center network reliability

J Meza, T Xu, K Veeraraghavan, O Mutlu - Proceedings of the Internet …, 2018 - dl.acm.org
The ability to tolerate, remediate, and recover from network incidents (caused by device
failures and fiber cuts, for example) is critical for building and operating highly-available web …