A general approach to network configuration verification

R Beckett, A Gupta, R Mahajan, D Walker - … of the Conference of the ACM …, 2017 - dl.acm.org
We present Minesweeper, a tool to verify that a network satisfies a wide range of intended
properties such as reachability or isolation among nodes, waypointing, black holes …

A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

Safely and automatically updating in-network ACL configurations with intent language

B Tian, X Zhang, E Zhai, HH Liu, Q Ye… - Proceedings of the …, 2019 - dl.acm.org
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …

Plankton: Scalable network configuration verification through model checking

S Prabhu, KY Chou, A Kheradmand, B Godfrey… - … USENIX Symposium on …, 2020 - usenix.org
Network configuration verification enables operators to ensure that the network will behave
as intended, prior to deployment of their configurations. Although techniques ranging from …

Cloud overlay for operations administration and management

NK Nainar, CM Pignataro, D Kumar - US Patent 10,320,664, 2019 - Google Patents
5, 687, 167 A 6, 115, 384 A 6, 167, 438 A 6, 400, 681 B1 6, 661, 797 B1 6, 687, 229 B1 6,
799, 270 B1 6, 888, 828 B1 6, 993, 593 B2 7, 027, 408 B2 7, 062, 567 B2 7, 095, 715 B2 7 …

Lessons from the evolution of the Batfish configuration analysis tool

M Brown, A Fogel, D Halperin, V Heorhiadi… - Proceedings of the …, 2023 - dl.acm.org
Batfish is a tool to analyze network configurations and forwarding. It has evolved from a
research prototype to an industrial-strength product, guided by scalability, fidelity, and …

A large scale study of data center network reliability

J Meza, T Xu, K Veeraraghavan, O Mutlu - Proceedings of the Internet …, 2018 - dl.acm.org
The ability to tolerate, remediate, and recover from network incidents (caused by device
failures and fiber cuts, for example) is critical for building and operating highly-available web …

Crystalnet: Faithfully emulating large production networks

HH Liu, Y Zhu, J Padhye, J Cao… - Proceedings of the 26th …, 2017 - dl.acm.org
Network reliability is critical for large clouds and online service providers like Microsoft. Our
network is large, heterogeneous, complex and undergoes constant churns. In such an …

Tiramisu: Fast multilayer network verification

A Abhashkumar, A Gember-Jacobson… - 17th USENIX Symposium …, 2020 - usenix.org
Today's distributed network control planes are highly sophisticated, with multiple interacting
protocols operating at layers 2 and 3. The complexity makes network configurations highly …

System and method for automated rendering of service chaining

SM Kumar, J Napper, PP Hiremath, V Saha - US Patent 10,931,793, 2021 - Google Patents
In one embodiment, a method includes creating a catalog of service function (" SF”) profiles,
wherein each of the profiles is associated with an SF and indicates a type of the associ ated …