A general approach to network configuration verification
We present Minesweeper, a tool to verify that a network satisfies a wide range of intended
properties such as reachability or isolation among nodes, waypointing, black holes …
properties such as reachability or isolation among nodes, waypointing, black holes …
A general approach to network configuration analysis
A Fogel, S Fung, L Pedrosa… - … USENIX Symposium on …, 2015 - usenix.org
We present an approach to detect network configuration errors, which combines the benefits
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
Providing public intradomain traffic matrices to the research community
This paper presents a new publicly available dataset from GÉANT, the European Research
and Educational Network. This dataset consists of traffic matrices built using full IGP routing …
and Educational Network. This dataset consists of traffic matrices built using full IGP routing …
Safely and automatically updating in-network acl configurations with intent language
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
Tiramisu: Fast multilayer network verification
Today's distributed network control planes are highly sophisticated, with multiple interacting
protocols operating at layers 2 and 3. The complexity makes network configurations highly …
protocols operating at layers 2 and 3. The complexity makes network configurations highly …
Aquila: a practically usable verification system for production-scale programmable data planes
This paper presents Aquila, the first practically usable verification system for Alibaba's
production-scale programmable data planes. Aquila addresses four challenges in building a …
production-scale programmable data planes. Aquila addresses four challenges in building a …
Probabilistic verification of network configurations
Not all important network properties need to be enforced all the time. Often, what matters
instead is the fraction of time/probability these properties hold. Computing the probability of …
instead is the fraction of time/probability these properties hold. Computing the probability of …
Path splicing
We present path splicing, a new routing primitive that allows network paths to be constructed
by combining multiple routing trees (" slices") to each destination over a single network …
by combining multiple routing trees (" slices") to each destination over a single network …
Accuracy, scalability, coverage: A practical configuration verifier on a global wan
This paper presents Hoyan--the first reported large scale deployment of configuration
verification in a global-scale wide area network (WAN). Hoyan has been running in …
verification in a global-scale wide area network (WAN). Hoyan has been running in …
Differential network analysis
Networks are constantly changing. To avoid outages, operators need to know whether
prospective changes in a network's control plane will cause undesired changes in end-to …
prospective changes in a network's control plane will cause undesired changes in end-to …