Proceedings of the Conference of the ACM Special Interest Group on Data Communication 2017
DOI: 10.1145/3098822.3098834
|View full text |Cite
|
Sign up to set email alerts
|

A General Approach to Network Configuration Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
145
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 177 publications
(147 citation statements)
references
References 19 publications
0
145
0
2
Order By: Relevance
“…[69]- [71]), programming languages (e.g. [72]- [76]), safe network updates (e.g., [77]- [80]), data plane checking (e.g., [10], [11], [16], [25]), real-time checkers [12], [14], [30], [81], and more general network analyses (e.g., [6], [8], [9], [19], [82], [83]) together with suitable levels of abstractions (e.g., [84], [85]).…”
Section: E Discussion: Importance Of Empty Pecsmentioning
confidence: 99%
“…[69]- [71]), programming languages (e.g. [72]- [76]), safe network updates (e.g., [77]- [80]), data plane checking (e.g., [10], [11], [16], [25]), real-time checkers [12], [14], [30], [81], and more general network analyses (e.g., [6], [8], [9], [19], [82], [83]) together with suitable levels of abstractions (e.g., [84], [85]).…”
Section: E Discussion: Importance Of Empty Pecsmentioning
confidence: 99%
“…Applied to the target network, the intents allow a set of possible forwarding behavior in the form of a set of forwarding paths in the network. 1 A collector then collects a subset of these paths by data plane or Figure 2: An abstract view of intent inference process control plane configuration analysis [3,12,13,19], observing the actual network traffic, etc. The collection mechanism is orthogonal to our work but we emphasize that the collector may not be able to observe all possible paths.…”
Section: Measures Of Qualitymentioning
confidence: 99%
“…In addition to the formal tools and techniques reviewed in Section , there is another set of tools which are used in general network verification . These tools can also be used to verify SDN infrastructure.…”
Section: Some Other Relevant Workmentioning
confidence: 99%
“…These tools can also be used to verify SDN infrastructure. These tool can be employed in verifying the correctness of data‐plane, middleboxes, and control‐plane . Further, we have also studied some additional verification tools for their applications in different domains of SDN enable networks.…”
Section: Some Other Relevant Workmentioning
confidence: 99%
See 1 more Smart Citation