“…The literature in this field is vast and includes BGP configuration checking (e.g., [7], [44]- [51]), ACL misconfiguration detection (e.g., [52], [53]), firewall checking (e.g., [17], [18], [21], [54]), SDN verification (e.g., [20], [23], [55], [56]), testing (e.g., [2], [57]- [60]), debugging (e.g., [61], [62]), differential analysis (e.g., [63]), concurrency analysis (e.g [64], [65]), automatic repair (e.g., [66]- [68]), synthesis (e.g. [69]- [71]), programming languages (e.g. [72]- [76]), safe network updates (e.g., [77]- [80]), data plane checking (e.g., [10], [11], [16], [25]), real-time checkers [12], [14], [30], [81], and more general network analyses (e.g., [6], [8], [9], [19], [82], [83]) together with suitable levels of abstractions (e.g., [84], [85]).…”