2008
DOI: 10.1145/1402946.1402972
|View full text |Cite
|
Sign up to set email alerts
|

Shadow configuration as a network management primitive

Abstract: Configurations for today's IP networks are becoming increasingly complex. As a result, configuration management is becoming a major cost factor for network providers and configuration errors are becoming a major cause of network disruptions. In this paper, we present and evaluate the novel idea of shadow configurations. Shadow configurations allow configuration evaluation before deployment and thus can reduce potential network disruptions. We demonstrate using real implementation that shadow configurations can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…Contrary to [23], IBSDN runs the IGP directly on the nodes (rather than just on the controller to compute forwarding paths), hence benefiting from IGP failure recovery abilities. In the context of traditional networks, the idea of relying on multiple control-planes running different instances of a distributed protocol has also been exploited by few other works, for purposes ranging from fast failure recovery [24] to pre-deployment configuration evaluation [25] and network reconfigurations [26], [27]. IBSDN uses multiple control-planes to combine SDN and IGP, introducing tailored techniques to efficiently ensure network robustness.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Contrary to [23], IBSDN runs the IGP directly on the nodes (rather than just on the controller to compute forwarding paths), hence benefiting from IGP failure recovery abilities. In the context of traditional networks, the idea of relying on multiple control-planes running different instances of a distributed protocol has also been exploited by few other works, for purposes ranging from fast failure recovery [24] to pre-deployment configuration evaluation [25] and network reconfigurations [26], [27]. IBSDN uses multiple control-planes to combine SDN and IGP, introducing tailored techniques to efficiently ensure network robustness.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…A general approach to deal with multiple configurations is proposed in [36]. In that work, Alimi et al propose firmware modifications that enable routers to manage a shadow configuration beyond the active configuration used for data traffic forwarding.…”
Section: Related Workmentioning
confidence: 99%
“…The entire approach could be seen as a way to implement two BGP control planes. However, our solution is more lightweight and easier to implement with respect to [36], as it requires no device modification, and no ad-hoc protocol for either tagging packets and committing configuration changes. In this paper, we also justified the need for an additional control plane to solve the BGP reconfiguration problem by a thorough theoretical study.…”
Section: Related Workmentioning
confidence: 99%
“…Many of these approaches are specific for BGP misconfiguration [9], [17], [11], [4]. [23], [13], [1], [24] focused on conflict analysis of firewalls configuration.…”
Section: Related Workmentioning
confidence: 99%