Proceedings of the ACM Special Interest Group on Data Communication 2019
DOI: 10.1145/3341302.3342094
|View full text |Cite
|
Sign up to set email alerts
|

Validating datacenters at scale

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(33 citation statements)
references
References 27 publications
1
32
0
Order By: Relevance
“…Rigorous analysis proves the convergence and correctness of CPCheck. It also shows that the previous published Azure local verification [27] can be easily supported as a specialized case of verifying shortestpath reachability and fault-tolerance requirement in CPCheck.…”
Section: Introductionmentioning
confidence: 84%
See 2 more Smart Citations
“…Rigorous analysis proves the convergence and correctness of CPCheck. It also shows that the previous published Azure local verification [27] can be easily supported as a specialized case of verifying shortestpath reachability and fault-tolerance requirement in CPCheck.…”
Section: Introductionmentioning
confidence: 84%
“…Each entry in the table maps a disjoint packet space [29] to an action. The action includes modification of packet header as well as a group of next-hops [27]. it is annotated with a keyword ALL.…”
Section: Data Plane Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…These approaches scale to networks with a couple of 100k forwarding rules and some support incremental updates [4], [18] which allow reverification times in the range of milliseconds. Further improvements have been made by dividing snapshots into smaller but closed portions [21], [22] which are easier to analyze and allow massive parallelization [23]. Additional improvements can be made by limiting on IP routed networks instead of an arbitrary amount of header fields [24].…”
Section: Overview Of Related Verification Toolsmentioning
confidence: 99%
“…This development is also not limited to academia. Large cloud providers, such as Alibaba [36], Amazon [2], and Microsoft [20], are developing and deploying network verification systems. However, as shown in Figure 1, each such tool today is a monolith, with its own model of the target functionality and its own analysis engine.…”
Section: Introductionmentioning
confidence: 99%