Expensive bugsFrequent protocol changes Operators don’t have the full picture.

Slides:



Advertisements
Similar presentations
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Models and techniques for verification of Software Defined Networks
VeriCon: Towards Verifying Controller Programs in SDNs (PLDI 2014) Thomas Ball, Nikolaj Bjorner, Aaron Gember, Shachar Itzhaky, Aleksandr Karbyshev, Mooly.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Copyright 2002 Year 2 - Chapter 5/Cisco 3 - Module 5 Routing Protocols: IGRP By Carl Marandola.
Courtesy: Nick McKeown, Stanford
Part IV: Multilayer Switching
1 Comnet 2010 Communication Networks Recitation 6 Routing.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Given Connections Solution
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat Presented by Gregory Peaker and Tyler Maclean.
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Formal checkings in networks James Hongyi Zeng with Peyman Kazemian, George Varghese, Nick McKeown.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
1 Chapter 22 Network layer Delivery, Forwarding and Routing (part2)
Egress Route Selection for Interdomain Traffic Engineering Design considerations beyond BGP.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Network Verification Star Wars amd The Empire Strikes Back.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Department of Computer Science A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares Alexander Loukissas Amin Vahdat SIGCOMM’08 Reporter:
Company Confidential 1 ICMPv6 Echo Replies for Teredo Clients draft-denis-icmpv6-generation-for-teredo-00 behave, IETF#75 Stockholm Teemu Savolainen.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Achieving Convergence-Free Routing using Failure-Carrying Packets K. Lakshminarayanan et al. Presented by Ang Li 06/29/07.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Proactive Network Configuration Validation with Batfish
A Protocol for Packet Network Intercommunication Wei Zhang
Objectives After completing this chapter you will be able to: Describe the different types of bridging: Transparent, Source Route and Translate Describe.
Funda Ergun Behnam Malakooti Case Western Reserve University NAG Intelligent and Agile Protocols and Architectures for Space and Terrestrial Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Ch 22. Routing Direct and Indirect Delivery.
ICSA 341 Data communications & Computer Networks Switching In the WAN, mesh networks are not practical for geographically spread areas with many nodes.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Inter-domain Routing Outline Border Gateway Protocol.
Header Space Analysis: Static Checking for Networks Broadband Network Technology Integrated M.S. and Ph.D. Eun-Do Kim Network Standards Research Section.
BUZZ: Testing Context-Dependent Policies in Stateful Networks Seyed K. Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar.
ROUTING.
Forwarding and Routing IP Packets
Rip Routing Protocol.
Introduction to Networking
Real Time Network Policy Checking using Header Space Analysis
How Global MPLS Service Brings World Altogether?
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
Delivery and Routing of IP Packets
Firewalls Purpose of a Firewall Characteristic of a firewall
Routing Protocols (RIP, OSPF, BGP).
Routing protocol in all three types of networks - Phase 1
RFC 1058 & RFC 2453 Routing Information Protocol
IP-Spoofing and Source Routing Connections
CS 4594 Broadband PNNI Signaling.
ELECTRICAL CIRCUITS AND CONSTRUCTIONS An electrical circuit is a network consisting of a closed loop, giving a return path for the current 2.
Communication Networks
BGP Issues BGP is a reachability protocol ISP issues
MetTel Cloud Connect Seamlessly Secure Your Path to Cloud Providers
COS 461: Computer Networks
With slides from Ahmed Khurshid
Communication Networks
Distance Vector Routing Protocols
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Figure 6.11 Configuration for Example 4
Private Networks.
Presentation transcript:

Expensive bugsFrequent protocol changes Operators don’t have the full picture

Speed Expressivity Hassel, Veriflow NetPlumber Network Optimized Datalog (NoD) Model checkers, SAT Solvers, Datalog Margrave

Policy TemplateExample Protection Sets Customer VMs cannot access controllers Reachable SetsCustomer VMs can access other VMs Consistency ECMP/Backup routes should have identical reachability Middlebox Forward path connections through middlebox should reverse Locality Packets between two hosts in the same cluster should stay within the cluster

Solution

Evaluation

Model Checker SMT All Solutions NoDHSA Stanford Unreach Stanford Reachable Stanford Loop CloudTime out Cloud 28.5Time out4.8-