Summary of Networked Systems Breakout Group

Size: px
Start display at page:

Download "Summary of Networked Systems Breakout Group"

Transcription

1 Summary of Networked Systems Breakout Group Boon Thau Loo NSF ExCAPE PI Meeting 10/11 June 2013

2 Outline Summary (activities over past year) Research highlights Plans for next year

3 Year 1 in Retrospect Original proposal focus: apply appysynthesis s techniques in (1) Internet routing and (2) wireless network protocols Scope of work has expanded over the past year: From synthesizing protocol implementations to synthesizing i policies i and configurations Exciting new applications in Cloud computing and Software defined Networking Deal with management complexity in cloud and highly volatile networked environments

4 Main Participants Faculty: Rajeev Alur (Penn), Ras Bodik (UC Berkeley), Boon Thau Loo (Penn), George Pappas (Penn), Ufuk Topcu (Penn), Madhu Parthasarathy (UIUC) Postdoc: Alexander Gurney (Penn) Students: Behnaz Arzani (Penn), Shaon Barman (UC Berkeley), Sarah Chasins (UC Berkeley), Chen Chen (Penn), Anduo Wang (Penn > UIUC), Shambwaditya Saha (UIUC), Yifei Yuan (Penn), M d f i ti / ll b ti W kl ll Mode of communication/collaboration: Weekly small group meetings, larger group sync ups, monthly webinar, Skype (Penn/India), qualifying exams (Yifei Yuan, Alur/Madhu/Loo), papers, demos.

5 Ongoing Projects (presented yesterday) Internet routing: Routing constraints and traffic disruptions (Gurney, Arzani, Guerin, Loo) FormallySecure Internet routing (Chen, Jia, Loo) Cloud back end: Software defined network configuration synthesis (Wang, Topcu, Loo, Scedrov) Automated bandwidth allocation in data centers (Yuan, Wang, Alur, Loo) Static Scheduling in Clouds (Zufferey, and IST Austria group) Cloud front end: Web scripting for end users (Barman, Chasins, Gulwani, Bodik)

6 Outline Summary (activities over past year) Research highlights Plans for next year

7 #1: Routing Constraints and Traffic Disruptions Participants: Alex Gurney, Behnaz Arzani, Roch Guerin, Boon T. Loo Last year: we presented the Formally Safe Routing (FSR) toolkit > automatically synthesize Internet routing policies that lead to convergence (i.e. safe) This year: two additional dimensions Traffic engineering, Incremental network repair SIGCOMM 12 demonstration and CoNEXT 13 submission

8 Routing Policy Routing policy oftenends ends up being characterized in terms of preferences over paths path p should be better than path q I don t care to choose between p and q Universal llanguage for supporting various business cases, operational concerns, and so on. Example abstraction: routing algebra (in original proposal), declarative networking programs

9 Traffic Engineering We have a network, represented as a (directed, weighted) graph. Routing will establish all pairs shortest paths over this graph. We have a demand matrix of traffic volumes for each source and destination. The shortest paths flow yields link loads (a traffic matrix). Our job: choose weights to minimize load.

10 Challenges and Initial Approaches Routing protocol must converge Minimize congestion network wide These goals are potentially conflicting: Somechoices of linkweights (minimizingcongestion) lead to convergence failure. How can we ensure convergence, while ensuring we get as close as possible to an optimalte solution? Interactive repair: if convergence invariant fails (due to operator error or router failure), how to find a shortest sequence of repairs to minimizetraffic impact? Isshortest shortest sequence of repairs always better? Techniques we explore: Max SMT formulation (Yices), embed path preferences inside existing TE optimization algorithms Evaluated on real network topologies on Emulab

11 #2: Synthesizing Provably Secure Routing Protocols Participants: Chen Chen, Limin Jia, Boon Thau Loo Border Gateway Protocol (BGP) is prone to attacks Prefix hijacking; forged update message Secure alternatives: Secure BGP; so BGP; SCION, ICING,. Lack of formal proof about proposed security guarantees A unified framework for verification and implementation of Internet routing protocol. Use declarative networking for synthesizing secure routing implementations Automated proofs by Coq WRiPE 12 workshop paper, NSDI 13 demo

12 Framework Secure Network Datalog Security Property specification Executable code generator Verification condition generator Distributed implementation ti Proof obligations Wide area deployment Theorem prover 12

13 #3: A Synthesis Approach Towards Automated Management of SDNs Participants: atcpa ts: Anduo Wang, g,uu UfukTopcu, Boon Thau Loo, Andre Scedrov Software defined networking: Centralized controller (programmable in software) Switches can be dynamically programmed: Flow table entries <pattern, action> Used in network virtualization in data centers Traffic isolation dynamic load balancing Traffic isolation, dynamic load balancing OpenFlow standards. Gaining significant traction in industry

14 Challenges and Initial Approaches Given SDN configuration 1, migrate to configuration 2: Determine sequence of routers to update Need to avoid routing loops, and preserve correctness invariants (e.g. traffic isolation, deny certain classes of traffic) Solve as a reachability problem in model checker nusmv Output: an ordering of rule updates Given existing SDN configuration 1, update configurations in response to network state changes Solve as two player temporal logic game Control logic= routing path rule (environment player)+ access control rule (system player) Find a winning strategy for access control rules against all path changes Winning strategy: invariant preserving Dealing with state explosion: Abstraction based on grouping by nodes or flows

15 #4: Automatic Bandwidth Allocation in Data Center s Network Data Centers X 1 X 2 X 3 1G 600M 500M 450M S 1 S 2 S 3 S 4 Boon Thau Loo Yifei Yuan, Anduo Wang, Rajeev Alur,

16 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M S 1 S 2 S 3 S 4

17 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 10G 10G 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M S 1 S 2 S 3 S 4

18 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M v 1 v 3 v 2 S 1 S 2 S 3 S 4

19 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M v 1 v 3 v 2 S 1 S 2 S 3 S 4

20 Challenges and Initial Approaches NP complete problem Existing heuristics are inefficient but may not find a solution (even if it exists) Our approach: SAT/SMT solving Abstraction and refinement for scalability Exploit hierarchical structure of data centers (Tree, Fat tree) FMCAD 13 submission

21 Other Talks Yesterday #5: Web scripting for end users Shaon Barman, Sarah Chasins, Ras Bodik, Sumit Gulwani Record and replay for web browsers Input: user demonstration of web application Output: script to reproduce the interaction Accessible to end users #6: Static scheduling hdli in the cloud Damien Zufferey et.al. Given a set of jobs, determine a scheduling order that meets optimization goal (total utilization, % deadlines met Challenges: scaling the scheduler, price/performance tradeoffs

22 Outline Summary (activities over past year) Research highlights Plans for next year

23 Plans for next 12 months Continue our current research directions Many projects in early stages Many papers and tool development in the pipeline Evolve into Ph.D. dissertation topics. Co advising would be a plus. Cross layer synthesis (routing, data center networking, cloud scheduling, hdli web scripting) i We welcome your participation and input! We have a lot of networked management problems to work on! Apply computation engines developed by other PIs Opportunities to collaboratewithindustry industry

Networked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013

Networked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013 Networked Systems Boon Thau Loo University of Pennsylvania NSF ExCAPE Meeting 20 Aug 2013 Outline Summary (activities over past year) Research highlights Conclusion Year 1 in Retrospect Original proposal

More information

Boon Thau Loo University of Pennsylvania

Boon Thau Loo University of Pennsylvania Summary of Networked Systems Breakout Boon Thau Loo University of Pennsylvania Networked Systems Breakout Series of 15-20 minute talks: Challenges in safe routing (Alex Gurney) Compositional network services

More information

Automated Synthesis of Reactive Controller for Software-defined Networks

Automated Synthesis of Reactive Controller for Software-defined Networks Automated Synthesis of Reactive Controller for Software-defined Networks Anduo Wang Salar Moarref Ufuk Topcu Boon Thau Loo Andre Scedrov University of Pennsylvania 1 Networks are complicated network operator

More information

DISTRIBUTION A: Distribution approved for public release.

DISTRIBUTION A: Distribution approved for public release. AFRL-AFOSR-VA-TR-2015-0269 A Unified Algebraic and Logic-Based Framework towards Safe Routing Implementations Boon Loo TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA 08/13/2015 Final Report. Air Force Research

More information

Programming Network Policies by Examples: Platform, Abstraction and User Studies

Programming Network Policies by Examples: Platform, Abstraction and User Studies Programming Network Policies by Examples: Platform, Abstraction and User Studies Boon Thau Loo University of Pennsylvania NetPL workshop @ SIGCOMM 2017 Joint work with Yifei Yuan, Dong Lin, Siri Anil,

More information

Boon Thau Loo Speaks Out on His SIGMOD Dissertation Award, Better Networking Through Datalog, Life as an Assistant Professor, and More

Boon Thau Loo Speaks Out on His SIGMOD Dissertation Award, Better Networking Through Datalog, Life as an Assistant Professor, and More Boon Thau Loo Speaks Out on His SIGMOD Dissertation Award, Better Networking Through Datalog, Life as an Assistant Professor, and More by Marianne Winslett http:// www.cis.upenn.edu/~boonloo/ Welcome to

More information

ExCAPE. Expeditions in Computer Augmented Program Engineering

ExCAPE. Expeditions in Computer Augmented Program Engineering ExCAPE Expeditions in Computer Augmented Program Engineering Rajeev Alur, Ras Bodik, Jeff Foster, Bjorn Hartmann, Lydia Kavraki, Hadas Kress-Gazit, Stephane Lafortune, Boon Loo, P. Madhusudan, Milo Martin,

More information

Formally Verifiable Networking

Formally Verifiable Networking Formally Verifiable Networking Anduo Wang 1 Limin Jia 1 Changbin Liu 1 Boon Thau Loo 1 Andre Scedrov 1 Oleg Sokolsky 1 Prithwish Basu 2 1 University of Pennsylvania 2 BBN technologies Protocol exchange

More information

Provenance-aware Secure Networks

Provenance-aware Secure Networks Provenance-aware Secure Networks Wenchao Zhou Eric Cronin Boon Thau Loo University of Pennsylvania Motivation Network accountability Real-time monitoring and anomaly detection Identifying and tracing malicious

More information

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004 TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell

More information

ExCAPE Kick off Meeting. Leads: Stéphane Lafortune and Steve Zdancewic

ExCAPE Kick off Meeting. Leads: Stéphane Lafortune and Steve Zdancewic Education and Outreach ExCAPE Kick off Meeting Monday June 4, 4:30 5:30pm Leads: Stéphane Lafortune and Steve Zdancewic Education and Outreach 2013 Summer School Programs for High SchoolStudents Students

More information

SDN abstraction and security: a database perspective

SDN abstraction and security: a database perspective June 17, 2016 SoSSDN SDN abstraction and security: a database perspective Anduo Wang * Jason Croft Xueyuan Mei Matthew Caesar Brighten Godfrey * Temple University University of Illinois Urbana-Champaign

More information

NETWORK VERIFICATION: WHEN CLARKE MEETS CERF

NETWORK VERIFICATION: WHEN CLARKE MEETS CERF TOOLS FOR PUBLIC CLOUDS, PRIVATE CLOUDS, ENTERPRISE NETWORKS, ISPs,... NETWORK VERIFICATION: WHEN CLARKE MEETS CERF George Varghese UCLA (with collaborators from CMU, MSR, Stanford, UCLA) 1 Model and Terminology

More information

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T

More information

Robust validation of network designs under uncertain demands and failures

Robust validation of network designs under uncertain demands and failures Robust validation of network designs under uncertain demands and failures Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani Purdue University USENIX NSDI 2017 Validating network design Network design today

More information

A Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations

A Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science 1-1-2013 A Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations

More information

A Theorem Proving Approach Towards Declarative Networking

A Theorem Proving Approach Towards Declarative Networking A Theorem Proving Approach Towards Declarative Networking Anduo Wang 1 Boon Thau Loo 1 Changbin Liu 1 Oleg Sokolsky 1 Prithwish Basu 2 1 Computer and Information Sciences Department, University of Pennsylvania,

More information

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science 1-1-2011 FSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing Anduo

More information

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing Wenchao Zhou supervised by Prof. Boon Thau Loo CIS Department, University of Pennsylvania Philadelphia, PA, 19104 wenchaoz@cis.upenn.edu

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u

More information

Democratically Finding The Cause of Packet Drops

Democratically Finding The Cause of Packet Drops Democratically Finding The Cause of Packet Drops Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang (Harry) Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo 1 Marple- SigComm 2017 Sherlock- SigComm

More information

Programmable Networks with Synthesis

Programmable Networks with Synthesis Programmable Networks with Synthesis Ahmed ElHassany Petar Tsankov Laurent Vanbever Martin Vechev Network Misconfigurations are Common What Example Makes Network Configuration Hard? Low-level, local router

More information

Topic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:

Topic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date: Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering

More information

Automated Refinement Checking of Asynchronous Processes. Rajeev Alur. University of Pennsylvania

Automated Refinement Checking of Asynchronous Processes. Rajeev Alur. University of Pennsylvania Automated Refinement Checking of Asynchronous Processes Rajeev Alur University of Pennsylvania www.cis.upenn.edu/~alur/ Intel Formal Verification Seminar, July 2001 Problem Refinement Checking Given two

More information

ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling

ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling ECE 587 Hardware/Software Co-Design Spring 2018 1/20 ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling Professor Jia Wang Department of Electrical and Computer Engineering

More information

Seamless Network-Wide IGP Migrations

Seamless Network-Wide IGP Migrations Seamless Network-Wide IGP Migrations Laurent Vanbever, Stefano Vissicchio, Cristel Pelsser, Pierre Francois, and Olivier Bonaventure laurent.vanbever@uclouvain.be SIGCOMM August 8, 20 It is not the strongest

More information

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

Formal Verification of Computer Switch Networks

Formal Verification of Computer Switch Networks Formal Verification of Computer Switch Networks Sharad Malik; Department of Electrical Engineering; Princeton Univeristy (with Shuyuan Zhang (Princeton), Rick McGeer (HP Labs)) 1 SDN: So what changes for

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. Ahmed El-Hassany Petar Tsankov Laurent Vanbever Martin Vechev

NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. Ahmed El-Hassany Petar Tsankov Laurent Vanbever Martin Vechev NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion Ahmed El-Hassany Petar Tsankov Laurent Vanbever Martin Vechev I shouldn t be the one giving this talk Third year PhD student

More information

Towards Systematic Design of Enterprise Networks

Towards Systematic Design of Enterprise Networks Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All

More information

FOUNDATIONS OF INTENT- BASED NETWORKING

FOUNDATIONS OF INTENT- BASED NETWORKING FOUNDATIONS OF INTENT- BASED NETWORKING Loris D Antoni Aditya Akella Aaron Gember Jacobson Network Policies Enterprise Network Cloud Network Enterprise Network 2 3 Tenant Network Policies Enterprise Network

More information

Verified Secure Routing

Verified Secure Routing Verified Secure Routing David Basin ETH Zurich EPFL, Summer Research Institute June 2017 Team Members Verification Team Information Security David Basin Tobias Klenze Ralf Sasse Christoph Sprenger Thilo

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

skb2 Shaon Barman, Sarah Chasins, Ras Bodik UC Berkeley Sumit Gulwani Microsoft Research

skb2 Shaon Barman, Sarah Chasins, Ras Bodik UC Berkeley Sumit Gulwani Microsoft Research skb2 Web Scripting for End Users Shaon Barman, Sarah Chasins, Ras Bodik UC Berkeley Sumit Gulwani Microsoft Research 1 Slide 1 skb2 I think the title should be changed since the project has expanded past

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable

More information

Combining Induction, Deduction and Structure for Synthesis

Combining Induction, Deduction and Structure for Synthesis Combining Induction, Deduction and Structure for Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Students: S. Jha, B. Brady, J. Kotker, W.Li Collaborators: R. Bryant, S. Gulwani,

More information

LOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley

LOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley LOUP: The Principles and Practice of Intra-Domain Route Dissemination Nikola Gvozdiev, Brad Karp, Mark Handley The Rising Tide of Reachability Expectations Internet users expect any-to-any reachability:

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga

More information

Lecture 7: Data Center Networks

Lecture 7: Data Center Networks Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich

SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich March 2019 Internet: The network of networks The Internet is a network of Autonomous Systems (ASes). Each AS is itself a

More information

Enforcing Customizable Consistency Properties in Software-Defined Networks. Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey

Enforcing Customizable Consistency Properties in Software-Defined Networks. Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey Enforcing Customizable Consistency Properties in Software-Defined Networks Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey 1 Network changes control applications, changes in traffic

More information

Cengiz Alaettinoglu. SDN Traffic Engineering A Natural Evolution

Cengiz Alaettinoglu. SDN Traffic Engineering A Natural Evolution Cengiz Alaettinoglu SDN Traffic Engineering A Natural Evolution What is Traffic Engineering (TE)? Minimizes the worst link utilization Alleviates traffic congestion Better/longer use of capital expenditure

More information

Efficient Internet Routing with Independent Providers

Efficient Internet Routing with Independent Providers Efficient Internet Routing with Independent Providers David Wetherall University of Washington Credits Ratul Mahajan, Microsoft Research Tom Anderson, University of Washington Neil Spring, University of

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

Deploying Voice Workloads for Skype for Business Online and Server 2015

Deploying Voice Workloads for Skype for Business Online and Server 2015 Deploying Voice Workloads for Skype for Business Online and Server 2015 40409; 5 Days, Instructor-led Course Description This five-day instructor-led course teaches how to design, plan, and deploy the

More information

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks

More information

Lecture 18: Border Gateway Protocol

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,

More information

A Brief History of Synthesis From Church to ExCAPE. Rajeev Alur. University of Pennsylvania

A Brief History of Synthesis From Church to ExCAPE. Rajeev Alur. University of Pennsylvania A Brief History of Synthesis From Church to ExCAPE Rajeev Alur University of Pennsylvania 1 Software Design Libraries Program Specifications Tests Compiler Analysis Tool Executable Platform 2 Programming

More information

CCNA Security ( ) and CCNP ( , , )

CCNA Security ( ) and CCNP ( , , ) 4/20/2016 CCNA Security (640-554) and CCNP (300-101, 300-115, 300-135) CCNA Security (640-554) and CCNP (300-101, 300-115, 300-135) MSIT120 / 160 Hours / 12 Months / Self-Paced / Materials Included Course

More information

Time and Place. Course Web Site. Grading Policy. Advanced Computer Networks. Lecture 1: Introduction to Course

Time and Place. Course Web Site. Grading Policy. Advanced Computer Networks. Lecture 1: Introduction to Course Time and Place Advanced Computer Networks Lecture 1: Introduction to Course Lecture: TuTh 10:30-12:00, Fr 9:30-10:30 Discussion: after paper discussion on Tue and/or Thu Room:1690 BBB Instructor: Sugih

More information

Syntax-Guided Program Synthesis. Rajeev Alur. University of Pennsylvania

Syntax-Guided Program Synthesis. Rajeev Alur. University of Pennsylvania Syntax-Guided Program Synthesis Rajeev Alur University of Pennsylvania 1 Goal: Programming computers easier than communicating with people Can programming be liberated, period. David Harel, IEEE Computer,

More information

Syntax-Guided Program Synthesis. Rajeev Alur

Syntax-Guided Program Synthesis. Rajeev Alur Syntax-Guided Program Synthesis Rajeev Alur University of Pennsylvania 1 Goal: Programming computers easier than communicating with people Can programming be liberated, period. David Harel, IEEE Computer,

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

Deploying Voice Workloads for Skype for Business Online and Server

Deploying Voice Workloads for Skype for Business Online and Server Course Code: M40409 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Deploying Voice Workloads for Skype for Business Online and Server Overview This five-day instructor-led course teaches how to

More information

Lecture 17: Border Gateway Protocol

Lecture 17: Border Gateway Protocol Lecture 17: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 18 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How

More information

Stable Internet Route Selection

Stable Internet Route Selection Stable Internet Route Selection Brighten Godfrey Matthew Caesar Ian Haken Scott Shenker Ion Stoica UC Berkeley pbg@cs.berkeley.edu NANOG 40 June 6, 2007 BGP instability: trouble control plane data plane

More information

SWAN: Software-driven wide area network. Ratul Mahajan

SWAN: Software-driven wide area network. Ratul Mahajan SWAN: Software-driven wide area network Ratul Mahajan Partners in crime Vijay Gill Chi-Yao Hong Srikanth Kandula Ratul Mahajan Mohan Nanduri Ming Zhang Roger Wattenhofer Rohan Gandhi Xin Jin Harry Liu

More information

Formally Verifiable Networking

Formally Verifiable Networking ABSTRACT Formally Verifiable Networking Anduo Wang Limin Jia Changbin Liu Boon Thau Loo Oleg Sokolsky Prithwish Basu University of Pennsylvania BBN Technologies {anduo,liminjia,changbl,boonloo,sokolsky}@seas.upenn.edu,

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Centralization of Network using Openflow Protocol

Centralization of Network using Openflow Protocol Indian Journal of Science and Technology, Vol 8(S2), 165 170, January 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS2/61217 Centralization of Network using Openflow

More information

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Interdomain Routing Reading: Sections P&D 4.3.{3,4} Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/

More information

Debugging the Data Plane with Anteater

Debugging the Data Plane with Anteater Debugging the Data Plane with Anteater Haohui Mai, Ahmed Khurshid Rachit Agarwal, Matthew Caesar P. Brighten Godfrey, Samuel T. King University of Illinois at Urbana-Champaign Network debugging is challenging

More information

BGP#: A System for Dynamic Route Control In Data Centers

BGP#: A System for Dynamic Route Control In Data Centers BGP#: A System for Dynamic Route Control In Data Centers Chao-Chih Chen UC Davis* Lihua Yuan Albert Greenberg Randy Kern Tao Zhang Parantap Lahiri John Arnold Kevin Grady Microsoft *Also a Microsoft Intern

More information

Formalizing Metarouting in PVS

Formalizing Metarouting in PVS Formalizing Metarouting in PVS ABSTRACT Anduo Wang Department of Computer and Information Science University of Pennsylvania Philadelphia, USA anduo@seas.upenn.edu In this paper, we extend PVS specification

More information

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol

More information

Scalable Multipath Routing (towards)

Scalable Multipath Routing (towards) Scalable Multipath Routing (towards) 71st Meeting of the IFIP WG 10.4 Working Group on Dependability and Security Ian Welch, School of Engineering and Computer Science; Victoria University of Wellington

More information

Control Improvisation

Control Improvisation Control Improvisation Sanjit A. Seshia Professor EECS, UC Berkeley Joint work with: Daniel Fremont, Tommaso Dreossi, Rafael Valle, Sophie Libkind, Alexandre Donze, David Wessel December 11, 2017 Diversity

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

"Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary

Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary Description Course Summary This five-day instructor-led course teaches how to design, plan, and deploy the various voice solutions available with Skype for Business Online and Skype for Business Server

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

IP & DCN Planning for Microwave Networks

IP & DCN Planning for Microwave Networks IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation

More information

Automated Bug Removal for Software-Defined Networks

Automated Bug Removal for Software-Defined Networks Automated Bug Removal for Software-Defined Networks Yang Wu* Ang Chen* Andreas Haeberlen* Wenchao Zhou + Boon Thau Loo* * University of Pennsylvania + Georgetown University 1 Motivation: Automated repair

More information

Sequential Logic Synthesis

Sequential Logic Synthesis Sequential Logic Synthesis Logic Circuits Design Seminars WS2010/2011, Lecture 9 Ing. Petr Fišer, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical University in Prague

More information

Software Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University

Software Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University Software Defined Networking Security: Security for SDN and Security with SDN Seungwon Shin Texas A&M University Contents SDN Basic Operation SDN Security Issues SDN Operation L2 Forwarding application

More information

Boon Thau Loo University of Pennsylvania

Boon Thau Loo University of Pennsylvania Applying PL and Database Techniques to Networking Boon Thau Loo University of Pennsylvania http://netdb.cis.upenn.edu DIMACS Workshop on Designing Networks for Manageability (Nov 12-13) Outline Declarative

More information

CQNCR: Optimal VM Migration Planning in Cloud Data Centers

CQNCR: Optimal VM Migration Planning in Cloud Data Centers CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,

More information

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,

More information

"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary

Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

A Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft

A Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft A Network-State Management Service Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft Complex Infrastructure 1 Complex Infrastructure Microsoft Azure Number

More information

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

UCS Engineering Details for the SAN Administrator

UCS Engineering Details for the SAN Administrator UCS Engineering Details for the SAN Administrator Craig Ashapa 2 First things first: debunking a myth Today (June 2012 UCS 2.02m) there is no FCoE northbound of UCS unless you really really really want

More information

Some Foundational Problems in Interdomain Routing

Some Foundational Problems in Interdomain Routing Some Foundational Problems in Interdomain Routing Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford AT&T Labs -- Research The state of interdomain

More information

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

More information

Mechanically-Verified Validation of Satisfiability Solvers

Mechanically-Verified Validation of Satisfiability Solvers Mechanically-Verified Validation of Satisfiability Solvers Nathan Wetzler The University of Texas at Austin Dissertation Proposal October 18, 2013 Outline Motivation and Proposal Satisfiability and Proofs

More information

THE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS. James Walker, Vice President Managed Network Services WAN Summit 7th October 2015

THE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS. James Walker, Vice President Managed Network Services WAN Summit 7th October 2015 THE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS James Walker, Vice President Managed Network Services WAN Summit 7th October 2015 tatacommunications.com @tata_comm tatacommunications-newworld.com youtube.com/user/tatacomms

More information

Abstractions for Routing. Abstractions for Network Routing

Abstractions for Routing. Abstractions for Network Routing Abstractions for Routing Abstractions for Network Routing Brighten Godfrey DIMACS 23 May 2012 Abstractions for Network Routing Impressions of Network Routing Neo-Dadaisms for Network Routing Absurdisms

More information

Advanced Topics in Routing

Advanced Topics in Routing Advanced Topics in Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

Hands-On ROUTE Implementing Cisco IP Routing CCNP Course 1

Hands-On ROUTE Implementing Cisco IP Routing CCNP Course 1 Hands-On CCNP Course 1 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks of global network professionals. Course 1 ROUTE

More information