Summary of Networked Systems Breakout Group
|
|
- Kathleen Charlene Willis
- 5 years ago
- Views:
Transcription
1 Summary of Networked Systems Breakout Group Boon Thau Loo NSF ExCAPE PI Meeting 10/11 June 2013
2 Outline Summary (activities over past year) Research highlights Plans for next year
3 Year 1 in Retrospect Original proposal focus: apply appysynthesis s techniques in (1) Internet routing and (2) wireless network protocols Scope of work has expanded over the past year: From synthesizing protocol implementations to synthesizing i policies i and configurations Exciting new applications in Cloud computing and Software defined Networking Deal with management complexity in cloud and highly volatile networked environments
4 Main Participants Faculty: Rajeev Alur (Penn), Ras Bodik (UC Berkeley), Boon Thau Loo (Penn), George Pappas (Penn), Ufuk Topcu (Penn), Madhu Parthasarathy (UIUC) Postdoc: Alexander Gurney (Penn) Students: Behnaz Arzani (Penn), Shaon Barman (UC Berkeley), Sarah Chasins (UC Berkeley), Chen Chen (Penn), Anduo Wang (Penn > UIUC), Shambwaditya Saha (UIUC), Yifei Yuan (Penn), M d f i ti / ll b ti W kl ll Mode of communication/collaboration: Weekly small group meetings, larger group sync ups, monthly webinar, Skype (Penn/India), qualifying exams (Yifei Yuan, Alur/Madhu/Loo), papers, demos.
5 Ongoing Projects (presented yesterday) Internet routing: Routing constraints and traffic disruptions (Gurney, Arzani, Guerin, Loo) FormallySecure Internet routing (Chen, Jia, Loo) Cloud back end: Software defined network configuration synthesis (Wang, Topcu, Loo, Scedrov) Automated bandwidth allocation in data centers (Yuan, Wang, Alur, Loo) Static Scheduling in Clouds (Zufferey, and IST Austria group) Cloud front end: Web scripting for end users (Barman, Chasins, Gulwani, Bodik)
6 Outline Summary (activities over past year) Research highlights Plans for next year
7 #1: Routing Constraints and Traffic Disruptions Participants: Alex Gurney, Behnaz Arzani, Roch Guerin, Boon T. Loo Last year: we presented the Formally Safe Routing (FSR) toolkit > automatically synthesize Internet routing policies that lead to convergence (i.e. safe) This year: two additional dimensions Traffic engineering, Incremental network repair SIGCOMM 12 demonstration and CoNEXT 13 submission
8 Routing Policy Routing policy oftenends ends up being characterized in terms of preferences over paths path p should be better than path q I don t care to choose between p and q Universal llanguage for supporting various business cases, operational concerns, and so on. Example abstraction: routing algebra (in original proposal), declarative networking programs
9 Traffic Engineering We have a network, represented as a (directed, weighted) graph. Routing will establish all pairs shortest paths over this graph. We have a demand matrix of traffic volumes for each source and destination. The shortest paths flow yields link loads (a traffic matrix). Our job: choose weights to minimize load.
10 Challenges and Initial Approaches Routing protocol must converge Minimize congestion network wide These goals are potentially conflicting: Somechoices of linkweights (minimizingcongestion) lead to convergence failure. How can we ensure convergence, while ensuring we get as close as possible to an optimalte solution? Interactive repair: if convergence invariant fails (due to operator error or router failure), how to find a shortest sequence of repairs to minimizetraffic impact? Isshortest shortest sequence of repairs always better? Techniques we explore: Max SMT formulation (Yices), embed path preferences inside existing TE optimization algorithms Evaluated on real network topologies on Emulab
11 #2: Synthesizing Provably Secure Routing Protocols Participants: Chen Chen, Limin Jia, Boon Thau Loo Border Gateway Protocol (BGP) is prone to attacks Prefix hijacking; forged update message Secure alternatives: Secure BGP; so BGP; SCION, ICING,. Lack of formal proof about proposed security guarantees A unified framework for verification and implementation of Internet routing protocol. Use declarative networking for synthesizing secure routing implementations Automated proofs by Coq WRiPE 12 workshop paper, NSDI 13 demo
12 Framework Secure Network Datalog Security Property specification Executable code generator Verification condition generator Distributed implementation ti Proof obligations Wide area deployment Theorem prover 12
13 #3: A Synthesis Approach Towards Automated Management of SDNs Participants: atcpa ts: Anduo Wang, g,uu UfukTopcu, Boon Thau Loo, Andre Scedrov Software defined networking: Centralized controller (programmable in software) Switches can be dynamically programmed: Flow table entries <pattern, action> Used in network virtualization in data centers Traffic isolation dynamic load balancing Traffic isolation, dynamic load balancing OpenFlow standards. Gaining significant traction in industry
14 Challenges and Initial Approaches Given SDN configuration 1, migrate to configuration 2: Determine sequence of routers to update Need to avoid routing loops, and preserve correctness invariants (e.g. traffic isolation, deny certain classes of traffic) Solve as a reachability problem in model checker nusmv Output: an ordering of rule updates Given existing SDN configuration 1, update configurations in response to network state changes Solve as two player temporal logic game Control logic= routing path rule (environment player)+ access control rule (system player) Find a winning strategy for access control rules against all path changes Winning strategy: invariant preserving Dealing with state explosion: Abstraction based on grouping by nodes or flows
15 #4: Automatic Bandwidth Allocation in Data Center s Network Data Centers X 1 X 2 X 3 1G 600M 500M 450M S 1 S 2 S 3 S 4 Boon Thau Loo Yifei Yuan, Anduo Wang, Rajeev Alur,
16 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M S 1 S 2 S 3 S 4
17 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 10G 10G 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M S 1 S 2 S 3 S 4
18 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M v 1 v 3 v 2 S 1 S 2 S 3 S 4
19 Automatic Bandwidth Allocation in Data Centers Data Center s Network Virtual Network X 1 V 1 400M 400M X 2 X 3 V2 V3 1G 600M 500M 450M v 1 v 3 v 2 S 1 S 2 S 3 S 4
20 Challenges and Initial Approaches NP complete problem Existing heuristics are inefficient but may not find a solution (even if it exists) Our approach: SAT/SMT solving Abstraction and refinement for scalability Exploit hierarchical structure of data centers (Tree, Fat tree) FMCAD 13 submission
21 Other Talks Yesterday #5: Web scripting for end users Shaon Barman, Sarah Chasins, Ras Bodik, Sumit Gulwani Record and replay for web browsers Input: user demonstration of web application Output: script to reproduce the interaction Accessible to end users #6: Static scheduling hdli in the cloud Damien Zufferey et.al. Given a set of jobs, determine a scheduling order that meets optimization goal (total utilization, % deadlines met Challenges: scaling the scheduler, price/performance tradeoffs
22 Outline Summary (activities over past year) Research highlights Plans for next year
23 Plans for next 12 months Continue our current research directions Many projects in early stages Many papers and tool development in the pipeline Evolve into Ph.D. dissertation topics. Co advising would be a plus. Cross layer synthesis (routing, data center networking, cloud scheduling, hdli web scripting) i We welcome your participation and input! We have a lot of networked management problems to work on! Apply computation engines developed by other PIs Opportunities to collaboratewithindustry industry
Networked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013
Networked Systems Boon Thau Loo University of Pennsylvania NSF ExCAPE Meeting 20 Aug 2013 Outline Summary (activities over past year) Research highlights Conclusion Year 1 in Retrospect Original proposal
More informationBoon Thau Loo University of Pennsylvania
Summary of Networked Systems Breakout Boon Thau Loo University of Pennsylvania Networked Systems Breakout Series of 15-20 minute talks: Challenges in safe routing (Alex Gurney) Compositional network services
More informationAutomated Synthesis of Reactive Controller for Software-defined Networks
Automated Synthesis of Reactive Controller for Software-defined Networks Anduo Wang Salar Moarref Ufuk Topcu Boon Thau Loo Andre Scedrov University of Pennsylvania 1 Networks are complicated network operator
More informationDISTRIBUTION A: Distribution approved for public release.
AFRL-AFOSR-VA-TR-2015-0269 A Unified Algebraic and Logic-Based Framework towards Safe Routing Implementations Boon Loo TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA 08/13/2015 Final Report. Air Force Research
More informationProgramming Network Policies by Examples: Platform, Abstraction and User Studies
Programming Network Policies by Examples: Platform, Abstraction and User Studies Boon Thau Loo University of Pennsylvania NetPL workshop @ SIGCOMM 2017 Joint work with Yifei Yuan, Dong Lin, Siri Anil,
More informationBoon Thau Loo Speaks Out on His SIGMOD Dissertation Award, Better Networking Through Datalog, Life as an Assistant Professor, and More
Boon Thau Loo Speaks Out on His SIGMOD Dissertation Award, Better Networking Through Datalog, Life as an Assistant Professor, and More by Marianne Winslett http:// www.cis.upenn.edu/~boonloo/ Welcome to
More informationExCAPE. Expeditions in Computer Augmented Program Engineering
ExCAPE Expeditions in Computer Augmented Program Engineering Rajeev Alur, Ras Bodik, Jeff Foster, Bjorn Hartmann, Lydia Kavraki, Hadas Kress-Gazit, Stephane Lafortune, Boon Loo, P. Madhusudan, Milo Martin,
More informationFormally Verifiable Networking
Formally Verifiable Networking Anduo Wang 1 Limin Jia 1 Changbin Liu 1 Boon Thau Loo 1 Andre Scedrov 1 Oleg Sokolsky 1 Prithwish Basu 2 1 University of Pennsylvania 2 BBN technologies Protocol exchange
More informationProvenance-aware Secure Networks
Provenance-aware Secure Networks Wenchao Zhou Eric Cronin Boon Thau Loo University of Pennsylvania Motivation Network accountability Real-time monitoring and anomaly detection Identifying and tracing malicious
More informationTBGP: A more scalable and functional BGP. Paul Francis Jan. 2004
TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell
More informationExCAPE Kick off Meeting. Leads: Stéphane Lafortune and Steve Zdancewic
Education and Outreach ExCAPE Kick off Meeting Monday June 4, 4:30 5:30pm Leads: Stéphane Lafortune and Steve Zdancewic Education and Outreach 2013 Summer School Programs for High SchoolStudents Students
More informationSDN abstraction and security: a database perspective
June 17, 2016 SoSSDN SDN abstraction and security: a database perspective Anduo Wang * Jason Croft Xueyuan Mei Matthew Caesar Brighten Godfrey * Temple University University of Illinois Urbana-Champaign
More informationNETWORK VERIFICATION: WHEN CLARKE MEETS CERF
TOOLS FOR PUBLIC CLOUDS, PRIVATE CLOUDS, ENTERPRISE NETWORKS, ISPs,... NETWORK VERIFICATION: WHEN CLARKE MEETS CERF George Varghese UCLA (with collaborators from CMU, MSR, Stanford, UCLA) 1 Model and Terminology
More informationAbstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School
Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T
More informationRobust validation of network designs under uncertain demands and failures
Robust validation of network designs under uncertain demands and failures Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani Purdue University USENIX NSDI 2017 Validating network design Network design today
More informationA Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science 1-1-2013 A Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations
More informationA Theorem Proving Approach Towards Declarative Networking
A Theorem Proving Approach Towards Declarative Networking Anduo Wang 1 Boon Thau Loo 1 Changbin Liu 1 Oleg Sokolsky 1 Prithwish Basu 2 1 Computer and Information Sciences Department, University of Pennsylvania,
More informationFSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science 1-1-2011 FSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing Anduo
More informationFSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing
FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing Wenchao Zhou supervised by Prof. Boon Thau Loo CIS Department, University of Pennsylvania Philadelphia, PA, 19104 wenchaoz@cis.upenn.edu
More informationIntroduction to Segment Routing
Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u
More informationDemocratically Finding The Cause of Packet Drops
Democratically Finding The Cause of Packet Drops Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang (Harry) Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo 1 Marple- SigComm 2017 Sherlock- SigComm
More informationProgrammable Networks with Synthesis
Programmable Networks with Synthesis Ahmed ElHassany Petar Tsankov Laurent Vanbever Martin Vechev Network Misconfigurations are Common What Example Makes Network Configuration Hard? Low-level, local router
More informationTopic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:
Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering
More informationAutomated Refinement Checking of Asynchronous Processes. Rajeev Alur. University of Pennsylvania
Automated Refinement Checking of Asynchronous Processes Rajeev Alur University of Pennsylvania www.cis.upenn.edu/~alur/ Intel Formal Verification Seminar, July 2001 Problem Refinement Checking Given two
More informationECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling
ECE 587 Hardware/Software Co-Design Spring 2018 1/20 ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling Professor Jia Wang Department of Electrical and Computer Engineering
More informationSeamless Network-Wide IGP Migrations
Seamless Network-Wide IGP Migrations Laurent Vanbever, Stefano Vissicchio, Cristel Pelsser, Pierre Francois, and Olivier Bonaventure laurent.vanbever@uclouvain.be SIGCOMM August 8, 20 It is not the strongest
More informationMulti-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service
in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple
More informationLecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end
More informationFormal Verification of Computer Switch Networks
Formal Verification of Computer Switch Networks Sharad Malik; Department of Electrical Engineering; Princeton Univeristy (with Shuyuan Zhang (Princeton), Rick McGeer (HP Labs)) 1 SDN: So what changes for
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationNetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. Ahmed El-Hassany Petar Tsankov Laurent Vanbever Martin Vechev
NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion Ahmed El-Hassany Petar Tsankov Laurent Vanbever Martin Vechev I shouldn t be the one giving this talk Third year PhD student
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All
More informationFOUNDATIONS OF INTENT- BASED NETWORKING
FOUNDATIONS OF INTENT- BASED NETWORKING Loris D Antoni Aditya Akella Aaron Gember Jacobson Network Policies Enterprise Network Cloud Network Enterprise Network 2 3 Tenant Network Policies Enterprise Network
More informationVerified Secure Routing
Verified Secure Routing David Basin ETH Zurich EPFL, Summer Research Institute June 2017 Team Members Verification Team Information Security David Basin Tobias Klenze Ralf Sasse Christoph Sprenger Thilo
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationskb2 Shaon Barman, Sarah Chasins, Ras Bodik UC Berkeley Sumit Gulwani Microsoft Research
skb2 Web Scripting for End Users Shaon Barman, Sarah Chasins, Ras Bodik UC Berkeley Sumit Gulwani Microsoft Research 1 Slide 1 skb2 I think the title should be changed since the project has expanded past
More informationBasic Idea. Routing. Example. Routing by the Network
Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationCyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte
Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable
More informationCombining Induction, Deduction and Structure for Synthesis
Combining Induction, Deduction and Structure for Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Students: S. Jha, B. Brady, J. Kotker, W.Li Collaborators: R. Bryant, S. Gulwani,
More informationLOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley
LOUP: The Principles and Practice of Intra-Domain Route Dissemination Nikola Gvozdiev, Brad Karp, Mark Handley The Rising Tide of Reachability Expectations Internet users expect any-to-any reachability:
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga
More informationLecture 7: Data Center Networks
Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE
More informationLecture 9: Reachability
Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set
More informationRouting by the Network
Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationSCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich
SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich March 2019 Internet: The network of networks The Internet is a network of Autonomous Systems (ASes). Each AS is itself a
More informationEnforcing Customizable Consistency Properties in Software-Defined Networks. Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey
Enforcing Customizable Consistency Properties in Software-Defined Networks Wenxuan Zhou, Dong Jin, Jason Croft, Matthew Caesar, Brighten Godfrey 1 Network changes control applications, changes in traffic
More informationCengiz Alaettinoglu. SDN Traffic Engineering A Natural Evolution
Cengiz Alaettinoglu SDN Traffic Engineering A Natural Evolution What is Traffic Engineering (TE)? Minimizes the worst link utilization Alleviates traffic congestion Better/longer use of capital expenditure
More informationEfficient Internet Routing with Independent Providers
Efficient Internet Routing with Independent Providers David Wetherall University of Washington Credits Ratul Mahajan, Microsoft Research Tom Anderson, University of Washington Neil Spring, University of
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing
More informationDeploying Voice Workloads for Skype for Business Online and Server 2015
Deploying Voice Workloads for Skype for Business Online and Server 2015 40409; 5 Days, Instructor-led Course Description This five-day instructor-led course teaches how to design, plan, and deploy the
More informationSDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged
SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks
More informationLecture 18: Border Gateway Protocol
Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,
More informationA Brief History of Synthesis From Church to ExCAPE. Rajeev Alur. University of Pennsylvania
A Brief History of Synthesis From Church to ExCAPE Rajeev Alur University of Pennsylvania 1 Software Design Libraries Program Specifications Tests Compiler Analysis Tool Executable Platform 2 Programming
More informationCCNA Security ( ) and CCNP ( , , )
4/20/2016 CCNA Security (640-554) and CCNP (300-101, 300-115, 300-135) CCNA Security (640-554) and CCNP (300-101, 300-115, 300-135) MSIT120 / 160 Hours / 12 Months / Self-Paced / Materials Included Course
More informationTime and Place. Course Web Site. Grading Policy. Advanced Computer Networks. Lecture 1: Introduction to Course
Time and Place Advanced Computer Networks Lecture 1: Introduction to Course Lecture: TuTh 10:30-12:00, Fr 9:30-10:30 Discussion: after paper discussion on Tue and/or Thu Room:1690 BBB Instructor: Sugih
More informationSyntax-Guided Program Synthesis. Rajeev Alur. University of Pennsylvania
Syntax-Guided Program Synthesis Rajeev Alur University of Pennsylvania 1 Goal: Programming computers easier than communicating with people Can programming be liberated, period. David Harel, IEEE Computer,
More informationSyntax-Guided Program Synthesis. Rajeev Alur
Syntax-Guided Program Synthesis Rajeev Alur University of Pennsylvania 1 Goal: Programming computers easier than communicating with people Can programming be liberated, period. David Harel, IEEE Computer,
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationDeploying Voice Workloads for Skype for Business Online and Server
Course Code: M40409 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Deploying Voice Workloads for Skype for Business Online and Server Overview This five-day instructor-led course teaches how to
More informationLecture 17: Border Gateway Protocol
Lecture 17: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 18 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How
More informationStable Internet Route Selection
Stable Internet Route Selection Brighten Godfrey Matthew Caesar Ian Haken Scott Shenker Ion Stoica UC Berkeley pbg@cs.berkeley.edu NANOG 40 June 6, 2007 BGP instability: trouble control plane data plane
More informationSWAN: Software-driven wide area network. Ratul Mahajan
SWAN: Software-driven wide area network Ratul Mahajan Partners in crime Vijay Gill Chi-Yao Hong Srikanth Kandula Ratul Mahajan Mohan Nanduri Ming Zhang Roger Wattenhofer Rohan Gandhi Xin Jin Harry Liu
More informationFormally Verifiable Networking
ABSTRACT Formally Verifiable Networking Anduo Wang Limin Jia Changbin Liu Boon Thau Loo Oleg Sokolsky Prithwish Basu University of Pennsylvania BBN Technologies {anduo,liminjia,changbl,boonloo,sokolsky}@seas.upenn.edu,
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationCentralization of Network using Openflow Protocol
Indian Journal of Science and Technology, Vol 8(S2), 165 170, January 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS2/61217 Centralization of Network using Openflow
More informationInterdomain Routing Reading: Sections P&D 4.3.{3,4}
Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/
More informationDebugging the Data Plane with Anteater
Debugging the Data Plane with Anteater Haohui Mai, Ahmed Khurshid Rachit Agarwal, Matthew Caesar P. Brighten Godfrey, Samuel T. King University of Illinois at Urbana-Champaign Network debugging is challenging
More informationBGP#: A System for Dynamic Route Control In Data Centers
BGP#: A System for Dynamic Route Control In Data Centers Chao-Chih Chen UC Davis* Lihua Yuan Albert Greenberg Randy Kern Tao Zhang Parantap Lahiri John Arnold Kevin Grady Microsoft *Also a Microsoft Intern
More informationFormalizing Metarouting in PVS
Formalizing Metarouting in PVS ABSTRACT Anduo Wang Department of Computer and Information Science University of Pennsylvania Philadelphia, USA anduo@seas.upenn.edu In this paper, we extend PVS specification
More informationRouting on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP
Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol
More informationScalable Multipath Routing (towards)
Scalable Multipath Routing (towards) 71st Meeting of the IFIP WG 10.4 Working Group on Dependability and Security Ian Welch, School of Engineering and Computer Science; Victoria University of Wellington
More informationControl Improvisation
Control Improvisation Sanjit A. Seshia Professor EECS, UC Berkeley Joint work with: Daniel Fremont, Tommaso Dreossi, Rafael Valle, Sophie Libkind, Alexandre Donze, David Wessel December 11, 2017 Diversity
More informationOn the State of the Inter-domain and Intra-domain Routing Security
On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing
More information"Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary
Description Course Summary This five-day instructor-led course teaches how to design, plan, and deploy the various voice solutions available with Skype for Business Online and Skype for Business Server
More informationLecture 13: Traffic Engineering
Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting
More informationIP & DCN Planning for Microwave Networks
IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation
More informationAutomated Bug Removal for Software-Defined Networks
Automated Bug Removal for Software-Defined Networks Yang Wu* Ang Chen* Andreas Haeberlen* Wenchao Zhou + Boon Thau Loo* * University of Pennsylvania + Georgetown University 1 Motivation: Automated repair
More informationSequential Logic Synthesis
Sequential Logic Synthesis Logic Circuits Design Seminars WS2010/2011, Lecture 9 Ing. Petr Fišer, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical University in Prague
More informationSoftware Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University
Software Defined Networking Security: Security for SDN and Security with SDN Seungwon Shin Texas A&M University Contents SDN Basic Operation SDN Security Issues SDN Operation L2 Forwarding application
More informationBoon Thau Loo University of Pennsylvania
Applying PL and Database Techniques to Networking Boon Thau Loo University of Pennsylvania http://netdb.cis.upenn.edu DIMACS Workshop on Designing Networks for Manageability (Nov 12-13) Outline Declarative
More informationCQNCR: Optimal VM Migration Planning in Cloud Data Centers
CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,
More informationlecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00
lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,
More information"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary
Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly
More informationInterdomain routing CSCI 466: Networks Keith Vertanen Fall 2011
Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing
More informationA Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft
A Network-State Management Service Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft Complex Infrastructure 1 Complex Infrastructure Microsoft Azure Number
More informationOutline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure
Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure
More informationCloud Service SLA Declaration
Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability
More informationDynamics of Hot-Potato Routing in IP Networks
Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)
More informationA configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)
A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers
More informationUCS Engineering Details for the SAN Administrator
UCS Engineering Details for the SAN Administrator Craig Ashapa 2 First things first: debunking a myth Today (June 2012 UCS 2.02m) there is no FCoE northbound of UCS unless you really really really want
More informationSome Foundational Problems in Interdomain Routing
Some Foundational Problems in Interdomain Routing Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford AT&T Labs -- Research The state of interdomain
More informationThe Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
More informationMechanically-Verified Validation of Satisfiability Solvers
Mechanically-Verified Validation of Satisfiability Solvers Nathan Wetzler The University of Texas at Austin Dissertation Proposal October 18, 2013 Outline Motivation and Proposal Satisfiability and Proofs
More informationTHE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS. James Walker, Vice President Managed Network Services WAN Summit 7th October 2015
THE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS James Walker, Vice President Managed Network Services WAN Summit 7th October 2015 tatacommunications.com @tata_comm tatacommunications-newworld.com youtube.com/user/tatacomms
More informationAbstractions for Routing. Abstractions for Network Routing
Abstractions for Routing Abstractions for Network Routing Brighten Godfrey DIMACS 23 May 2012 Abstractions for Network Routing Impressions of Network Routing Neo-Dadaisms for Network Routing Absurdisms
More informationAdvanced Topics in Routing
Advanced Topics in Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC
More informationContents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth
EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center
More informationLecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage
Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection
More informationHands-On ROUTE Implementing Cisco IP Routing CCNP Course 1
Hands-On CCNP Course 1 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks of global network professionals. Course 1 ROUTE
More information