Leet et al., 2018 - Google Patents
Toward the first SDN programming capacity theorem on realizing high-level programs on low-level datapathsLeet et al., 2018
View PDF- Document ID
- 6813167142921970771
- Author
- Leet C
- Wang X
- Yang Y
- Aspnes J
- Publication year
- Publication venue
- IEEE INFOCOM 2018-IEEE Conference on Computer Communications
External Links
Snippet
High-Ievel programming and programmable data paths are two key capabilities of software- defined networking (SDN). A fundamental problem linking these two capabilities is whether a given high-level SDN program can be realized onto a given low-level SDN datapath …
- 238000010192 crystallographic characterization 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/76—Architectures of general purpose stored programme computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Trois et al. | A survey on SDN programming languages: Toward a taxonomy | |
El-Hassany et al. | {NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion | |
Beckett et al. | Control plane compression | |
Beckett et al. | Don't mind the gap: Bridging network-wide objectives and device-level configurations | |
Mai et al. | Debugging the data plane with anteater | |
Son et al. | Model checking invariant security properties in OpenFlow | |
Majumdar et al. | Kuai: A model checker for software-defined networks | |
US10649747B2 (en) | Compilation and runtime methods for executing algorithmic packet processing programs on multi-table packet forwarding elements | |
Sethi et al. | Abstractions for model checking SDN controllers | |
Ryzhyk et al. | Correct by construction networks using stepwise refinement | |
Abbes et al. | Detection of firewall configuration errors with updatable tree | |
Smolka et al. | Scalable verification of probabilistic networks | |
Zhang et al. | Automated verification of customizable middlebox properties with gravel | |
Bonelli et al. | A purely functional approach to packet processing | |
Horn et al. | A precise and expressive lattice-theoretical framework for efficient network verification | |
Leet et al. | Toward the first SDN programming capacity theorem on realizing high-level programs on low-level datapaths | |
Parizotto et al. | PRIME: Programming in-network modular extensions | |
Kumar et al. | DBVal: Validating P4 data plane runtime behavior | |
Alpernas et al. | Abstract interpretation of stateful networks | |
Beckett | Network control plane synthesis and verification | |
Oqaily et al. | NFVGuard: Verifying the security of multilevel network functions virtualization (NFV) stack | |
Zhou et al. | Automatically Correcting Networks with {NEAt} | |
Wang et al. | SDN Programming Capacity Theorem on Realizing High-Level Programs on Low-Level Datapaths | |
Weitz et al. | Bagpipe: Verified BGP configuration checking | |
Klimis | Abstractions and optimisations for model-checking software-defined networks |