Polynomial-Time What-If Analysis for Prefix-Manipulating MPLS Networks

Stefan Schmid, Jiri Srba

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

16 Citations (Scopus)
139 Downloads (Pure)

Abstract

While automated network verification is emerging as a critical enabler to manage large complex networks, current approaches come with a high computational complexity. This paper initiates the study of communication networks whose configurations can be verified fast, namely in polynomial time. In particular, we show that in communication networks based on prefix rewriting, which include MPLS networks, important network properties such as reachability, loop-freedom, and transparency, can be verified efficiently, even in the presence of failures. This enables a fast what-if analysis, addressing a major concern of network administrators: while configuring and testing network policies for a fully functional network is challenging, ensuring policy compliance in the face of (possibly multiple) failures, is almost impossible for human administrators. At the heart of our approach lies an interesting connection to the theory of prefix rewriting systems, a subfield of language and automata theory.
Original languageEnglish
Title of host publicationIEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Number of pages9
PublisherIEEE
Publication date2018
Pages1799-1807
ISBN (Print)978-1-5386-4129-3
ISBN (Electronic)978-1-5386-4128-6
DOIs
Publication statusPublished - 2018
Event2018 IEEE Conference on Computer Communications Workshops, INFOCOM 2018 - Honolulu, United States
Duration: 15 Apr 201819 Apr 2018

Conference

Conference2018 IEEE Conference on Computer Communications Workshops, INFOCOM 2018
Country/TerritoryUnited States
CityHonolulu
Period15/04/201819/04/2018
SeriesI E E E Infocom. Proceedings
ISSN0743-166X

Keywords

  • MPLS networks
  • formal verification
  • pushdown automata

Fingerprint

Dive into the research topics of 'Polynomial-Time What-If Analysis for Prefix-Manipulating MPLS Networks'. Together they form a unique fingerprint.

Cite this