[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2535372.2535376acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Minimizing network complexity through integrated top-down design

Published: 09 December 2013 Publication History

Abstract

The network design process today remains ad-hoc and largely complexity agnostic, often resulting in suboptimal networks characterized by excessive amounts of dependencies and commands in device configurations. The unnecessarily high configuration complexity can lead to a huge increase in both the amount of manual intervention required for managing the network and the likelihood of configuration errors, and thus must be avoided. In this paper we present an integrated top-down design approach and show how it can minimize the unnecessary configuration complexity in realizing user reachability control, a key network design objective that involves designing three distinct network elements: VLAN, IP address, and packet filter. Capitalizing on newly-developed abstractions, our approach integrates the design of the three elements into a unified framework by systematically modeling how the design of one element may impact the complexity of other elements. Our approach goes substantially beyond the current "divide-and-conquer" approach that designs each element in complete isolation, and enables minimizing the combined complexity of all elements. Specifically, two new optimization problems are formulated, and novel algorithms and heuristics are developed to solve the formulated problems. Evaluation on a large campus network shows that our approach can effectively reduce the packet filter complexity and VLAN trunking complexity by more than 85% and 70%, respectively, when compared to the ad-hoc approach currently used by the operators.

References

[1]
Cisco IP solution center. http://www.cisco.com/en/US/products/sw/netmgtsw/ps4748/index.html.
[2]
Intelliden. http://www.intelliden.com/.
[3]
Opsware. http://www.opsware.com/.
[4]
Voyence. http://www.voyence.com/.
[5]
Maximum Weighted Matching. http://jorisvr.nl/maximummatching.html, 2008.
[6]
M. Behringer and G. Huston. A framework for defining network complexity. Internet Draft (work in progress), http://tools.ietf.org/html/draft-irtf-ncrg-complexity-framework-00, 2013.
[7]
T. Benson, A. Akella, and D. Maltz. Unraveling the complexity of network management. In Proc. USENIX NSDI, 2009.
[8]
T. Benson, A. Akella, and D. A. Maltz. Mining policies from enterprise network configuration. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, 2009.
[9]
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and Jacobus van der Merwe. Design and implementation of a Routing Control Platform. In Proc. USENIX NSDI, 2005.
[10]
B.-G. Chun, S. Ratnasamy, and E. Kohler. NetComplex: A Complexity Metric for Networked System Designs. In Proc. Usenix NSDI, 2008.
[11]
Cisco. Catalyst 2950 desktop switch software configuration guide.
[12]
Distributed Management Task Force, Inc. http://www.dmtf.org.
[13]
W. Enck, P. McDaniel, S. Sen, P. Sebos, S. Spoerel, A. Greenberg, S. Rao, and W. Aiello. Configuration management at massive scale: System design and experience. In Proc. USENIX, 2007.
[14]
N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In Proc. USENIX NSDI, 2005.
[15]
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker. Frenetic: a network programming language. In Proceedings of ACM SIGPLAN international conference on Functional programming.
[16]
J. Gottlieb, A. Greenberg, J. Rexford, and J. Wang. Automated provisioning of BGP customers. In IEEE Network Magazine, Dec. 2003.
[17]
T. G. Griffin and J. L. Sobrinho. Metarouting. In Proc. ACM SIGCOMM, 2005.
[18]
Juniper Networks. What is behind network downtime? http://www-935.ibm.com/services/tw/gts/pdf/200249.pdf, 2008.
[19]
N. Kang, Z. Liu, J. Rexford, and D. Walker. Optimizing the one big switch abstraction in software-defined networks. In Proc. ACM CoNEXT, 2013.
[20]
Z. Kerravala. As the value of enterprise networks escalates, so does the need for configuration management. The Yankee Group Report, 2004.
[21]
A. R. Khakpour and A. X. Liu. Quantifying and querying network reachability. In Proc. IEEE ICDCS, 2010.
[22]
F. Le, G. G. Xie, D. Pei, J. Wang, and H. Zhang. Shedding light on the glue logic of the Internet routing architecture. In Proc. ACM SIGCOMM, 2008.
[23]
A. Liu, E. Torng, and C. Meiners. Firewall compressor: An algorithm for minimizing firewall policies. In Proc. IEEE INFOCOM, 2008.
[24]
C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing software-defined networks. In Proc. USENIX NSDI, 2013.
[25]
S. Narain. Network configuration management via model finding. In Proc. LISA Conference, 2005.
[26]
Nicira. Networking in the era of virtualization, 2012.
[27]
P. Oppenheimer. Top-Down Network Design (3rd Edition). Cisco Press, 2010.
[28]
J. Pescatore. Taxonomy of software vulnerabilities. The Gartner Group Report, 2003.
[29]
R. Rastogi, Y. Breitbart, M. Garofalakis, and A. Kumar. Optimal configuration of OSPF aggregates. IEEE/ACM Transaction on Networking, 2003.
[30]
M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, and D. Walker. Abstractions for network update. In Proceedings of the ACM SIGCOMM, 2012.
[31]
X. Sun, S. Rao, and G. Xie. Modeling complexity of enterprise routing design. In Proc. ACM CoNEXT, 2012.
[32]
X. Sun, Y.-W. E. Sung, S. Krothapalli, and S. Rao. A Systematic Approach for Evolving VLAN Design. In Proc. IEEE INFOCOM, 2010.
[33]
E. Sung, X. Sun, S. Rao, G. G. Xie, and D. Maltz. Towards systematic design of enterprise networks. IEEE/ACM Trans. Networking, 19(3):695--708, June 2011.
[34]
V. Tabatabaee, B. Bhattacharjee, R. La, and M. A. Shayman. Differentiated traffic engineering for QoS provisioning. In IEEE INFOCOM 2005, 2005.
[35]
G. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford. On static reachability analysis of IP networks. In Proc. IEEE INFOCOM, 2005.

Cited By

View all
  • (2023)Design and Analysis of Fiber to the Building for Smart Building in Student Center Universitas Indonesia2023 14th International Conference on Information & Communication Technology and System (ICTS)10.1109/ICTS58770.2023.10330847(271-276)Online publication date: 4-Oct-2023
  • (2022)Software-defined network assimilationProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544244(281-297)Online publication date: 22-Aug-2022
  • (2020)Extending Campus Network Via Intranet and IP-Telephony For Better Performance and Service Delivery: Meeting Organizational GoalsJournal of Applied Science, Engineering, Technology, and Education10.35877/454RI.asci121001:2(94-104)Online publication date: 13-Jun-2020
  • Show More Cited By

Index Terms

  1. Minimizing network complexity through integrated top-down design

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '13: Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
    December 2013
    454 pages
    ISBN:9781450321013
    DOI:10.1145/2535372
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 December 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ip address allocation
    2. network complexity
    3. reachability control
    4. top-down design
    5. vlan

    Qualifiers

    • Research-article

    Conference

    CoNEXT '13
    Sponsor:
    CoNEXT '13: Conference on emerging Networking Experiments and Technologies
    December 9 - 12, 2013
    California, Santa Barbara, USA

    Acceptance Rates

    CoNEXT '13 Paper Acceptance Rate 44 of 226 submissions, 19%;
    Overall Acceptance Rate 198 of 789 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Design and Analysis of Fiber to the Building for Smart Building in Student Center Universitas Indonesia2023 14th International Conference on Information & Communication Technology and System (ICTS)10.1109/ICTS58770.2023.10330847(271-276)Online publication date: 4-Oct-2023
    • (2022)Software-defined network assimilationProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544244(281-297)Online publication date: 22-Aug-2022
    • (2020)Extending Campus Network Via Intranet and IP-Telephony For Better Performance and Service Delivery: Meeting Organizational GoalsJournal of Applied Science, Engineering, Technology, and Education10.35877/454RI.asci121001:2(94-104)Online publication date: 13-Jun-2020
    • (2017)An Efficient Framework for Data-Plane Verification With Geometric Windowing QueriesIEEE Transactions on Network and Service Management10.1109/TNSM.2017.272372514:4(1113-1127)Online publication date: 1-Dec-2017
    • (2017)Shedding light on the complexity of enterprise routing design: A case study2017 3rd IEEE International Conference on Computer and Communications (ICCC)10.1109/CompComm.2017.8322543(214-218)Online publication date: Dec-2017
    • (2016)RobotronProceedings of the 2016 ACM SIGCOMM Conference10.1145/2934872.2934874(426-439)Online publication date: 22-Aug-2016
    • (2016)An efficient framework for data-plane verification with geometric windowing queries2016 IEEE 24th International Conference on Network Protocols (ICNP)10.1109/ICNP.2016.7784412(1-10)Online publication date: Nov-2016
    • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016
    • (2014)Towards a novel and optimal packet identifier design for SDNProceedings of the third workshop on Hot topics in software defined networking10.1145/2620728.2620775(223-224)Online publication date: 22-Aug-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media