Toward Systematic Detection and Resolution of Network Control Conflicts
Xie, Geoffrey G.
MetadataShow full item record
The problem of detecting and resolving control con icts has started to receive attention from the networking commu- nity. Corybantic  is an example of recent work in this area. We argue that it is too coarse grain in that it does not model the combined operational objectives of multiple controller functions. This paper proposes a ner grain ap- proach where a network control function is represented as a deterministic nite-state transducer. The machine runs on inputs provided by an SDN controller and outputs instruc- tions that update the network as needed to meet objectives. Standard proof techniques and algorithms can be leveraged to analyze properties of these machines. Speci cally, their intersection describes precisely the stable operating region of a network when the machines operate in parallel. The stable region comprises conditions under which no control function is in the process of updating the network.
The article of record as published may be located at http://dx.doi.org/10.1145/2620728.2620745
Showing items related by title, author, creator and subject.
Fu Chen-Hua (Monterey, California: Naval Postgraduate School, 1993-03);Efficient performance and high throughput are the major goals of the network performance management. How can we achieve these goal? First, it is necessary to know the network traffic situations. This thesis research ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Warnke, Scott D. (Monterey, California: Naval Postgraduate School, 2016-06);Identifying communities in a dark network is a potentially difficult task. The nature of dark networks, and their characteristic of con-cealing connections within the network, makes community detection an enterprise based ...