Fault Localization in Large-Scale Network Policy Deployment

AI-generated keywords: Fault Localization

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Recent advancements in network management automation and Software-Defined Networking (SDN) simplify network policy management tasks
  • Network policies are represented in an abstract model at a centralized controller and deployed as low-level rules across various network devices
  • Any software or hardware component within this cycle can cause underlying network issues
  • The paper titled "Fault Localization in Large-Scale Network Policy Deployment" addresses the problem of network policy fault localization
  • The authors propose a solution through risk modeling and a greedy algorithm to identify faulty policy objects within the network policy
  • They design and develop SCOUT, a fully automated system that identifies faulty policy objects and pinpoints physical-level failures that caused them
  • Evaluation of SCOUT involves real testbed experiments and extensive simulations, demonstrating its ability to detect faulty objects with minimal false positives and false negatives
  • This research highlights the importance of addressing fault localization in large-scale network policy deployment
  • The authors contribute to improving the reliability and performance of network management frameworks.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Praveen Tammana, Chandra Nagarajan, Pavan Mamillapalli, Ramana Rao Kompella, Myungjin Lee

10 pages, 10 figures, IEEE format, Conference, SDN, Network Policy

Abstract: The recent advances in network management automation and Software-Defined Networking (SDN) are easing network policy management tasks. At the same time, these new technologies create a new mode of failure in the management cycle itself. Network policies are presented in an abstract model at a centralized controller and deployed as low-level rules across network devices. Thus, any software and hardware element in that cycle can be a potential cause of underlying network problems. In this paper, we present and solve a network policy fault localization problem that arises in operating policy management frameworks for a production network. We formulate our problem via risk modeling and propose a greedy algorithm that quickly localizes faulty policy objects in the network policy. We then design and develop SCOUT---a fully-automated system that produces faulty policy objects and further pinpoints physical-level failures which made the objects faulty. Evaluation results using a real testbed and extensive simulations demonstrate that SCOUT detects faulty objects with small false positives and false negatives.

Submitted to arXiv on 21 Dec. 2017

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1712.08129v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

The recent advancements in network management automation and Software-Defined Networking (SDN) have greatly simplified network policy management tasks. However, these new technologies also introduce a new mode of failure within the management cycle itself. Network policies are represented in an abstract model at a centralized controller and then deployed as low-level rules across various network devices. As a result, any software or hardware component within this cycle has the potential to cause underlying network issues. In this paper titled "Fault Localization in Large-Scale Network Policy Deployment," authors Praveen Tammana, Chandra Nagarajan, Pavan Mamillapalli, Ramana Rao Kompella, and Myungjin Lee address the problem of network policy fault localization that arises in operating policy management frameworks for production networks. They propose a solution by formulating the problem through risk modeling and introducing a greedy algorithm that efficiently identifies faulty policy objects within the network policy. To further enhance their solution, the authors design and develop SCOUT, a fully-automated system that not only identifies faulty policy objects but also pinpoints physical-level failures that caused these objects to become faulty. The evaluation of SCOUT involves real testbed experiments and extensive simulations, which demonstrate its ability to detect faulty objects with minimal false positives and false negatives. Overall, this research highlights the importance of addressing fault localization in large-scale network policy deployment. By presenting an effective solution through risk modeling and algorithmic techniques, the authors contribute to improving the reliability and performance of network management frameworks.
Created on 14 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.