Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Complexity Evaluation of Network Configurations and Abstractions

View through CrossRef
Computer networks have been traditionally configured by humans using command-line interfaces. Some network abstractions have emerged in the last 10 years, but there is no easy way of comparing them to each other objectively. Therefore, there is no consensus in the industry of what direction should modern network abstractions take, and the adoption of these abstractions lags. In this paper I propose a comparison framework using metrics derived from graph structures to evaluate the simplicity, efficiency, and effectiveness of different network abstraction models. The result of this comparison is that while some of the existing network abstractions are quite efficient to store network policy (such as the Kubernetes or the Cisco Application Centric Infrastructure models), others (notably public cloud) are still very infrastructure-centric and suffer from excessive complexity.
Title: Complexity Evaluation of Network Configurations and Abstractions
Description:
Computer networks have been traditionally configured by humans using command-line interfaces.
Some network abstractions have emerged in the last 10 years, but there is no easy way of comparing them to each other objectively.
Therefore, there is no consensus in the industry of what direction should modern network abstractions take, and the adoption of these abstractions lags.
In this paper I propose a comparison framework using metrics derived from graph structures to evaluate the simplicity, efficiency, and effectiveness of different network abstraction models.
The result of this comparison is that while some of the existing network abstractions are quite efficient to store network policy (such as the Kubernetes or the Cisco Application Centric Infrastructure models), others (notably public cloud) are still very infrastructure-centric and suffer from excessive complexity.

Related Results

Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Abstract The rapid growth of open access publishing (OAP) has significantly improved the accessibility and dissemination of scientific knowledge. However, this expansion has also c...
Complexity Theory
Complexity Theory
The workshop Complexity Theory was organised by Joachim von zur Gathen (Bonn), Oded Goldreich (Rehovot), Claus-Peter Schnorr (Frankfurt), an...
Linguistic Complexity
Linguistic Complexity
Linguistic complexity (or: language complexity, complexity in language) is a multifaceted and multidimensional research area that has been booming since the early 2000s. The curren...
Network Automation
Network Automation
Purpose: The article "Network Automation in the Contemporary Economy" explores the concepts and methods of effective network management. The application stack, Jinja template engin...
Information Technology and the Complexity Cycle
Information Technology and the Complexity Cycle
Aim/Purpose: In this paper we propose a framework identifying many of the unintended consequences of information technology and posit that the increased complexity brought about by...
Assessment of Construction Project Complexity
Assessment of Construction Project Complexity
Objective:Project complexity is a crucial factor in project management that presents auxiliary obstacles to reaching project objectives (cost, time, safety, and quality). This stud...
On Measuring the Complexity of Networks: Kolmogorov Complexity versus Entropy
On Measuring the Complexity of Networks: Kolmogorov Complexity versus Entropy
One of the most popular methods of estimating the complexity of networks is to measure the entropy of network invariants, such as adjacency matrices or degree sequences. Unfortunat...
Programming model abstractions for optimizing I/O intensive applications
Programming model abstractions for optimizing I/O intensive applications
This thesis contributes from the perspective of task-based programming models to the efforts of optimizing I/O intensive applications. Throughout this thesis, we propose programmin...

Back to Top