Javascript must be enabled to continue!
The cutting EDGE of IP router configuration
View through CrossRef
Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and error-prone, is the dominant mode of operation, especially for large enterprise networks. These networks often lack the basic building blocks---an accurate equipment inventory, a debugged initial configuration, and a specification of local configuration policies---to support the holy grail of automation. We argue the
migrating an existing network
to automated configuration is a rich and challenging research problem rooted in data analysis and in the modeling of network protocols and operational practices. We propose a novel,
bottom-up
approach that proceeds in three phases: (i)analysis of configuration data to summarize the existing network state and uncover configuration problems; (ii) data mining to identify the network's local configuration policies and violations of these policies; and ultimately (iii)boot-strapping of a database to drive future configuration changes. The first stage reduces the number of errors, the second normalizes the local policies, and the third prevents new errors and reduces the manpower needed to configure the network. We describe the architecture of our EDGE tool for steps (i) and (ii), and present some examples from our experiences applying the tool to several large enterprise networks.
Association for Computing Machinery (ACM)
Title: The cutting EDGE of IP router configuration
Description:
Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks.
Manual configuration, while expensive and error-prone, is the dominant mode of operation, especially for large enterprise networks.
These networks often lack the basic building blocks---an accurate equipment inventory, a debugged initial configuration, and a specification of local configuration policies---to support the holy grail of automation.
We argue the
migrating an existing network
to automated configuration is a rich and challenging research problem rooted in data analysis and in the modeling of network protocols and operational practices.
We propose a novel,
bottom-up
approach that proceeds in three phases: (i)analysis of configuration data to summarize the existing network state and uncover configuration problems; (ii) data mining to identify the network's local configuration policies and violations of these policies; and ultimately (iii)boot-strapping of a database to drive future configuration changes.
The first stage reduces the number of errors, the second normalizes the local policies, and the third prevents new errors and reduces the manpower needed to configure the network.
We describe the architecture of our EDGE tool for steps (i) and (ii), and present some examples from our experiences applying the tool to several large enterprise networks.
Related Results
Jaringan Komputer 4 Konfigurasi Routing Dynamic Akhmad Syarifudin 175100012
Jaringan Komputer 4 Konfigurasi Routing Dynamic Akhmad Syarifudin 175100012
Dynamic Routing atau Routing Dynamic (dinamik) adalah sebuah router yang memiliki dan membuat tabel routing secara otomatis. Dengan menggunakan lalu lintas jaringan dan juga salin...
Jaringan Komputer 4 Konfigurasi Routing Dynamic (Akhmad Syarifudin 175100012)
Jaringan Komputer 4 Konfigurasi Routing Dynamic (Akhmad Syarifudin 175100012)
Dynamic Routing atau Routing Dynamic (dinamik) adalah sebuah router yang memiliki dan membuat tabel routing secara otomatis. Dengan menggunakan lalu lintas jaringan dan juga salin...
A Full-Duplex 5×5 Optical Router Based on a Hybrid Photonic-Plasmonic Switch
A Full-Duplex 5×5 Optical Router Based on a Hybrid Photonic-Plasmonic Switch
An optical router is an essential component of a photonic network-on-chip (PNoC). Normally, an optical router consists of traditional optical elements such as the micro-ring resona...
Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...
Cutting Characteristics of Direct Milling of Cemented Tungsten Carbides Using Diamond-Coated Carbide End Mills with Untreated and Treated Cutting Edge
Cutting Characteristics of Direct Milling of Cemented Tungsten Carbides Using Diamond-Coated Carbide End Mills with Untreated and Treated Cutting Edge
This study investigates the cutting characteristics of direct milling of cemented tungsten carbides performed using a diamond-coated carbide end mill. The diamond-coated carbide en...
AI-driven zero-touch orchestration of edge-cloud services
AI-driven zero-touch orchestration of edge-cloud services
(English) 6G networks demand orchestration systems capable of managing thousands of distributed microservices under sub-millisecond latency constraints. Traditional centralized app...
Optimizing edge cloud deployments for video analytics
Optimizing edge cloud deployments for video analytics
(English) As our digital world and physical realities blend together, we, as users, are growing to expect real-time interaction wherever and whenever we want. Newer internet servic...
ROUTERS EXTENSIBLES PARA INVESTIGACIÓN
ROUTERS EXTENSIBLES PARA INVESTIGACIÓN
ROUTERS EXTENSIBLES PARA INVESTIGACIÓN
EXTENSIBLE ROUTERS FOR INVESTIGATION
Max Ever Ponce Soldevilla
Universidad Nacional Mayor de San Marcos (UNMSM)
DOI: https://doi.org/10.3...

