Filters








3,394 Hits in 3.6 sec

Debugging Network Reachability with Blocked Paths [chapter]

S. Bayless, J. Backes, D. DaCosta, B. F. Jones, N. Launchbury, P. Trentin, K. Jewell, S. Joshi, M. Q. Zeng, N. Mathews
2021 Lecture Notes in Computer Science  
AbstractIn this industrial case study we describe a new network troubleshooting analysis used by VPC Reachability Analyzer, an SMT-based network reachability analysis and debugging tool.  ...  This allows users to refine their query so that the blocked path is aligned with their intended network behavior before making any changes to their VPC configuration.  ...  If the destination is reachable, then Tiros identifies a feasible path from the source to the destination, where a path is a sequence of network components associated with incoming and/or outgoing packet  ... 
doi:10.1007/978-3-030-81688-9_39 fatcat:tdmalumt3vgqtc4kgji5iivvwy

An Experiment in Software Error Data Collection and Analysis

N.F. Schneidewind, H.-M. Hoffmann
1979 IEEE Transactions on Software Engineering  
Several complexity measures which can be defined in terms of the directed graph representation of a program, such as cyclomatic number, were analyzed with respect to the following error characteristics  ...  of paths was associated with structures with errors.  ...  His current research involves software engineering and computer networks. Dr.  ... 
doi:10.1109/tse.1979.234188 fatcat:2pbjnlnrrvhpvdhjteegl4r5wm

Modeling Programs with Unstructured Control Flow for Debugging [chapter]

Wolfgang Mayer, Markus Stumptner
2002 Lecture Notes in Computer Science  
The basic blocks in each method are then transformed into a constraint network.  ...  ., turning off alternate execution paths to the one actually taken).  ...  Each basic block of the CFG is transformed into a constraint representation improved over that of [15] by transforming each basic block separately (instead of building one large constraint network).  ... 
doi:10.1007/3-540-36187-1_10 fatcat:76rjufbr75fzdmichsj5t2dvfm

An Internet Heartbeat [article]

Robert Beverly, Mark Allman
2019 arXiv   pre-print
We explore the design space of an Internet heartbeat, potential use cases, incentives, and paths to deployment.  ...  Even networks under our own control too often remain poorly understood and hard to diagnose.  ...  USE CASES To shed light on potential inferences possible with an IHB, we explore three use-cases: outage detection, residential broadband debugging, and forwarding path changes.  ... 
arXiv:1901.10441v1 fatcat:b3omencebfffjjl7nvzf2plhri

Testing the reachability of (new) address space

Randy Bush, James Hiebert, Olaf Maennel, Matthew Roughan, Steve Uhlig
2007 Proceedings of the 2007 SIGCOMM workshop on Internet network management - INM '07  
Our methodology is capable of detecting paths on which reachability is actually present but which are routed around an outdated filter configuration, as well as cases where a destination is inaccessible  ...  Therefore, it would be desirable to test whether filters block newly apportioned address space before it is allocated to ISPs and/or end users.  ...  This can be due to firewalls which block pings to large fractions of the network. If a ping is administratively prohibited by a network, we excluded this address space from any further study.  ... 
doi:10.1145/1321753.1321756 fatcat:yk67appbove7togt3f4gg7whxa

Inferring and debugging path MTU discovery failures

Matthew Luckie, Kenjiro Cho, Bill Owens
2005 Proceedings of the 5th ACM SIGCOMM conference on Internet measurement - IMC '05  
The iterative process of determining the largest packet size supported by a path by learning the next-hop MTU of each MTU-constraining link on the path is known as Path MTU Discovery (PMTUD).  ...  Finally, we provide data on the failures that occurred on a large jumbo-capable network and find that although disabling ICMP messages is a problem, many other failure modes were found.  ...  which blocked inbound ICMP to the web-servers.  ... 
doi:10.1145/1330107.1330129 fatcat:plmtjczcwjendodefovw2lnuay

Quantifying and Verifying Reachability for Access Controlled Networks

Alex Liu, Amir Khakpour
2013 IEEE/ACM Transactions on Networking  
Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown.  ...  We implemented the algorithms in our network reachability tool called Quarnet and conducted experiments on a university network.  ...  Unfortunately, in reality, network reachability management is often a mess for many networks due to its high complexity and the lack of advanced reachability debugging tools.  ... 
doi:10.1109/tnet.2012.2203144 fatcat:thcx5qolw5fihbtss3qvxx5nki

Debugging the data plane with anteater

Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, Samuel Talmadge King
2011 Computer communication review  
Applied to a large university network, Anteater revealed 23 bugs, including forwarding loops and stale ACL rules, with only five false positives.  ...  Nine of these faults are being fixed by campus network operators.  ...  We also thank our network operator Debbie Fligor for collecting data and sharing her operational experience.  ... 
doi:10.1145/2043164.2018470 fatcat:jdczilz6pnfxvktyxb6nii3quy

Debugging the data plane with anteater

Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, Samuel Talmadge King
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
Applied to a large university network, Anteater revealed 23 bugs, including forwarding loops and stale ACL rules, with only five false positives.  ...  Nine of these faults are being fixed by campus network operators.  ...  We also thank our network operator Debbie Fligor for collecting data and sharing her operational experience.  ... 
doi:10.1145/2018436.2018470 dblp:conf/sigcomm/MaiKACGK11 fatcat:kn72qnvdqfef5bzq6hpcpvnw6m

Service Provider DevOps

Wolfgang John, Guido Marchetto, Felician Nemeth, Pontus Skoldstrom, Rebecca Steinert, Catalin Meirosu, Ioanna Papafili, Kostas Pentikousis
2017 IEEE Communications Magazine  
operations and management in the network virtualization era.  ...  Although there is consensus that software defined networking and network functions virtualization overhaul service provisioning and deployment, the community still lacks a definite answer on how carrier-grade  ...  This is done by iterating verification of a reachability property between the clients and the firewalls on the paths.  ... 
doi:10.1109/mcom.2017.1500803cm fatcat:dz43oqry2barvnwotma5xlndoy

Internet optometry

Randy Bush, Olaf Maennel, Matthew Roughan, Steve Uhlig
2009 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09  
For example, we discover the extent of default routing and its impact on reachability.  ...  We will show in this paper, that some of the limitations can be carefully addressed when designing an experiment, e.g. not seeing the reverse path taken by a probe can be partly compensated for by our  ...  Acknowledgments We are grateful to all network operators around the world for their feedback and ARIN for loaning previously unallocated prefixes to us.  ... 
doi:10.1145/1644893.1644923 dblp:conf/imc/BushMRU09 fatcat:qpcno5ffrnbj7ouem5xsvsmtjq

Identifying IPv6 network problems in the dual-stack world

Kenjiro Cho, Matthew Luckie, Bradley Huffaker
2004 Proceedings of the ACM SIGCOMM workshop on Network troubleshooting research, theory and operations practice meet malfunctioning reality - NetT '04  
Finally, we run traceroute with Path MTU discovery to the selected systems and then visualize the results for comparative path analysis.  ...  Our test results indicate that the majority of IPv6 paths have delay characteristics comparable to those of IPv4, although a small number of paths exhibit a much larger delay with IPv6.  ...  The tunnel discovery is also useful for troubleshooting since problems in tunnels are often caused by the underlying IPv4 networks and hard to debug with IPv6 tools alone.  ... 
doi:10.1145/1016687.1016697 fatcat:zwj7pwxzfvgl3ol5t2dkn7iws4

Quantifying and Querying Network Reachability

Amir R. Khakpour, Alex X. Liu
2010 2010 IEEE 30th International Conference on Distributed Computing Systems  
Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown.  ...  In this paper, we propose a suite of algorithms for quantifying reachability based on network configurations (mainly ACLs) as well as solutions for querying network reachability.  ...  Unfortunately, in reality, network reachability management is often a mess for most networks due to its high complexity and the lack of advanced reachability debugging tools.  ... 
doi:10.1109/icdcs.2010.15 dblp:conf/icdcs/KhakpourL10 fatcat:6dc54d4rkvewbi63gsout4pctq

Practical Issues in Sequential Equivalence Checking through Alignability: Handling Don't Cares and Generating Debug Traces

In-ho Moon, Per Bjesse, Carl Pixley
2006 High Level Design Validation and Test Workshop (HLDVT), IEEE International  
We also show how our debug trace heuristic has allowed us to find a real optimization tool bug.  ...  Our experimental results show that our theory extensions are necessary to be able to deal with a large portion of the industrial designs that we have applied our alignability checking tool to.  ...  Second, when alignability checking fails, designers have little information with which to debug the failure as there are no known reset state from which to generate a debug trace.  ... 
doi:10.1109/hldvt.2006.319985 dblp:conf/hldvt/MoonBP06 fatcat:dp2naczdabae7gqmd34cdcborq

Automatic test packet generation

Hongyi Zeng, Peyman Kazemian, George Varghese, Nick McKeown
2012 Proceedings of the 8th international conference on Emerging networking experiments and technologies - CoNEXT '12  
Networks are getting larger and more complex; yet administrators rely on rudimentary tools such as ping and traceroute to debug problems.  ...  We propose an automated and systematic approach for testing and debugging networks called "Automatic Test Packet Generation" (ATPG).  ...  -Chinese idiom It is notoriously hard to debug networks.  ... 
doi:10.1145/2413176.2413205 dblp:conf/conext/ZengKVM12 fatcat:s2kxjax7xbdhvo5v77tgvaorwu
« Previous Showing results 1 — 15 out of 3,394 results