{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:16Z","timestamp":1772163916146,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1282380.1282404","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T11:35:23Z","timestamp":1349955323000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["CONMan"],"prefix":"10.1145","author":[{"given":"Hitesh","family":"Ballani","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY"}]},{"given":"Paul","family":"Francis","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144201"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.993221"},{"key":"e_1_3_2_1_3_1","volume-title":"RFC 4026 - Provider Provisioned Virtual Private Network (VPN) Terminology","author":"Andersson L.","year":"2005","unstructured":"L. Andersson and T. Madsen , \" RFC 4026 - Provider Provisioned Virtual Private Network (VPN) Terminology ,\" March 2005 . L. Andersson and T. Madsen, \"RFC 4026 - Provider Provisioned Virtual Private Network (VPN) Terminology,\" March 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"Complexity Oblivious Network Management: A step towards network manageability,\" Cornell University","author":"Ballani H.","year":"2006","unstructured":"H. Ballani and P. Francis , \" Complexity Oblivious Network Management: A step towards network manageability,\" Cornell University , Ithaca, NY , US, Tech. Rep . cul.cis\/TR 2006 -2026, 2006. H. Ballani and P. Francis, \"Complexity Oblivious Network Management: A step towards network manageability,\" Cornell University, Ithaca, NY, US, Tech. Rep. cul.cis\/TR2006-2026, 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190318"},{"key":"e_1_3_2_1_6_1","volume-title":"of Symp. on Networked Systems Design and Implementation (NSDI)","author":"Caesar M.","year":"2005","unstructured":"M. Caesar , D. Caldwell , N. Feamster , J. Rexford , A. Shaikh , and J. van der Merwe , \"Design and Implementation of a Routing Control Platform ,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI) , 2005 . M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe, \"Design and Implementation of a Routing Control Platform ,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_3_2_1_7_1","unstructured":"Carsten Schmidt \"Interface Traffic Monitor Pro \" http:\/\/software.ccschmidt.de\/.  Carsten Schmidt \"Interface Traffic Monitor Pro \" http:\/\/software.ccschmidt.de\/."},{"key":"e_1_3_2_1_8_1","volume-title":"SANE: A Protection Architecture for Enterprise Networks,\" in Proc. of Usenix Security","author":"Casado M.","year":"2006","unstructured":"M. Casado , T. Garfinkel , A. Akella , M. Freedman , D. Boneh , N. McKeown , and S. Shenker , \" SANE: A Protection Architecture for Enterprise Networks,\" in Proc. of Usenix Security , 2006 . M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, \"SANE: A Protection Architecture for Enterprise Networks,\" in Proc. of Usenix Security, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863957"},{"key":"e_1_3_2_1_10_1","volume-title":"Finally, a Use for Componentized Transport Protocols,\" in Proc. of the Fourth Workshop on Hot Topics in Networking","author":"Condie T.","year":"2005","unstructured":"T. Condie , J. M. Hellerstein , P. Maniatis , S. Rhea , and T. Roscoe , \" Finally, a Use for Componentized Transport Protocols,\" in Proc. of the Fourth Workshop on Hot Topics in Networking , 2005 . T. Condie, J. M. Hellerstein, P. Maniatis, S. Rhea, and T. Roscoe, \"Finally, a Use for Componentized Transport Protocols,\" in Proc. of the Fourth Workshop on Hot Topics in Networking, 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI)","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan , \" Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI) , 2005 . N. Feamster and H. Balakrishnan, \"Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972391"},{"key":"e_1_3_2_1_13_1","volume-title":"Network management by delegation: the MAD approach,\" in Proc. of the conference of the Centre for Advanced Studies on Collaborative research (CASCON)","author":"Goldszmidt G.","year":"1991","unstructured":"G. Goldszmidt , Y. Yemini , and S. Yemini , \" Network management by delegation: the MAD approach,\" in Proc. of the conference of the Centre for Advanced Studies on Collaborative research (CASCON) , 1991 . G. Goldszmidt, Y. Yemini, and S. Yemini, \"Network management by delegation: the MAD approach,\" in Proc. of the conference of the Centre for Advanced Studies on Collaborative research (CASCON), 1991."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935181"},{"key":"e_1_3_2_1_16_1","unstructured":"J. Halpern and E. Ellesson \"The IETF Policy Framework Working Group \" Online Charter http:\/\/www.ietf.org\/html.charters\/OLD\/policy-charter.html.  J. Halpern and E. Ellesson \"The IETF Policy Framework Working Group \" Online Charter http:\/\/www.ietf.org\/html.charters\/OLD\/policy-charter.html."},{"key":"e_1_3_2_1_17_1","first-page":"52","article-title":"Policy-based Management: Beyond The Hype","author":"Jude M.","year":"2001","unstructured":"M. Jude , \" Policy-based Management: Beyond The Hype ,\" Business Communication Review , pp. 52 -- 56 , 2001 , http:\/\/www.bcr.com\/bcrmag\/2001\/03\/p52.php. M. Jude, \"Policy-based Management: Beyond The Hype,\" Business Communication Review, pp. 52--56, 2001, http:\/\/www.bcr.com\/bcrmag\/2001\/03\/p52.php.","journal-title":"Business Communication Review"},{"key":"e_1_3_2_1_18_1","volume-title":"January","author":"Kerravala Z.","year":"2004","unstructured":"Z. Kerravala , \"Enterprise Networking and Computing : the Need for Configuration Management,\" Yankee Group report , January 2004 . Z. Kerravala, \"Enterprise Networking and Computing: the Need for Configuration Management,\" Yankee Group report, January 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_20_1","volume-title":"Cross-layer Visibility as a Service,\" in Proc. of workshop on Hot Topics in Networks","author":"Kompella R. R.","year":"2005","unstructured":"R. R. Kompella , A. Greenberg , J. Rexford , A. C. Snoeren , and J. Yates , \" Cross-layer Visibility as a Service,\" in Proc. of workshop on Hot Topics in Networks , 2005 . R. R. Kompella, A. Greenberg, J. Rexford, A. C. Snoeren, and J. Yates, \"Cross-layer Visibility as a Service,\" in Proc. of workshop on Hot Topics in Networks, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"IP Fault Localization Via Risk Modeling ,\" in Proc. of 2nd Symp. on Networked Systems Design and Implementation (NSDI)","author":"Kompella R. R.","year":"2005","unstructured":"R. R. Kompella , J. Yates , A. Greenberg , and A. C. Snoeren , \" IP Fault Localization Via Risk Modeling ,\" in Proc. of 2nd Symp. on Networked Systems Design and Implementation (NSDI) , 2005 . R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren, \"IP Fault Localization Via Risk Modeling ,\" in Proc. of 2nd Symp. on Networked Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_3_2_1_22_1","volume-title":"Experimental Study of Internet Stability and Backbone Failures,\" in Proc. of Symposium on Fault-Tolerant Computing (FTCS)","author":"Labovitz C.","year":"1999","unstructured":"C. Labovitz , A. Ahuja , and F. Jahanian , \" Experimental Study of Internet Stability and Backbone Failures,\" in Proc. of Symposium on Fault-Tolerant Computing (FTCS) , 1999 . C. Labovitz, A. Ahuja, and F. Jahanian, \"Experimental Study of Internet Stability and Backbone Failures,\" in Proc. of Symposium on Fault-Tolerant Computing (FTCS), 1999."},{"key":"e_1_3_2_1_23_1","volume-title":"Developing Pattern-Based Management Programs,\" in Proc. of Conference on Management of Multimedia Networks and Services (MMNS)","author":"Lim K.-S.","year":"2001","unstructured":"K.-S. Lim and R. Stadler , \" Developing Pattern-Based Management Programs,\" in Proc. of Conference on Management of Multimedia Networks and Services (MMNS) , 2001 . K.-S. Lim and R. Stadler, \"Developing Pattern-Based Management Programs,\" in Proc. of Conference on Management of Multimedia Networks and Services (MMNS), 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095818"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_27_1","volume-title":"Characterization of Failures in an IP Backbone,\" in Proc. of IEEE INFOCOMM","author":"Markopoulou A.","year":"2004","unstructured":"A. Markopoulou , G. Iannaccone , S. Bhattacharyya , C. Chuah , and C. Diot , \" Characterization of Failures in an IP Backbone,\" in Proc. of IEEE INFOCOMM , 2004 . A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C. Chuah, and C. Diot, \"Characterization of Failures in an IP Backbone,\" in Proc. of IEEE INFOCOMM, 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"Why do Internet services fail, and what can be done about it,\" in Proc. of USENIX Symposium on Internet Technologies and Systems","author":"Oppenheimer D.","year":"2003","unstructured":"D. Oppenheimer , A. Ganapathi , and D. Patterson , \" Why do Internet services fail, and what can be done about it,\" in Proc. of USENIX Symposium on Internet Technologies and Systems , 2003 . D. Oppenheimer, A. Ganapathi, and D. Patterson, \"Why do Internet services fail, and what can be done about it,\" in Proc. of USENIX Symposium on Internet Technologies and Systems, 2003."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of workshop on Hot Topics in Networks","author":"P.","year":"2006","unstructured":"P. Bahl et. al., \"Discovering Dependencies for Network Management,\" in Proc. of workshop on Hot Topics in Networks , 2006 . P. Bahl et. al., \"Discovering Dependencies for Network Management,\" in Proc. of workshop on Hot Topics in Networks, 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.689628"},{"key":"e_1_3_2_1_31_1","unstructured":"Pierrick Simier \"SNMPLink \" www.snmplink.org\/Tools.html.  Pierrick Simier \"SNMPLink \" www.snmplink.org\/Tools.html."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.793689"},{"key":"e_1_3_2_1_33_1","volume-title":"RFC 4364 - BGP\/MPLS IP Virtual Private Networks (VPNs)","author":"Rosen E.","year":"2006","unstructured":"E. Rosen and Y. Rekhter , \" RFC 4364 - BGP\/MPLS IP Virtual Private Networks (VPNs) ,\" February 2006 . E. Rosen and Y. Rekhter, \"RFC 4364 - BGP\/MPLS IP Virtual Private Networks (VPNs),\" February 2006."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of International Symposium on Integrated Network Management","author":"Schonwalder J.","year":"2005","unstructured":"J. Schonwalder , \"Characterization of SNMP MIB Modules ,\" in Proc. of International Symposium on Integrated Network Management , 2005 . J. Schonwalder, \"Characterization of SNMP MIB Modules,\" in Proc. of International Symposium on Integrated Network Management, 2005."},{"key":"e_1_3_2_1_35_1","unstructured":"Tobias Oetiker and Dave Rand \"MRTG: Multi Router Traffic Grapher \" http:\/\/mrtg.hdl.com.   Tobias Oetiker and Dave Rand \"MRTG: Multi Router Traffic Grapher \" http:\/\/mrtg.hdl.com."},{"key":"e_1_3_2_1_36_1","volume-title":"Jan","author":"Uijterwaal H.","year":"2006","unstructured":"H. Uijterwaal and M. Zekauskas , \" IP Performance Metrics (ippm),\" Online Charter , Jan 2006 , http:\/\/www.ietf.org\/html.charters\/ippm-charter.html. H. Uijterwaal and M. Zekauskas, \"IP Performance Metrics (ippm),\" Online Charter, Jan 2006, http:\/\/www.ietf.org\/html.charters\/ippm-charter.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.993219"},{"key":"e_1_3_2_1_38_1","volume-title":"Testing and Verification","author":"von Bochmann G.","year":"1987","unstructured":"G. von Bochmann , \"Usage of Protocol Development Tools : The Results of a Survey,\" in Proc. of Conference on Protocol Specification , Testing and Verification , 1987 . G. von Bochmann, \"Usage of Protocol Development Tools: The Results of a Survey,\" in Proc. of Conference on Protocol Specification, Testing and Verification, 1987."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015472"},{"key":"e_1_3_2_1_40_1","unstructured":"E. R. Y. Rekhter R. Bonica \"Use of PE-PE GRE or IP in BGP\/MPLS IP Virtual Private Networks \" draft-ietf-l3vpn-gre-ip-2547-05 February 2006.  E. R. Y. Rekhter R. Bonica \"Use of PE-PE GRE or IP in BGP\/MPLS IP Virtual Private Networks \" draft-ietf-l3vpn-gre-ip-2547-05 February 2006."},{"key":"e_1_3_2_1_41_1","unstructured":"\"CISCO 802.1Q Tunneling \" http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/lan\/c3550\/1219ea1\/3550scg\/swtunnel.htm.  \"CISCO 802.1Q Tunneling \" http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/lan\/c3550\/1219ea1\/3550scg\/swtunnel.htm."},{"key":"e_1_3_2_1_42_1","unstructured":"\"CISCO Network Management Products \" http:\/\/www.cisco.com\/en\/US\/products\/sw\/netmgtsw\/index.html.  \"CISCO Network Management Products \" http:\/\/www.cisco.com\/en\/US\/products\/sw\/netmgtsw\/index.html."},{"key":"e_1_3_2_1_43_1","unstructured":"\"HP OpenView \" www.openview.hp.com\/.  \"HP OpenView \" www.openview.hp.com\/."},{"key":"e_1_3_2_1_44_1","unstructured":"\"IBM's Autonomic Computing \" http:\/\/www-03.ibm.com\/autonomic\/.  \"IBM's Autonomic Computing \" http:\/\/www-03.ibm.com\/autonomic\/."},{"key":"e_1_3_2_1_45_1","unstructured":"\"Microsoft Dynamic Systems Initiative \" http:\/\/www.microsoft.com\/windowsserversystem\/dsi\/default.mspx.  \"Microsoft Dynamic Systems Initiative \" http:\/\/www.microsoft.com\/windowsserversystem\/dsi\/default.mspx."},{"key":"e_1_3_2_1_46_1","unstructured":"\"UPnP Forum \" http:\/\/www.upnp.org\/.  \"UPnP Forum \" http:\/\/www.upnp.org\/."},{"key":"e_1_3_2_1_47_1","unstructured":"\"Wireshark: A Network Protocol Analyzer \" http:\/\/www.wireshark.org\/.  \"Wireshark: A Network Protocol Analyzer \" http:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_48_1","volume-title":"Policy-based Networking","author":"Research IBM","year":"2006","unstructured":"\" IBM Research : Policy-based Networking ,\" Dec 2006 , http:\/\/www.research.ibm.com\/policy\/. \"IBM Research: Policy-based Networking,\" Dec 2006, http:\/\/www.research.ibm.com\/policy\/."},{"key":"e_1_3_2_1_49_1","unstructured":"\"SNMP MIB Search Engine \" January 2006 www.mibdepot.com.  \"SNMP MIB Search Engine \" January 2006 www.mibdepot.com."},{"key":"e_1_3_2_1_50_1","unstructured":"\"Digital Living Network Alliance \" Jan 2007 http:\/\/www.dlna.org\/.  \"Digital Living Network Alliance \" Jan 2007 http:\/\/www.dlna.org\/."},{"key":"e_1_3_2_1_51_1","unstructured":"\"Zeroconf Working Group \" Jan 2007 http:\/\/www.zeroconf.org\/.  \"Zeroconf Working Group \" Jan 2007 http:\/\/www.zeroconf.org\/."}],"event":{"name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","location":"Kyoto Japan","acronym":"SIGCOMM07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1282380.1282404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:13:51Z","timestamp":1750245231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282404"}},"subtitle":["a step towards network manageability"],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":51,"alternative-id":["10.1145\/1282380.1282404","10.1145\/1282380"],"URL":"https:\/\/doi.org\/10.1145\/1282380.1282404","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1282427.1282404","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}