{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T22:47:24Z","timestamp":1768690044987,"version":"3.49.0"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1637516"],"award-info":[{"award-number":["CCF-1637516"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2018,4,3]]},"abstract":"<jats:p>Operators of modern networks require support for diverse and complex end-to-end policies, such as, middlebox traversals, isolation, and traffic engineering. While Software-defined Networking (SDN) provides centralized custom routing functionality in networks to realize these policies, many networks still deploy \"legacy\" control planes running distributed routing protocols like OSPF and BGP because these protocols are scalable and robust to failures. However, realization of policies by distributed control plane configurations is manual and error-prone. We present Zeppelin, a system for automatically generating policy-compliant control planes that also behave well under majority of small network failures. Zeppelin differs from existing approaches in that it uses policy-compliant paths to guide the synthesis process instead of directly generating policy-compliant configurations. We show that Zeppelin synthesizes highly resilient and policy-compliant configurations for real topologies with up to 80 routers.<\/jats:p>","DOI":"10.1145\/3179425","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T12:11:45Z","timestamp":1522843905000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Synthesis of Fault-Tolerant Distributed Router Configurations"],"prefix":"10.1145","volume":"2","author":[{"given":"Kausik","family":"Subramanian","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Loris","family":"D'Antoni","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673884"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062367"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1559000"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018471"},{"key":"e_1_2_1_8_1","first-page":"19","article-title":"Compatible weights and valid cycles in non-spanning OSPF routing patterns","volume":"4","author":"Brostr\u00f6m Peter","year":"2009","unstructured":"Peter Brostr\u00f6m and Kaj Holmberg . 2009 . Compatible weights and valid cycles in non-spanning OSPF routing patterns . Algorithmic Operations Research Vol. 4 , 1 (2009), 19 -- 35 . Peter Brostr\u00f6m and Kaj Holmberg. 2009. Compatible weights and valid cycles in non-spanning OSPF routing patterns. Algorithmic Operations Research Vol. 4, 1 (2009), 19--35.","journal-title":"Algorithmic Operations Research"},{"key":"e_1_2_1_9_1","volume-title":"Design and Implementation of a Routing Control Platform Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation -","author":"Caesar Matthew","unstructured":"Matthew Caesar , Donald Caldwell , Nick Feamster , Jennifer Rexford , Aman Shaikh , and Jacobus van der Merwe . 2005. Design and Implementation of a Routing Control Platform Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association , Berkeley, CA, USA, 15--28. deftempurl%http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251205 tempurl Matthew Caesar, Donald Caldwell, Nick Feamster, Jennifer Rexford, Aman Shaikh, and Jacobus van der Merwe. 2005. Design and Implementation of a Routing Control Platform Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, Berkeley, CA, USA, 15--28. deftempurl%http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251205 tempurl"},{"key":"e_1_2_1_10_1","volume-title":"Feasibility and Infeasibility in Optimization:: Algorithms and Computational Methods","author":"Chinneck John W","unstructured":"John W Chinneck . 2007. Feasibility and Infeasibility in Optimization:: Algorithms and Computational Methods . Vol. Vol. 118 . Springer Science & Business Media . John W Chinneck. 2007. Feasibility and Infeasibility in Optimization:: Algorithms and Computational Methods. Vol. Vol. 118. Springer Science & Business Media."},{"key":"e_1_2_1_11_1","unstructured":"Cisco. 2013. What Is Administrative Distance. http:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/15986-admin-distance.html. (2013).  Cisco. 2013. What Is Administrative Distance. http:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/15986-admin-distance.html. (2013)."},{"key":"e_1_2_1_12_1","volume-title":"Network-wide Configuration Synthesis. In 29th International Conference on Computer Aided Verification","author":"El-Hassany Ahmed","year":"2017","unstructured":"Ahmed El-Hassany , Petar Tsankov , Laurent Vanbever , and Martin Vechev . 2017 . Network-wide Configuration Synthesis. In 29th International Conference on Computer Aided Verification , Heidelberg, Germany , 2017 (CAV'17). Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev. 2017. Network-wide Configuration Synthesis. In 29th International Conference on Computer Aided Verification, Heidelberg, Germany, 2017 (CAV'17)."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings. IEEE","volume":"2","author":"Fortz Bernard","year":"2000","unstructured":"Bernard Fortz and Mikkel Thorup . 2000 . Internet traffic engineering by optimizing OSPF weights INFOCOM 2000. Nineteenth annual joint conference of the IEEE computer and communications societies . Proceedings. IEEE , Vol. Vol. 2 . IEEE, 519--528. Bernard Fortz and Mikkel Thorup. 2000. Internet traffic engineering by optimizing OSPF weights INFOCOM 2000. Nineteenth annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE, Vol. Vol. 2. IEEE, 519--528."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815684"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_2_1_17_1","unstructured":"Gurobi. 2017. Gurobi Optimization. http:\/\/www.gurobi.com\/. (2017).  Gurobi. 2017. Gurobi Optimization. http:\/\/www.gurobi.com\/. (2017)."},{"key":"e_1_2_1_18_1","volume-title":"Simplifying software-defined network optimization using SOL 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 223--237","author":"Heorhiadi Victor","unstructured":"Victor Heorhiadi , Michael K Reiter , and Vyas Sekar . 2016. Simplifying software-defined network optimization using SOL 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 223--237 . Victor Heorhiadi, Michael K Reiter, and Vyas Sekar. 2016. Simplifying software-defined network optimization using SOL 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 223--237."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633027"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015472"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3179425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3179425","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3179425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:18Z","timestamp":1750208898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3179425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,4,3]]}},"alternative-id":["10.1145\/3179425"],"URL":"https:\/\/doi.org\/10.1145\/3179425","relation":{},"ISSN":["2476-1249"],"issn-type":[{"value":"2476-1249","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,3]]},"assertion":[{"value":"2018-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}