{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:39:20Z","timestamp":1770291560402,"version":"3.49.0"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2020,10,26]]},"abstract":"<jats:p>\n            Controlling an opaque system by reading some \"dials\" and setting some \"knobs,\" without really knowing what they do, is a hazardous and fruitless endeavor, particularly at scale. What we need are transparent networks, that start at the top with a high-level intent and map all the way down, through the control plane to the data plane. If we can specify the behavior we want in software, then we can check that the system behaves as we expect. This is impossible if the implementation is opaque. We therefore need to use open-source software or write it ourselves (or both), and have mechanisms for checking actual behavior against the specified intent. With fine-grain checking (e.g., every packet, every state variable), we can build networks that are more reliable, secure, and performant. In the limit, we can build networks that run autonomously under verifiable, closed-loop control. We believe this vision, while ambitious, is finally within our reach, due to\n            <jats:italic>deep programmability<\/jats:italic>\n            across the stack, both vertically (control and data plane) and horizontally (end to end). It will emerge naturally in some networks, as network owners take control of their software and engage in open-source efforts; whereas in enterprise networks it may take longer. In 5G access networks, there is a pressing need for our community to engage, so these networks, too, can operate autonomously under verifiable, closed-loop control.\n          <\/jats:p>","DOI":"10.1145\/3431832.3431842","type":"journal-article","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T16:21:53Z","timestamp":1603729313000},"page":"82-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Using deep programmability to put network owners in control"],"prefix":"10.1145","volume":"50","author":[{"given":"Nate","family":"Foster","sequence":"first","affiliation":[{"name":"Cornell University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nick","family":"McKeown","sequence":"additional","affiliation":[{"name":"Stanford University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guru","family":"Parulkar","sequence":"additional","affiliation":[{"name":"Stanford University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Larry","family":"Peterson","sequence":"additional","affiliation":[{"name":"Princeton University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oguz","family":"Sunay","sequence":"additional","affiliation":[{"name":"Open Networking Foundation"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"April","year":"2020","unstructured":"Aether : Managed 5G-Enabled Edge Cloud for Enterprises , April 2020 . https:\/\/www.opennetworking.org\/aether\/. Aether: Managed 5G-Enabled Edge Cloud for Enterprises, April 2020. https:\/\/www.opennetworking.org\/aether\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371934.3371963"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the IEEE, 95(1)","author":"Chiang M.","year":"2007","unstructured":"M. Chiang , S. Low , R. Calderbank , and J. Doyle . Layering as optimization decomposition: A mathematical theory of network protocols . Proceedings of the IEEE, 95(1) , January 2007 . M. Chiang, S. Low, R. Calderbank, and J. Doyle. Layering as optimization decomposition: A mathematical theory of network protocols. Proceedings of the IEEE, 95(1), January 2007."},{"key":"e_1_2_1_6_1","volume-title":"October","author":"Chih-Lin I.","year":"2018","unstructured":"I. Chih-Lin and S. Katti . O-RAN: Towards an Open and Smart RAN , October 2018 . https:\/\/www.o-ran.org\/s\/O-RAN-WP-FInal-181017.pdf. I. Chih-Lin and S. Katti. O-RAN: Towards an Open and Smart RAN, October 2018. https:\/\/www.o-ran.org\/s\/O-RAN-WP-FInal-181017.pdf."},{"key":"e_1_2_1_7_1","volume-title":"Open Networking Summit","author":"Czichy T.","year":"2019","unstructured":"T. Czichy . 5G RAN optimization using the O-RAN software community's RIC (RAN Intelligent Controller) . In Open Networking Summit , Europe , September 2019 . Slides available at https:\/\/wiki.o-ran-sc.org\/pages\/viewpage.action?pageId=10715420&preview=\/10715420\/10715422\/Near_RT_RIC_for_ONS.pdf. T. Czichy. 5G RAN optimization using the O-RAN software community's RIC (RAN Intelligent Controller). In Open Networking Summit, Europe, September 2019. Slides available at https:\/\/wiki.o-ran-sc.org\/pages\/viewpage.action?pageId=10715420&preview=\/10715420\/10715422\/Near_RT_RIC_for_ONS.pdf."},{"key":"e_1_2_1_8_1","volume-title":"USENIX Networked Systems Design and Implementation","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fund , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In USENIX Networked Systems Design and Implementation , May 2015 . A. Fogel, S. Fund, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In USENIX Networked Systems Design and Implementation, May 2015."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262813"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364676"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"e_1_2_1_13_1","volume-title":"USENIX Networked Systems Design and Implementation","author":"Hsu K.-F.","year":"2020","unstructured":"K.-F. Hsu , R. Beckett , A. Chen , J. Rexford , P. Tammana , and D. Walker . Contra: A programmable system for performance-aware routing . In USENIX Networked Systems Design and Implementation , February 2020 . K.-F. Hsu, R. Beckett, A. Chen, J. Rexford, P. Tammana, and D. Walker. Contra: A programmable system for performance-aware routing. In USENIX Networked Systems Design and Implementation, February 2020."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S. Jain A. Kumar S. Mandal J. Ong L. Poutievski A. Singh S. Venkata J. Wanderer J. Zhou M. Zhu J. Zolla U. H\u00f6lzle S. Stuart and A. Vahdat. B4: Experience with a globally-deployed software defined WAN. In ACM SIGCOMM page 3--14.  S. Jain A. Kumar S. Mandal J. Ong L. Poutievski A. Singh S. Venkata J. Wanderer J. Zhou M. Zhu J. Zolla U. H\u00f6lzle S. Stuart and A. Vahdat. B4: Experience with a globally-deployed software defined WAN. In ACM SIGCOMM page 3--14.","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080122"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3630"},{"key":"e_1_2_1_18_1","volume-title":"USENIX Networked Systems Design and Implementation","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In USENIX Networked Systems Design and Implementation , San Jose, CA , May 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In USENIX Networked Systems Design and Implementation, San Jose, CA, May 2012."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75252"},{"key":"e_1_2_1_20_1","volume-title":"USENIX Conference on Networked Systems Design and Implementation","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . VeriFlow: Verifying network-wide invariants in real time . In USENIX Conference on Networked Systems Design and Implementation , Apr. 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. VeriFlow: Verifying network-wide invariants in real time. In USENIX Conference on Networked Systems Design and Implementation, Apr. 2013."},{"key":"e_1_2_1_21_1","volume-title":"June","author":"Kim C.","year":"2016","unstructured":"C. Kim , P. Bhide , E. Doe , H. Holbrook , A. Ghanwani , D. Daly , M. Hira , and B. Davie . In-band Network Telemetry (INT) , June 2016 . https:\/\/p4.org\/assets\/INT-current-spec.pdf. C. Kim, P. Bhide, E. Doe, H. Holbrook, A. Ghanwani, D. Daly, M. Hira, and B. Davie. In-band Network Telemetry (INT), June 2016. https:\/\/p4.org\/assets\/INT-current-spec.pdf."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380843"},{"key":"e_1_2_1_23_1","first-page":"351","volume-title":"USENIX Conference on Operating Systems Design and Implementation","author":"Koponen T.","year":"2010","unstructured":"T. Koponen , M. Casado , N. Gude , J. Stribling , L. Poutievski , M. Zhu , R. Ramanathan , Y. Iwata , H. Inoue , T. Hama , and S. Shenker . Onix: A distributed control platform for large-scale production networks . In USENIX Conference on Operating Systems Design and Implementation , page 351 -- 364 , 2010 . T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker. Onix: A distributed control platform for large-scale production networks. In USENIX Conference on Operating Systems Design and Implementation, page 351--364, 2010."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775011"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314216"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_2_1_27_1","volume-title":"ACM SIGCOMM Workshop on Self-Driving Networks.","author":"Mogul J.","unstructured":"J. Mogul . Unsafe at any speed: Self-driving networks without self-crashing networks . In ACM SIGCOMM Workshop on Self-Driving Networks. J. Mogul. Unsafe at any speed: Self-driving networks without self-crashing networks. In ACM SIGCOMM Workshop on Self-Driving Networks."},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79733-0","volume-title":"Software-Defined Networks: A Systems Approach","author":"Peterson L.","year":"2020","unstructured":"L. Peterson , C. Cascone , B. O'Connor , and T. Vachuska . Software-Defined Networks: A Systems Approach . 2020 . https:\/\/sdn.systemsapproach.org. L. Peterson, C. Cascone, B. O'Connor, and T. Vachuska. Software-Defined Networks: A Systems Approach. 2020. https:\/\/sdn.systemsapproach.org."},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79733-0","volume-title":"5G Mobile Networks: A Systems Approach","author":"Peterson L.","year":"2020","unstructured":"L. Peterson and O. Sunay . 5G Mobile Networks: A Systems Approach . 2020 . https:\/\/5g.systemsapproach.org. L. Peterson and O. Sunay. 5G Mobile Networks: A Systems Approach. 2020. https:\/\/5g.systemsapproach.org."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152461"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899484"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3431832.3431842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3431832.3431842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:31Z","timestamp":1750195891000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3431832.3431842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10,26]]}},"alternative-id":["10.1145\/3431832.3431842"],"URL":"https:\/\/doi.org\/10.1145\/3431832.3431842","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}