{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:45:42Z","timestamp":1757587542454,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672199.3673891","type":"proceedings-article","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T06:50:26Z","timestamp":1721717426000},"page":"20-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight and Fast Network Verification Platform for Cloud Data Center Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2300-1547","authenticated-orcid":false,"given":"Lin","family":"Shen","sequence":"first","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6612-9307","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9672-7938","authenticated-orcid":false,"given":"Lizhao","family":"You","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7297-2944","authenticated-orcid":false,"given":"Haihua","family":"Li","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7855-5147","authenticated-orcid":false,"given":"Wei","family":"Song","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1817-9376","authenticated-orcid":false,"given":"Ziyang","family":"Yao","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4809-9190","authenticated-orcid":false,"given":"Zhou","family":"Yuan","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8269-8709","authenticated-orcid":false,"given":"Feng","family":"Dong","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3745-411X","authenticated-orcid":false,"given":"Ronghua","family":"Sun","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Batfish. ([n. d.]). https:\/\/github.com\/batfish\/batfish"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. FRRouting Project. https:\/\/frrouting.org\/. ([n. d.])."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Network Simulator. https:\/\/www.nsnam.org\/. ([n. d.])."},{"key":"e_1_3_2_1_4_1","volume-title":"Tiramisu: Fast Multilayer Network Verification. In NSDI'20","author":"Abhashkumar Anubhavnidhi","year":"2020","unstructured":"Anubhavnidhi Abhashkumar, Aaron Gember-Jacobson, and Aditya Akella. 2020. Tiramisu: Fast Multilayer Network Verification. In NSDI'20. USENIX, 201--219."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_6_1","volume-title":"Control Plane Compression. In SIGCOMM'18","author":"Beckett Ryan","year":"2018","unstructured":"Ryan Beckett, Aarti Gupta, Ratul Mahajan, and David Walker. 2018. Control Plane Compression. In SIGCOMM'18. ACM, 476--489."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_4"},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI'16","author":"Fayaz Seyed K","year":"2016","unstructured":"Seyed K Fayaz, Tushar Sharma, Ari Fogel, Ratul Mahajan, Todd Millstein, Vyas Sekar, and George Varghese. 2016. Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. In OSDI'16. USENIX, 217--232."},{"key":"e_1_3_2_1_9_1","volume-title":"NSDI'15","author":"Fogel Ari","year":"2015","unstructured":"Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd Millstein. 2015. A General Approach to Network Configuration Analysis. In NSDI'15. USENIX, 469--483."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17)","author":"Horn Alex","year":"2017","unstructured":"Alex Horn, Ali Kheradmand, and Mukul Prasad. 2017. Delta-net: Real-time network verification using atoms. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17). 735--749."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13)","author":"Kazemian Peyman","year":"2013","unstructured":"Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real time network policy checking using header space analysis. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13). 99--111."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"e_1_3_2_1_15_1","volume-title":"Fast Bgp Simulation of Large Datacenters. In VMCAI'19","author":"Lopes Nuno P","year":"2019","unstructured":"Nuno P Lopes and Andrey Rybalchenko. 2019. Fast Bgp Simulation of Large Datacenters. In VMCAI'19. Springer, 386--408."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837657"},{"key":"e_1_3_2_1_17_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Prabhu Santhosh","year":"2020","unstructured":"Santhosh Prabhu, Kuan Yen Chou, Ali Kheradmand, Brighten Godfrey, and Matthew Caesar. 2020. Plankton: Scalable network configuration verification through model checking. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 953--967."},{"volume-title":"Modeling the Routing of an Autonomous System with C-BGP","author":"Quoitin Bruno","key":"e_1_3_2_1_18_1","unstructured":"Bruno Quoitin and Steve Uhlig. 2005. Modeling the Routing of an Autonomous System with C-BGP. IEEE network 19, 6, 12--19."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604843"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3114448"},{"key":"e_1_3_2_1_23_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Zeng Hongyi","year":"2014","unstructured":"Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat. 2014. Libra: Divide and conquer to verify forwarding tables in huge networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 87--99."},{"key":"e_1_3_2_1_24_1","volume-title":"Differential Network Analysis. In NSDI'22","author":"Zhang Peng","year":"2022","unstructured":"Peng Zhang, Aaron Gember-Jacobson, Yueshang Zuo, Yuhao Huang, Xu Liu, and Hao Li. 2022. Differential Network Analysis. In NSDI'22. USENIX, 601--615."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20)","author":"Zhang Peng","year":"2020","unstructured":"Peng Zhang, Xu Liu, Hongkun Yang, Ning Kang, Zhengchang Gu, and Hao Li. 2020. APKeep: Realtime Verification for Real Networks. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20). 241--255."}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24"},"container-title":["Proceedings of the SIGCOMM Workshop on Formal Methods Aided Network Operation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672199.3673891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672199.3673891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T13:21:49Z","timestamp":1756214509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672199.3673891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":25,"alternative-id":["10.1145\/3672199.3673891","10.1145\/3672199"],"URL":"https:\/\/doi.org\/10.1145\/3672199.3673891","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}