skip to main content
article

The cutting EDGE of IP router configuration

Published:01 January 2004Publication History
Skip Abstract Section

Abstract

Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and error-prone, is the dominant mode of operation, especially for large enterprise networks. These networks often lack the basic building blocks---an accurate equipment inventory, a debugged initial configuration, and a specification of local configuration policies---to support the holy grail of automation. We argue the migrating an existing network to automated configuration is a rich and challenging research problem rooted in data analysis and in the modeling of network protocols and operational practices. We propose a novel, bottom-up approach that proceeds in three phases: (i)analysis of configuration data to summarize the existing network state and uncover configuration problems; (ii) data mining to identify the network's local configuration policies and violations of these policies; and ultimately (iii)boot-strapping of a database to drive future configuration changes. The first stage reduces the number of errors, the second normalizes the local policies, and the third prevents new errors and reduces the manpower needed to configure the network. We describe the architecture of our EDGE tool for steps (i) and (ii), and present some examples from our experiences applying the tool to several large enterprise networks.

References

  1. C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra, "Routing Policy Specification Language (RPSL)," RFC 2622, IETF, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Network Configuration Working Group. http://www.ietf.org/html.charters/netconf-charter.html.Google ScholarGoogle Scholar
  3. Z. Kerravala, "Configuration management delivers business resiliency." The Yankee Group, November 2002.Google ScholarGoogle Scholar
  4. D. Oppenheimer, A. Ganapathi, and D. A. Patterson, "Why do Internet services fail, and what van be done about it?" In Proc. USENIX Symposium on Internet Technologies and Systems, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gold Wire Tech. http://www.goldwiretech.com/.Google ScholarGoogle Scholar
  7. WANDL IP Analysis Tools. http://www.wandl.com/html/ipat/IPAT_new.cfm.Google ScholarGoogle Scholar
  8. OPNET NetDoctor. http://www.opnet.com/products/modules/netdoctor.html.Google ScholarGoogle Scholar
  9. Orchestream Service Activator. http:/www.metasolv. com/MSLV/CDA/General/ProdSrvs_FocusDetail/1,2543,17%, 00.asp.Google ScholarGoogle Scholar
  10. Cariden MATE Framework. http://www.cariden.com/products/.Google ScholarGoogle Scholar
  11. OpNet SP Guru, http://www.opnet.com/products/spguru/home.htm.Google ScholarGoogle Scholar
  12. Arbor Networks Peakflow. http://www.arbornetworks.com/products_sp.php.Google ScholarGoogle Scholar
  13. J. Gottlieb, A. Greenberg, J. Rexford, and J. Wang, "Automated provisioning of BGP customers," IEEE Network Magazine, vol. 17, November/December 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Feldmann and J. Rexford, "IP network configuration for intradomain traffic engineering," IEEE Network Magazine, pp. 46--57, September/October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. R. Gansner and S. C. North, "An open graph visualization system and its applications to software engineering," Software-Practice and Experience, vol. 00, no. S1, pp. 1--5, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. Baker, "Requirements for IP Version 4 Routers," RFC 1812, IETF, June 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Kamada and S. Kawai, "An algorithm for drawing general undirected graphs," Information Processing Letters, vol. 31, pp. 7--15. April 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The cutting EDGE of IP router configuration
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 34, Issue 1
      January 2004
      140 pages
      ISSN:0146-4833
      DOI:10.1145/972374
      Issue’s Table of Contents

      Copyright © 2004 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 2004

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader