Affiliation:
1. Department of Computer Science and Engineering, Motilal Nehru National Institute of Technology Allahabad Allahabad India
Abstract
SummaryIn today's era of fast‐growing network‐enabled devices combined, it increases the complexity of the network. This leads to the massive data packet transfer on the network via the data plane in a software‐defined networking environment. The programmable packet processing in a data plane may introduce indirect bugs that are hard to catch manually. To avoid catastrophic after‐effects, such programs need to be formally verified. Researchers have proposed various tools and techniques to verify the data plane program using the P4 language. Most of the researchers have used the concept of assertion and symbolic execution to provide P4 verification approaches. As symbolic execution does not scale up well, researchers have proposed different techniques, which include the use of constraints, slicing of the program, parallelization, data plane verification, program verification, and so on. The tools have experimented with different choices for compiler optimization. In this article, we perform a pervasive survey on various verification tools and techniques based on data plane programming using domain‐specific language like P4 from the inception of the concept. We have compared the packet processing tools developed as per the requirement of time with their ideology and the impact of change.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications
Reference75 articles.
1. Software defined networking (sdn) ‐ architecture and role of openflow. Accessed January 27 2023.https://www.howtoforge.com/tutorial/software-defined-networking-sdn-architecture-and-role-of-openflow/
2. Understanding the sdn architecture. Accessed January 19 2023.https://www.sdxcentral.com/networking/sdn/definitions/inside-sdn-architecture/
3. P4
4. Data Plane Programmability Beyond OpenFlow: Opportunities and Challenges for Network and Service Operations and Management
5. Etsi technologies for NFV. Accessed February 1 2023.https://www.etsi.org/technologies/nfv
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain for Securing Custom/User-Defined Protocols in P4 Programmable Switches;2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON);2023-10-12