TY - GEN
T1 - To automate or not to automate
T2 - IEEE International Conference on Communications, ICC 2008
AU - Lee, Sihyung
AU - Wong, Tina
AU - Kim, Hyong S.
PY - 2008
Y1 - 2008
N2 - Configuring a network is a low-level, device-specific task. Many have compared it to writing a distributed program in assembly language, reserved only for highly experienced network operators. Automation has been proposed by researchers and industry as the solution to problems in network configuration. However, there is a certain amount of resistance from the operator community against automation. On the one hand, operators do desire a way for network-wide configuration. On the other hand, they still like to have access and control to details, to ensure flexibility and for debugging. In this paper, we attempt to answer the question "How should we automate network configuration" by studying where the complexity lies in network configuration. With an operational perspective, using data from three different types of production networks, we analyze the configuration files from these networks over the span of up to two years. Our analysis shows that the majority of changes to these files are a few lines each and made frequently. We found that routing, especially its policies, constitute a significant portion of the configuration files, as well as modifications to them. We then present complexity models to measure network-wide risk, impact and duplication of routing policies in network configuration. We show that risk and impact tend to grow over time, and the duplication factor is high. Based on the results of our analysis, we propose ways to automate the complex parts of network configuration.
AB - Configuring a network is a low-level, device-specific task. Many have compared it to writing a distributed program in assembly language, reserved only for highly experienced network operators. Automation has been proposed by researchers and industry as the solution to problems in network configuration. However, there is a certain amount of resistance from the operator community against automation. On the one hand, operators do desire a way for network-wide configuration. On the other hand, they still like to have access and control to details, to ensure flexibility and for debugging. In this paper, we attempt to answer the question "How should we automate network configuration" by studying where the complexity lies in network configuration. With an operational perspective, using data from three different types of production networks, we analyze the configuration files from these networks over the span of up to two years. Our analysis shows that the majority of changes to these files are a few lines each and made frequently. We found that routing, especially its policies, constitute a significant portion of the configuration files, as well as modifications to them. We then present complexity models to measure network-wide risk, impact and duplication of routing policies in network configuration. We show that risk and impact tend to grow over time, and the duplication factor is high. Based on the results of our analysis, we propose ways to automate the complex parts of network configuration.
UR - http://www.scopus.com/inward/record.url?scp=51249094781&partnerID=8YFLogxK
U2 - 10.1109/ICC.2008.1072
DO - 10.1109/ICC.2008.1072
M3 - Conference contribution
AN - SCOPUS:51249094781
SN - 9781424420742
T3 - IEEE International Conference on Communications
SP - 5726
EP - 5731
BT - ICC 2008 - IEEE International Conference on Communications, Proceedings
Y2 - 19 May 2008 through 23 May 2008
ER -