Decoupling policy from configuration in campus and enterprise networks

Nick Feamster, Ankur Nayak, Hyojoon Kim, Russell Clark, Yogesh Mundada, Anirudh Ramachandran, Mukarram Bin Tariq

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information Bow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's "control plane" from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.

Original languageEnglish (US)
Title of host publicationLANMAN 2010 - The 17th IEEE International Workshop on Local and Metropolitan Area Networks
DOIs
StatePublished - 2010
Event17th IEEE Workshop on Local and Metropolitan Area Networks, LANMAN 2010 - Long Branch, NJ, United States
Duration: May 5 2010May 7 2010

Publication series

NameLANMAN 2010 - The 17th IEEE International Workshop on Local and Metropolitan Area Networks

Other

Other17th IEEE Workshop on Local and Metropolitan Area Networks, LANMAN 2010
Country/TerritoryUnited States
CityLong Branch, NJ
Period5/5/105/7/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Decoupling policy from configuration in campus and enterprise networks'. Together they form a unique fingerprint.

Cite this