NetKAT: Semantic foundations for networks

Carolyn Jane Anderson, Nate Foster, Arjun Guha, Jean Baptiste Jeannin, Dexter Kozen, Cole Schlesinger, David Walker

Research output: Contribution to journalArticlepeer-review

161 Scopus citations

Abstract

Recent years have seen growing interest in high-level languages for programming networks. But the design of these languages has been largely ad hoc, driven more by the needs of applications and the capabilities of network hardware than by foundational principles. The lack of a semantic foundation has left language designers with little guidance in determining how to incorporate new features, and programmers without a means to reason precisely about their code. This paper presents NetKAT, a new network programming language that is based on a solid mathematical foundation and comes equipped with a sound and complete equational theory.We describe the design of NetKAT, including primitives for filtering, modifying, and transmitting packets; union and sequential composition operators; and a Kleene star operator that iterates programs. We show that NetKAT is an instance of a canonical and well-studied mathematical structure called a Kleene algebra with tests (KAT) and prove that its equational theory is sound and complete with respect to its denotational semantics. Finally, we present practical applications of the equational theory including syntactic techniques for checking reachability, proving non-interference properties that ensure isolation between programs, and establishing the correctness of compilation algorithms.

Original languageEnglish (US)
Pages (from-to)113-126
Number of pages14
JournalACM SIGPLAN Notices
Volume49
Issue number1
StatePublished - Jan 13 2014

All Science Journal Classification (ASJC) codes

  • General Computer Science

Keywords

  • Domain-specific languages
  • Frenetic
  • Kleene algebra with tests
  • NetKAT
  • Network programming languages
  • Software-defined networking

Fingerprint

Dive into the research topics of 'NetKAT: Semantic foundations for networks'. Together they form a unique fingerprint.

Cite this