TY - GEN
T1 - The evolution of network configuration
T2 - 2011 ACM SIGCOMM Internet Measurement Conference, IMC'11
AU - Kim, Hyojoon
AU - Benson, Theophilus
AU - Akella, Aditya
AU - Feamster, Nick
PY - 2011
Y1 - 2011
N2 - Studying network configuration evolution can improve our understanding of the evolving complexity of networks and can be helpful in making network configuration less error-prone. Unfortunately, the nature of changes that operators make to network configuration is poorly understood. Towards improving our understanding, we examine and analyze five years of router, switch, and firewall configurations from two large campus networks using the logs from version control systems used to store the configurations. We study how network configuration is distributed across different network operations tasks and how the configuration for each task evolves over time, for different types of devices and for different locations in the network. To understand the trends of how configuration evolves over time, we study the extent to which configuration for various tasks are added, modified, or deleted. We also study whether certain devices experience configuration changes more frequently than others, as well as whether configuration changes tend to focus on specific portions of the configuration (or on specific tasks). We also investigate when network operators make configuration changes of various types. Our results concerning configuration changes can help the designers of configuration languages understand which aspects of configuration might be more automated or tested more rigorously and may ultimately help improve configuration languages.
AB - Studying network configuration evolution can improve our understanding of the evolving complexity of networks and can be helpful in making network configuration less error-prone. Unfortunately, the nature of changes that operators make to network configuration is poorly understood. Towards improving our understanding, we examine and analyze five years of router, switch, and firewall configurations from two large campus networks using the logs from version control systems used to store the configurations. We study how network configuration is distributed across different network operations tasks and how the configuration for each task evolves over time, for different types of devices and for different locations in the network. To understand the trends of how configuration evolves over time, we study the extent to which configuration for various tasks are added, modified, or deleted. We also study whether certain devices experience configuration changes more frequently than others, as well as whether configuration changes tend to focus on specific portions of the configuration (or on specific tasks). We also investigate when network operators make configuration changes of various types. Our results concerning configuration changes can help the designers of configuration languages understand which aspects of configuration might be more automated or tested more rigorously and may ultimately help improve configuration languages.
KW - longitudinal analysis
KW - network configuration
KW - network evolution
UR - http://www.scopus.com/inward/record.url?scp=82955165174&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=82955165174&partnerID=8YFLogxK
U2 - 10.1145/2068816.2068863
DO - 10.1145/2068816.2068863
M3 - Conference contribution
AN - SCOPUS:82955165174
SN - 9781450310130
T3 - Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
SP - 499
EP - 514
BT - IMC'11 - Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference
Y2 - 2 November 2011 through 4 November 2011
ER -