{"id":504215,"date":"2018-08-02T11:07:02","date_gmt":"2018-08-02T18:07:02","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=504215"},"modified":"2018-11-06T08:33:54","modified_gmt":"2018-11-06T16:33:54","slug":"high-fidelity-network-validation-for-cloud-scale-networks","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/high-fidelity-network-validation-for-cloud-scale-networks\/","title":{"rendered":"Tech Showcase: High-Fidelity Network Validation for Cloud Scale Networks"},"content":{"rendered":"

We propose a platform to validate networks with high-fidelity emulations. On a computing cluster such as Azure, we run the full stack (including real operating system, software, and chip emulators) of each network device in a virtualized sandbox (a virtual machine or a container). We interconnect the sandboxes of the network devices with virtual network links in the same way as in production and load real configurations onto them. The network operator can directly log into emulated devices and carry out tests, or we can extract the routing information and analyze it logically by using a logic solver such as Z3. The key advantage is high fidelity: it directly verifies the network status and behaviors with the same software and configurations as in production, so that it can produce much more trustworthy validation results to network developers. We have shown an early prototype to Azure network engineers, to enthusiastic response.<\/p>\n","protected":false},"excerpt":{"rendered":"

We propose a platform to validate networks with high-fidelity emulations. On a computing cluster such as Azure, we run the full stack (including real operating system, software, and chip emulators) of each network device in a virtualized sandbox (a virtual machine or a container). We interconnect the sandboxes of the network devices with virtual network […]<\/p>\n","protected":false},"featured_media":504227,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[13558,13547],"msr-video-type":[238872],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-504215","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-video-type-faculty-summit","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/tByho_E19_w","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/504215"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/504215\/revisions"}],"predecessor-version":[{"id":548067,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/504215\/revisions\/548067"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/504227"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=504215"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=504215"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=504215"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=504215"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=504215"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=504215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}