A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges
Networks have grown increasingly complicated. Violations of intended policies can compromise network availability and network reliability. Network operators need to ensure that their policies are correctly implemented. This has inspired a research field, network verification and testing, that enable...
Saved in:
Published in | IEEE Communications surveys and tutorials Vol. 21; no. 1; pp. 940 - 969 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Networks have grown increasingly complicated. Violations of intended policies can compromise network availability and network reliability. Network operators need to ensure that their policies are correctly implemented. This has inspired a research field, network verification and testing, that enables users to automatically detect bugs and systematically reason their network. Furthermore, techniques ranging from formal modeling to verification and testing have been applied to help operators build reliable systems in electronic design automation and software. Inspired by its success, network verification has recently seen increased attention in the academic and industrial communities. As an area of current interest, it is an interdisciplinary subject (with fields including formal methods, mathematical logic, programming languages, and networks), making it daunting for a nonprofessional. We perform a comprehensive survey on well-developed methodologies and tools for data plane verification, control plane verification, data plane testing and control plane testing. This survey also provides lessons gained from existing solutions and a perspective of future research developments. |
---|---|
AbstractList | Networks have grown increasingly complicated. Violations of intended policies can compromise network availability and network reliability. Network operators need to ensure that their policies are correctly implemented. This has inspired a research field, network verification and testing, that enables users to automatically detect bugs and systematically reason their network. Furthermore, techniques ranging from formal modeling to verification and testing have been applied to help operators build reliable systems in electronic design automation and software. Inspired by its success, network verification has recently seen increased attention in the academic and industrial communities. As an area of current interest, it is an interdisciplinary subject (with fields including formal methods, mathematical logic, programming languages, and networks), making it daunting for a nonprofessional. We perform a comprehensive survey on well-developed methodologies and tools for data plane verification, control plane verification, data plane testing and control plane testing. This survey also provides lessons gained from existing solutions and a perspective of future research developments. |
Author | Shi, Xingang Wu, Jianping Wang, Zhiliang Yao, Jiangyuan Zhang, Han Yin, Xia Wang, Qing Li, Yahui |
Author_xml | – sequence: 1 givenname: Yahui orcidid: 0000-0002-7094-4053 surname: Li fullname: Li, Yahui organization: Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China – sequence: 2 givenname: Xia surname: Yin fullname: Yin, Xia organization: Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China – sequence: 3 givenname: Zhiliang orcidid: 0000-0001-6587-820X surname: Wang fullname: Wang, Zhiliang email: wzl@cernet.edu.cn organization: Institute for Network Sciences and Cyberspace, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China – sequence: 4 givenname: Jiangyuan surname: Yao fullname: Yao, Jiangyuan organization: College of Information Science and Technology, Hainan University, Haikou, China – sequence: 5 givenname: Xingang surname: Shi fullname: Shi, Xingang organization: Institute for Network Sciences and Cyberspace, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China – sequence: 6 givenname: Jianping surname: Wu fullname: Wu, Jianping organization: Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China – sequence: 7 givenname: Han surname: Zhang fullname: Zhang, Han organization: School of Cyber Science and Technology, Beihang University, Beijing, China – sequence: 8 givenname: Qing surname: Wang fullname: Wang, Qing organization: Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, China |
BookMark | eNotjN1KwzAYQIMouE1fQG_yAp35XRLvSnEqbO5i9Qe8GFn6ZY12bUmqsrdX1KsDh8MZo-O2awGhC0qmlBJzVayW63LKCNVTpmeaSHKERowrnikhX07ROKU3QgQThozQa47XH_ETDrhr8QMMX118x08Qgw_ODuFH2rbCJaQhtDv8HIYaz7u4tw1ewlB3VbrGed_Hzroa0m9b1LZpoN1BOkMn3jYJzv85QY_zm7K4yxar2_siX2SOczNkFqzbClkBnzEmPTABRoL0Tm2VpowL7SpnJK801cZ7qYxyzFlKuVTMSs8n6PLvGwBg08ewt_Gw0UJyQhT_Bo7UUpU |
CitedBy_id | crossref_primary_10_1109_TNSM_2021_3130290 crossref_primary_10_1016_j_jnca_2020_102947 crossref_primary_10_1007_s11276_021_02579_1 crossref_primary_10_1109_TNET_2021_3050769 crossref_primary_10_1109_TNET_2024_3469386 crossref_primary_10_1109_TNSM_2024_3407159 crossref_primary_10_1109_TKDE_2020_2967670 crossref_primary_10_23919_cje_2023_00_001 crossref_primary_10_3390_fi14010029 crossref_primary_10_3390_electronics10182207 crossref_primary_10_1007_s00165_021_00558_z crossref_primary_10_1109_TNSM_2022_3183591 crossref_primary_10_3390_electronics13061108 crossref_primary_10_1002_dac_5554 crossref_primary_10_1109_ACCESS_2020_2975221 crossref_primary_10_1109_TSE_2022_3150333 |
ContentType | Journal Article |
DBID | 97E ESBDL RIA RIE |
DOI | 10.1109/COMST.2018.2868050 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present Open Access资源_IEL Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2373-745X |
EndPage | 969 |
ExternalDocumentID | 8453007 |
Genre | orig-research |
GrantInformation_xml | – fundername: National High Technology Research and Development Program of China 863 Program grantid: 2015AA016105 – fundername: National Natural Science Foundation of China grantid: 61402253 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 29I 2WC 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD ESBDL HZ~ IES IFIPE IFJZH IPLJI JAVBF LAI O9- OCL P2P RIA RIE RNS |
ID | FETCH-LOGICAL-c339t-aeacb45de36225fe24e95e5fc7b7812348cdc953d8189ff5797c2ca113572a5f3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 03:00:19 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c339t-aeacb45de36225fe24e95e5fc7b7812348cdc953d8189ff5797c2ca113572a5f3 |
ORCID | 0000-0001-6587-820X 0000-0002-7094-4053 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8453007 |
PageCount | 30 |
ParticipantIDs | ieee_primary_8453007 |
PublicationCentury | 2000 |
PublicationDate | 2019-Firstquarter |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 2019-Firstquarter |
PublicationDecade | 2010 |
PublicationTitle | IEEE Communications surveys and tutorials |
PublicationTitleAbbrev | COMST |
PublicationYear | 2019 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0042490 |
Score | 2.4610915 |
Snippet | Networks have grown increasingly complicated. Violations of intended policies can compromise network availability and network reliability. Network operators... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 940 |
SubjectTerms | Control systems formal methods network reliability network testing Network verification Reliability Routing protocols Software software-defined network Testing |
Title | A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges |
URI | https://ieeexplore.ieee.org/document/8453007 |
Volume | 21 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61Jz34quKbHDy6291N0iTeSrEUYeuhrRY8lE0yUVG20u4K-uvNPipFPHgLm8AuGZhvZna-bxC6NBFNWMdyT7kM2aPahJ4EEXiU2YSDMzioguAcDzuDCb2dsmkDXf1wYQCgbD4Dv1iW__LNXOdFqawtKCMldXzDJW4VV2vldalLI4IVKSaQ7d5dPBoXnVvCj0RHBAWvfm18Soke_R0Ur95bNY28-nmmfP31S5Lxvx-2i7brMBJ3K7vvoQak-2hrTVywhR67eJQvPuATz1M8rLq98b3btHWZDiepweNCZSN9wg8v2TPuFwHsG47LqdLLa9ytBcdhWZ7trQavLA_QpH8z7g28epSCpwmRmZc4_6ooM-DwKmIWIgqSAbOaK-4gnlChjZaMGIff0lrGJdeRTsKQMB4lzJJD1EznKRwhrFyQIEIHadooKqQSlpDQhBooT4Cb4Bi1iguavVdqGbP6bk7-fnyKNp2RZFXUOEPNbJHDuYP5TF2U9v0GzEWoow |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NbhMxEB6V9gAcSqEgaKH4AMdNd_0T25U4RKFRSptwaAqVOIS1PQYE2lTNpqg8C6_Sd-vsT1CFuFbittq1VrJnNN_MeOYbgFeBy1x1o04cRciJ9CFLLJo0kSrmGkng6KoG59G4OzyR707V6Qr8_tMLg4h18Rl2qsf6Lj_M_KJKle0aqQRhWltCeYiXPylAm785eEvSfM35YH_SHybtDIHEC2HLJCfD4qQKSIaaq4hcolWootdOE7YJaXzwVolAwGVjVNpqz32eZUJpnqso6L93YI38DMWb7rClnZcUuKTLNpzU7vbfj44nVa2Y6XDTNWnVyX9jYEuNV4MHcLXcaVOm8r2zKF3H__qLBPJ_PYoNWG8dZdZrNPshrGDxCO7foE_chE89drw4v8BLNivYuKlnZx_oY2wTkSwvAptUPCLFF_bxW_mVDSoX_Qcb1XOz53us11Kq47xe21-Olpk_hpNb2d0TWC1mBT4F5sgNMhmBtg9OGutMFCILmUepc9QhfQablUCmZw0fyLSVxda_X7-Eu8PJ6Gh6dDA-3IZ7pCC2SeE8h9XyfIEvyKkp3U6tWww-37YErwHa0Aa1 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+on+Network+Verification+and+Testing+With+Formal+Methods%3A+Approaches+and+Challenges&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Li%2C+Yahui&rft.au=Yin%2C+Xia&rft.au=Wang%2C+Zhiliang&rft.au=Yao%2C+Jiangyuan&rft.date=2019-01-01&rft.pub=IEEE&rft.eissn=2373-745X&rft.volume=21&rft.issue=1&rft.spage=940&rft.epage=969&rft_id=info:doi/10.1109%2FCOMST.2018.2868050&rft.externalDocID=8453007 |