Back to Results
First PageMeta Content
Routing / Internet standards / Internet protocols / Subnetwork / Router / Routing control plane / IP address / Virtual LAN / Forwarding plane / Network architecture / Internet / Computing


Mining Policies From Enterprise Network Configuration ⋆ Theophilus Benson⋆ , Aditya Akella⋆ and David A. Maltz† University of Wisconsin, Madison and † Microsoft Research {tbenson,akella}@cs.wisc.edu, dmaltz@mic
Add to Reading List

Document Date: 2014-03-19 22:40:32


Open Document

File Size: 223,35 KB

Share Result on Facebook

City

Washington / DC / Vancouver / Chicago / /

Company

General Terms Design / Ge / Microsoft / /

Country

United States / Canada / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

David A. Maltz† University of Wisconsin / /

IndustryTerm

network routers / in their networks / policy-lite networks / gateway routers / policy-lite network / productions networks / smallest networks / policy-heavy network / simplest enterprise network / ip networks / ports/protocols / policy-heavy networks / to different network / reachability analysis tool / large networks / fewer routers / network operator / measurement tools / of the networks / gateway router / given router / network devices / network management / private corporate networks / university networks / operational networks / hypothetical network / operational network / /

Organization

Name Univ-1 Univ-2 Univ-3 Enet-1 Enet-2 Univ / IMC / CS Department / University of Wisconsin / Madison / IEEE Computer Society / /

Person

J. Lee / V / David A. Maltz / /

Position

model control plane restrictions / /

Product

ACLs / ACLs.3 Intuitively / represented using ACLs.3 Intuitively / C1 / /

ProvinceOrState

Illinois / British Columbia / /

Technology

given router / two routers / gateway router / network routers / destination router / source router / destination routers / Simulation / network router / gateway routers / /

SocialTag