… first show … design tasks be formulated in terms of network-wide performance, security, and resilience requirements. our formulations capture the correctness and feasibility constraints on the design, and they model each task as one of optimizing desired criteria subject to the constraints.
on one hand, a manager faces high-level constraints such as performance, each of manageability, security, and resilience to failures … on the other hand, to realize a network design, a manager must choose from a slew of protocols, low-level mechanisms, and options. Many of these protocols and mechanisms have profound interactions, however, the current “protocol by protocol” method of network configuration do not allow network operator to see and control these interactions in a systematic manner.