Advertisement

Modelling the Temporal Aspects of Network Configurations

  • Sylvain Hallé
  • Rudy Deca
  • Omar Cherkaoui
  • Roger Villemaire
  • Daniel Puche
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 229)

Abstract

One of the main issues with the existing management configuration is the absence of a transactional model, which should allow the network configuration data to retain their integrity and consistence during the configuration process. In this paper, we propose a mathematical framework based on lattice theory allowing the structuring of configuration operations leading to the concept of component and validation checkpoint, and present polynomial-time algorithms for studying these structures. We will illustrate the model by an example of two examples of configuration operations: the deployment of a VLAN service through SNMP and the deployment of a VPN service through the Netconf protocol.

Keywords

Temporal Constraint Object Constraint Language Network Configuration Virtual Private Network Transactional Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Cherkaoui O, Bétouret F, Deca R (2004) On the Transactional Issues of the Netconf Protocol. Université du Québec à Montréal, unpublished report.Google Scholar
  2. 2.
    Case J, Fedor M, Schoffstall M, Davin J (1990) Simple Network Management Protocol, STD 15. RFC 1157Google Scholar
  3. 3.
    Cisco SNMP Object Navigator. http://tools.cisco.com/Support/SNMP/Google Scholar
  4. 4.
    Clarke EM, Grumberg O, Peled DA (2000) Model Checking. MIT Press, CambridgeGoogle Scholar
  5. 5.
    Crubézy M (2002) The Protégé Axiom Language and Toolset (“PAL”). Protégé Project, Stanford University http://protege.stanford.edu/Google Scholar
  6. 6.
    Daminaou N, Dulay N, Lupu E, Sloman M (2001) The Ponder policy Specification Language. In Sloman M, Lobo J, Lupu EC. (eds) Policy’2001, Springer, Berlin Heidelberg New York, pp 29–31Google Scholar
  7. 7.
    D’Antonio S, D’Arienzo M, Pescapè A, Ventre G (2004) An Architecture for Automatic Configuration of Integrated Networks. In NOMS 2004Google Scholar
  8. 8.
    Davey BA, Priestley HA (1990) Introduction to Lattices and Order, Cambridge University Press, CambridgezbMATHGoogle Scholar
  9. 9.
    Deca R, Cherkaoui O, Puche D (2004) A Validation Solution for Network Configuration. In CNSR 2004Google Scholar
  10. 10.
    Deca R, Cherkaoui O, Puche D (2004) Configuration Model for Network Management. In Gaiti D, Galmes S, Puigjaner R (eds) NetCon 2004Google Scholar
  11. 11.
    Draft Standard for Virtual Bridge Local Area Networks, IEEE Draft P802.1Q/D1, May 16, 1997Google Scholar
  12. 12.
    Enns R (2004) Netconf Configuration Protocol. Internet draft, June 2004. http://www.ietf.org/internet-drafts/draft-ietf-netconf-prot-03.txtGoogle Scholar
  13. 13.
    Hallé S, Deca R, Cherkaoui O, Villemaire R (2004) Automated Verification of Service Configuration on Network Devices. In Vicente J, Hutchison D (eds) MMNS 2004, Springer, Berlin Heidelberg New York, LNCS 3271, pp 176–188Google Scholar
  14. 14.
    Hallé S, Deca R, Cherkaoui O, Villemaire R, Puche D (2004) A Formal Validation Model for the Netconf Protocol. In Sahai, A, Wu F (eds) DSOM 2004, Springer, Berlin Heidelberg New York, LNCS 3278, pp 147–158Google Scholar
  15. 15.
    Jackson D, Schechter I, Shlyakhter I (2000) Alcoa: the Alloy Constraint Analyzer, In ICSE 2000Google Scholar
  16. 16.
    Jackson D (2000) Alloy: A Lightweight Object Modelling Notation. Technical Report 797, MIT Laboratory for Computer ScienceGoogle Scholar
  17. 17.
    López de Vergara JE, Villagrá VE, Berrocal J (2002) Semantic Management: advantages of using an ontology-based management information meta-model. In HP-OVUA 2002Google Scholar
  18. 18.
    Noy NF (2001) Managing Multiple Ontologies in Protégé-2000. In Fifth International Protégé-2000 WorkshopGoogle Scholar
  19. 19.
    Object Constraint Language (OCL) http://www.omg.org/docs/ptc/03-10-14.pdfGoogle Scholar
  20. 20.
    Rosen E, Rechter Y (1999) BGP/MPLS VPNs. RFC 2547Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Sylvain Hallé
    • 1
  • Rudy Deca
    • 1
  • Omar Cherkaoui
    • 1
  • Roger Villemaire
    • 1
  • Daniel Puche
    • 2
  1. 1.Université du Québec à MontréalMontréalCanada
  2. 2.Cisco Systems Inc.MontréalCanada

Personalised recommendations