期刊文献+

基于形式化描述的交换机网络自动配置策略的设计与实现 被引量:3

A formal approach to the design and implementation of configuration strategy automation for switch network
原文传递
导出
摘要 配置管理是网络管理中的重要组成部分,随着IPv6的使用、安全机制的完善,园区网的配置变得更加复杂。该文提出交换机网络自动配置策略并实现原型系统。该系统以网络拓扑为基础,将其自动转化成alloy语言的描述,通过对配置规则进行形式化描述,计算出可行的配置解,自动完成交换机各参数的配置。该文以配置交换机网络的源地址验证(SAVI)功能为例,通过多线程的方式对各个子网同时进行规则推理,可以完成千级数量SAVI交换机的自动配置。 Configuration management is an important part of network management. With the use of IPv6 protocol and the improvement of security mechanism, configuration of enterprise network has become more and more complex. The paper presents a method for automatic configuration of switch network and implements a prototype system. The system automatically translates network topology into formal description with Alloy language. Through the formal description of the configuration rules, the system finds a solution satisfying all the rules, and finally enforces the configuration of switches automatically. By using multi-threads to find a solution satisfying rules for each subnet simultaneously, the system can finish the automatic configuration of a campus network with a thousand of SAV1 switches within reasonable time.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第8期1041-1048,共8页 Journal of Tsinghua University(Science and Technology)
基金 国家"九七三"重点基础研究项目(2009CB320505) 国家"十一五"科技支撑计划项目(2008BAH37B05) 国家"八六三"高技术项目(2008AA01A303 2009AA01Z251) 国家自然科学基金资助项目(61170211 61170209)
关键词 网络管理 自动配置 alloy语言 network management automatic configuration alloylanguage
  • 相关文献

参考文献15

  • 1Markopoulou A, Iannaccone G, Bhattacharyya S, et al. Characterization of failures in an IP backbone[C]// Proc 23rd Annual Joint Conference of the IEEE Computer and Communications Societies. Hong Kong, China: IEEE Press, 2004! 2307 2317.
  • 2Oppenheimer D, GanapathiA, PattersonD. Why dolnternet services fail, and what can be done about it? [C]// Proc 4rd USENIX Symposium on Internet Technologies and Systems. Seattle, WA: USENIX Press, 2003: 1-15.
  • 3Feamster N, Balakrishnan H. Detecting BGP configuration faults with static analysis [C]// Proc 2nd Symposium on Networked Systems Design and Implementation (NSDI). Boston, MA, USA: USENIX Press, 2005:43-56.
  • 4AN Changqing, WANG Hui, YANG Jiahai. MIB design and application for source address validation improvement protocol [C]//16th IEEE Symposium on Computers and Communications (ISCC 2011). Kerkyra, Greecez IEEE Press, 2011: 677-680.
  • 5Jackson D. Software Abstractions: Logic, Language, and Analysis [M]. Cambridge, Massachusetts: MIT Press, 2006.
  • 6Torlak E, Jackson D. Kodkod: A relational model finder [C]// Proc 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Braga, Portugal, 2007: (;32-647.
  • 7Enck W, McDaniel P, Sen S, et al. Configuration management at massive scale: System design and experience [C]// Proc IEEE Journal on Selected Areas in Communications. Piscataway, N J: IEEE-INST Electrical Electronics Engineers Ine, 2007 : 323 - 335.
  • 8Chen X, Mao Z M, Van der Merwe J. PACMAN: A plat$orm for automated and controlled network operations and configuration management [C]// Proc 5th International Conference on CoNext. New York.- ACM Press, 2009: 277- 288.
  • 9Chen X, Mao Y, Mao Z M, et al. Declarative configuration rnanagement for complex and dynamic networks [C]// Proc 6th International Conference on CoNext. New York; ACM Press, 2010, 654-665.
  • 10Ramakrishnan R, Ullman J D. A survey of research on deductive database systems [J]. Journal of Logic Programming, 1993, 23(2): 125 149.

同被引文献5

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部