期刊文献+

基于YANG的连网需求的建模

Modeling Networking Requirement Based on YANG
下载PDF
导出
摘要 网络的连通和隔离是用户最基本的需求,也是网络正确运行的基本保障.为了证明需求与底层网络行为的一致性,首先要对连网需求进行描述,本文使用YANG数据建模语言对需求进行建模,模型的建立分为三个部分:1)需求模型,描述了对象之间在服务上的行为关系;2)需求接口模型,完成具体需求的远程过程调用的形式描述,包括RPC的名称,输入参数的形式、以及返回结果;3)需求属性模型,该模型依赖于需求接口模型中的参数输入,将需求属性模型实例化后,可以更好的为其它的服务提供参数输入.然后将模型转换为JAVA服务接口,同时生成相应的REST API为外部应用提供服务,实现需求属性模型向流规则的转化,最后完成了连网需求的建模. Connectivity and isolation of the network are the most basic requirements of users and the basic guarantee for the correct operation of the network. To prove the consistency of the requirements with the underlying network behavior,the networking requirements should be formal described firstly. In this paper,the YANG data modeling language is used to model the requirements. The process of modeling is divided into three parts: 1) Requirement modeling,which describes the behavior relationship between objects in the service; 2) Requirements interface modeling,the concrete description of the specific requirements of the Remote Process Call( RPC),including the name of the RPC,the form of input parameters,as well as the results; 3) Requirement attribute modeling,which the depends on parameters input from the requirements interface model,after instantiation,requirement attribute model can better provide input parameters for the other services. Then the model is transformed to the JAVA service interface and the corresponding REST API is generated to provide services for the external application. Finally the requirement attribute model is transformed to the flow rules,and the networking requirement modeling is completed.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第11期2482-2487,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61163011 61262082)资助 内蒙古自然科学基金项目(2015MS0612)资助 内蒙古高校科学技术研究项目(NJZY010)资助
关键词 YANG 建模 连网 需求模型 YANG modeling networking requirement mode
  • 相关文献

参考文献1

二级参考文献4

  • 1William Stallings. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2[S]. Addison-Wesley, 1999.
  • 2Tail-f Systems. ConfD - A Commercial On Device Management Solution, v3.3.4, Product Marketing Page[R/OL]. Tail- f Systems, 2011. http://www.tail- f.com/products- and- services/confd, Software obtained under Non-disclosure Agree- ment.
  • 3Wasserman, Goddard. Using the NETCONF Configuration Protocol over Secure SHell (SSH)[S]. IETF RFC 4742, 2006.
  • 4McCloghrie, Perkins, Schoenwaelder. Structure of Manage- ment Information Version 2 (SMIv2)[S]. IETF RFC 2578, 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部