Abstract
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an information model. We propose in this paper a model for validation based on XML schema trees. By using an existing logical formalism called TQL, we express important dependencies between parameters that appear in those information models, and automatically check these dependencies on sample XML trees in reasonable time. We illustrate our claim by showing different rules and an example of validation on a Virtual Private Network.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bush, R., Griffin, T.: Integrity for Virtual Private Routed Networks. In: Proc. IEEE INFOCOM (2003)
Cardelli, L.: Describing semistructured data. SIGMOD Record 30(4), 80–85 (2001)
Cardelli, L., Ghelli, G.: TQL: A query language for semistructured data based on the ambient logic. Mathematical Structures in Computer Science (to appear)
Deca, R., Cherkaoui, O., Puche, D.: A Validation Solution for Network Configuration. In: Communications Networks and Services Research Conference (CNSR 2004), Fredericton, N.B. (2004)
DSP111, DMTF white paper, Common Information Model core model, version 2.4, August 30 (2000)
Enns, R.: NETCONF Configuration Protocol. Internet draft (February 2004), http://www.ietf.org/internet-drafts/draft-ietf-netconf-prot-02.txt
Gottlob, G., Koch, C.: Monadic queries over tree-structured data. In: LICS 2002, pp. 189–202 (2002)
Hallé, S., Deca, R., Cherkaoui, O., Villemaire, R.: Automated Validation of Service Configuration on Network Devices. In: Vicente, J.B., Hutchison, D. (eds.) MMNS 2004. LNCS, vol. 3271, pp. 176–188. Springer, Heidelberg (2004) (to appear)
Lymberopoulos, L., Lupu, E., Sloman, M.: Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework. In: NOMS 2004 (2004)
López de Vergara, J.E., Villagrá, V.A., Berrocal, J.: Semantic Management: advantages of using an ontology-based management information meta-model. In: HP-OVUA 2002 (2002)
Pepelnjak, I., Guichard, J.: MPLS VPN Architectures. Cisco Press (2001)
Rosen, E., Rekhter, Y.: BGP/MPLS VPNs. RFC 2547 (1999)
Scott, C., Wolfe, P., Erwin, M.: Virtual Private Networks. O’Reilly, Sebastopol (1998)
Strassner, J., Baker, F.: Directory Enabled Networks. Macmillan Technical Publishing, Basingstoke (1999)
TQL web site, Università di Pisa, http://tql.di.unipi.it/tql/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hallé, S., Deca, R., Cherkaoui, O., Villemaire, R., Puche, D. (2004). A Formal Validation Model for the Netconf Protocol. In: Sahai, A., Wu, F. (eds) Utility Computing. DSOM 2004. Lecture Notes in Computer Science, vol 3278. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30184-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-30184-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23631-3
Online ISBN: 978-3-540-30184-4
eBook Packages: Springer Book Archive