Abstract
Due to the significant development of network services in the past few years, their validation has become increasingly difficult. The advent of novel approaches to the issue of validation is therefore vital for keeping services manageable, safe, and reliable. We present a model for the validation of service configurations on network devices. A service configuration is modelled by a tree structure, and its properties are described by validation rules expressed in terms of these tree elements. By using an existing logical formalism called TQL, we have succeeded in expressing complex dependencies between parameters, and in automatically checking these dependencies against real-world network descriptions in feasible time.
Topic: policy-based management
Chapter PDF
Similar content being viewed by others
References
Alechina, N., Demri, S., De Rijke, M.: A modal perspective on path constraints. Journal of Logic and Computation 13(6), 939–956 (2003)
Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: Proc. IEEE INFOCOM (2004)
Bush, R., Griffin, T.: Integrity for Virtual Private Routed Networks. In: Proc. IEEE INFOCOM (2003)
Cardelli, L.: Describing semistructured data. SIGMOD Record 30(4), 80–85 (2001)
Cardelli, L., Ghelli, G.: TQL: A query language for semistructured data based on the ambient logic. Mathematical Structures in Computer Science (to appear)
Deca, R., Cherkaoui, O., Puche, D.: A Validation Solution for Network Configuration. In: Communications Networks and Services Research Conference (CNSR 2004), Fredericton, N.B. (2004)
Distributed Management Task Force, http://www.dmtf.org/
DSP111, DMTF white paper, Common Information Model core model, version 2.4, August 30 (2000)
Fournet, C., Gonthier, G., Lévy, J.-J., Maranget, L., Rémy, D.: A Calculus of Mobile Agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol. 1119, Springer, Heidelberg (1996)
Fuller, V., Li, T., Yu, J., Varadhan, K.: Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. RFC 1519 (1993)
Gottlob, G., Koch, C.: Monadic queries over tree-structured data. In: LICS 2002, pp. 189–202 (2002)
ITU Recommendation M.3000, Overview of TMN Recommendations (February 2000)
Mayer, A., Wool, A., Ziskind, E.: Fang: A Firewall Analysis Engine. In: Proc. IEEE Symposium on Security and Privacy (2000)
Miklau, G., Suciu, D.: Containment and equivalence for an Xpath fragment. In: Proc. PODS 2002, pp. 65–76 (2002)
Pepelnjak, I., Guichard, J.: MPLS VPN Architectures. Cisco Press (2001)
Rekhter, Y., Li, T.: An Architecture for IP Address Allocation with CIDR. RFC 1518 (1993)
Rosen, E., Rekhter, Y.: BGP/MPLS VPNs. RFC 2547 (1999)
Scott, C., Wolfe, P., Erwin, M.: Virtual Private Networks. O’Reilly, Sebastopol (1998)
Strassner, J., Baker, F.: Directory Enabled Networks. Macmillan Technical Publishing, Basingstoke (1999)
TQL web site, Università di Pisa, http://tql.di.unipi.it/tql/
Vitek, J., Castagna, G.: Seal: a framework for secure mobile computations. In: Bal, H.E., Cardelli, L., Belkhouche, B. (eds.) ICCL-WS 1998. LNCS, vol. 1686, pp. 44–77. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hallé, S., Deca, R., Cherkaoui, O., Villemaire, R. (2004). Automated Validation of Service Configuration on Network Devices. In: Vicente, J., Hutchison, D. (eds) Management of Multimedia Networks and Services. MMNS 2004. Lecture Notes in Computer Science, vol 3271. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30189-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-30189-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23239-1
Online ISBN: 978-3-540-30189-9
eBook Packages: Springer Book Archive