Skip to main content
Log in

Constraint-based model for network service provisioning

Modele base sur les contraintes pour la gestion des services reseau

  • Published:
Annales Des Télécommunications Aims and scope Submit manuscript

Abstract

As the network services deployed over the Internet become more complex, their configurations are more difficult to manage. The constraints that exist among the network service configuration parameters are an important source of complexity in the configuration, validation and fault management processes. Existing solutions do not provide adequate high-level models to capture and integrate various types of configuration constraints. It is therefore necessary to adopt a structured approach in order to solve this problem. Thus, in this paper, we propose a structured and integrated constraint-based model for network service configuration, validation and fault management.

Résumé

Au fur et à mesure que les services réseau fournis sur Vinternet deviennent plus complexes, leurs configurations sont plus difficiles à gérer. Les contraintes qui existent parmi les paramètres de configuration des services réseau constituent une source importante de complexité dans la gestion de la configuration, de la validation et des pannes. Les solutions existantes ne fournissent pas des modèles de haut niveau adéquats pour capter et intégrer les différents types de contraintes de configuration. Il est donc nécessaire d’adopter une approche structurée pour résoudre ce problème. Dans cet article, nous proposons un modèle structuré basé sur les contraintes pour gérer la configuration, la validation et les pannes des services réseau.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lopez De Vergara J. E., Villagra V. A., Asensio J. L, Berrocal J., Ontologies: Giving Semantics to Network Management Models, IEEE Network, 17, no 3 pp. 15–21, 2003.

    Google Scholar 

  2. Keller F., An Extension of GDMO for Formalizing Managed Objects Behaviour, Proceedings of the IFIP TC6 8th International Conference on Formal Description Techniques VIII, 43, pp. 201–217, ISBN:0-412-73270-X, 1995.

    Google Scholar 

  3. Franzke A., Frohnhoff B., Formalizing GDMO Action and Notification. Definitions — Results from a Case Study, Journal of Network and Systems Management, 6, no 4, pp. 267–282, 1998.

    Google Scholar 

  4. Halle S., Deca R., Cherkaoui O., Villemaire R., A formal validation model for the Netconf protocol, Proc. 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM’04), Davis, CA, USA, November 15–17, pp. 147–158, 2004.

    Google Scholar 

  5. Damianou N., Dulay N., Lupu E., Sloman M., The Ponder policy Specification Language, Workshop on Policies for Distributed Systems and Networks (Policy2001), HP Labs Bristol, Springer, pp. 29–31, 2001.

    Google Scholar 

  6. Halle S., Formalismes logiques pour la gestion des configurations dans les réseaux informatiques, M.Se. Thesis, UQAM Montréal, 2005.

    Google Scholar 

  7. Warmer J., Kleppe A., The Object Constraint Language: Precise Modeling with UML, Addison-Wesley, Redwood City, 1998.

    Google Scholar 

  8. Richters M., A Precise Approach to Validating UML Models and OCL Constraints, Ph.D. Thesis, Universität Bremen, 2000.

    Google Scholar 

  9. Deca R., Cherkaoui O., Puche D., Configuration Model for Network Management, Proceedings of the IEEE IFIP TC6 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con ’2004), Palma de Mallorca, Spain, 2004.

    Google Scholar 

  10. Halle S., Villemaire R., Cherkaoui O., CTL Model Checking for Labelled Tree Queries, Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME’06), 00, pp. 27–35, 2006.

    Google Scholar 

  11. Deca R., Mahrez O., Cherkaoui O., Slone D., Contributions to Automated Testing of Network Service Interactions. Actes du 5e colloque international sur les Nouvelles Technologies de la Répartition (NOTERE2005), Gatineau, Canada, pp. 175–180, 2005.

    Google Scholar 

  12. Opnet Technologies, Inc., NetDoctor — Ensuring Network Integrity and Security, http://www.opnet.com/products/modules/netdoctor.pdf, 2005.

    Google Scholar 

  13. Al-Shaer E. S., Hamed H. H., Taxonomy of Conflicts in Network Security Policies, IEEE Communications Magazine, 44, no 3, pp. 134–141, March, 2006.

    Google Scholar 

  14. Feamster N., Balakrishnan H., Detecting BGP configuration faults with static analysis, Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI ’05), pp. 1–11, Boston, MA, USA, May 2005.

    Google Scholar 

  15. Bush R., Griffin T., Integrity for Virtual Private Routed Networks, Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, (INFOCOM’03), San Francisco, CA, U.S.A., 2003.

    Google Scholar 

  16. Kittel A., Bhatnagar A., Hum R., Weintraub K., Service Creation and Service Management for Advanced IP Networks and Services — An Experience Paper, IEEE/IFIP Integrated Management (IM 2001), Seattle, WA, U.S.A., 2001.

    Google Scholar 

  17. Clemm A., Shen F., Lee V., Generic provisioning of heterogeneous services — a close encounter with service profiles, Computer Networks 43, pp. 43–57, Elsevier, 2003.

    Google Scholar 

  18. Garschhammer M., Hauck R., Kempter B., Radisic I., Roelle H., Schmidt H., The MNM Service Model — Refined Views on Generic Service Management, Journal of Communications and Networks, 3, no 4, pp. 297–306, 2001.

    Google Scholar 

  19. Dreo Rodosek G., A Generic Model for IT Services and Service Management”. Proceedings of the 14th IFIP/IEEE Workshop on Distributed Systems: Operations and Management (DSOM’03), pp. 171–184, 2003.

    Google Scholar 

  20. Burgess M., Cfengine: a site configuration engine, USENIX Computing systems, 8, no 3, pp. 333–360, 1995.

    MathSciNet  Google Scholar 

  21. Couch L., Daniels N., The maelstrom: Network service debugging via “ineffective procedures”. Proceedings of the 15th USENIX conference on Systemadministration, San Diego, California, December, 2001.

    Google Scholar 

  22. Sandness F. E., Scheduling partially ordered events in a randomised framework: Empirical results and implications for automatic configuration management, Proceedings of the 15th USENIX conference on System administration, San Diego, Calif., December 02-07, 2001.

    Google Scholar 

  23. Couch A., Sun Y., On the Algebraic Structure of Convergence, Proc.IEEE DSOM 2003, Heidelberg, Germany, Springer, pp. 28–40, 2003.

    Google Scholar 

  24. Halle S., Deca R., Cherkaoui O., Villemaire R., Puche D., Sequential dependencies in configuration operations, 7e Colloque francophone de Gestion de Réseaux et de Services, Bordeaux, France, May 9–12, 2006.

    Google Scholar 

  25. Znaty S., Cherakoui O., IDEAL: An IntegrateD REsource MAnagement Language, Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’97), Phoenix, AZ, U.S.A., November 1997, 1, pp. 202–206, IEEE, Piscataway, NJ, U.S.A.

    Google Scholar 

  26. Rivière A.-L, Sibilla M., Management Information Models Integration: From Existing Approaches to new Unifying Guidelines, Journal of Network and Systems Management, 6, no 4, pp. 333–356, 1998.

    Google Scholar 

  27. Rivière A.-I)., Pell A., Sibilla M., Network Management Information: From Protocols to Information Integration, Proceedings of the 7th IFIP/IEEE Workshop on “Distributed Systems: Operations and Management” (DSOM 1996), L’Aquila, Italy, 1996.

    Google Scholar 

  28. Marttn-Flatin J. P.), D. Srivastava D., Westerinen A, Iterative Multi-Tier Management Information Modeling, IEEE Communications Magazine, 41, no 12, pp. 92–99, 2003

    Google Scholar 

  29. Keller A., Managing the Management: CORBA-based Instrumentation of Management Systems, Proceedings of the 6th IFIP/IEEE International Symposium on Integrated Network Management (IM 1999), Boston, MA, U.S.A., 1999.

    Google Scholar 

  30. Strauss F., A Script MIB based Java Policy Management System: Design and Implementation Report, Technical University Braunschweig, Germany, September 2001.

    Google Scholar 

  31. Lupu E. C., Sloman M., Conflicts in Policy-Based Distributed Systems management, IEEE Transactions in Software Engineering, 25, no 6, pp. 852–869, 1999.

    Google Scholar 

  32. Gorse N., Aboulhamid E. M., Savaria Y., Consistency Validation of High-Level Requirements, In Proceedings of the 4th IEEE International Workshop on System-on-Chip for Real-Time Applications (iwsoc’04), pp. 93–98, Banff, AB, Canada, July 2004.

    Chapter  Google Scholar 

  33. Barbuceanu M., Gray T., Mankowski S., HOW to make your agents fulfill their obligations, 3rd Conference on the Practical Applications of Intelligent Agents and Multi-Agents (PAAM’98), London, UK, 1998.

    Google Scholar 

  34. Krishnakumar K. T., Sloman M., Constraint based Network Adaptation for Ubiquitous Applications, Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC’2002), pp. 258–271, Lausanne, Switzerland, September 2002.

    Chapter  Google Scholar 

  35. Brown A. B., Keller A., Hellerstein J., A Model of Configuration Complexity and its Application to a Change Management System, Proceedings of the 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), pp. 631–644, May 2005.

    Chapter  Google Scholar 

  36. Khalil I., Braun T., Automated Service Provisioning in Heterogeneous Large-Scale Environment, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2002), pp.575–588, Florence, Italy, April 2002.

    Google Scholar 

  37. Cisco Systems, Inc., Cisco Modular Quality of Service Command Line Interface, http://www.cisco.com/cn/US/tech/tk543/technologies_white_paper09186a0080123415.shtml, 2005

    Google Scholar 

  38. Flegkas P., Trimintzios P., Pavlou G., Liotta A., Design and Implementation of a Policy-based Resource Management Architecture, Proceedings of the 8th IFIP/IEEE International Symposium on Integrated Network Management (IM 2003), Kluwer, pp. 215–229, Colorado Springs, co, U.S.A., March 2003.

    Chapter  Google Scholar 

  39. Cisco Systems, INC., Configuring a Basic MPLS VPN, Document ID: 13733, http://www.cisco.com/warp/public/105/mpls_vpn_basic.html, August 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudy Deca.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Deca, R., Cherkaoui, O., Savaria, Y. et al. Constraint-based model for network service provisioning. Ann. Telecommun. 62, 847–870 (2007). https://doi.org/10.1007/BF03253293

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03253293

Key words

Mots clés

Navigation