互联网自动配置研究
作者:
基金项目:

国家重点基础研究发展计划(973)(2009CB320505);国家科技支撑计划(2008BAH37B05);国家高技术研究发展计划(863)(2008AA01A303,2009AA01Z251);国家自然科学基金(61170211);教育部博士点基金(20110002110056)


Research on Internet Automatic Configuration
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [57]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    互联网越来越复杂,网络设备支持的功能和服务越来越多,导致配置错误多发.配置错误已成为网络中断和异常产生的主要原因之一.互联网配置问题引起众多研究者的兴趣和重视,成为网络管理领域的一个重要研究课题.自2002年以来,研究者先后从不同角度对互联网配置问题进行了大量的研究,这些研究极大地促进了网络自动配置技术的发展.首先对互联网自动配置及配置案例进行概述;然后,按照配置自动生成、配置验证、配置自动实现这3个方面对互联网自动配置研究进行分类总结和分析评价;最后,总结了当前研究中存在的问题,并对未来研究发展趋势进行展望,希望能为该领域的研究者提供一些有益的启示.

    Abstract:

    The Internet is becoming extremely complex. Meanwhile, the network devices have been supporting more functions and services, which result in much more misconfigurations. Such misconfigurations, however, have become the main reason for network interruption as well as network anomalies. This issue has drawn many researchers' interest and attention, thus becomes a significant research topic in the field of network management. Since 2002, researchers have devoted themselves to solve configuration problems from different perspectives, and these studies greatly contribute to the development of the Internet automatic configuration. This paper firstly presents Internet automatic configuration and some configuration cases; then categorizes and evaluates Internet automatic configuration from the aspects of automatic configuration generation, configuration validation and automatic configuration realization; last but not least, summarizes the defects in the current research and then prospect the development of future research. The purpose of this paper is to provide some available information and beneficial enlightenment for researchers of this field.

    参考文献
    [1] Labovitz C, Ahuja A, Jahanian F. Experimental study of Internet stability and backbone failures. In: Proc. of the 29th Annual Int''l Symp. on Fault-Tolerant Computing (FTCS). Washington, 1999. 278-285. [doi: 10.1109/FTCS.1999.781062]
    [2] Markopoulou A, Iannaccone G, Bhattacharyya S, Chuah C-N, Diot C. Characterization of failures in an IP backbone. In: Proc. of the 23rd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Hong Kong, 2004. 2307-2317. [doi: 10.1109/INFCOM.2004.1354653]
    [3] Oppenheimer D, Ganapathi A, Patterson DA. Why do Internet services fail, and what can be done about it. In: Proc. of the 4th on USENIX Symp. on Internet Technologies and Systems (USITS). Seattle, 2003. 1-15. http://dl.acm.org/citation.cfm?id=1251461
    [4] Feamster N, Balakrishnan H. Detecting BGP configuration faults with static analysis. In: Proc. of the 2nd Conf. on Symp. Networked Systems Design & Implementation (NSDI). Boston, 2005. 43-56. http://dl.acm.org/citation.cfm?id=1251207
    [5] Mahajan R, Wetherall D, Anderson T. Understanding BGP misconfiguration. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pittsburgh, 2002. 3-16. [doi: 10.1145/633025.633027]
    [6] Kerravala Z. As the value of enterprise networks escalates, so does the need for configuration management. The Yankee Group, 2004. http://www.cs.princeton.edu/courses/archive/spr12/cos461/papers/Yankee04.pdf
    [7] Theophilus B, Aditya A, David M. Unraveling the complexity of network management. In: Proc. of the 6th USENIX Symp. on Networked Systems Design and Implementation (NSDI). Boston, 2009. 335-348. http://dl.acm.org/citation.cfm?id=1559000
    [8] Theophilus B, Aditya A, Aman S. Demystifying configuration challenges and trade-offs in network-based ISP services. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. Toronto, 2011. 302-313. [doi: 10.1145/2018436.2018471]
    [9] Caldwell D, Gilbert A, Gottlieb J, Greenberg A, Hjalmtysson G, Rexford J. The cutting EDGE of IP router configuration. ACM SIGCOMM Computer Communication Review, 2004,34(1):21-26. [doi: 10.1145/972374.972379]
    [10] ISO/IEC 7498-4 1989. 2006. http://www.iso.org/iso/catalogue_detail.htm?csnumber=14258
    [11] Sanchez L, McCloghrie K, Saperia J. Requirements for configuration management of IP-based networks. RFC 3139, 2001.
    [12] Yang JH, Jiang N, An CQ, Li FL. A formal approach to the design and implementation of configuration strategy automation for switch network. Journal of Tsinghua University, 2012,53(8):1041-1048 (in Chinese with English abstract).
    [13] Li FL, Yang JH, An CQ, Wu JP, Wang SY, Jiang N. CSS-VM: A centralized and semi-automatic system for VLAN management. In: Proc. of the IFIP/IEEE Int''l Symp. on Integrated Network Management (IM). Ghent, 2013. 623-629. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6573042
    [14] Jiang N, An CQ, Yang JH. Adaptive tuning of operation parameters for automatically learned filter table. In: Proc. of the 13th Asia- Pacific Network Operations and Management Symp. (APNOMS). Taipei, 2011. 1-8. [doi: 10.1109/APNOMS.2011.6077039]
    [15] Böehm H, Feldmann A, Maennel O, Reiser C, Volk R. Network wide inter-domain routing policies: Design and realization. In: Proc. of the 34th Conf. on North American Network Operators'' Group Meeting. Seattle, 2005.
    [16] Gottlieb J, Greenberg A, Rexford J, Wang J. Automated provisioning of BGP customers. IEEE Network Magazine, 2003,17(6): 44-55. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1248660
    [17] Enck W, McDaniel P, Sen S, Sebos P, Spoerel S, Greenberg A, Rao S, Aiello W. Configuration management at massive scale: System design and experience. In: Proc. of the USENIX Annual Technical Conf. (USENIX). Santa Clara, 2007. 73-86. http://dl. acm.org/citation.cfm?id=1364391
    [18] Chen X, Mao ZM, Van der Merwe J. PACMAN: A platform for automated and controlled network operations and configuration management. In: Proc. of the 5th Int''l Conf. on Emerging Networking Experiments and Technologies (CoNext). Rome, 2009. 277-288. http://dl.acm.org/citation.cfm?id=1658971
    [19] Murata T. Petri nets: Properties, analysis and applications. Proc. of the IEEE, 1989,77(4):541-580. [doi: 10.1109/5.24143]
    [20] Van der Aalst WM. The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers, 1998, 8(1):21-66. [doi: 10.1142/S0218126698000043]
    [21] Chen X, Mao Y, Mao ZM, van der Merwe J. Declarative configuration management for complex and dynamic networks. In: Proc. of the 6th Int''l Conf. on Emerging Networking Experiments and Technologies (CoNext). Philadelphia, 2010. 61-72. [doi: 10.1145/1921168.1921176]
    [22] Ramakrishnan R, Ullman JD. A survey of research on deductive database systems. Journal of Logic Programming, 1993,23(2): 125-149.
    [23] Narain S. Network configuration management via model finding. In: Proc. of the 19th Conf. on Large Installation Systems Administration (LISA). San Diego, 2005. 155-168. http://dl.acm.org/citation.cfm?id=1251165
    [24] Alloy. http://alloy.mit.edu/
    [25] Jackson D. Software Abstractions: Logic, Language, and Analysis. MIT Press, 2006.
    [26] Narain S, Levin G, Kaul V, Malik S. Declarative infrastructure configuration synthesis and debugging. Journal of Network and Systems Management, 2008,16(3):235-258. [doi: 10.1007/s10922-008-9108-y]
    [27] SWI-Prolog. http://www.swi-prolog.org/
    [28] Bratko. Prolog Programming for Artificial Intelligence. Addison-Wesley Longman Publishing Co., Inc., 1990.
    [29] Thomas D, Wouter J. PoDIM: A language for high-level configuration management. In: Proc. of the 21st Large Installation System Administration Conf. (LISA). 2007. 261-273. http://dl.acm.org/citation.cfm?id=1349447
    [30] Kodkod. http://alloy.mit.edu/kodkod/
    [31] Huan L, Dan O. Remote network labs: An on-demand network cloud for configuration testing. SIGCOMM Computer Communication Review, 2010,40(1):83-91. [doi: 10.1145/1672308.1672324]
    [32] Goodell G, Aiello W, Griffin T, Ioannidis J, McDaniel P, Rubin A. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In: Proc. of the Network and Distributed System Security Symp. (NDSS). San Diego, 2003. 47-61. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.3884
    [33] Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: Proc. of the 23rd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Hong Kong, 2004. 2605-2616. [doi: 10.1109/INFCOM.2004. 1354680]
    [34] Yuan LH, Mai JN, Su ZD, Chen H, Chuah C-N, Mohapatra P. FIREMAN: A toolkit for FIREwall modeling and analysis. In: Proc. of the Conf. on 2006 IEEE Symp. on Security and Privacy (S&P). Oakland, 2006. 199-213. [doi: 10.1109/SP.2006.16]
    [35] Caldwell D, Lee S, Mandelbaum Y. Adaptive parsingof router configuration languages. In: Proc. of the Internet Network Management Workshop (INM). Orlando, 2008. 1-6.
    [36] Hamed HH, Al-Shaer ES, Marrero W. Modeling and verification of IPSec and VPN security policies. In: Proc. of the 13th IEEE Int''l Conf. on Network Protocols (ICNP). Boston, 2005. 259-278. [doi: 10.1109/ICNP.2005.25]
    [37] Roscoe T, Hand S, Isaacs R, Mortier R, Jardetzky P. Predicate routing: Enabling controlled networking. ACM SIGCOMM Computer Communication Review, 2003,33(1):65-70. [doi: 10.1145/774763.774773]
    [38] Xie GG, Zhan J, Maltz D. On static reach ability analysis of IP networks. In: Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Miami, 2005. 2170-2183. http://ieeexplore.ieee.org/xpl/login.jsp?tp=& arnumber=1498492
    [39] Mai H, Khurshid A, Agarwal R, Caesar M, Godfrey PB, King ST. Debugging the data plane with anteater. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2011. 290-301. [doi: 10.1145/2018436.2018470]
    [40] Gogineni H, Greenberg A, Maltz DA, Ng TSE, Yan H, Zhang H. MMS: An autonomic network-layer foundation for network management. IEEE Journal on Selected Areas in Communications, 2008,28(1):15-27. [doi: 10.1109/JSAC.2010.100103]
    [41] Strassner J. How policy empowers business-driven device management. In: Proc. of the 3rd Int''l Workshop on Policies for Distributed Systems and Networks. Monterey, 2002. 214-217. [doi: 10.1109/POLICY.2002.1011311]
    [42] Enns R. NETCONF configuration protocol. RFC 4741, 2006.
    [43] Wasserman M, Goddard T. Using the NETCONF configuration protocol over secure shell (SSH). RFC 4742, 2006.
    [44] Goddard T. Using NETCONF over the simple object access protocol (SOAP). RFC 4743, 2006.
    [45] Lear E, Crozier K. Using the NETCONF protocol over blocks extensible exchange protocol (BEEP), RFC 4744t, 2006.
    [46] Bjorklund M. YANG: A data modeling language for the network configuration protocol (NETCONF). RFC 6020, 2010.
    [47] Elbadawi K, Yu J. Improving network services configuration management. In: Proc. of the 20th Int''l Conf. on Computer Communications and Networks (ICCCN). Maui, 2011. 1-6. [doi: 10.1109/ICCCN.2011.6006050]
    [48] NETCONF data modeling language (netmod). http://datatracker.ietf.org/wg/netmod/
    [49] Lengyel B, Bjorklund M. Partial lock remote procedure call (RPC) for NETCONF. RFC5717, 2009.
    [50] Seottand M, Bjorklund M. YANG module for NETCONF monitoring. RFC6022, 2010.
    [51] Tail-f systems ConfD. http://www.tail-f.com/products/confd/
    [52] Chisholm S, Trevino H. NETCONF event notifications. RFC, 2008.
    [53] Xu H, Ai X, Xiao DB. New generation network management based on the NETCONF protocol. Journal of Beijing University of Posts and Telecommunications, 2009,32(S1):10-14 (in Chinese with English abstract).
    [54] Xiao DB, Chen LM, Ai X. Research and implement on next generation network configuration protocol NETCONF. Journal of Huazhong Normal University, 2008,42(4):530-534 (in Chinese with English abstract).
    [55] Liang WM. Research and implementation of an ITIL-based NETCONF network configuration management system [MS. Thesis]. Wuhan: Huazhong Normal University, 2011 (in Chinese with English abstract).
    [56] Chang YN. Research and implementation of YANG-based NETCONF data modeling [MS. Thesis]. Wuhan: Huazhong Normal University, 2009 (in Chinese with English abstract).
    [57] Chen LM. Research of NETCONF-based network configuration management agent [MS. Thesis]. Wuhan: Huazhong Normal University, 2009 (in Chinese with English abstract).
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

李福亮,杨家海,吴建平,安常青,姜宁.互联网自动配置研究.软件学报,2014,25(1):118-134

复制
分享
文章指标
  • 点击次数:8057
  • 下载次数: 8439
  • HTML阅读次数: 3414
  • 引用次数: 0
历史
  • 收稿日期:2012-07-05
  • 最后修改日期:2013-04-09
  • 在线发布日期: 2013-11-04
文章二维码
您是第19981008位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号