Research on Internet Automatic Configuration
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [57]
  • |
  • Related
  • | | |
  • Comments
    Abstract:

    The Internet is becoming extremely complex. Meanwhile, the network devices have been supporting more functions and services, which result in much more misconfigurations. Such misconfigurations, however, have become the main reason for network interruption as well as network anomalies. This issue has drawn many researchers' interest and attention, thus becomes a significant research topic in the field of network management. Since 2002, researchers have devoted themselves to solve configuration problems from different perspectives, and these studies greatly contribute to the development of the Internet automatic configuration. This paper firstly presents Internet automatic configuration and some configuration cases; then categorizes and evaluates Internet automatic configuration from the aspects of automatic configuration generation, configuration validation and automatic configuration realization; last but not least, summarizes the defects in the current research and then prospect the development of future research. The purpose of this paper is to provide some available information and beneficial enlightenment for researchers of this field.

    Reference
    [1] Labovitz C, Ahuja A, Jahanian F. Experimental study of Internet stability and backbone failures. In: Proc. of the 29th Annual Int''l Symp. on Fault-Tolerant Computing (FTCS). Washington, 1999. 278-285. [doi: 10.1109/FTCS.1999.781062]
    [2] Markopoulou A, Iannaccone G, Bhattacharyya S, Chuah C-N, Diot C. Characterization of failures in an IP backbone. In: Proc. of the 23rd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Hong Kong, 2004. 2307-2317. [doi: 10.1109/INFCOM.2004.1354653]
    [3] Oppenheimer D, Ganapathi A, Patterson DA. Why do Internet services fail, and what can be done about it. In: Proc. of the 4th on USENIX Symp. on Internet Technologies and Systems (USITS). Seattle, 2003. 1-15. http://dl.acm.org/citation.cfm?id=1251461
    [4] Feamster N, Balakrishnan H. Detecting BGP configuration faults with static analysis. In: Proc. of the 2nd Conf. on Symp. Networked Systems Design & Implementation (NSDI). Boston, 2005. 43-56. http://dl.acm.org/citation.cfm?id=1251207
    [5] Mahajan R, Wetherall D, Anderson T. Understanding BGP misconfiguration. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pittsburgh, 2002. 3-16. [doi: 10.1145/633025.633027]
    [6] Kerravala Z. As the value of enterprise networks escalates, so does the need for configuration management. The Yankee Group, 2004. http://www.cs.princeton.edu/courses/archive/spr12/cos461/papers/Yankee04.pdf
    [7] Theophilus B, Aditya A, David M. Unraveling the complexity of network management. In: Proc. of the 6th USENIX Symp. on Networked Systems Design and Implementation (NSDI). Boston, 2009. 335-348. http://dl.acm.org/citation.cfm?id=1559000
    [8] Theophilus B, Aditya A, Aman S. Demystifying configuration challenges and trade-offs in network-based ISP services. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. Toronto, 2011. 302-313. [doi: 10.1145/2018436.2018471]
    [9] Caldwell D, Gilbert A, Gottlieb J, Greenberg A, Hjalmtysson G, Rexford J. The cutting EDGE of IP router configuration. ACM SIGCOMM Computer Communication Review, 2004,34(1):21-26. [doi: 10.1145/972374.972379]
    [10] ISO/IEC 7498-4 1989. 2006. http://www.iso.org/iso/catalogue_detail.htm?csnumber=14258
    [11] Sanchez L, McCloghrie K, Saperia J. Requirements for configuration management of IP-based networks. RFC 3139, 2001.
    [12] Yang JH, Jiang N, An CQ, Li FL. A formal approach to the design and implementation of configuration strategy automation for switch network. Journal of Tsinghua University, 2012,53(8):1041-1048 (in Chinese with English abstract).
    [13] Li FL, Yang JH, An CQ, Wu JP, Wang SY, Jiang N. CSS-VM: A centralized and semi-automatic system for VLAN management. In: Proc. of the IFIP/IEEE Int''l Symp. on Integrated Network Management (IM). Ghent, 2013. 623-629. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6573042
    [14] Jiang N, An CQ, Yang JH. Adaptive tuning of operation parameters for automatically learned filter table. In: Proc. of the 13th Asia- Pacific Network Operations and Management Symp. (APNOMS). Taipei, 2011. 1-8. [doi: 10.1109/APNOMS.2011.6077039]
    [15] Böehm H, Feldmann A, Maennel O, Reiser C, Volk R. Network wide inter-domain routing policies: Design and realization. In: Proc. of the 34th Conf. on North American Network Operators'' Group Meeting. Seattle, 2005.
    [16] Gottlieb J, Greenberg A, Rexford J, Wang J. Automated provisioning of BGP customers. IEEE Network Magazine, 2003,17(6): 44-55. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1248660
    [17] Enck W, McDaniel P, Sen S, Sebos P, Spoerel S, Greenberg A, Rao S, Aiello W. Configuration management at massive scale: System design and experience. In: Proc. of the USENIX Annual Technical Conf. (USENIX). Santa Clara, 2007. 73-86. http://dl. acm.org/citation.cfm?id=1364391
    [18] Chen X, Mao ZM, Van der Merwe J. PACMAN: A platform for automated and controlled network operations and configuration management. In: Proc. of the 5th Int''l Conf. on Emerging Networking Experiments and Technologies (CoNext). Rome, 2009. 277-288. http://dl.acm.org/citation.cfm?id=1658971
    [19] Murata T. Petri nets: Properties, analysis and applications. Proc. of the IEEE, 1989,77(4):541-580. [doi: 10.1109/5.24143]
    [20] Van der Aalst WM. The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers, 1998, 8(1):21-66. [doi: 10.1142/S0218126698000043]
    [21] Chen X, Mao Y, Mao ZM, van der Merwe J. Declarative configuration management for complex and dynamic networks. In: Proc. of the 6th Int''l Conf. on Emerging Networking Experiments and Technologies (CoNext). Philadelphia, 2010. 61-72. [doi: 10.1145/1921168.1921176]
    [22] Ramakrishnan R, Ullman JD. A survey of research on deductive database systems. Journal of Logic Programming, 1993,23(2): 125-149.
    [23] Narain S. Network configuration management via model finding. In: Proc. of the 19th Conf. on Large Installation Systems Administration (LISA). San Diego, 2005. 155-168. http://dl.acm.org/citation.cfm?id=1251165
    [24] Alloy. http://alloy.mit.edu/
    [25] Jackson D. Software Abstractions: Logic, Language, and Analysis. MIT Press, 2006.
    [26] Narain S, Levin G, Kaul V, Malik S. Declarative infrastructure configuration synthesis and debugging. Journal of Network and Systems Management, 2008,16(3):235-258. [doi: 10.1007/s10922-008-9108-y]
    [27] SWI-Prolog. http://www.swi-prolog.org/
    [28] Bratko. Prolog Programming for Artificial Intelligence. Addison-Wesley Longman Publishing Co., Inc., 1990.
    [29] Thomas D, Wouter J. PoDIM: A language for high-level configuration management. In: Proc. of the 21st Large Installation System Administration Conf. (LISA). 2007. 261-273. http://dl.acm.org/citation.cfm?id=1349447
    [30] Kodkod. http://alloy.mit.edu/kodkod/
    [31] Huan L, Dan O. Remote network labs: An on-demand network cloud for configuration testing. SIGCOMM Computer Communication Review, 2010,40(1):83-91. [doi: 10.1145/1672308.1672324]
    [32] Goodell G, Aiello W, Griffin T, Ioannidis J, McDaniel P, Rubin A. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In: Proc. of the Network and Distributed System Security Symp. (NDSS). San Diego, 2003. 47-61. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.3884
    [33] Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: Proc. of the 23rd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Hong Kong, 2004. 2605-2616. [doi: 10.1109/INFCOM.2004. 1354680]
    [34] Yuan LH, Mai JN, Su ZD, Chen H, Chuah C-N, Mohapatra P. FIREMAN: A toolkit for FIREwall modeling and analysis. In: Proc. of the Conf. on 2006 IEEE Symp. on Security and Privacy (S&P). Oakland, 2006. 199-213. [doi: 10.1109/SP.2006.16]
    [35] Caldwell D, Lee S, Mandelbaum Y. Adaptive parsingof router configuration languages. In: Proc. of the Internet Network Management Workshop (INM). Orlando, 2008. 1-6.
    [36] Hamed HH, Al-Shaer ES, Marrero W. Modeling and verification of IPSec and VPN security policies. In: Proc. of the 13th IEEE Int''l Conf. on Network Protocols (ICNP). Boston, 2005. 259-278. [doi: 10.1109/ICNP.2005.25]
    [37] Roscoe T, Hand S, Isaacs R, Mortier R, Jardetzky P. Predicate routing: Enabling controlled networking. ACM SIGCOMM Computer Communication Review, 2003,33(1):65-70. [doi: 10.1145/774763.774773]
    [38] Xie GG, Zhan J, Maltz D. On static reach ability analysis of IP networks. In: Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). Miami, 2005. 2170-2183. http://ieeexplore.ieee.org/xpl/login.jsp?tp=& arnumber=1498492
    [39] Mai H, Khurshid A, Agarwal R, Caesar M, Godfrey PB, King ST. Debugging the data plane with anteater. In: Proc. of the ACM Special Interest Group on Data Communication (SIGCOMM) on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2011. 290-301. [doi: 10.1145/2018436.2018470]
    [40] Gogineni H, Greenberg A, Maltz DA, Ng TSE, Yan H, Zhang H. MMS: An autonomic network-layer foundation for network management. IEEE Journal on Selected Areas in Communications, 2008,28(1):15-27. [doi: 10.1109/JSAC.2010.100103]
    [41] Strassner J. How policy empowers business-driven device management. In: Proc. of the 3rd Int''l Workshop on Policies for Distributed Systems and Networks. Monterey, 2002. 214-217. [doi: 10.1109/POLICY.2002.1011311]
    [42] Enns R. NETCONF configuration protocol. RFC 4741, 2006.
    [43] Wasserman M, Goddard T. Using the NETCONF configuration protocol over secure shell (SSH). RFC 4742, 2006.
    [44] Goddard T. Using NETCONF over the simple object access protocol (SOAP). RFC 4743, 2006.
    [45] Lear E, Crozier K. Using the NETCONF protocol over blocks extensible exchange protocol (BEEP), RFC 4744t, 2006.
    [46] Bjorklund M. YANG: A data modeling language for the network configuration protocol (NETCONF). RFC 6020, 2010.
    [47] Elbadawi K, Yu J. Improving network services configuration management. In: Proc. of the 20th Int''l Conf. on Computer Communications and Networks (ICCCN). Maui, 2011. 1-6. [doi: 10.1109/ICCCN.2011.6006050]
    [48] NETCONF data modeling language (netmod). http://datatracker.ietf.org/wg/netmod/
    [49] Lengyel B, Bjorklund M. Partial lock remote procedure call (RPC) for NETCONF. RFC5717, 2009.
    [50] Seottand M, Bjorklund M. YANG module for NETCONF monitoring. RFC6022, 2010.
    [51] Tail-f systems ConfD. http://www.tail-f.com/products/confd/
    [52] Chisholm S, Trevino H. NETCONF event notifications. RFC, 2008.
    [53] Xu H, Ai X, Xiao DB. New generation network management based on the NETCONF protocol. Journal of Beijing University of Posts and Telecommunications, 2009,32(S1):10-14 (in Chinese with English abstract).
    [54] Xiao DB, Chen LM, Ai X. Research and implement on next generation network configuration protocol NETCONF. Journal of Huazhong Normal University, 2008,42(4):530-534 (in Chinese with English abstract).
    [55] Liang WM. Research and implementation of an ITIL-based NETCONF network configuration management system [MS. Thesis]. Wuhan: Huazhong Normal University, 2011 (in Chinese with English abstract).
    [56] Chang YN. Research and implementation of YANG-based NETCONF data modeling [MS. Thesis]. Wuhan: Huazhong Normal University, 2009 (in Chinese with English abstract).
    [57] Chen LM. Research of NETCONF-based network configuration management agent [MS. Thesis]. Wuhan: Huazhong Normal University, 2009 (in Chinese with English abstract).
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

李福亮,杨家海,吴建平,安常青,姜宁.互联网自动配置研究.软件学报,2014,25(1):118-134

Copy
Share
Article Metrics
  • Abstract:8059
  • PDF: 8443
  • HTML: 3418
  • Cited by: 0
History
  • Received:July 05,2012
  • Revised:April 09,2013
  • Online: November 04,2013
You are the first2049436Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063