IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2017-03-02 11:20
A study on abstraction of configuration in network equipment
Masato Hirose, Kunio Akashi, Yoichi Shinoda (JAIST)
Abstract (in Japanese) (See Japanese page) 
(in English) Network operator was possible to apply configurations to each network devices without mistake at the beginning of the Internet. Because the network was a simple structure compared to the present. However the network becomes large and complicated, as a result the network operator is becoming hard to apply configurations to network devices without mistake.
The reasons for the configuration of the network device is independent and it has no relation with the other network devices. In other words, when the network operator changes configuration, it is accepted even if the configuration conflicts with device's. Consequently, the network operator can not know own mistake until running target network, when the network operator applies configuration including mistakes.
On the assumption that the configuration is generally described all the protocol configuration in one file on the network device. Since the OS the network device is mostly implemented based on a general-purpose OS such as FreeBSD and Linux. Thus, each protocol is executed as an application by referring to the configuration. Therefore. while there is a merit that the user can manage setting of multiple applications with one file, there is a disadvantage that it is difficult to manage the dependency of configuration in each application. When applying the configuration that destroying the dependency, it may be returned as an error, but there are the case it prove running properly unless checking the log after the operation.
There are some existing methods of configuration verification. But existing methods of configuration verification corresponds only to the specified protocol. Thus checking configuration may repeat even a small change, there is not a possibility to effect because there are other influences.
The purpose of this research is to prevent misconfiguration by network operator to validate configuration, before the target network running. As expressed in OSI model, the protocol of the upper layer is not guaranteed as long as the protocol of the lower layer do not work properly. Thus, in the proposed method, some configurations of network devices are modeled each layer for validation. Therefore, it is possible to validate configurations even if the layer include the point where the configuration is changed and the other layer include some points depending on it is different. The model in the proposed method is constructed by applying some configurations to different rules. Due to this, is is possible verification a multi layer network with configurations. By querying the system, user can validate logical connection relation of this model. Accordingly, it is possible to check whether the configuration conflicts with other configurations before the user applies configuration to the target network device. In the implementation of this system, using logical programming language that can handle configuration as a logical expression with high abstraction level.
In this study, I conducted an experiment to evaluate the effectiveness in query function of implemented system. The configuration in general-purpose network device is almost able to express as the model, but the configuration dynamically changing, for example OSPF and BGP, is not acceptable. Then, I also conducted an experiment to evaluate the initializing performance when configurations is given. As a result, initializing time increase exponentially as the number of network devices increases. Although it is the subjectivity of the author, it is no choice to apply this system to large-scale network like carrier or ISP. However considering initializing time, It may fit small and medium scale network. Finally, I compared with some network description languages and the model of proposed method.
Theoretical simulation for network is possible to validate complicated network. The proposed method contributes that preventing misconfiguration before running the target network. This study aimed to prevent configuration mistake by validate configuration, but is is also considered effective to prepare rules from past network state information.
Keyword (in Japanese) (See Japanese page) 
(in English) Network verification / / / / / / /  
Reference Info. IEICE Tech. Rep.
Paper #  
Date of Issue  
ISSN  
Download PDF

Conference Information
Committee NS IN  
Conference Date 2017-03-02 - 2017-03-03 
Place (in Japanese) (See Japanese page) 
Place (in English) OKINAWA ZANPAMISAKI ROYAL HOTEL 
Topics (in Japanese) (See Japanese page) 
Topics (in English) General 
Paper Information
Registration To IN 
Conference Code 2017-03-NS-IN 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) A study on abstraction of configuration in network equipment 
Sub Title (in English)  
Keyword(1) Network verification  
Keyword(2)  
Keyword(3)  
Keyword(4)  
Keyword(5)  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Masato Hirose  
1st Author's Affiliation Japan Advanced Institute of Science and Technology (JAIST)
2nd Author's Name Kunio Akashi  
2nd Author's Affiliation Japan Advanced Institute of Science and Technology (JAIST)
3rd Author's Name Yoichi Shinoda  
3rd Author's Affiliation Japan Advanced Institute of Science and Technology (JAIST)
4th Author's Name  
4th Author's Affiliation ()
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker Author-1 
Date Time 2017-03-02 11:20:00 
Presentation Time 20 minutes 
Registration for IN 
Paper #  
Volume (vol) vol.116 
Number (no) no.485 
Page  
#Pages  
Date of Issue  


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan