Modelling the temporal aspects of network configurations

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

One of the main issues with the existing management configuration is the absence of a transactional model, which should allow the network configuration data to retain their integrity and consistence during the configuration process. In this paper, we propose a mathematical framework based on lattice theory allowing the structuring of configuration operations leading to the concept of component and validation checkpoint, and present polynomial-time algorithms for studying these structures. We will illustrate the model by an example of two examples of configuration operations: the deployment of a VLAN service through SNMP and the deployment of a VPN service through the Netconf protocol. © 2007 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Hallé, S., Deca, R., Cherkaoui, O., Villemaire, R., & Puche, D. (2007). Modelling the temporal aspects of network configurations. IFIP International Federation for Information Processing, 229, 269–282. https://doi.org/10.1007/978-0-387-49690-0_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free