迈向网络管理的形式化方法

P. Johnson
{"title":"迈向网络管理的形式化方法","authors":"P. Johnson","doi":"10.1109/GLOCOM.1994.513405","DOIUrl":null,"url":null,"abstract":"The purpose of developing formal methods for network management is to construct a methodology so that implementations of network management can be studied. Such studies lead to increased productivity in generating software for network management applications and toward increased efficiencies in running network management applications in the field. A process leading to an approach of developing formal methods for network management is proposed. This process introduces C.A.E Hoare's (1983) thoughts on the syntax of sequential computing processes along with Dijkstra's (1975) idea of \"Guarded Variables\". The result is a syntax which allows one to model execution of a sequential set of program statements and, in addition, has a nondeterministic property within the syntax to explicitly model decision points within the execution of statements where only one of multiple scenarios is followed in the sequence. From this base, network management can be modelled as a set of behaviors, whose semantics can be embedded within the above syntax. This representation is analogous to the idea of \"reverse engineering\" in cloning computer chips. Here, the external interactions of the target chip, like the observed behaviors of a network management system, are defined and then simulated through fundamentally different processes, while still producing identical interactions under like conditions. For the network management application, (taking access control as an example) control can be modeled as an interchange of functional commands across an interface by embedding the access control semantics within predicates and noting the decisions within the predicates through the nondeterministic syntax.","PeriodicalId":323626,"journal":{"name":"1994 IEEE GLOBECOM. Communications: The Global Bridge","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Toward formal methods in network management\",\"authors\":\"P. Johnson\",\"doi\":\"10.1109/GLOCOM.1994.513405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of developing formal methods for network management is to construct a methodology so that implementations of network management can be studied. Such studies lead to increased productivity in generating software for network management applications and toward increased efficiencies in running network management applications in the field. A process leading to an approach of developing formal methods for network management is proposed. This process introduces C.A.E Hoare's (1983) thoughts on the syntax of sequential computing processes along with Dijkstra's (1975) idea of \\\"Guarded Variables\\\". The result is a syntax which allows one to model execution of a sequential set of program statements and, in addition, has a nondeterministic property within the syntax to explicitly model decision points within the execution of statements where only one of multiple scenarios is followed in the sequence. From this base, network management can be modelled as a set of behaviors, whose semantics can be embedded within the above syntax. This representation is analogous to the idea of \\\"reverse engineering\\\" in cloning computer chips. Here, the external interactions of the target chip, like the observed behaviors of a network management system, are defined and then simulated through fundamentally different processes, while still producing identical interactions under like conditions. For the network management application, (taking access control as an example) control can be modeled as an interchange of functional commands across an interface by embedding the access control semantics within predicates and noting the decisions within the predicates through the nondeterministic syntax.\",\"PeriodicalId\":323626,\"journal\":{\"name\":\"1994 IEEE GLOBECOM. Communications: The Global Bridge\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1994 IEEE GLOBECOM. Communications: The Global Bridge\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOCOM.1994.513405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1994 IEEE GLOBECOM. Communications: The Global Bridge","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.1994.513405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

开发网络管理的形式化方法的目的是构建一种方法论,以便研究网络管理的实现。这些研究提高了为网络管理应用程序生成软件的生产力,并提高了在现场运行网络管理应用程序的效率。提出了一种开发网络管理形式化方法的过程。这个过程引入了C.A.E Hoare(1983)关于顺序计算过程语法的思想以及Dijkstra(1975)的“保护变量”思想。结果是一种语法,它允许对一组顺序的程序语句的执行进行建模,此外,在语法中还具有非确定性属性,可以显式地对语句执行中的决策点进行建模,其中顺序中只遵循多个场景中的一个。在此基础上,可以将网络管理建模为一组行为,其语义可以嵌入到上述语法中。这种表示类似于克隆计算机芯片的“逆向工程”思想。在这里,目标芯片的外部相互作用,就像观察到的网络管理系统的行为一样,被定义,然后通过根本不同的过程进行模拟,同时在类似的条件下仍然产生相同的相互作用。对于网络管理应用程序,(以访问控制为例)控制可以建模为跨接口的功能性命令交换,方法是在谓词中嵌入访问控制语义,并通过不确定性语法注意谓词中的决策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Toward formal methods in network management
The purpose of developing formal methods for network management is to construct a methodology so that implementations of network management can be studied. Such studies lead to increased productivity in generating software for network management applications and toward increased efficiencies in running network management applications in the field. A process leading to an approach of developing formal methods for network management is proposed. This process introduces C.A.E Hoare's (1983) thoughts on the syntax of sequential computing processes along with Dijkstra's (1975) idea of "Guarded Variables". The result is a syntax which allows one to model execution of a sequential set of program statements and, in addition, has a nondeterministic property within the syntax to explicitly model decision points within the execution of statements where only one of multiple scenarios is followed in the sequence. From this base, network management can be modelled as a set of behaviors, whose semantics can be embedded within the above syntax. This representation is analogous to the idea of "reverse engineering" in cloning computer chips. Here, the external interactions of the target chip, like the observed behaviors of a network management system, are defined and then simulated through fundamentally different processes, while still producing identical interactions under like conditions. For the network management application, (taking access control as an example) control can be modeled as an interchange of functional commands across an interface by embedding the access control semantics within predicates and noting the decisions within the predicates through the nondeterministic syntax.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信