Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network strategy verification system and method

A technology of network policy and verification method, applied in the direction of version control, software maintenance/management, creation/generation of source code, etc. The effect of saving development and technical iteration costs

Pending Publication Date: 2021-11-30
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Limited by the specific constraints of policy verification technology, network operation and maintenance personnel usually cannot directly apply the original policy verification tool to the network being operated and maintained
Moreover, in the face of a variety of complex network verification tools, operation and maintenance personnel have no way to analyze and select a suitable solution
[0003] Traditional network policy verification tools, limited by the programming model, cannot cover various network devices and network constraints. Specifically, they have the following defects:
[0004] (1) The function definition is not clear, and it is difficult to select a network policy verification tool with sufficient functions and good performance for a specific network and specific problems
[0005] (2) The input format is not uniform. When using different network policy verification tools to verify the same network, it is necessary to adapt the input format to each verification tool, which greatly increases the workload of network administrators.
[0006] (3) The code reuse rate is low, and the phenomenon of repeated development is common
Due to the unclear module division of the existing network policy verification tools, developers often choose to redevelop irrelevant modules such as the network policy analysis module when designing new network verification algorithms, which brings waste of manpower and slows down technology iteration. speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network strategy verification system and method
  • Network strategy verification system and method
  • Network strategy verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] The purpose of the present invention is to reconstruct various network verification algorithms through modular program design based on the functional modularization of network policy verification technology, define a unified module interface and data structure, and realize flexible and expandable The general framework of network policy verification tools reduces the difficulty of using...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network strategy verification system and method. The system comprises an input end, a network strategy verification unit and an output end; the input end is used for inputting a network topology, a network strategy and a constraint to be verified; the network strategy verification unit is used for receiving the network topology, the network strategy and the constraint to be verified, and outputting a network verification result based on the obtained configuration file of the network equipment; and the output end is used for outputting the constraint satisfaction information, the error positioning information and the error repairing suggestion. According to the embodiment of the invention, the modular program design is introduced into the network verification, the complexity of the network strategy verification tool design can be reduced, the workload segmentation is facilitated, the agile development is realized, and the debugging maintenance and problem positioning of the network strategy verification tool are simplified.

Description

technical field [0001] The invention relates to the technical field of network policy verification, in particular to a network policy verification system and method. Background technique [0002] The traditional network policy verification technology models and designs a certain network, reads the router and switch configuration of a specific manufacturer, analyzes the network policy based on a specific verification algorithm, such as the algorithm shown in the figure or theorem proof, and analyzes the network behavior. The state space is traversed. Limited by the specific constraints of policy verification technology, network operation and maintenance personnel usually cannot directly apply the original policy verification tool to the network being operated and maintained. Moreover, in the face of a variety of complex network verification tools, operation and maintenance personnel have no way to analyze and select a suitable solution. [0003] Traditional network policy v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/35G06F8/36G06F8/71
CPCG06F8/35G06F8/36G06F8/71
Inventor 李军李一凡贾成君胡效赫
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products