of several similar machines and their configuration
tools from different vendors.
• If a node in the network breaks, it can be replaced
and the configuration reapplied. It is even possible
to use a machine from a different vendor without
having to reenter the configuration.
Altogether, these points help to increase reliability
and security of a network and facilitate the life of net-
work administrators.
However, we should not forget about some disad-
vantages. Verinec introduces an additional layer of
software between machines and administrators. We
should keep in mind some points to avoid introducing
new problems and maybe compromising the network
security:
• Automatic generation of configuration instruction
makes live easier – as long as it is done correctly.
Special care must be given to make the translation
of XML into the vendor specific format as accurate
as possible.
• If Verinec is to be used in a real world environment,
we need to do performance testing. We do not yet
know how long it would take to configure a com-
plete network. One improvement regarding the du-
ration of the transition state of the network would
be to parallelise configuration commands to inde-
pendent machines.
• The Verinec XML format does not cover all spe-
cific features found in service implementations, but
focus on the common parts. There is always a
compromise to achieve between many features and
portability from one implementation to the other.
Highly optimised configurations will be difficult to
achieve using a configuration generation tool like
Verinec.
The centralised approach is less flexible to work
with, as all changes must be done to the central repos-
itory. This could lower the acceptance by system ad-
ministrators. If they would start to configure some
devices from outside the Verinec system, the incon-
sistency risks would rise again. To make it possible to
use Verinec from different locations, we could think
of a server/client approach, for example with a Java
applet as client to access the Verinec system with a
web browser.
REFERENCES
Abrahamson, C., Blodgett, M., Kunen, A., Mueller, N., and
Parter, D. (2003). Splat: A network switch/port con-
figuration management tool. In Seventeenth Systems
Administration Conference (LISA 03), Berkeley, CA,
USA. Usenix.
Barringer, H., Goldberg, A., Havelund, K., and Sen, K.
(2004). Rule-based runtime verification. In Proceed-
ings of Fifth International VMCAI conference (VM-
CAI’04). Springer.
Bellogini, A. and Santarelli, I. (2004). Network markup
language. Technical report, Roma Tre University,
http://giga.dia.uniroma3.it/ ivan/NetML/.
Charles, P. (2001–2005). Jpcap. Technical report,
http://jpcap.sourceforge.net.
Cisco (2005). Internet operation system. Technical report,
Cisco Systems, http://www.cisco.com.
Clark, J. (1999). Xsl transformations (xslt). Technical re-
port, W3C, http://www.w3.org/TR/xslt.
DMTF (1996-2005). Web-based enterprise man-
agement (wbem) initiative. Technical report,
http://www.dmtf.org/standards/wbem/.
Enns, R. (2004). Netconf configuration protocol.
Technical report, Internet Engineering Task Force,
http://www.ops.ietf.org/netconf/.
Fyodor (1997–2005). Network mapper. Technical report,
http://www.insecure.org/nmap/.
Guru, R. (2003). Syncml device management. Technical
report, IBM India Software Labs, http://www-
106.ibm.com/developerworks/wireless/library/wi-
syncml1/.
Hewlett-Packard (2005). Hp openview. Techni-
cal report, Hewlett-Packard Development Company,
http://www.managementsoftware.hp.com.
IBM (2005). Ibm tivoli netview. Technical re-
port, International Business Machines Corp.,
http://www.ibm.com/software/tivoli/products/netview/.
Jungo, D. (2004). The role of simulation in a network con-
figuration engineering approach. In ICICT 2004, Mul-
timedia Services and Underlying Network Infrastruc-
ture, Cairo, Egypt. Information Technology Institute.
Jungo, D., Buchmann, D., and Ultes-Nitsche, U. (2005).
A unit testing framework for network configurations.
In Proceedings of the 3rd International Workshop on
Modelling, Simulation, Verification, and Validation
of Enterprise Information Systems (MS VVEIS 2005),
Miami, Florida, USA. INSTICC Press.
Markovic, S. and Vandamme, A. (2003–2005). Jrobin:
Rrdtool choice for the java world. Technical report,
jrobin.org, http://www.jrobin.org/.
Toledo, J. (2000–2005). Etherape. Technical report,
http://etherape.sourceforge.net.
Ultes-Nitsche, U., Jungo, D., and Buchmann, D.
(2004–2005). Verified network configura-
tion. Technical report, University of Fribourg,
http://diuf.unifr.ch/tns/projects/verinec/.
Wandl (2005). Ip analysis tool. Technical report, Wide
Area Network Design Labroratory, http://www.
wandl.com/html/ipat/IPAT
new.cfm.
AUTOMATED CONFIGURATION DISTRIBUTION IN VERINEC
309