From the device’s point of view, changing its posi-
tion means getting into a new environment. For the
other devices, like mobile devices in an ad hoc net-
work or the base station in an infrastructure mode
network, the mobile device moving around changes
their environment. Whenever a packet is sent over
a wireless network interface, the environment of the
interface is consulted to decide which interfaces are
currently in range to receive the packet.
This allows to test the configuration of the services
involved in handling mobile devices. As an example,
for employees connecting their notebook from out-
side the network using a VPN
4
, security policy might
require that they can not access a file server with con-
fidential files. However, if the same employee takes
his notebook to the office, he must be able to use all
services. This example also shows that in configura-
tion tests, mobile does not automatically imply wire-
less. The concept can also be used with devices con-
nected to different networks by cables.
Mobility has not only an impact on the simulation
framework, but also on the mobile device’s run-time
configuration. When changing from one base station
to another, the mobile device might also change its IP
address and default gateway, which can be static or
received dynamically via DHCP. Once the mobile de-
vice has an IP address, its behaviour in the new envi-
ronment can be tested using the appropriate test cases
with input events and expected outcome. However,
this dynamic configuration has to be achieved by sim-
ulating network protocols. As the final aim is to have
a correctly working real network, we need a realis-
tic simulation. Environmental acquisition can not be
used directly to update the mobile device’s configura-
tion.
5 CONCLUSION
In this paper, we presented the concept of envi-
ronmental acquisition proposed in (Gil and Lorenz,
1996). We then explored the application of this con-
cept to network management and network simulation.
The network defines a natural containment struc-
ture to acquire information from. Additional contain-
ments not directly visible in the network topology,
like rooms or floors, can be taken into account too.
The concept is quite powerful in order to reduce re-
dundancy and thus ensure consistency of configura-
tion data. At the same time, the effort to change the
configuration is diminished. Even changing a setting
that affects all workstations like the name of the file
server can be done in one place and all stations are
updated accordingly.
4
Virtual Private Network is a standard to tunnel a con-
nection over an untrusted network into the local network.
For simulation, environmental acquisition helps to
model mobile devices moving in and out of reach of
other wireless stations. Because we are interested in
the correctness of configuration and not in the details
of wireless protocols, acquisition allows us to simu-
late exactly the level of detail we need.
REFERENCES
Abrahamson, C., Blodgett, M., Kunen, A., Mueller, N., and
Parter, D. (2003). Splat: A network switch/port con-
figuration management tool. In Seventeenth Systems
Administration Conference (LISA 03), Berkeley, CA,
USA. Usenix.
Anderson, P. and Scobie, A. (2002). LCFG - the Next Gen-
eration. In UKUUG Winter Conference. UKUUG.
Buchmann, D., Jungo, D., and Ultes-Nitsche, U. (2005).
Automated configuration distribution in Verinec. In
Proceedings of the 2nd International Conference on e-
Business and Telecommunications Networks (ICETE
2005), Reading, UK. INSTICC Press.
Burgess, M. (1995). Cfengine: a site configuration engine.
In USENIX Computing systems, volume 8, University
of Oslo, Norway. Usenix.
Gil, J. and Lorenz, D. H. (1996). Environmental Acquisition
– A New Inheritance-Like Abstraction Mechanism.
In Proceedings of the 11
th
Annual Conference on
Object-Oriented Programming Systems, Languages,
and Applications, pages 214–231. OOPSLA’96.
Jungo, D., Buchmann, D., and Ultes-Nitsche, U. (2004).
The role of simulation in a network configuration en-
gineering approach. In ICICT 2004, Multimedia Ser-
vices and Underlying Network Infrastructure, Cairo,
Egypt. Information Technology Institute.
Jungo, D., Buchmann, D., and Ultes-Nitsche, U. (2005).
A unit testing framework for network configurations.
In Proceedings of the 3rd International Workshop on
Modelling, Simulation, Verification, and Validation
of Enterprise Information Systems (MSVVEIS 2005),
Miami, Florida, USA. INSTICC Press.
Jungo, D., Buchmann, D., and Ultes-Nitsche, U. (2006).
Testing of semantic properties in XML documents.
In Proceedings of the 4rd International Workshop on
Modelling, Simulation, Verification, and Validation of
Enterprise Information Systems (MSVVEIS 2006), Pa-
phos, Cyprus. INSTICC Press.
Lhotka, L. and Novotny, J. (2002-2005). Netopeer. Tech-
nical report, Cesnet, http://www.liberouter.
org/netopeer/.
Logan, M., Felleisen, M., and Blank-Edelman, D. (2002).
Environmental Acquisition in Network Manage-
ment. In Sixteenth Systems Administration Conference
(LISA 02), pages 175–184, Berkeley, CA, USA.
Page, B., Lechler, T., and Claassen, S. (2000). Objek-
torientierte Simulation in Java mit dem Framework
DESMO-J. BoD GmbH, Norderstedt.