CN112953768A - Three-layer network change scheme verification method and system - Google Patents

Three-layer network change scheme verification method and system Download PDF

Info

Publication number
CN112953768A
CN112953768A CN202110183714.0A CN202110183714A CN112953768A CN 112953768 A CN112953768 A CN 112953768A CN 202110183714 A CN202110183714 A CN 202110183714A CN 112953768 A CN112953768 A CN 112953768A
Authority
CN
China
Prior art keywords
network
change
scheme
verification
change scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110183714.0A
Other languages
Chinese (zh)
Other versions
CN112953768B (en
Inventor
李家炎
秦英杰
许广洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110183714.0A priority Critical patent/CN112953768B/en
Publication of CN112953768A publication Critical patent/CN112953768A/en
Application granted granted Critical
Publication of CN112953768B publication Critical patent/CN112953768B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Abstract

The invention provides a method and a system for verifying a three-layer network change scheme, which can be used in the field of artificial intelligence, wherein the method comprises the following steps: acquiring network equipment information and a scheme change instruction of a three-layer network; obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network; according to the method and the device, the change scheme of the network topology simulation model is verified according to the preset network change verification rule to obtain the scheme verification result.

Description

Three-layer network change scheme verification method and system
Technical Field
The invention relates to the technical field of communication networks, in particular to the technical field of artificial intelligence, and particularly relates to a method and a system for verifying a three-layer network change scheme.
Background
With the rapid development of scientific technology, the demand of users on network performance is higher and higher, the network scale is increased explosively, network changes such as network creation and expansion, rapid service online and frequent policy adjustment bring much pressure to a front-line operation and maintenance staff of the network. At present, the verification of the three-layer network change scheme usually needs to pass through a plurality of manual checks, and the expert experience is greatly depended on. At present, no better verification method exists for whether the production network is negatively influenced after the change and whether the change is expected.
Disclosure of Invention
The invention aims to provide a three-layer network change scheme verification method, which is used for automatically verifying a three-layer network change scheme and improving verification efficiency and accuracy. Another object of the present invention is to provide a three-layer network change scheme verification system. It is yet another object of the present invention to provide such a method. It is a further object of this invention to provide such a readable medium.
In order to achieve the above object, the present invention discloses a method for verifying a three-layer network change scheme, which comprises:
acquiring network equipment information and a scheme change instruction of a three-layer network;
obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network;
and carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
Preferably, the obtaining a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction specifically includes:
forming a configuration surface model according to the network equipment information and the change scheme instruction;
carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model;
and forming the network topology simulation model according to the configuration surface model and the data surface model.
Preferably, the forming a configuration surface model according to the network device information and the change scheme instruction specifically includes:
establishing a simulation network environment according to the network equipment information;
and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
Preferably, the obtaining of the data plane model by performing the change scheme network protocol simulation based on the configuration plane model specifically includes:
analyzing the network equipment information to obtain a data structure of network equipment in a three-layer network, and obtaining a control plane model according to the data structure and a routing protocol;
iterating based on the control plane model to obtain a routing table;
and generating a forwarding table according to the routing table and the access control list to obtain a data plane model.
Preferably, the verifying the change scheme of the network topology simulation model according to the preset network change verification rule to obtain the scheme verification result specifically includes:
obtaining a BDD decision diagram according to the data surface model;
traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths;
and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
The invention also discloses a system for verifying the change scheme of the three-layer network, which comprises the following steps:
the information acquisition module is used for acquiring network equipment information and a scheme change instruction of the three-layer network;
the simulation environment construction module is used for obtaining a network topology simulation model according to the network equipment information of the three-layer network and the change scheme instruction;
and the scheme verification module is used for verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
Preferably, the simulation environment construction module is specifically configured to form a configuration surface model according to the network device information and the change scheme instruction; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
Preferably, the scheme verification module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
The invention also discloses a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method as described above.
The invention also discloses a computer-readable medium, having stored thereon a computer program,
which when executed by a processor implements the method as described above.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram illustrating a method for validating a three-tier network change scheme in accordance with one embodiment of the present invention;
fig. 2 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S200 of the present invention;
fig. 3 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S210 of the present invention;
fig. 4 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S220 of the present invention;
FIG. 5 is a diagram illustrating the generation of a data plane model according to one embodiment of the verification method for three-layer network alterations of the present invention;
fig. 6 is a schematic diagram of a BDD decision diagram according to a specific embodiment of a verification method for a three-layer network change scheme of the present invention; fig. 7 is a diagram of a three-layer network change scenario verification method S300 according to a specific embodiment of the present invention;
fig. 8 is a diagram illustrating path reachability verification in an embodiment of a three-layer network change scenario verification method according to the present invention;
FIG. 9 is a block diagram illustrating a three-layer network change scheme verification system in accordance with one embodiment of the present invention;
FIG. 10 shows a schematic block diagram of a computer device suitable for use in implementing embodiments of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the method and system for verifying the three-layer network change scheme disclosed by the present application can be used in the technical field of artificial intelligence, and can also be used in any field except the technical field of artificial intelligence.
According to one aspect of the present invention, the present embodiment discloses a verification method for a three-layer network change scheme. As shown in fig. 1, in this embodiment, the method includes:
s100: and acquiring network equipment information and a change scheme instruction of the three-layer network.
S200: and obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network.
S300: and carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result. The preset network change verification rule can be obtained by implementing the change intention of a change staff on the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change staff can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
In a preferred embodiment, as shown in fig. 2, the obtaining, by the S200, a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction specifically includes:
s210: and forming a configuration surface model according to the network equipment information and the change scheme instruction.
S220: and simulating a change scheme network protocol based on the configuration surface model to obtain a data surface model.
S230: and forming the network topology simulation model according to the configuration surface model and the data surface model.
It will be appreciated that the network device information may be obtained in the form of a call interface. For the change scheme, the change scheme instruction of the change scheme can be acquired in the form of command input or interface call. And forming a configuration surface model according to the network equipment information and the change scheme instruction. Further, a change scheme network protocol is simulated based on the configuration surface model to obtain a data surface model. And then, the network topology simulation model is formed according to the configuration surface model and the data surface model, and the network topology simulation model is subjected to scheme change verification according to a preset network change verification rule to obtain a scheme verification result, so that the aim of verifying the network change scheme in advance is fulfilled, and the scheme verification efficiency and accuracy are greatly improved.
In a preferred embodiment, as shown in fig. 3, the forming, by the S210, the configuration surface model according to the network device information and the change plan instruction specifically includes:
s211: and establishing a simulation network environment according to the network equipment information.
S212: and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
It can be understood that the change plan command and the device configuration of the network device information can be combined to uniformly generate the configuration plane model. In one specific example, for a router in a three-layer network, the change plan instruction input is:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
commit
the configured network device information is as follows:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
that is, in this specific example, in order to convert the change plan command into the configuration surface model, "commit" may be removed, and the configuration surface model may be merged.
Then, an accurate simulation network environment can be quickly constructed through the information such as the LLDP list, the MAC information and the like in the acquired network equipment information. The constructed simulation network environment has self-preservation capability, and can realize automatic information acquisition and automatic updating through linkage with a network management platform. In addition, all the change operations in the simulation network environment are deductions, and the real production environment is not influenced.
In a preferred embodiment, as shown in fig. 4, the step S220 of performing a change plan network protocol simulation based on the configuration plane model to obtain a data plane model specifically includes:
s221: and analyzing the network equipment information to obtain a data structure of the network equipment in the three-layer network, and obtaining a control plane model according to the data structure and a routing protocol.
S222: and iterating based on the control plane model to obtain a routing table.
S223: and generating a forwarding table according to the routing table and an Access Control List (ACL) to obtain a data plane model.
It can be understood that, based on the configuration surface model, the control surface model is formed by combining rules such as the routing protocol, and then the network protocol simulation table entry is performed, so that the data surface model can be generated. On the basis of the control plane model, a routing information base (rib) is generated through continuous iteration, and a forwarding table (fib) is generated by combining with the ACL, as shown in fig. 5.
In the obtained data plane model, the segment or ip can be represented by non-classification programming, and is composed of 32 boolean vectors (the star is a wildcard, the representation 0/1 can be used, and the wildcard can not be represented in the BDD). A certain network segment or ip is represented by a BDD decision diagram, and whether another ip/network segment belongs to or is contained in the network segment can be judged by retrieving the BDD binary decision diagram. For example, 1.0.0/8, 00000010, and 1.0.0.0/8 may represent a BDD plot as shown in fig. 6. A certain network segment or ip matches the decision diagram, from top to bottom (from the 32 th bit to the 25 th bit), if both are matched, the network segment belongs to two network segments of 1.0.0.0/8U 2.0.0.0/8.
In a preferred embodiment, as shown in fig. 7, the step S300 of performing a change scheme verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result specifically includes:
s310: and obtaining a BDD decision diagram according to the data plane model.
S320: and traversing all paths of the BDD decision diagram through a breadth-first search algorithm to determine all reachable paths.
S330: and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
It can be understood that, a corresponding verification step can be obtained in advance according to the change intention of implementing the change scheme of the change staff, or a preset network change verification rule can be obtained by using a tracert route check path (whether the tracert route passes through a specified device) in the change scheme as the intention, and whether the change scheme meets the change intention of implementing the change staff is verified according to a quantized preset network change verification rule. For example, for the setting of the verification step, in a specific example, when a route is added to the change scheme, the end-to-end reachability of the route needs to be verified when the intention of the change scheme is verified, and particularly when one end of the route is not in the simulation range, the command of whether the change configuration in the simulation range has a change can be verified. Specifically, the changing step of adding the route in the changing scheme is as follows:
ssh 123.88.131.130//TH0245RT0A-C1//
ter mon
conf t
ip route 123.88.146.22 255.255.255.255 123.88.132.49
end
wr
exit
the corresponding verification step may be set to:
ssh 123.88.131.130//TH0245RT0A-C1//
show ip route// if 123.88.146.22 exists, show it if so
ip route 123.88.146.22 255.255.255.255 123.88.132.49。
In the above specific example, a BDD decision graph is obtained according to the data plane model. The reachability problem can be converted into traversing all paths according to the starting point and the end point through a breadth-first search (BFS) algorithm, the starting point and the end point are subjected to traffic operation on the link BDD on each path through the network segments, and if the result is not empty, the path can be reached. If the result is null, the path is not reachable. And verifying the change scheme by determining whether the reachable path conforms to the preset network change verification rule to obtain a scheme verification result.
For example, as shown in fig. 8, in order to verify the change scheme, the reachability of the routing device needs to be determined. In fig. 8, routing devices 1 to 23 having an interconnection relationship are shown, and according to the determined starting point device 13 and the determined end point device 10, all paths are traversed through BFS, and finally, an reachable path between the device 13 and the device 10 is obtained, such as a path represented by an arrow in fig. 8, which indicates that the path is reachable.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result, and using mathematical model verification to replace the prior art that the accuracy of the scheme change can be ensured only by manual recheck verification. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance, verify the accuracy of the change scheme and improve the change risk control capability, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Based on the same principle, the embodiment also discloses a verification system for the three-layer network change scheme. As shown in fig. 9, the system includes an information acquisition module 11, a simulation environment construction module 12, and a scenario verification module 13.
The information obtaining module 11 is configured to obtain network device information and a change scheme instruction of a three-layer network.
The simulation environment construction module 12 is configured to obtain a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction.
And the scheme verification module 13 is configured to perform scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
In a preferred embodiment, the simulation environment construction module is specifically configured to form a configuration surface model according to the network device information and a change scheme instruction; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
It will be appreciated that the network device information may be obtained in the form of a call interface. For the change scheme, the change scheme instruction of the change scheme can be acquired in the form of command input or interface call. And forming a configuration surface model according to the network equipment information and the change scheme instruction. Further, a change scheme network protocol is simulated based on the configuration surface model to obtain a data surface model. And then, the network topology simulation model is formed according to the configuration surface model and the data surface model, and the network topology simulation model is subjected to scheme change verification according to a preset network change verification rule to obtain a scheme verification result, so that the aim of verifying the network change scheme in advance is fulfilled, and the scheme verification efficiency and accuracy are greatly improved.
In a preferred embodiment, the simulation environment building module is specifically configured to build a simulation network environment according to the network device information. And modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
It can be understood that the change plan command and the device configuration of the network device information can be combined to uniformly generate the configuration plane model. In a specific example, on Huanji router, the change plan instruction input is:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
commit
the configured network device information is as follows:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
that is, in this specific example, in order to convert the change plan command into the configuration surface model, "commit" may be removed, and the configuration surface model may be merged.
Then, an accurate simulation network environment can be quickly constructed through the input of the LLDP list, the MAC information and the like in the acquired network equipment information. The constructed simulation network environment has self-preservation capability, and can realize automatic information acquisition and automatic updating through linkage with a network management platform. In addition, all the change operations in the simulation network environment are deductions, and the real production environment is not influenced.
In a preferred embodiment, the simulation environment building module is specifically configured to analyze the network device information to obtain a data structure of a network device in a three-layer network, and obtain a control plane model according to the data structure and a routing protocol. And iterating based on the control plane model to obtain a routing table. And generating a forwarding table according to the routing table and an Access Control List (ACL) to obtain a data plane model.
It is to be appreciated that the data plane model can be generated based on a configuration plane model, performing network protocol simulations. Specifically, the information configuration of the network equipment can be analyzed to generate a uniform data structure, and then a control plane model is formed by combining rules such as a routing protocol. On the basis of the control plane model, a routing information base (rib) is generated through continuous iteration, and a forwarding table (fib) is generated by combining with the ACL, as shown in fig. 5.
In the obtained data plane model, the segment or ip can be represented by non-classification programming, and is composed of 32 boolean vectors (the star is a wildcard, the representation 0/1 can be used, and the wildcard can not be represented in the BDD). A certain network segment or ip is represented by a BDD decision diagram, and whether another ip/network segment belongs to or is contained in the network segment can be judged by retrieving the BDD binary decision diagram. For example, 1.0.0/8, 00000010, and 1.0.0.0/8 may represent a BDD plot as shown in fig. 6. A certain network segment or ip matches the decision diagram, from top to bottom (from the 32 th bit to the 25 th bit), if both are matched, the network segment belongs to two network segments of 1.0.0.0/8U 2.0.0.0/8.
In a preferred embodiment, the scheme verification module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
It can be understood that, a corresponding verification step can be obtained in advance according to the change intention of implementing the change scheme of the change staff, or a preset network change verification rule can be obtained by using a tracert route check path (whether the tracert route passes through a specified device) in the change scheme as the intention, and whether the change scheme meets the change intention of implementing the change staff is verified according to a quantized preset network change verification rule. For example, for the setting of the verification step, in a specific example, when a route is added to the change scheme, the end-to-end reachability of the route needs to be verified when the intention of the change scheme is verified, and particularly when one end of the route is not in the simulation range, the command of whether the change configuration in the simulation range has a change can be verified. Specifically, the changing step of adding the route in the changing scheme is as follows:
ssh 123.88.131.130//TH0245RT0A-C1//
ter mon
conf t
ip route 123.88.146.22 255.255.255.255 123.88.132.49
end
wr
exit
the corresponding verification step may be set to:
ssh 123.88.131.130//TH0245RT0A-C1//
show ip route// if 123.88.146.22 exists, show it if so
ip route 123.88.146.22 255.255.255.255 123.88.132.49。
In the above specific example, a BDD decision graph is obtained according to the data plane model. The reachability problem can be converted into traversing all paths according to the starting point and the end point through a breadth-first search (BFS) algorithm, the starting point and the end point are subjected to traffic operation on the link BDD on each path through the network segments, and if the result is not empty, the path can be reached. If the result is null, the path is not reachable. And verifying the change scheme by determining whether the reachable path conforms to the preset network change verification rule to obtain a scheme verification result.
For example, as shown in fig. 8, in order to verify the change scheme, the reachability of the routing device needs to be determined. In fig. 8, routing devices 1 to 23 having an interconnection relationship are shown, and according to the determined starting point device 13 and the determined end point device 10, all paths are traversed through BFS, and finally, an reachable path between the device 13 and the device 10 is obtained, such as a path represented by an arrow in fig. 8, which indicates that the path is reachable.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result, and using mathematical model verification to replace the prior art that the accuracy of the scheme change can be ensured only by manual recheck verification. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance, verify the accuracy of the change scheme and improve the change risk control capability, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Since the principle of the system for solving the problem is similar to the above method, the implementation of the system can refer to the implementation of the method, and the detailed description is omitted here.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example, the computer device specifically comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method performed by the client as described above when executing the program, or the processor implementing the method performed by the server as described above when executing the program.
Referring now to FIG. 10, shown is a schematic diagram of a computer device 600 suitable for use in implementing embodiments of the present application.
As shown in fig. 10, the computer apparatus 600 includes a Central Processing Unit (CPU)601 which can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output section 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted as necessary on the storage section 608.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the invention include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for verifying a three-layer network change scheme is characterized by comprising the following steps:
acquiring network equipment information and a scheme change instruction of a three-layer network;
obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network;
and carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
2. The method for verifying a change scheme of a three-layer network according to claim 1, wherein the obtaining a network topology simulation model according to the network device information and the change scheme instruction of the three-layer network specifically comprises:
forming a configuration surface model according to the network equipment information and the change scheme instruction;
carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model;
and forming the network topology simulation model according to the configuration surface model and the data surface model.
3. The method of verifying a change scheme in a three-tier network according to claim 2, wherein the forming a configuration surface model according to the network device information and the change scheme instruction specifically includes:
establishing a simulation network environment according to the network equipment information;
and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
4. The method for verifying a change scheme of a three-layer network according to claim 2, wherein the simulating a change scheme network protocol based on the configuration plane model to obtain a data plane model specifically comprises:
analyzing the network equipment information to obtain a data structure of network equipment in a three-layer network, and obtaining a control plane model according to the data structure and a routing protocol;
iterating based on the control plane model to obtain a routing table;
and generating a forwarding table according to the routing table and the access control list to obtain a data plane model.
5. The method for verifying the change scheme of the three-layer network according to claim 4, wherein the step of verifying the change scheme of the network topology simulation model according to the preset network change verification rule to obtain the scheme verification result specifically comprises:
obtaining a BDD decision diagram according to the data surface model;
traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths;
and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
6. A three-tier network change scheme verification system, comprising:
the information acquisition module is used for acquiring network equipment information and a scheme change instruction of the three-layer network;
the simulation environment construction module is used for obtaining a network topology simulation model according to the network equipment information of the three-layer network and the change scheme instruction;
and the scheme verification module is used for verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
7. The system of claim 6, wherein the simulation environment build module is specifically configured to form a configuration surface model according to the network device information and change plan instructions; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
8. The system of claim 7, wherein the schema validation module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
9. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method of any of claims 1-5.
10. A computer-readable medium, having stored thereon a computer program,
the program when executed by a processor implementing the method according to any one of claims 1-5.
CN202110183714.0A 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system Active CN112953768B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110183714.0A CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110183714.0A CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Publications (2)

Publication Number Publication Date
CN112953768A true CN112953768A (en) 2021-06-11
CN112953768B CN112953768B (en) 2023-02-24

Family

ID=76245563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110183714.0A Active CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Country Status (1)

Country Link
CN (1) CN112953768B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411221A (en) * 2021-06-30 2021-09-17 中国南方电网有限责任公司 Power communication network fault simulation verification method, device, equipment and storage medium
CN115277405A (en) * 2022-06-24 2022-11-01 中国工商银行股份有限公司 Automatic driving network generation method and device based on digital twins

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002185512A (en) * 2000-12-12 2002-06-28 Hitachi Ltd Method for verifying connectivity of network
JP2007208633A (en) * 2006-02-01 2007-08-16 Mitsubishi Electric Corp Device, method and program for designing network
CN102315963A (en) * 2011-08-11 2012-01-11 百度在线网络技术(北京)有限公司 Method for authenticating system configuration change and equipment
CN108322394A (en) * 2018-04-02 2018-07-24 京信通信系统(中国)有限公司 Routing table is established, searched, deleting and Status Change method and apparatus
CN110855457A (en) * 2018-08-20 2020-02-28 阿里巴巴集团控股有限公司 Method and device for generating network model and configuring network
CN111726255A (en) * 2020-06-23 2020-09-29 中国工商银行股份有限公司 Processing method and device for network change
CN111835532A (en) * 2019-04-11 2020-10-27 华为技术有限公司 Network authentication method and device
CN111934921A (en) * 2020-07-29 2020-11-13 深信服科技股份有限公司 Network topology discovery method and device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002185512A (en) * 2000-12-12 2002-06-28 Hitachi Ltd Method for verifying connectivity of network
JP2007208633A (en) * 2006-02-01 2007-08-16 Mitsubishi Electric Corp Device, method and program for designing network
CN102315963A (en) * 2011-08-11 2012-01-11 百度在线网络技术(北京)有限公司 Method for authenticating system configuration change and equipment
CN108322394A (en) * 2018-04-02 2018-07-24 京信通信系统(中国)有限公司 Routing table is established, searched, deleting and Status Change method and apparatus
CN110855457A (en) * 2018-08-20 2020-02-28 阿里巴巴集团控股有限公司 Method and device for generating network model and configuring network
CN111835532A (en) * 2019-04-11 2020-10-27 华为技术有限公司 Network authentication method and device
CN111726255A (en) * 2020-06-23 2020-09-29 中国工商银行股份有限公司 Processing method and device for network change
CN111934921A (en) * 2020-07-29 2020-11-13 深信服科技股份有限公司 Network topology discovery method and device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411221A (en) * 2021-06-30 2021-09-17 中国南方电网有限责任公司 Power communication network fault simulation verification method, device, equipment and storage medium
CN115277405A (en) * 2022-06-24 2022-11-01 中国工商银行股份有限公司 Automatic driving network generation method and device based on digital twins

Also Published As

Publication number Publication date
CN112953768B (en) 2023-02-24

Similar Documents

Publication Publication Date Title
CN110609759B (en) Fault root cause analysis method and device
US10489363B2 (en) Distributed FP-growth with node table for large-scale association rule mining
Knowles et al. A new evolutionary approach to the degree-constrained minimum spanning tree problem
CN112953768B (en) Three-layer network change scheme verification method and system
Wang et al. Service placement for collaborative edge applications
CN110601978B (en) Flow distribution control method and device
CN114072820A (en) Executing machine learning models
CN114556381A (en) Developing machine learning models
CN111625258A (en) Mercker tree updating method, device, equipment and readable storage medium
CN113572697A (en) Load balancing method based on graph convolution neural network and deep reinforcement learning
CN107679107B (en) Graph database-based power grid equipment reachability query method and system
US20180309639A1 (en) Dynamic computer network classification using machine learning
CN114629767A (en) Power dispatching network simulation method and device, computer equipment and storage medium
US10747936B1 (en) System, method, and computer program product for genetic routing in an electronic circuit design
JP2022013844A (en) Information processing method, information processing device and program
CN113132125A (en) Fault reason positioning method and device, electronic equipment and storage medium
CN111144540A (en) Generation method of anti-electricity-stealing simulation data set
Takano et al. Fundamental framework for describing various node centralities using an oscillation model on social media networks
CN112580803B (en) Model acquisition method, apparatus, electronic device, storage medium, and program product
Mueller-Bady et al. Using evolutionary dynamic optimization for monitor selection in highly dynamic communication infrastructures
US11818016B2 (en) Network design apparatus, network design method and program
Zhao et al. Virtual network embedding on massive substrate networks
US11275881B1 (en) System, method, and computer program product for genetic routing in an electronic circuit design
Mueller-Bady et al. On the feasibility of using hybrid evolutionary dynamic optimization for optimal monitor selection in dynamic communication networks
CN112633559A (en) Social relationship prediction method and system based on dynamic graph convolutional neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant