CN112953768B - Three-layer network change scheme verification method and system - Google Patents

Three-layer network change scheme verification method and system Download PDF

Info

Publication number
CN112953768B
CN112953768B CN202110183714.0A CN202110183714A CN112953768B CN 112953768 B CN112953768 B CN 112953768B CN 202110183714 A CN202110183714 A CN 202110183714A CN 112953768 B CN112953768 B CN 112953768B
Authority
CN
China
Prior art keywords
network
change
scheme
verification
change scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110183714.0A
Other languages
Chinese (zh)
Other versions
CN112953768A (en
Inventor
李家炎
秦英杰
许广洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110183714.0A priority Critical patent/CN112953768B/en
Publication of CN112953768A publication Critical patent/CN112953768A/en
Application granted granted Critical
Publication of CN112953768B publication Critical patent/CN112953768B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Abstract

The invention provides a method and a system for verifying a three-layer network change scheme, which can be used in the field of artificial intelligence, wherein the method comprises the following steps: acquiring network equipment information and a scheme change instruction of a three-layer network; obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network; according to the method and the device, the change scheme of the network topology simulation model is verified according to the preset network change verification rule to obtain the scheme verification result.

Description

Three-layer network change scheme verification method and system
Technical Field
The invention relates to the technical field of communication networks, in particular to the technical field of artificial intelligence, and particularly relates to a method and a system for verifying a three-layer network change scheme.
Background
With the rapid development of scientific technology, the demand of users on network performance is higher and higher, the network scale is increased explosively, network changes such as network creation and expansion, rapid service online and frequent policy adjustment bring much pressure to a front-line operation and maintenance staff of the network. At present, the verification of the three-layer network change scheme usually needs to pass through a plurality of manual inspections and greatly depends on expert experience. At present, no better verification method exists for whether the production network is negatively influenced after the change and whether the change is expected.
Disclosure of Invention
The invention aims to provide a three-layer network change scheme verification method, which is used for automatically verifying a three-layer network change scheme and improving verification efficiency and accuracy. Another object of the present invention is to provide a three-layer network change scheme verification system. It is yet another object of the present invention to provide such a method. It is a further object of the invention to provide a readable medium.
In order to achieve the above object, the present invention discloses a method for verifying a three-layer network change scheme, which comprises:
acquiring network equipment information and a scheme change instruction of a three-layer network;
obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network;
and carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
Preferably, the obtaining a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction specifically includes:
forming a configuration surface model according to the network equipment information and the change scheme instruction;
carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model;
and forming the network topology simulation model according to the configuration surface model and the data surface model.
Preferably, the forming a configuration surface model according to the network device information and the change scheme instruction specifically includes:
establishing a simulation network environment according to the network equipment information;
and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
Preferably, the obtaining of the data plane model by performing the change scheme network protocol simulation based on the configuration plane model specifically includes:
analyzing the network equipment information to obtain a data structure of network equipment in a three-layer network, and obtaining a control plane model according to the data structure and a routing protocol;
iterating based on the control plane model to obtain a routing table;
and generating a forwarding table according to the routing table and the access control list to obtain a data plane model.
Preferably, the verifying the change scheme of the network topology simulation model according to the preset network change verification rule to obtain the scheme verification result specifically includes:
obtaining a BDD decision diagram according to the data surface model;
traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths;
and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
The invention also discloses a system for verifying the change scheme of the three-layer network, which comprises the following steps:
the information acquisition module is used for acquiring network equipment information and a scheme change instruction of the three-layer network;
the simulation environment construction module is used for obtaining a network topology simulation model according to the network equipment information of the three-layer network and the change scheme instruction;
and the scheme verification module is used for verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
Preferably, the simulation environment construction module is specifically configured to form a configuration surface model according to the network device information and the change scheme instruction; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
Preferably, the scheme verification module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path accords with the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
The invention also discloses a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method as described above.
The invention also discloses a computer-readable medium, having stored thereon a computer program,
which program, when executed by a processor, carries out the method as described above.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, according to a preset network change verification rule, carrying out change scheme verification on the network topology simulation model to obtain a scheme verification result. The preset network change verification rule can be obtained by the change intention of the implementation change personnel on the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the implementation change personnel can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Figure 1 illustrates a flow diagram of one embodiment of a method for validating a three-layer network change scenario in accordance with the present invention;
fig. 2 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S200 of the present invention;
fig. 3 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S210 of the present invention;
fig. 4 is a flowchart of a verification method for a three-layer network change scheme according to a specific embodiment S220 of the present invention;
FIG. 5 is a diagram illustrating the generation of a data plane model according to one embodiment of the verification method for three-layer network alterations of the present invention;
fig. 6 is a schematic diagram of a BDD decision diagram according to a specific embodiment of a verification method for a three-layer network change scheme of the present invention; fig. 7 is a diagram of a verification method S300 for a three-layer network change scenario according to a specific embodiment of the present invention;
fig. 8 is a diagram illustrating path reachability verification in an embodiment of a three-layer network change scenario verification method according to the present invention;
figure 9 is a block diagram illustrating one embodiment of a three-layer network change scenario verification system in accordance with the present invention;
FIG. 10 shows a schematic block diagram of a computer device suitable for use to implement an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the method and system for verifying the three-layer network change scheme disclosed by the present application can be used in the technical field of artificial intelligence, and can also be used in any field except the technical field of artificial intelligence.
According to one aspect of the present invention, the present embodiment discloses a verification method for a three-layer network change scheme. As shown in fig. 1, in this embodiment, the method includes:
s100: and acquiring network equipment information and a change scheme instruction of the three-layer network.
S200: and obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network.
S300: and verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
The invention constructs a network topology simulation model through network equipment information and a change scheme instruction of a three-layer network. And then, according to a preset network change verification rule, carrying out change scheme verification on the network topology simulation model to obtain a scheme verification result. The preset network change verification rule can be obtained by implementing the change intention of a change staff on the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change staff can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
In a preferred embodiment, as shown in fig. 2, the obtaining, by the S200, a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction specifically includes:
s210: and forming a configuration surface model according to the network equipment information and the change scheme instruction.
S220: and simulating a change scheme network protocol based on the configuration surface model to obtain a data surface model.
S230: and forming the network topology simulation model according to the configuration surface model and the data surface model.
It will be appreciated that the network device information may be obtained in the form of a call interface. For the change scheme, the change scheme instruction of the change scheme can be acquired in the form of command input or interface call. And forming a configuration surface model according to the network equipment information and the change scheme instruction. Further, a change scheme network protocol is simulated based on the configuration surface model to obtain a data surface model. And then, the network topology simulation model is formed according to the configuration surface model and the data surface model, and the network topology simulation model is subjected to scheme change verification according to a preset network change verification rule to obtain a scheme verification result, so that the aim of verifying the network change scheme in advance is fulfilled, and the scheme verification efficiency and accuracy are greatly improved.
In a preferred embodiment, as shown in fig. 3, the forming, by the S210, the configuration surface model according to the network device information and the change plan instruction specifically includes:
s211: and establishing a simulation network environment according to the network equipment information.
S212: and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
It is understood that the change plan command may be combined with the device configuration of the network device information to uniformly generate the configuration plane model. In one specific example, for a router in a three-layer network, the change plan instruction input is:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
commit
the configured network device information is as follows:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
that is, in this specific example, in order to convert the change plan command into the configuration surface model, "commit" may be removed, and the configuration surface model may be merged.
Then, an accurate simulation network environment can be quickly constructed through the information such as the LLDP list, the MAC information and the like in the acquired network equipment information. The constructed simulation network environment has self-preservation capability, and can realize automatic information acquisition and automatic updating through linkage with a network management platform. In addition, all the changing operations in the simulation network environment are deduction, and the real production environment is not influenced.
In a preferred embodiment, as shown in fig. 4, the step S220 of performing a change plan network protocol simulation based on the configuration plane model to obtain a data plane model specifically includes:
s221: and analyzing the network equipment information to obtain a data structure of the network equipment in the three-layer network, and obtaining a control plane model according to the data structure and a routing protocol.
S222: and iterating based on the control plane model to obtain a routing table.
S223: and generating a forwarding table according to the routing table and an Access Control List (ACL) to obtain a data plane model.
It can be understood that, based on the configuration surface model, the control surface model is formed by combining rules such as the routing protocol, and then the network protocol simulation table entry is performed, so that the data surface model can be generated. On the basis of the control plane model, a Routing Information Base (RIB) is generated through continuous iteration, and a forwarding information table (FIB) is generated by combining an ACL, as shown in fig. 5.
In the obtained data plane model, the network segment or ip can be represented by non-classification programming and consists of 32 Boolean vectors (the x is a wildcard which can represent 0/1, and the wildcard can not be represented in the BDD). A certain network segment or ip is represented by a BDD decision diagram, and whether another ip/network segment belongs to or is contained in the network segment can be judged by retrieving the BDD binary decision diagram. For example, 1.0.0/8 =0000, 2.0.0/8 0000 0010, and 1.0.0/u 2.0/8 may be expressed as a BDD map, as shown in fig. 6. A certain network segment or ip matches the decision diagram, from top to bottom (from the 32 th bit to the 25 th bit), if both are matched, the network segment belongs to two network segments of 1.0.0.0/8U 2.0.0/8.
In a preferred embodiment, as shown in fig. 7, the step S300 of performing a change scheme verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result specifically includes:
s310: and obtaining a BDD decision diagram according to the data plane model.
S320: and traversing all paths of the BDD decision diagram through a breadth-first search algorithm to determine all reachable paths.
S330: and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
It can be understood that, a corresponding verification step can be obtained in advance according to the change intention of implementing the change scheme of the change staff, or a preset network change verification rule can be obtained by using a tracert route check path (whether the tracert route passes through a specified device) in the change scheme as the intention, and whether the change scheme meets the change intention of implementing the change staff is verified according to a quantized preset network change verification rule. For example, for the setting of the verification step, in a specific example, when a route is added to the change scheme, the end-to-end reachability of the route needs to be verified when verifying the intention of the change scheme, and especially for the case where one end is not in the simulation range, the verification may be performed by verifying whether there is a command of a change in the change configuration within the simulation range. Specifically, the changing step of adding the route in the changing scheme is as follows:
ssh 123.88.131.130//TH0245RT0A-C1//
ter mon
conf t
ip route 123.88.146.22 255.255.255.255 123.88.132.49
end
wr
exit
the corresponding verification steps may be arranged as:
ssh 123.88.131.130//TH0245RT0A-C1//
show ip route// if there is 123.88.146.22, if there is, display
ip route 123.88.146.22 255.255.255.255 123.88.132.49。
In the above specific example, a BDD decision graph is obtained according to the data plane model. The reachability problem can be converted into traversing all paths according to the starting point and the end point through a breadth-first search (BFS) algorithm, the starting point and the end point are subjected to traffic operation on the link BDD on each path through the network segments, and if the result is not empty, the path can be reached. If the result is null, the path is not reachable. And verifying the change scheme by determining whether the reachable path conforms to the preset network change verification rule to obtain a scheme verification result.
For example, as shown in FIG. 8, in order to validate a change scenario, the reachability of the routing device needs to be determined. In fig. 8, the routing devices 1 to 23 are shown in a connected relationship with each other, and according to the determined starting device 13 and end device 10, all paths are traversed through BFS, and finally, a reachable path between the device 13 and the device 10 is obtained, such as a path represented by an arrow in fig. 8, which indicates that the path is reachable.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out modification scheme verification on the network topology simulation model according to a preset network modification verification rule to obtain a scheme verification result, and ensuring the accuracy of the modification scheme by using mathematical model verification instead of manual recheck verification at present. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance, verify the accuracy of the change scheme and improve the change risk control capability, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Based on the same principle, the embodiment also discloses a verification system for the three-layer network change scheme. As shown in fig. 9, the system includes an information acquisition module 11, a simulation environment construction module 12, and a scenario verification module 13.
The information obtaining module 11 is configured to obtain network device information and a change scheme instruction of a three-layer network.
The simulation environment constructing module 12 is configured to obtain a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction.
And the scheme verification module 13 is configured to perform scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, according to a preset network change verification rule, carrying out change scheme verification on the network topology simulation model to obtain a scheme verification result. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance and verify the accuracy of the change scheme, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
In a preferred embodiment, the simulation environment building module is specifically configured to form a configuration surface model according to the network device information and a change scheme instruction; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
It will be appreciated that the network device information may be obtained in the form of a call interface. For the change scheme, the change scheme instruction of the change scheme can be acquired in the form of command input or interface call. And forming a configuration surface model according to the network equipment information and the change scheme instruction. Further, a change scheme network protocol is simulated based on the configuration surface model to obtain a data surface model. And then, the network topology simulation model is formed according to the configuration surface model and the data surface model, and the network topology simulation model is subjected to scheme change verification according to a preset network change verification rule to obtain a scheme verification result, so that the aim of verifying the network change scheme in advance is fulfilled, and the scheme verification efficiency and accuracy are greatly improved.
In a preferred embodiment, the simulation environment building module is specifically configured to build a simulation network environment according to the network device information. And modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
It can be understood that the change plan command and the device configuration of the network device information can be combined to uniformly generate the configuration plane model. In one specific example, on Huawei router, the change plan instruction input is:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
commit
the configured network device information is as follows:
interface 40GE3/0/6
shutdown
undo shutdown
undo portswitch
description TO_BF68SW27-VZ-M31D_40GE-1/0/1
ip address 80.108.68.161 255.255.255.252
ospf network-type p2p
ospf timer hello 5
that is, in this specific example, in order to convert the change plan command into the configuration surface model, "commit" may be removed, and the configuration surface model may be merged.
Then, an accurate simulation network environment can be quickly constructed through the input of the LLDP list, the MAC information and the like in the acquired network equipment information. The constructed simulation network environment has self-preservation capability, and can realize automatic information acquisition and automatic updating through linkage with a network management platform. In addition, all the change operations in the simulation network environment are deductions, and the real production environment is not influenced.
In a preferred embodiment, the simulation environment building module is specifically configured to analyze the network device information to obtain a data structure of a network device in a three-layer network, and obtain a control plane model according to the data structure and a routing protocol. And iterating based on the control plane model to obtain a routing table. And generating a forwarding table according to the routing table and an Access Control List (ACL) to obtain a data plane model.
It is to be appreciated that the data plane model can be generated based on a configuration plane model, performing network protocol simulations. Specifically, the information configuration of the network equipment can be analyzed to generate a uniform data structure, and then a control plane model is formed by combining rules such as a routing protocol. On the basis of the control plane model, a Routing Information Base (RIB) is generated through continuous iteration, and a forwarding information table (FIB) is generated by combining an ACL, as shown in fig. 5.
In the obtained data plane model, the network segment or ip can be represented by non-classification programming and consists of 32 Boolean vectors (the x is a wildcard which can represent 0/1, and the wildcard can not be represented in the BDD). A certain network segment or ip is represented by a BDD decision diagram, and whether another ip/network segment belongs to or is contained in the network segment can be judged by retrieving the BDD binary decision diagram. For example, 1.0.0/8 =0000, 2.0.0/8 0000 0010, and 1.0.0/u 2.0/8 may be expressed as a BDD map, as shown in fig. 6. A certain network segment or ip matches the decision diagram, from top to bottom (from the 32 th bit to the 25 th bit), if both are matched, the network segment belongs to two network segments of 1.0.0.0/8U 2.0.0/8.
In a preferred embodiment, the scheme verification module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
It can be understood that, a corresponding verification step can be obtained in advance according to the change intention of implementing the change scheme of the change staff, or a preset network change verification rule can be obtained by using a tracert route check path (whether the tracert route passes through a specified device) in the change scheme as the intention, and whether the change scheme meets the change intention of implementing the change staff is verified according to a quantized preset network change verification rule. For example, for the setting of the verification step, in a specific example, when a route is added to the change scheme, the end-to-end reachability of the route needs to be verified when verifying the intention of the change scheme, and especially for the case where one end is not in the simulation range, the verification may be performed by verifying whether there is a command of a change in the change configuration within the simulation range. Specifically, the changing step of adding the route in the changing scheme is as follows:
ssh 123.88.131.130//TH0245RT0A-C1//
ter mon
conf t
ip route 123.88.146.22 255.255.255.255 123.88.132.49
end
wr
exit
the corresponding verification steps may be arranged as:
ssh 123.88.131.130//TH0245RT0A-C1//
show ip route// if there is 123.88.146.22, if there is, display
ip route 123.88.146.22 255.255.255.255 123.88.132.49。
In the above specific example, a BDD decision graph is obtained according to the data plane model. The reachability problem can be converted into traversing all paths according to the starting point and the end point by a breadth-first search (BFS) algorithm, the starting point and the end point are subjected to routing operation on the BDD of the link on each path through the network segments, and if the result is not empty, the path can be reached. If the result is null, the path is not reachable. And verifying the change scheme by determining whether the reachable path conforms to the preset network change verification rule to obtain a scheme verification result.
For example, as shown in FIG. 8, in order to validate a change scenario, the reachability of the routing device needs to be determined. In fig. 8, the routing devices 1 to 23 are shown in a connected relationship with each other, and according to the determined starting device 13 and end device 10, all paths are traversed through BFS, and finally, a reachable path between the device 13 and the device 10 is obtained, such as a path represented by an arrow in fig. 8, which indicates that the path is reachable.
The invention constructs a network topology simulation model through the network equipment information of the three-layer network and the change scheme instruction. And then, carrying out scheme change verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result, and using mathematical model verification to replace the prior art that the accuracy of the scheme change can be ensured only by manual recheck verification. The preset network change verification rule can be obtained through the change intention of the change personnel to the three-layer network change scheme, so that whether the change scheme of the three-layer network meets the change intention of the change personnel can be verified. The invention can verify the network change scheme in advance, verify the accuracy of the change scheme and improve the risk control capability of the change, thereby greatly reducing the probability of production accidents caused by errors of the change scheme.
Since the principle of the system for solving the problem is similar to the above method, the implementation of the system can refer to the implementation of the method, and the detailed description is omitted here.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example, the computer device specifically comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method performed by the client as described above when executing the program, or the processor implementing the method performed by the server as described above when executing the program.
Referring now to FIG. 10, shown is a schematic diagram of a computer device 600 suitable for use in implementing embodiments of the present application.
As shown in fig. 10, the computer apparatus 600 includes a Central Processing Unit (CPU) 601 which can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output section 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted as necessary on the storage section 608.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the invention include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A method for verifying a three-layer network change scheme is characterized by comprising the following steps:
acquiring network equipment information and a scheme change instruction of a three-layer network;
obtaining a network topology simulation model according to the network equipment information and the change scheme instruction of the three-layer network;
carrying out change scheme verification on the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result;
the obtaining a network topology simulation model according to the network device information of the three-layer network and the change scheme instruction specifically includes:
forming a configuration surface model according to the network equipment information and the change scheme instruction;
carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model;
and forming the network topology simulation model according to the configuration surface model and the data surface model.
2. The method of verifying a change scheme in a three-tier network of claim 1, wherein the forming a configuration surface model according to the network device information and the change scheme instruction specifically comprises:
establishing a simulation network environment according to the network equipment information;
and modifying the network equipment information in the simulation network environment according to the change scheme instruction to obtain a configuration surface model.
3. The method for verifying a change scheme in a three-layer network according to claim 1, wherein the simulating a change scheme network protocol based on the configuration plane model to obtain a data plane model specifically comprises:
analyzing the network equipment information to obtain a data structure of network equipment in a three-layer network, and obtaining a control plane model according to the data structure and a routing protocol;
iterating based on the control plane model to obtain a routing table;
and generating a forwarding table according to the routing table and the access control list to obtain a data plane model.
4. The method for verifying a change scheme of a three-layer network according to claim 3, wherein the step of verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result specifically comprises:
obtaining a BDD decision diagram according to the data surface model;
traversing all paths of the BDD decision diagram through a breadth-first search algorithm, and determining all reachable paths;
and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
5. A three-tier network change scenario verification system, comprising:
the information acquisition module is used for acquiring network equipment information and a scheme change instruction of the three-layer network;
the simulation environment construction module is used for obtaining a network topology simulation model according to the network equipment information of the three-layer network and the change scheme instruction;
the scheme verification module is used for verifying the change scheme of the network topology simulation model according to a preset network change verification rule to obtain a scheme verification result;
the simulation environment construction module is specifically used for forming a configuration surface model according to the network equipment information and the change scheme instruction; carrying out network protocol simulation of a change scheme based on the configuration surface model to obtain a data surface model; and forming the network topology simulation model according to the configuration surface model and the data surface model.
6. The system of claim 5, wherein the schema validation module is specifically configured to obtain a BDD decision graph according to the data plane model; traversing all paths of the BDD decision graph through a breadth-first search algorithm, and determining all reachable paths; and determining whether the reachable path conforms to the preset network change verification rule or not so as to verify the change scheme to obtain a scheme verification result.
7. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method of any of claims 1-4.
8. A computer-readable medium, having stored thereon a computer program,
the program when executed by a processor implements the method of any one of claims 1 to 4.
CN202110183714.0A 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system Active CN112953768B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110183714.0A CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110183714.0A CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Publications (2)

Publication Number Publication Date
CN112953768A CN112953768A (en) 2021-06-11
CN112953768B true CN112953768B (en) 2023-02-24

Family

ID=76245563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110183714.0A Active CN112953768B (en) 2021-02-10 2021-02-10 Three-layer network change scheme verification method and system

Country Status (1)

Country Link
CN (1) CN112953768B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411221B (en) * 2021-06-30 2022-11-11 中国南方电网有限责任公司 Power communication network fault simulation verification method, device, equipment and storage medium
CN115277405A (en) * 2022-06-24 2022-11-01 中国工商银行股份有限公司 Automatic driving network generation method and device based on digital twins

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002185512A (en) * 2000-12-12 2002-06-28 Hitachi Ltd Method for verifying connectivity of network
CN102315963A (en) * 2011-08-11 2012-01-11 百度在线网络技术(北京)有限公司 Method for authenticating system configuration change and equipment
CN110855457A (en) * 2018-08-20 2020-02-28 阿里巴巴集团控股有限公司 Method and device for generating network model and configuring network
CN111726255A (en) * 2020-06-23 2020-09-29 中国工商银行股份有限公司 Processing method and device for network change
CN111835532A (en) * 2019-04-11 2020-10-27 华为技术有限公司 Network authentication method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007208633A (en) * 2006-02-01 2007-08-16 Mitsubishi Electric Corp Device, method and program for designing network
CN108322394B (en) * 2018-04-02 2021-01-01 京信通信系统(中国)有限公司 Routing table establishing, searching, deleting and state changing method and device
CN111934921B (en) * 2020-07-29 2023-11-07 深信服科技股份有限公司 Network topology discovery method and device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002185512A (en) * 2000-12-12 2002-06-28 Hitachi Ltd Method for verifying connectivity of network
CN102315963A (en) * 2011-08-11 2012-01-11 百度在线网络技术(北京)有限公司 Method for authenticating system configuration change and equipment
CN110855457A (en) * 2018-08-20 2020-02-28 阿里巴巴集团控股有限公司 Method and device for generating network model and configuring network
CN111835532A (en) * 2019-04-11 2020-10-27 华为技术有限公司 Network authentication method and device
CN111726255A (en) * 2020-06-23 2020-09-29 中国工商银行股份有限公司 Processing method and device for network change

Also Published As

Publication number Publication date
CN112953768A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
CN109685647B (en) Credit fraud detection method and training method and device of model thereof, and server
CN110609759B (en) Fault root cause analysis method and device
Han et al. Fault-tolerant relay node placement in heterogeneous wireless sensor networks
CN112953768B (en) Three-layer network change scheme verification method and system
CA3080050A1 (en) Training tree-based machine-learning modeling algorithms for predicting outputs and generating explanatory data
CN111625258B (en) Mercker tree updating method, device, equipment and readable storage medium
CN112566093B (en) Terminal relation identification method and device, computer equipment and storage medium
CN111431819A (en) Network traffic classification method and device based on serialized protocol flow characteristics
CN112187554A (en) Operation and maintenance system fault positioning method and system based on Monte Carlo tree search
CN113572697A (en) Load balancing method based on graph convolution neural network and deep reinforcement learning
CN112100450A (en) Graph calculation data segmentation method, terminal device and storage medium
WO2021184367A1 (en) Social network graph generation method based on degree distribution generation model
CN113687875A (en) Vehicle task unloading method and device in Internet of vehicles
Ryabko et al. Graph model of Fog Computing system
CN114238135A (en) Test case determination method and device and electronic equipment
CN107679107B (en) Graph database-based power grid equipment reachability query method and system
CN114629767A (en) Power dispatching network simulation method and device, computer equipment and storage medium
Ryabko et al. Graph theory methods for fog computing: A pseudo-random task graph model for evaluating mobile cloud, fog and edge computing systems
Chen et al. A fast algorithm for finding K shortest paths using generalized spur path reuse technique
CN111625727B (en) Information processing method, device and storage medium for social relationship data
US10747936B1 (en) System, method, and computer program product for genetic routing in an electronic circuit design
CN114091271A (en) Method and device for simplifying equipment model, electronic equipment and storage medium
CN115955323A (en) Network security situation sensing method and device and electronic equipment
JP2022013844A (en) Information processing method, information processing device and program
Peixoto et al. Exploiting fog computing with an adapted dbscan for traffic congestion detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant