Advertisement

Ontological Configuration Management for Wireless Mesh Routers

  • Iván Díaz
  • Cristian Popi
  • Olivier Festor
  • Juan Touriño
  • Ramón Doallo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5843)

Abstract

Wireless mesh networks (WMNs) are a category of wireless networks that are self-organized, robust and which offer more flexible client coverage with less equipment requirements than wired networks. In WMNs, mesh routers constitute the network’s “backbone”. The distributed, ever-changing and ad-hoc nature of these networks poses new challenges in configuration management. In order to face them, we modelize the configuration and semantics of a preexisting mesh router using the CIM model and OWL ontology language and implementing XSLT transformations from the original configuration format to CIM/OWL and back. We thus represent it in a higher level of abstraction, an ontological representation that supports configuration semantic checking, policy enforcing and reasoning on the configuration of WMN nodes. We also use the capabilities of our AdCIM framework for persistence and the generation of web configuration interfaces.

Keywords

Wireless Mesh Network Wireless Interface Mesh Router Common Information Model Switching Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: A survey. Computer Networks 47(4), 445–487 (2005)zbMATHCrossRefGoogle Scholar
  2. 2.
    Diaz, I., Touriño, J., Salceda, J., Doallo, R.: A framework focus on configuration modeling and integration with transparent persistence. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2005). Workshop on System Management Tools for Large-Scale Parallel Systems, Denver, Colorado, USA, April 2005, p. 297a (2005), http://adcim.des.udc.es
  3. 3.
    DMTF. Common Information Model (CIM) Standards, http://www.dmtf.org/standards/cim (accessed July 2009)
  4. 4.
    W3C. OWL 1.0 (2004), http://www.w3.org/TR/2004/REC-owl-features-20040210/ (accessed July 2009)
  5. 5.
    Image Sciences, Computer Sciences and Remote Sensing Laboratory Research Unit, http://lsiit.u-strasbg.fr/ (accessed July 2009)
  6. 6.
    OSGi Alliance, http://www.osgi.org/Main/HomePage (accessed July 2009)
  7. 7.
    W3C. XSL Transformations (XSLT) Version 1.0 (1999), http://www.w3.org/TR/xslt (accessed July 2009)
  8. 8.
    W3C. XForms 1.0 (2003), http://www.w3.org/TR/xforms (accessed July 2009)
  9. 9.
    Loshin, P.: Big book of LDAP RFCs. Morgan Kaufmann, San Francisco (2000)Google Scholar
  10. 10.
    Wood, E.: Guidelines for CIM-to-LDAP directory mappings (2000), http://www.dmtf.org/standards/documents/DEN/DSP0100.pdf (accessed July 2009)
  11. 11.
    Rivière, A., Sibilla, M.: Management information models integration: From existing approaches to new unifying guidelines. Journal of Networks and System Management 6(3), 333–356 (1998)CrossRefGoogle Scholar
  12. 12.
    DMTF. Specification for the Representation of CIM in XML (2002), http://www.dmtf.org/standards/documents/WBEM/DSP201.html (accessed July 2009)
  13. 13.
    Quirolgico, S., Assis, P., Westerinen, A., Baskey, M., Stokes, E.: Toward a formal Common Information Model ontology. In: Bussler, C.J., Hong, S.-k., Jun, W., Kaschek, R., Kinshuk, Krishnaswamy, S., Loke, S.W., Oberle, D., Richards, D., Sharma, A., Sure, Y., Thalheim, B. (eds.) WISE 2004. LNCS, vol. 3307, pp. 11–21. Springer, Heidelberg (2004)Google Scholar
  14. 14.
    Sinz, C., Khosravizadeh, A., Kuchlin, W., Mihajlovski, V.: Verifying CIM models of Apache web-server configurations. In: Proceedings of the 3rd International Conference on Quality Software, QSIC 2003, Dallas, USA, November 2003, pp. 290–297 (2003)Google Scholar
  15. 15.
    Glasner, D., Sreedhar, V.C.: Configuration reasoning and ontology for web. In: Proceedings of the 4th IEEE International Conference on Services Computing, SCC 2007, Salt Lake City, USA, July 2007, pp. 387–394 (2007)Google Scholar
  16. 16.
    W3C Member submission. SWRL (2004), http://www.w3.org/Submission/SWRL/ (accessed July 2009)
  17. 17.
    Motik, B., Sattler, U., Studer, R.: Query answering for OWL-DL with rules. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol. 3298, pp. 549–563. Springer, Heidelberg (2004)Google Scholar
  18. 18.
    Clark, K., Parsia, B.: Pellet: The Open Source OWL DL Reasoner, http://clarkparsia.com/pellet/ (accessed July 2009)
  19. 19.
    Heimbigner, D.: DMTF - CIM to OWL: A case study in ontology conversion. In: Proceedings of the 16th Conference on Software Engineering and Knowledge Engineering, SEKE 2004, Banff, Canada, June 2004, pp. 470–473 (2004)Google Scholar
  20. 20.
    Majewska, M., Kryza, B., Kitowsky, J.: Translation of Common Information Model to Web Ontology Language. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol. 4487, pp. 414–417. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  21. 21.
    García, F., Martínez, G., Botía, J., Gómez-Skarmeta, A.: On the application of the Semantic Web Rule Language in the definition of policies for system security management. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM-WS 2005. LNCS, vol. 3762, pp. 69–78. Springer, Heidelberg (2005)Google Scholar
  22. 22.
    Qiu, L., Bahl, P., Rao, A., Zhou, L.: Troubleshooting wireless mesh networks. ACM SIGCOMM Computer Communication Review 36(5), 17–28 (2006)CrossRefGoogle Scholar
  23. 23.
    Zhang, Y., Fang, Y.: ARSA: An Attack-Resilient Security Architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications 24(10), 1916–1928 (2006)CrossRefMathSciNetGoogle Scholar
  24. 24.
    Nortel WMN solutions, http://www.nortel.com (accessed July 2009)
  25. 25.
    LocustWorld, http://www.locustworld.com (accessed July 2009)
  26. 26.
    Staub, T., Balsiger, D., Lustenberger, M., Braun, T.: Secure remote management and software distribution for wireless mesh networks. In: Proceedings of the 7th International Workshop on Applications and Services in Wireless Networks. ASWN 2007, Santander, Spain (May 2007)Google Scholar
  27. 27.
    Burgess, M.: Cfengine: A site configuration engine. Computing Systems 8(3), 1–29 (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Iván Díaz
    • 1
  • Cristian Popi
    • 2
  • Olivier Festor
    • 2
  • Juan Touriño
    • 1
  • Ramón Doallo
    • 1
  1. 1.Computer Architecture Group Department of Electronics and SystemsUniversity of A CoruñaCoruñaSpain
  2. 2.MADYNES - INRIA Nancy Grand Est - Research Center 615Villers-les-NancyFrance

Personalised recommendations