On Policy-Based Extensible Hierarchical Network Management in QoS-Enabled IP Networks
Policy-based Management has been the subject of extensive research over the last decade.More recently, the IETF has been investigating Policy-based Networking as a means for managing IP-based multiservice networks with quality of service guarantees.P olicies are seen as a way to guide the behaviour of a network or distributed system through high-level, declarative directives.W e mainly view policies as a means of extending the logic of a management system at runtime, so that it can be adaptive to changing or newly emerging requirements.W e are interested in particular in the coexistence of hard-wired hierarchical management systems with policy logic in a fashion that the overall system becomes programmable and extensible.In this paper we consider generic issues behind hierarchical policy-based management systems and we present initial work on such a system for dimensioning and dynamic resource management in IP Differentiated Services networks.
KeywordsPolicy-based Networking Hierarchical Management IP Differentiated Services
Unable to display preview. Download preview PDF.
- J. Moffett and M.S loman, “Policy Hierarchies for Distributed Systems Management,” IEEE Journal on Selected Areas in Communications, vol.11, pp.1404–1414, December 1993.Google Scholar
- M.S loman, “Policy Driven Management for Distributed Systems,” Journal of Network and Systems Management, vol.2, pp. 333–360, December 1994. Plenum Publishing.Google Scholar
- M.S tevens et al., Policy Framework.In ternet draft, 〈draft-ietf-policy-framework-00.txt〉, work in progress, September 1999.Google Scholar
- M.S loman and J. Moffett, “Domain Management for Distributed Systems,” in Integrated Network Management I (B. Mean dzija and J. Westcott, eds.), pp. 505–516, North Holland, 1989.Google Scholar
- Imperial College London, “Policies for network and distributed systems.” see: http://www-dse.doc.ic.ac.uk/policies/.
- R. Wies, “Policy Definition and Classification: Aspects, Crieteria, Examples,” in Proc. of the 5th IEEE Workshop on Distributed Systems Operations and Management, (DSOM), (Toulouse, France), October 1994.Google Scholar
- N. Damianou and N. Dulay and E. Lupu and M. Sloman, “Ponder: A Language for Specifying Security and Management Policies,” tech.rep., Imperial College Report DoC-2001, January 2000.Google Scholar
- R. Yavatkar, D. Pendarakis, and R. Guèrin, A Framework for Policy-Based Admission Control. RFC-2753, Informational, January 2000.Google Scholar
- P. Georgat sos et al., “Technology Inter-Operation in ATM Networks: the REFORM System,” IEEE Communications Magazine, vol.37, pp. 112–118, May 1999.Google Scholar
- M. Sloman and E. Lupu, “Policy Specification for Programmable Networks,” in Proc. of the 1st Int’l Conference on Active Networks (S. Covaci, ed.), LNCS, (Berlin, Germany), Spinger-Verlag, June 1999.Google Scholar
- S. Blake et al., An Architecture for Difierentated Services. RFC-2475, Informational, December 1998.Google Scholar
- D. Goderis et al., Functional Architecture and Top Level Design. TEQUILA Consortium — Deliverable D1.1, September 2000. available at: www.isttequila. org/deliverables.html.