Load Experiment of the vDACS Scheme in Case of Increasing the Simultaneous Connection for the DACS SV

Part of the Studies in Computational Intelligence book series (SCI, volume 722)


In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 200.


Policy-based network management DACS scheme NAPT 



This work was supported by the research grant of KDDI Foundation. We express our gratitude.


  1. 1.
    Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-Based Admission Control. IETF RFC 2753 (2000)Google Scholar
  2. 2.
    Odagiri, K., Yaegashi, R., Tadauchi, M., Ishii, N.: Secure DACS scheme. J. Netw. Comput. Appl., Elsevier 31(4), 851–861 (2008)Google Scholar
  3. 3.
    Odagiri, K., Shimizu, S., Takizawa, M., Ishii, N.: Theoretical suggestion of policy-based wide area network management system (wDACS system part-I). Int. J. Netw. Distrib. Comput. (IJNDC), 1(4), 260–269 (2013)Google Scholar
  4. 4.
    Odagiri, K., Shimizu, S., Ishii, N., Takizawa, M.: Suggestion of the cloud type virtual policy based network management scheme for the common use between plural organizations. In: Proceedings of International Conference on Network-Based Information Systems (NBiS-2015), September, pp. 180–186 (2015)Google Scholar
  5. 5.
    Cerf, V., Kahn, E.: A protocol for packet network interconnection. IEEE Trans. on Commun. COM-22, 637–648 (1974)Google Scholar
  6. 6.
    Moore, B., et al.: Policy Core Information Model—Version 1 Specification. IETF RFC 3060 (2001)Google Scholar
  7. 7.
    Moore, B.: Policy Core Information Model (PCIM) Extensions. IETF 3460 (2003)Google Scholar
  8. 8.
    Strassner, J., Moore, B., Moats, R., Ellesson, E.: Policy Core Lightweight Directory Access Protocol (LDAP) Schema. IETF RFC 3703 (2004)Google Scholar
  9. 9.
    Durham, D., et al.: The COPS (Common Open Policy Service) Protocol. IETF RFC 2748 (2000)Google Scholar
  10. 10.
    Herzog, S., et al.: COPS usage for RSVP. IETF RFC 2749 (2000)Google Scholar
  11. 11.
    Chan, K., et al.: COPS Usage for Policy Provisioning (COPS-PR). IETF RFC 3084 (2001)Google Scholar
  12. 12.
    CIM Core Model V2.5 LDAP Mapping Specification (2002)Google Scholar
  13. 13.
    CIM Schema: Version 2.30.0 (2011)Google Scholar
  14. 14.
    Wahl, M., Howes, T., Kille, S.: Lightweight Directory Access Protocol (v3). IETF RFC 2251 (1997)Google Scholar
  15. 15.
    ETSI ES 282 003: Telecoms and Internet converged Services and protocols for Advanced Network (TISPAN). Resource and Admission Control Subsystem (RACS). Functional Architecture, June 2006Google Scholar
  16. 16.
    ETSI ETSI ES 283 026: Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN). Resource and Admission Control. Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in the Resource and Protocol specification, April 2006Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Sugiyama Jogakuen UniversityNagoyaJapan
  2. 2.Gakushuin Women’s CollegeTokyoJapan
  3. 3.Aichi Institute of TechnologyToyotaJapan

Personalised recommendations