ProNet: A policy network environment

Network and business management convergence is seen as the next step towards harmonizing information technology resource allocation with target business goals. This paper proposes a management platform that starts at the specification of business targets in the form of policies and goes all the way to enforcing them in a next generation Quality of Service aware network. We specified both a policy language and a parser and also implemented procedures for mapping policies into underlying network mechanisms. Furthermore, case studies presented in this paper show performance results of network services controlled by such policies.RésuméLa convergence de la gestion des réseaux de communication avec celle des applications est un pas important vers l’adéquation de l’allocation des ressources aux objectifs de l’entreprise. Cet article présente une plateforme de gestion qui comporte la spécification des objectifs applicatifs sous forme de règles qui seront ensuite détaillées et appliquées à des réseaux gérant la qualité de service. Un language de description des règles de gestion et un compilateur ont été spécifiés et des procédures de correspondance entre les règles et les mécanismes de communication ont été implémentées. Des études de cas ont également présentées qui mettent en évidence les performances des réseaux gérés avec ces règles.

[1]  A. Asgari,et al.  A monitoring and measurement architecture for traffic engineered IP networks. , 2001 .

[2]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[3]  Geoffrey G. Xie,et al.  Network policy languages: a survey and a new approach , 2001, IEEE Netw..

[4]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[5]  André Zúquete,et al.  Enforcing Obligation with Security Monitors , 2001, ICICS.

[6]  Andrea Westerinen,et al.  Policy Core Information Model - Version 1 Specification , 2001, RFC.

[7]  René Wies,et al.  Policies in network and systems management—Formal definition and architecture , 1994, Journal of Network and Systems Management.

[8]  Gunnar Karlsson,et al.  Admission control based on end-to-end measurements , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[9]  Luke Howard An Approach for Using LDAP as a Network Information Service , 1998, RFC.

[10]  Karl N. Levitt,et al.  Security Policy Specification Using a Graphical Approach , 1998, ArXiv.

[11]  Jean Bacon,et al.  Access control in an open distributed environment , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[12]  George Pavlou,et al.  On Policy-Based Extensible Hierarchical Network Management in QoS-Enabled IP Networks , 2001, POLICY.