Policy transformation techniques in policy-based systems management

Policy based systems management provides a means for administrators, end-users and application developers to manage and dynamically change the behavior of computing systems. One advantage of policy-based management is that it simplifies and automates the administration of IT environments. A significant part of the simplification is obtained by allowing the system administrator to specify only the objectives or goals that are to be met, rather than having to specify detailed configuration parameters for each of the different devices in the system. It may not be obvious to the administrator how the goals can be achieved without having to know the internals of the system. This knowledge thus needs to be captured in the policy driven actions. The existing algorithms for mapping policy objectives to specific configuration details tend to be specific to each policy discipline. This makes the policy-based approach harder to deploy for new disciplines. In this paper, we address different types of policy transformations and propose methods, which are not discipline specific for mapping objectives to system configurations.

[1]  Andrea Westerinen,et al.  Policy Core Information Model - Version 1 Specification , 2001, RFC.

[2]  David G. Stork,et al.  Pattern Classification , 1973 .

[3]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[4]  W. Brogan Modern Control Theory , 1971 .

[5]  Yixin Diao,et al.  Using MIMO feedback control to enforce policies for interrelated metrics with application to the Apache Web server , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[6]  Peter Braun,et al.  A policy based QoS management system for the IntServ/DiffServ based Internet , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[7]  Ron Kohavi,et al.  Feature Selection for Knowledge Discovery and Data Mining , 1998 .

[8]  Zdzislaw Bubnicki,et al.  Modern Control Theory , 2005 .

[9]  T. Howes,et al.  Understanding and Deploying LDAP Directory Services , 2003 .

[10]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[11]  Emil C. Lupu,et al.  An adaptive policy based management framework for differentiated services networks , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[12]  Dinesh C. Verma,et al.  A Policy Service for GRID Computing , 2002, GRID.

[13]  Adam Woei-Jyh Lee,et al.  Integrating Goal Specification in Policy-Based Management , 2001, POLICY.

[14]  William Stallings,et al.  SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 , 1999 .

[15]  Dinesh C. Verma,et al.  Policy Based SLA Management in Enterprise Networks , 2001, POLICY.

[16]  Dinesh C. Verma,et al.  Simplifying network administration using policy-based management , 2002, IEEE Netw..