Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the course between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. As the second step of the second phase for the last goal, we examine the implementation method of the cloud type virtual PBNM which can be used by plural organizations in this paper.

[1]  James Aweya,et al.  An adaptive load balancing scheme for web servers , 2002, Int. J. Netw. Manag..

[2]  M.S. Ferdous,et al.  An Extended Algorithm to Enhance the Performance of the Current NAPT , 2007, 2007 International Conference on Information and Communication Technology.

[3]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[4]  Jim Boyle,et al.  COPS usage for RSVP , 2000, RFC.

[5]  Naohiro Ishii,et al.  DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[6]  Bob Moore Policy Core Information Model (PCIM) Extensions , 2003, RFC.

[7]  Jim Boyle,et al.  Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .

[8]  Naohiro Ishii,et al.  Efficient Network Management System with DACS Scheme Management with communication control , 2006 .

[9]  Keith McCloghrie,et al.  COPS Usage for Policy Provisioning (COPS-PR) , 2001, RFC.

[10]  Aameek Singh,et al.  Server-storage virtualization: Integration and load balancing in data centers , 2008, 2008 SC - International Conference for High Performance Computing, Networking, Storage and Analysis.

[11]  Sajal K. Das,et al.  Parallel Processing of Adaptive Meshes with Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[12]  Christopher Metz,et al.  The latest in VPNs: part II , 2004, IEEE Internet Computing.

[13]  Tim Howes,et al.  Lightweight Directory Access Protocol (v3) , 1997, RFC.

[14]  Robert E. Kahn,et al.  A Protocol for Packet Network Intercommunication , 1974 .

[15]  Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control; Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in , 2008 .

[16]  Christopher Metz,et al.  The Latest in Virtual Private Networks: Part I , 2003, IEEE Internet Comput..

[17]  B. Leiner,et al.  The DARPA internet protocol suite , 1985, IEEE Communications Magazine.

[18]  Roch Guérin,et al.  A Framework for Policy-based Admission Control , 2000, RFC.

[19]  Mohamed G. Gouda,et al.  Diverse Firewall Design , 2004, IEEE Transactions on Parallel and Distributed Systems.

[20]  John Strassner,et al.  Policy Core Lightweight Directory Access Protocol (LDAP) Schema , 2004, RFC.

[21]  Naohiro Ishii,et al.  Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I) , 2012, 2012 15th International Conference on Network-Based Information Systems.

[22]  Andrea Westerinen,et al.  Policy Core Information Model - Version 1 Specification , 2001, RFC.

[23]  Naohiro Ishii,et al.  Secure DACS Scheme , 2008, J. Netw. Comput. Appl..

[24]  Naohiro Ishii,et al.  Efficient Network Management System with DACS Scheme , 2006, International conference on Networking and Services (ICNS'06).