Policy Specification and Architecture for Quality of Service Mangement

An application's quality of service (QoS) requirements refers to non-functional, run-time requirements. These requirements are usually soft in that the application is functionally correct even if the QoS requirement is not satisfied at run-time. QoS requirements are dynamic in that for a specific application, they change. The ability to satisfy an application's QoS requirement depends on the available resources. Since an application may have different QoS requirements in different sessions, the resources needed are different. A differentiated service must be supported. Since an application's QoS requirement is soft, it may not always be satisfied. It must be possible to dynamically allocate more resources. In an overloaded situation, it may be necessary to allocate resources to an application at the expense of other applications. Policies are used to express QoS requirements and actions to be taken when the QoS requirement is not satisfied. Policies are also used to specify actions to be taken in overloaded situations. Policies dynamically change. Supporting these policies is done through a set of distributed managed processes. It must be possible specify policies and have these policies distributed to managed processes. This paper describes how these policies can be formally specified and a management architecture (based on the IETF framework) that describes how the policies are distributed and used by the management system. We conclude with a discussion of our experiences with the management system developed.

[1]  Kurt Geihs,et al.  A Generic Model for Fault Isolation in Integrated Management Systems , 1997, Journal of Network and Systems Management.

[2]  Stefan Kätker,et al.  Fault Isolation and Event Correlation for Integrated Fault Management , 1997, Integrated Network Management.

[3]  Fang Chen,et al.  Constraints for role-based access control , 1996, RBAC '95.

[4]  Michael Anthony Bauer,et al.  Distributed Resource Management to Support Distributed Application-Specific Quality of Service , 2001, MMNS.

[5]  John Strassner,et al.  Policy Core Lightweight Directory Access Protocol (LDAP) Schema , 2004, RFC.

[6]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[7]  Geoffrey G. Xie,et al.  Network policy languages: a survey and a new approach , 2001, IEEE Netw..

[8]  Emil C. Lupu,et al.  A policy deployment model for the Ponder language , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[9]  Christian Jacquenet,et al.  Distributed Dynamic Resource Management for the AF Traffic of the Differentiated Services Networks , 2005, ICCNMC.

[10]  Andrea Westerinen,et al.  Policy Core Information Model - Version 1 Specification , 2001, RFC.

[11]  Djamel Sadok,et al.  Service Level Management of Differentiated Services Networks with Active Policies , 2001 .

[12]  René Wies,et al.  Policies in network and systems management—Formal definition and architecture , 1994, Journal of Network and Systems Management.

[13]  Alberto Gonzalez Prieto,et al.  SLS to DiffServ configuration mappings , 2001, DSOM.

[14]  Karl N. Levitt,et al.  Security Policy Specification Using a Graphical Approach , 1998, ArXiv.

[15]  Michael Anthony Bauer,et al.  Issues in Managing Soft QoS Requirements in Distributed Systems Using a Policy-Based Framework , 2001, POLICY.

[16]  Jürgen Quittek,et al.  MPLS management using policies , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[17]  Salvatore J. Stolfo,et al.  A coding approach to event correlation , 1995, Integrated Network Management.

[18]  S. Katker A modeling framework for integrated distributed systems fault management , 1996 .

[19]  Jürgen Quittek,et al.  Using the script MIB for policy-based configuration management , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[20]  David K. Y. Yau,et al.  Adaptive rate-controlled scheduling for multimedia applications , 1997, MULTIMEDIA '96.

[21]  Emil C. Lupu,et al.  Ponder: A Language for Specifying Security and Management Policies for Distributed Systems , 2000 .

[22]  David K. Y. Yau,et al.  Adaptive rate-controlled scheduling for multimedia applications , 1997, TNET.

[23]  Rodolphe Ortalo,et al.  A Flexible Method for Information System Security Policy Specification , 1998, ESORICS.

[24]  Paulo Pereira,et al.  Algorithms and Contracts for Network and Systems Management , 1999, LANOMS.