A new architecture for performance-based policy management in heterogeneous wireless networks

The growth in the popularity of Internet services, increasing demands of mobile users together with a wide range of access technologies and mobile-networked devices, demands integration and inter-working of these heterogeneous access networks. Sometimes referred to as 4th generation (4G) networks, the overall objective is to provide a managed Always Best Connected (ABC) service over underlying heterogonous wireless and mobile platforms while maintaining negotiated security and Quality of Service (QoS) in an open and nonproprietary environment. This paper proposes a new model and its architecture which is based upon Policy-based Management (PBM) and provides a framework for the centralised management of networks based on business-level policies. However, it extends the basic PBM ideas to provide a "layered approach" which facilitates the negotiation of management services over interconnected heterogonous mobile platforms thus achieving an always best connected scenario. Finally this paper describes a proof-of-concept testbed which demonstrates the implementation of this model in practice.

[1]  Jim Boyle,et al.  Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .

[2]  Ravi Sahita,et al.  Framework Policy Information Base , 2003, RFC.

[3]  Emil C. Lupu,et al.  Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..

[4]  Guy Pujolle,et al.  Roaming and service management in public wireless networks using an innovative policy management architecture , 2005, Int. J. Netw. Manag..

[5]  John C. Strassner,et al.  Policy-based network management - solutions for the next generation , 2003, The Morgan Kaufmann series in networking.

[6]  Bob Moore Policy Core Information Model (PCIM) Extensions , 2003, RFC.

[7]  Juan A. Botía,et al.  Representing Security Policies in Web Information Systems , 2005 .

[8]  Antonio F. Gómez-Skarmeta,et al.  On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management , 2005, OTM Workshops.

[9]  Andreas Matheus,et al.  How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[10]  Krysia Broda,et al.  Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments , 2005 .

[11]  Edgard Jamhour,et al.  An RBAC-based policy information base , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[12]  W. W. Lu,et al.  Fourth-generation mobile initiatives and technologies [Guest Editorial] , 2002, IEEE Commun. Mag..

[13]  Andrea Westerinen,et al.  Terminology for Policy-Based Management , 2001, RFC.

[14]  Guy Pujolle,et al.  Roaming and service management in public wireless networks using an innovative policy management architecture , 2005 .

[15]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..