Abstract

This chapter describes the architecture of a policy-based network management (PBNM) system. The architecture of a PBNM system is determined by several factors such as the types of policies that are implemented and the granularity of control. A novel feature of the PBNM architecture is the use of policy-based management and process management. Policy-based management is used to select the appropriate processes to execute, and feedback from those processes is used to adjust which policies are then used, according to a finite state machine. The reference architecture of a PBNM system is developed. To better understand the complexities of this architecture, four simple use cases are investigated. The first use case discussed the procedure for the PBNM system to determine what functions a particular user is allowed to perform on a given device. The second use case discussed how the system authenticated a user and then authorized privileges for that user. The third use case concentrated on understanding what operations are performed on a policy from the network manager's point-of-view, and the fourth use case described the operations that the PBNM system must do to support the changing of a policy.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.