[IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap...

7
Automated QoS policy adaptation for heterogeneous access network environments Pedro A. Aranda Gutierrez Ilka Miloucheva Telefónica, Investigación y Desarrollo, Spain Fraunhofer Institute, Germany [email protected] ilka.miloucheva @fokus.fraunhofer.de Abstract To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated configuration and adaptation of policies for QoS-aware applications. A policy management architecture is required, which allows interaction and adaptation of QoS policies of different actors, such as network operator, service provider and user based on common a policy repository. This paper focusses on design issues of such an architecture including adaptation procedures, management interfaces for different actors, components for policy adaptation, as well as policy repository and data bases describing the QoS information for heterogeneous access networks. 1. Introduction For efficient operation of heterogeneous Internet infrastructures for users with multiple access network interfaces and QoS based applications, it is critical that the resources for the applications are intelligently managed and adapted dependent on the network capabilities and the particular goals of users, service providers and network operators [1]. One approach for automated management of resources and service adaptation is based on QoS policies [2]. QoS policies can control the network resources for applications and users based on mechanisms, such as queuing schemes, priorities, packet scheduling, bandwidth provisioning (DiffServ, IntServ/RSVP). QoS Policies are assumed to be translated automatically into network device configurations. This paper is focussed on QoS policy architecture for automated configuration and adaptation of resources for applications of mobile users in heterogeneous Internet based on Service Level Agreements (SLAs) between users, service providers and network operators. The design of an appropriate QoS policy management architecture for dynamic resource allocation and configuration considering access routers and applications in heterogeneous Internet environment is discussed. The implementation of the components is focus of the European project NETQOS [3]. Currently, the IETF QoS policy framework considers policies of the network operator aimed at automated DiffServ and IntServ configuration [5]. This paper describes the interfaces for policy management aimed at dynamic resource configuration and adaptation considering the different kind of actors. It is organized as follows: In section 2, IETF standardization and current state-of-the- art is discussed. Section 3 describes an example for QoS policies and their adaptation based on common parameters and learning algorithms. Section 4 addresses the concepts of the policy management architecture for automated adaptation of Qos policies in heterogeneous network environments. Section 5 concentrates on the design of the management interfaces and the policy repository, which includes the information required for configuration and adaptation of policies. Section 6 concludes this paper. 2. QoS Policy – state-of-the-art 2.1. IETF QoS policy framework The IETF defines policies as a set of rules to administer, manage and control access to the network resources by applications and users (see RFC 3198 [6]). The IETF Policy Framework is aimed at representing, managing, sharing and reusing policies in a vendor independent, interoperable, and scalable manner (see [RFC 3060 [7], RFC 3460 [8]) and is based on the interactions of a policy management application, a policy repository, a policy decision and a policy enforcement point: The Policy management application allows the network administrator to create and deploy policies, store them in the repository and monitor the status of the policy-managed environment, checking for potential policy conflicts. Second International Conference on Systems and Networks Communications (ICSNC 2007) 0-7695-2938-0/07 $25.00 © 2007

Transcript of [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap...

Page 1: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

Automated QoS policy adaptation for heterogeneous access network environments

Pedro A. Aranda Gutierrez Ilka MilouchevaTelefónica, Investigación y Desarrollo, Spain Fraunhofer Institute, Germany

[email protected] ilka.miloucheva @fokus.fraunhofer.de

Abstract

To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated configuration and adaptation of policies for QoS-aware applications. A policy management architecture is required, which allows interaction and adaptation of QoS policies of different actors, such as network operator, service provider and user based on common a policy repository. This paper focusses on design issues of such an architecture including adaptation procedures, management interfaces for different actors, components for policy adaptation, as well as policy repository and data bases describing the QoS information for heterogeneous access networks.

1. Introduction

For efficient operation of heterogeneous Internet infrastructures for users with multiple access network interfaces and QoS based applications, it is critical that the resources for the applications are intelligently managed and adapted dependent on the network capabilities and the particular goals of users, service providers and network operators [1]. One approach for automated management of resources and service adaptation is based on QoS policies [2].

QoS policies can control the network resources for applications and users based on mechanisms, such as queuing schemes, priorities, packet scheduling, bandwidth provisioning (DiffServ, IntServ/RSVP). QoS Policies are assumed to be translated automatically into network device configurations.

This paper is focussed on QoS policy architecture for automated configuration and adaptation of resources for applications of mobile users in heterogeneous Internet based on Service Level Agreements (SLAs) between users, service providers and network operators. The design of an appropriate QoS policy management architecture for dynamic resource allocation and configuration considering access routers and

applications in heterogeneous Internet environment is discussed. The implementation of the components is focus of the European project NETQOS [3]. Currently, the IETF QoS policy framework considers policies of the network operator aimed at automated DiffServ and IntServ configuration [5]. This paper describes the interfaces for policy management aimed at dynamic resource configuration and adaptation considering the different kind of actors. It is organized as follows: In section 2, IETF standardization and current state-of-the-art is discussed. Section 3 describes an example for QoS policies and their adaptation based on common parameters and learning algorithms. Section 4 addresses the concepts of the policy management architecture for automated adaptation of Qos policies in heterogeneous network environments. Section 5 concentrates on the design of the management interfaces and the policy repository, which includes the information required for configuration and adaptation of policies. Section 6 concludes this paper.

2. QoS Policy – state-of-the-art

2.1. IETF QoS policy framework

The IETF defines policies as a set of rules to administer, manage and control access to the network resources by applications and users (see RFC 3198 [6]). The IETF Policy Framework is aimed at representing, managing, sharing and reusing policies in a vendor independent, interoperable, and scalable manner (see [RFC 3060 [7], RFC 3460 [8]) and is based on the interactions of a policy management application, a policy repository, a policy decision and a policy enforcement point:• The Policy management application allows the

network administrator to create and deploy policies, store them in the repository and monitor the status of the policy-managed environment, checking for potential policy conflicts.

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 2: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

• The Policy Enforcement Point (PEP) is the target entity that hosts the network elements where policy decisions are actually enforced.

• The Policy Decision Point (PDP) takes the policy decisions based on policy conditions by retrieving and interpreting policies, detecting policy conflicts, receiving policy decision requests from PEPs, and returning policy decisions to them.

• The Policy repository is a storage facility that the policy decision points use to retrieve policies.

The IETF specifies QoS policies based on IntServ and DiffServ provisioning technologies. The Common Open Policy Service (COPS) protocol[9], as defined by the IETF RAP WG, is used to exchange policy information between PEPs and PDPs. COPS can be used in the Integrated Services (IntServ) architecture operating with the Resource reSerVation Protocol (RSVP) and has been extended for Policy Provisioning (COPS-PR) [10] in order to support more efficiently the Differentiated Services (DiffServ) networks.

IETF QoS management is addressed by the QoS Policy Information Model (QPIM) [5]. It considers further IETF policy models - Policy Core Information Model (PCIM) [7] and the Common Information Model (CIM) [8]. The IETF Policy Information Base (PIB) is focussed on policy information that can be transmitted to the network device for policy configuration as well as a virtual information store called PIB containing the model of the policy [11].

QoS policy management can interact with access control. Access control policies are represented by the Role-Based Access Control (RBAC) [12]. The RBPIM (Role-Based Policy Information Model) is a PCIM extension for describing access control policies based on RBAC [13].

NETCONF [14] provides flexible mechanisms for policy based network configuration and access to all configuration data on the device. The NETCONF protocol is designed to support device configuration in a more proper way than the Simple Network Management Protocol (SNMP) [15]. IETF has also focussed on management of network device QoS data path mechanisms using policies [16].

In this document, we present a QoS policy information model which extends the IETF QoS policy concepts by considering QoS mechanisms and business goals for management of heterogeneous network environments.

2.2. QoS policy research for heterogeneous networks

Policies in heterogeneous networks can be used to adapt user services according business goals based on the evaluation of the characteristics (capabilities) of particular networks. In [17], a Hierarchical Policy

Based Management Architecture to Support the Deployment and the Discovery of Services in Ubiquitous Networks is discussed, which allows the user to discover dynamically the services at their current location and to customize them according his requirements and business goals.

Further policies can be focused on optimization of the access network selection in heterogeneous environments considering goals of users, service provides and network operators. In mobility management architectures, for instance based on Mobile IPv6, policies for the network selection, can be specified for vertical handover, i.e. when a mobile node moves from one access network to another .

The optimal network selection for mobile users and applications can be driven either by the customers (user-centric) or by the network provider (network-centric) [18]. The policies for the network selection depend on the goals of network operator, service provider and users and can be expressed by some QoS parameter constraints, requirements for radio channel characteristics, resource availability, and other conditions [19]. Such policy definitions can also consider administrative domain, access technology, terminal and application characteristics [20].

For optimized access router selection in IPv6 mobile environment, QoS policies can be also combined with special purpose protocols, such as Candidate Access Router Discovery protocol (CARD) [21].

In heterogeneous access network environments, policies can also be used to support enhanced QoS guarantee of services with specific network requirements. In multicast, for example, policies can enforce the selection of appropriate network technology (DVB, UMTS, GSM/GPRS and WLAN). In [22], policies aimed at optimization of resource usage for a group of users are proposed. Such policies consider the goals of the users belonging to the multicast group and optimize them to achieve an optimal system profit.

User-centric approaches for intelligent network selection in service oriented heterogeneous wireless network environments can be based on policies specified by utility functions and decision strategies for the provision of particular service [23]. The utility and decision functions can consider as parameters: bandwidth constraints, enhanced availability and service delivery cost.

QoS policies for heterogeneous environments are also used for automated resource configuration, provisioning and adaptation. For this purpose, [24] propose policy definitions based on information about users, service and networks organized as profiles. Profiles integrate information about user’s preferences, the available services and the network capabilities.

In policy based networking architectures, the resource allocation is driven from the Service Level Agreements (SLAs). The policy rules describe the

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 3: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

amount of network resources needed to guarantee the QoS according to the SLAs without going into details of the configuration for the particular network. Policy rules can also be designed to control and optimize the scheduling of resources between heterogeneous networks, which are helpful in overload and unutilized system status. In [25], policy rules based on inter-SLA resource scheduling schemes for wireless/fixed architecture, which allow cellular only or cellular / WLAN access are proposed. Decisions based on the related policies focussed on the configuration of same entity are complex. To support decision making based on related and dependent policies, approaches, such as fuzzy logic inference and multiple attribute decision making methods, have been used [26].

In the next section we propose an architecture, which is primarily aimed at supporting policies of different actors, using interfaces for predefined policies for QoS management, which adapt QoS handling in routers and applications in heterogeneous network environments.

3. QoS policies for heterogeneous network environments and their adaptation

Policies for heterogeneous networks can support the mapping of the application QoS requirements to the capabilities of the particular network, which are different on the data link layer (DVB-H, UMTS, WLAN, WIMAX). The QoS policy specifications depend on the Service Level Agreements (SLAs) between users, network operators and service providers. The QoS / SLA contracts can allow the usage of multiple access networks and different QoS levels for applications. In case that users, service providers and network operators have specific QoS preferences, the adaptation of QoS policies can lead to dynamical changes of resource usage strategies for the particular applications. An example of policies of the service providers and users is given in table 1, where the policies are aimed at dynamic configuration and change of preferred access network, QoS and resources for specific applications(i.e. Video-on-demand and mobile TV)Actor Policy definitionService Provider

If (app==MobileTV || app == VoD) {  SPApNets = DVB­H || UMTS || WLAN;  SPApQoS = highQoS || lowQoS;  PrSPApNet = UMTS;  PrSPApQoS = lowQoS;  PrSPApBandw =    map(PrSPApQoS_to  PrSPApNet);}

where PrSPApNet, PrSPApQoS and PrSPApBandw are, respectively the preferred access network, Qos level and bandwidth of the service provider for the application (goal DVB-H)

User If (app==MobileTV || app ==VoD) then {  if (PrUApNet in SPApNets)     then PrUApNet= DVB­H;    else adapt_PrUApNet;  if (PrUApQoS in SPApQoS)    then PrUApQoS= highQoS;    else adapt_PrUApQoS;  PrUApBandw = map (PrUApQoS_to  PrUApNet);}

where PrUApNet, PrUApQoS and PrUApBandware, respectively, the preferred access network, Qos level and bandwidth of the user for the application (goal DVB-H)

Table 1: Resource policies of users and service providers for heterogeneous access networks and top-down adaptation

Service providers and users can specify preferences for their applications, i.e. which access networks have to be used dependent on criteria, as for instance cost, reliability and QoS guarantee. In the above example, the service provider requires that IPTV and Video on Demand are delivered over UMTS with lowQoS.

In contrast to this, the user prefers that IPTV or Video on Demand is delivered over DVB-H with highQoS . In case the user prefers values allowed by the service providers, the user policy is accepted as entered by the user, otherwise the parameters of the user policies are adapted by the rules adapt_PrUApNet (for change of the preferred network) and adapt_PrUApQoS (for change of the preferred QoS).

The dependencies of the user’s and service provider’s policies for Video-on-Demand (VoD) and Mobile TV applications on the resource usage policies of the network operator are not shown in the example, but in the operational networks, such dependencies exist and are considered in the policy definition. In fact, the actual preferences of users and service providers for usage of particular networks depend on the resource planning strategies of the network operators for these networks. The resource planning of the network operator can be supported by special tools, such as the QORE system [1], which can interact with the proposed policy management tools.

The adaptation of the user resource allocation policies (i.e. change of PrUApNet and PrUApQoS parameter values, when they do not meet the requirements of the service provider policies) is done top-down considering hierarchical dependencies of the actors defining policies, such as user and service provider.

Policy adaptation can be also defined bottom-up based on learning algorithms. Reinforcement learning algorithms can be used for adaptation of higher level policies of the service provider and network operator based on lower layer policies of users. An example is, when the service provider learns from the preferences of the users (preferred access networks and QoS of applications) and dynamically adapts his own resource allocation policies. The learning for policy optimisation can be applied to increase resource usage of efficiency

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 4: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

and allow the fulfilment of user requests with enhanced guarantee. Considering the example policies, it is also possible to define learning algorithms aimed at bottom-up optimisation of the parameters of the service provider policies for dynamically management of QoS-aware applications based on the corresponding user policies. The bottom-up policy adaptation approach based on learning is shown in figure 3.

Figure 1: Bottom-up policy adaptation based on learning

For the specification of the policies, a policy description language like Ponder [29] or extensions to XML [28] can be used. The policy descriptions are entered using dedicated policy management interfaces.

Figure 2: QoS policy configuration architecture considering policies of different actors

4. QoS policy architecture for policy adaptation

A general challenge of the QoS policy architecture for heterogeneous environments is using policies to align automatically the resource allocation in order to optimise resource usage and provide QoS specified by the SLAs considering network capabilities and goals (preferences) of users, service providers, and network operators.The proposed architecture is based on:- Management interfaces for policies of different

actors (policies of users, service providers and network operators);

- A policy repository based on which the interactions between preference management tools and policy decision points are done;

- Data bases containing monitoring, network capability, QoS/SLA, application and other information required by the policies;

- Policy adaptation and Learning algorithms for automated policy optimisation;

- Policy Enforcement Points (PEPs), which communicate with the Policy Decision Points to obtain the actual policies for applications and routers, perform decisions and send the policies to the PEPs.

Users, service providers and network operators store their policies in a common policy repository. The policies represent their particular preferences and business goals considering the SLAs. For instance, the network operator policies can be aimed to schedule dynamically the resources of the access routers (DVB-H, UMTS, WLAN) depending on the load and forecasted traffic. Based on the analysis of application traffic, the service providers can dynamically set preferences for usage of specific access network by given applications. Finally, the users can also dynamically change their preferences for costs and quality of experience.

To check policy consistency and adapt and optimise policies, the policies of the different actors are collected in a common repository. The policy management application enters the policies and looks for dependencies based on the specified policy dependency rules. The interaction of these different policies can be managed based on the policy repository and algorithms for policy adaptation and learning.

The policy decision point uses the policies entered in the repository, as well as the information of the capabilities of the access networks (802.21, DVB networks and their return channels) and monitoring information in order to adapt the policies and distribute them to the policy enforcement points (i.e. the access routers in the heterogeneous infrastructure).

Bottom-up Learning and adaptation of policies based on actor’s hierarchy

Network operator policies for resource allocation - updates resources at access routers based on users’s and service provider’s preferences for accesss networks and resource usage of applications

Service provider policies for resource allocation - updates prefences for access networks selection for application traffic based on user’s preferences for accesss networks and QoS of applications

User policies for dynamic QoS configuration

- selection of prefered access network for applications

- selection of QoS per application

Server

DVB - H Access

Router

Internet - Core

Access Router Return Tunnel W LAN

WLAN Access Router

Next DVB - H Next return

tunnel WLAN

Policy repositor y

Management interface (Network operator)

Policy decision point

Resource configuration policy

Network capabilities IEEE 802.21

Management interface (Service provider)

Management interface (User)

Policy adaptation

Monitoring data

PEP UMTS

PEP PEP

QoS/SLA

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 5: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

Periodically or when a condition is met and the policy must be enforced on a given entity, the policy decision point checks the policy adaptation rules and sends the resulting policy to the policy enforcement point.

5. Components of the architecture

5.1. Policy management interface

The policy management interface is used by users, service providers and network operators to enter and change policy rules in the repository using a specific Graphical User Interfaces (GUI), which contains the specific parameters of each actor.

The GUIs allow the translation and storage of the policies in the repository, as well as control of the interactions and the dependencies for the policies of the different actors.

The policies consist of conditions and actions, which are entered in the system by the different actors using two approaches:- Setting of policy parameters and options for

predefined policies;

- Importing policy specifications from the repository using XML.

The system allows translation of the policy specifications into internal representations of the policy repository .

Figure 3 shows the concept GUI for generating resource usage policies for heterogeneous networks. The policy management interface should include the following functionality:• The general policy description related to the

specified policy and including user identification, policy name specification and QoS/SLA identification (if such exists),.

• Policy repository management allowing entering, changing, deleting of policies, as well as browsing of policies using the policy repository.

• Predefined policy specification interfaces to allow a user friendly specification of parameters for predefined policies; i.e. e resource usage policies as discussed in the previous section.

• XML based policy specification interface intended for users, who can write and understand policy specifications in an XML based policy language [28].

• The GUI allows also possibilities for specification of Operations for policy adaptation and policy dependency analysis. Such operations include specification of adaptation rules, changes or deletions of such rules, as well as obtaining of

dependencies of the policies considering the information in the policy repository.

Figure 3: Concept interface for configuration of resource policies for heterogeneous networks

5.2. Policy repository

The policy repository is a database, which stores the policies of the actors and the dependencies between them. The policies are stored as internal presentations of rules for management and control of QoS of applications and routers in heterogeneous networking environments.

The policy description is the basic entity in the policy repository containing the policy identification, the policy group, description of the policy duration and references to further entities specifying policy information (see figure 4). The group of policy is introduced to specify a set of policies, which have common goals.

Policy repository entities can describe actions, which are enforced by the particular policy, as for instance resource actions, measurement actions and transport actions.

Further entities include specifications of the conditions leading to the policy enforcement.

The policy description, conditions and actions entities build the policy repository. These entities are linked to further data bases and their information:

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 6: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

- QoS/SLA specification to check QoS policies for consistency considering the agreements between the actors;

- Monitoring data base containing the descriptions of the measurement scenarios and their information requested by the actor;

- Router description including the QoS and vendor specifications for the particular router;

- Application specification giving insight in the QoS parameters of the application, which can be adapted ;

- Data bases including user, service provider and network operator profiles, network capabilities, etc.

The information of some data bases, as for instance data bases describing capabilities of access networks, QoS/SLA specifications and application QoS descriptions can be organised based on specific ontology definitions. Ontology can be used for more clear and efficient design, as for instance in case of Web applications [31].

The dependencies of the policy repository entities and their relationships to information data bases are shown in figure 4.

The efficiency of the policy management can be increased using scalable policy data storage based on interaction of local and global policy repositories, as discussed in the framework of dynamic policy management for scalable on-demand resource allocation [32].

Figure 4: Policy repository entities and relationships to other data bases

6. Conclusions

This paper has discussed the interfaces and data base design for automated policy configuration and adaptation. The policies are derived from QoS / SLA agreements and are used for dynamic change of

resources for QoS-aware applications in heterogeneous network environments (UMTS, WIMAX, WLAN, DVB-T, DVB-H). Policies of users, service provider and network operator for heterogeneous access networks are considered and automatically adapted based on common policy repository.

Benefits of the proposed QoS management services is:

• Automated optimisation of resource usage policies of network operators considering policies of service provider and users and learning algorithms;

• Dynamic configuration and adaptation of resources by user and service provider using predefined policies parametrised based on different criteria;

• Flexible policy management interface allowing translation of policies of different actors in the common policy repository.

7. Acknowledgements

The work on the discussed architecture is partially funded by the European Commission in the framework of EU IST NETQOS project.

8. References

[1] D. Hetzer, I. Miloucheva, “Adaptable bandwidth planning for enhanced QoS support in user-centric broadband architectures, World Telecommunications Congress WTC 2006, Budapest, 30 April – 3 Mai, 2006.[2] S.Avallone, P. Di. Gennaro, I. Miloucheva, M. Roth, S. Rao, “NETQOS: Policy based management of Heterogeneous Networks for guaranteed QoS”, QoS 2006 workshop, Coimbra, Portugal, 18-19 May 2006[3] IST project, "Policy Based Management of Heterogeneous Networks for Guaranteed QoS (NETQOS)", www.ist-netqos.org[4] Designing Advanced Interfaces for the Delivery and Administration of Location independent optimised personal Services (DAIDALOS), EU IST project, www.ist-daidalos.org[5] Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, B. Moore, “Policy Quality of Service (QoS) Information Model”, RFC 3644, November 2003.[6] Westerinen, J. Schnizlein, J. Strassner, M. Scherling, R. Quinn, S. Herzog, A. Huynh, M. Carlson, J. Perry, J. and M. Waldbusser, "Terminology for Policy-based Management", RFC 3198, November 2001.[7] B. Moore, E. Elleson, J. Strassner, A. Westerinen, “Policy Core Information Model-Version 1 Specification”, RFC 3060, February 2001.[8]B. Moore, “Policy Core Information Model (PCIM) Extensions”, RFC 3460, January 2003.[9] J. Boyle, R. Cohen, D. Durham, S. Herzog, R. Rajan, and A. Sastry, "The COPS (Common Open Policy Service) Protocol", RFC 2748, January 2000.

Policy rule description - policy ident (name, group) - policy duration - ref. to action, cond.,actors..

Network capabilities - IEEE 802.21 specifications

Resource actions

Measurement actions

Transport actions

Application QoS descriptions

Policy Description - ident - scope - dependence

Condition specifications

QoS/SLA Specific.

Router Description

Monitorimg data base

Service provider

User Network operator

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007

Page 7: [IEEE 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) - Cap Eterel, France (2007.08.25-2007.08.31)] 2007 Second International Conference on

[10] K. Chan, D. Durham, S. Gai, S. Herzog, K. McCloghrie, F. Reichmeyer, J. Seligson, A. Smith, and R.Yavatkar, "COPS Usage for Policy Provisioning (COPS- PR)", RFC 3084, March 2001.[11]R. Sahita, S. Hahn, K. Chan, K. McCloghrie, „Framework Policy Information Base”, RFC 3318, March 2003. [12]Core and hierarchical role based access control (RBAC) profile of XACML v2.0 OASIS Standard, 1 February 2005.[13]R. Nabhen, Ed. Jamhour, C. Maziero, “RBPIM: A PCIM-Based Framework for RBAC”, Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03), 2003.[14]R. Enns (ed.) “NETCONF Configuration Protocol, RFC 4741, December 2006.[15]D. Harrington, R. Presuhn, B. Wijnen, “An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks”, RFC 3411, December 2002.[16]B. Moore, D. Durham, J. Strassner, A. Westerinen, W. Weiss, “Information Model for Describing Network Device QoS Datapath Mechanisms",RFC 3670, January 2004.[17]S. Ghamri-Doudane, N. Agoulmine, “Hierarchical Policy Based Management Architecture to Support the Deployment and the Discover of Services in Ubiquitous Networks, Proceedings of 29th Annual IEEE International Conference on Local Computer Networks (LCN), 2004.[18]I.Miloucheva, O.Menzl, K.Jonas, R.L. Aguiar, “Efficient QoS based mobile multicast using context transfer “, Journal of Communicatiobns Software and Systems, Vol.2, No.2, Juni, 2006.[19]K. Murray, D. Pesch, R. Mathur, “Intelligent Access and Mobility Management in Heterogeneous Wireless Networks using Policy”, Proc. ACM ISICT 2003, Dublin, Ireland, Sept. 2003.[20]X. Gao, G. Wu, T. Miki, „QoS Framework for Mobile Heterogeneous Networks“, 2003.[21]M. Liebsch, A. Singh, H. Chaskar, D. Funato, E. Shim: "Candidate Access Router Discovery (CARD)", RFC 4066, July 2005.[22]L. Huang, K. A. Chew, R. Tafazolli, “Network selection for One-to-Many Services In 3G-Broadcasting Cooperative Networks”, IEEE, 2005.[23]O. Ormond, J. Murphy, G-M. Muntean, “Utility-based Intelligent Network Selection in Beyond 3G Systems, ICT 2006, Istanbul, 2006.[24]M. Ganna, E. Horlait, “On Using Policies for Managing ServiceProvisionning in Agent-Based Heterogeneous Environments for Mobile Users”, Proceeding 6th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY’05, 2005.[25]Y. Cheng, W. Song, W. Zhuang, A. Leon-Garcia, R.Q. Hu, „Efficient Resource Allocation for Policy-Based Wireless/Wireline Networking, Mobile Networks and Applications, No. 11, p. 661-679, 2006. [26]A.L. Wilson, A. Lenaghan, R. Malyan, “Optimising Wireless Access Network Selection to Maintain QoS in Heterogeneous Wireless Environments, WPMC '05, Aalborg, Denmark, 2005[27]L. Teo, G.-J. Ahn, “Supporting Access Control Policies Across Multiple Operating Systems”, 43rd ACM Southeast Conference, Kennesaw, GA, USA, March 18-20, 2005.[28]Sperberg-McQueen, C., Paoli, J., Maler, E., and T. Bray, "Extensible Markup Language (XML) 1.0 (Second Edition)", World Wide Web Consortium,

http://www.w3.org/TR/2000/REC-xml-20001006, October 2000.[29]L. Lymberopoulos, E. C. Lupu, M. S. Sloman, “Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework”, presented at NOMS 2004, Seoul, April 2004.[30]Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services., IEEE P802.21/D01.00, March 2006[31]E. Michael Maximilien, Munindar P. Singh, “A Framework and Ontology for Dynamic Web Services Selection”, IEEE Internet Computing archive Volume 8 , Issue 5, p. 84 – 93, Sept. 2004[32]Elizabeth G. Idhaw, Lucas M. Lam, Dylan Pecelli, and Steven V. Pizzi, Policy-based management of the Future Airborne network via peer-to-peer networking, April 2006.

Second International Conference on Systems and Networks Communications (ICSNC 2007)0-7695-2938-0/07 $25.00 © 2007