2004
DOI: 10.1002/bltj.20002
|View full text |Cite
|
Sign up to set email alerts
|

Policy-based network management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…In any case, the policy based methodology is a way to deal with the board that has extraordinary potential not just in overseeing basic administrations, such as the system component setup and VPNs, yet additionally in overseeing complex administrations. Much research is as yet expected to understand its maximum capacity [11][12].…”
Section: Related Workmentioning
confidence: 99%
“…In any case, the policy based methodology is a way to deal with the board that has extraordinary potential not just in overseeing basic administrations, such as the system component setup and VPNs, yet additionally in overseeing complex administrations. Much research is as yet expected to understand its maximum capacity [11][12].…”
Section: Related Workmentioning
confidence: 99%
“…The PMI can be visualised as a backbone from which one can hang individual PBM applications, as is schematically illustrated in Figure 5. Examples of the PBM applications that can hang from a PMI include the routing management, quality of service management (Choudhary, 2004b), service level specifications management, information assurance management (Choudhary, 2005b(Choudhary, , 2006, and of course the network management (Choudhary, 2004a). This process is roughly like having a network backbone from which individual local area networks can be hanged.…”
Section: Pmi Based Deploymentmentioning
confidence: 99%
“…At the Internet Engineering Task Force (IETF) the policy based decisions have been used for routing since 1989 (IETF, 1989) though a PBM formalism was specified much later (IETF, 2005a(IETF, , 2003a. Prototype developments emerged (Agrawal et al, 2005;Choudhary, 2004a) though standards-based robust products are mostly lacking.…”
Section: Introductionmentioning
confidence: 99%
“…The PMI can be visualized as a backbone from which one can hang individual PBM applications, as is schematically illustrated in Figure 3. Examples of the PBM applications include the routing management, quality of service management [4], service level specifications management, information assurance management [5], [6], and of course the network management [2]. In the case of the PMI based deployment, the PBM capabilities arise from three main sources: (a) the capabilities of the policy management infrastructure; (b) the capabilities of the domain specific digital policies such as those for routing, quality of service, service level specifications, information assurance, and network management; and (c) the capabilities that derive from the situation evaluation and decision making logic2 employed within a PDP.…”
Section: Pmi Based Deploymentmentioning
confidence: 99%
“…The readers are referred to the published literature [1] [2] for an introduction. The global information grid (GIG) and its space base component, the transformational satellites (TSAT), are essential enablers for the Net Centric Operations and Warfare (NCOW).…”
Section: Introductionmentioning
confidence: 99%