Abstract
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the course between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have been studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. As the first step, the DASC System is extended to move on the Wide Area Network (WAN) in this paper. We call the extended DACS system the Wide Area DACS system (wDACS system).
Article PDF
Avoid common mistakes on your manuscript.
References
V.CERF and E.KAHN,”A Protocol for Packet Network Interconnection,” IEEE Trans. on Commn, vol.COM-22 pp.637–648, May 1974.
B.M.LEINER, R.CORE,J.POSTEL,and D.MILLS,”The DARPA Internet Protocol Suite,” IEEE Commun.Magazine,vol.23 pp.29–34 March 1985.
P. Mockapetris and K. J. Dunlap. Development of the domain name system. In SIGCOMM’88, 1988.
Alex X. Liu, Mohamed G.Gouda, “Diverse Firewall Design,” IEEE Trans. on Parallel and Distributed Systems,Vol.19, Issue.9, pp.1237–1251, Sept. 2008.
M.S. Ferdous, F. Chowdhury, J.C. Acharjee, “An Extended Algorithm to Enhance the Performance of the Current NAPT,” Int. Conf. on Information and Communication Technology(ICICT ‘07), pp.315 – 318, March 2007.
S.K. Das, D.J. Harvey, and R. Biswas,”Parallel processing of adaptive meshes with load balancing,” IEEE Tran.on Parallel and Distributed Systems, vol.12,No.12,pp.1269–1280,Dec 2002.
J. Aweya, M. Ouellette, D.Y. Montuno, B. Doray, and K. Felske,”An adaptive load balancing scheme for web servers,” Int.,J.of Network Management.,vol.12,No.1,pp.3–39,Jan/Feb 2002.
C. Metz,”The latest in virtual private networks: part I,” IEEE Internet Computing, Vol. 7, No. 1, pp. 87–91,2003.
C. Metz,”The latest in VPNs: part II,” IEEE Internet Computing, Vol. 8, No. 3, pp. 60–65, 2004.
R. Perlman, “An overview of PKI trust models, IEEE Network,Vol.13, Issue.6, pp.38–43,Nov/Dec 1999.
A. Singh, M. Korupolu, D. Mohapatra, “Server-storage virtualization: Integration and load balancing in data centers,” Int. Conf. for High Performance Computing, Networking, Storage and Analysis, pp. 1–12, Nov. 2008.
R. Yavatkar at el., “A Framework for Policy-based Admission Control”, IETF RFC 2753, 2000.
B. Moore at el., “Policy Core Information Model --Version 1 Specification”, IETF RFC 3060, 2001.
B. Moore.,”Policy Core Information Model (PCIM) Extensions”, IETF 3460, 2003.
J. Strassner at el., “ Policy Core Lightweight Directory Access Protocol (LDAP) Schema”, IETF RFC 3703, 2004.
D. Durham at el.,”The COPS (Common Open Policy Service) Protocol”, IETF RFC 2748, 2000.
S. Herzog at el.,”COPS usage for RSVP”, IETF RFC 2749, 2000.
K. Chan et al.,”COPS Usage for Policy Provisioning (COPS-PR)”, IETF RFC 3084, 2001.
CIM Core Model V2.5 LDAP Mapping Specification, 2002.
M. Wahl at el.,”Lightweight Directory Access Protocol (v3)”, IETF RFC 2251, 1997.
CIM Schema: Version 2.30.0, 2011.
ETSI ES 282 003: Telecoms and Internet converged Services and protocols for Advanced Network (TISPAN); Resource and Admission Control Subsystem (RACS); Functional Architecture, June 2006.
ETSI ETSI ES 283 026: Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control; Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in the Resource and Protocol specifica-tion”, April 2006.
K. Odagiri, R. Yaegashi, M. Tadauchi, and N.Ishii, Efficient Network Management System with DACS Scheme : Management with communication control,” Int. J. of Computer Science and Network Security, Vol.6, No.1, pp.30–36, January, 2006.
K. Odagiri, R. Yaegashi, M. Tadauchi, and N.Ishii, Secure DACS Scheme, “ Journal of Network and Computer Applications,” Elsevier, Vol.31, Issue 4, pp.851–861, November, 2008.
K. Odagiri, S. Shimizu, R. Yaegashi, M. Takizawa, N. Ishii, “DACS System Implementation Method to Realize the Next Generation Policy-based Network Management Scheme,” Proc. of Int. Conf. on Advanced Information Networking and Applications (AINA20010), Perth, Australia, Japan, IEEE Computer Society, pp.348–354, May, 2010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Odagiri, K., Shimizu, S., Takizawa, M. et al. Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I). Int J Netw Distrib Comput 1, 260–269 (2013). https://doi.org/10.2991/ijndc.2013.1.4.7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2013.1.4.7