You are previewing Policy-Based Networking: Architecture and Algorithms.
O'Reilly logo
Policy-Based Networking: Architecture and Algorithms

Book Description

Policy-based networking is the new frontier in networking. A high-level directive given to the network at a single console, it promises easy management of critical network elements such as security, Quality of Service, and device configuration. The translation of high level policies into the device specific configurations is a complex procedure, requiring detailed knowledge of the topology and routes in the network, and translation-enabling algorithms. This book would take the mystery out of this process, allowing you, the network engineer to build policy support into your network architecture. Only scattered pieces of the solution can currently be found in various IETF and DMTF working groups, or in some research presentations and workshops. In-depth understanding of the algorithms behind policy-based networking is necessary for network engineers/architects who want to create new products/applications that deliver policy features.

Table of Contents

  1. Copyright
  2. About the Author
  3. About the Technical Reviewers
  4. Acknowledgments
  5. Tell Us What You Think
  6. Introduction
  7. Policy-Enabled Networking Architecture
    1. Policy and Network Management
    2. Policy Disciplines
    3. Policy Definition
    4. Policy Activity: A Historical Perspective
    5. Policy Architecture Overview
    6. Further Information
  8. IP Architecture Overview
    1. IP Overview
    2. Quality of Service Overview
    3. IP Security Overview
    4. Further Information
  9. The Generic Provisioning Problem
    1. Business Environments
    2. High-Level Policies
    3. Low-Level Policies
    4. The Policy Management Tool
  10. Technology Support for Business Needs
    1. Support of Business SLAs in the Enterprise Network
    2. Extranet Support in the Enterprise Environment
    3. SLA Support in the ISP Environment
    4. VPN Support in the ISP Environment
    5. SLA Support in the ASP Environment
    6. Access Control Support in the ASP Environment
  11. Resource Discovery
    1. Topology Discovery
    2. PEP and PDP Discovery
    3. Role and User Discovery
    4. Application Discovery
  12. Policy Validation and Translation Algorithms
    1. Policy Specification Languages
    2. A Policy Case Example
    3. Policy Constraint Validation
    4. Policy Conflict Detection and Resolution
    5. Policy Coverage Analysis
    6. Discipline-Specific Policy Validation
    7. Policy Translation: Conversion from High-Level to Low-Level
  13. Policy Distribution Mechanisms
    1. An Example of Policy Distribution
    2. Policy Distribution Using Management Frameworks
    3. Policy Distribution Using Scripts
    4. Policy Distribution Using LDAP
    5. Policy Distribution Using SNMP
    6. Policy Distribution Using Common Open Policy Service
    7. Policy Distribution Using Web Servers
    8. Summary
  14. Policy Enforcement Point Algorithms
    1. Policy Enforcement Point Components
    2. Classification Algorithms
    3. Policy Validation Algorithms
  15. Policy Application Instances
    1. Enterprise SLA Support
    2. Extranet Support for the Enterprise Environment
    3. SLA Support for the ISP Environment
    4. VPN Support for the ISP Environment
    5. Customer Support for the Application-Hosting Environment
  16. Advanced Topics
    1. Policy Monitoring
    2. Dynamic and State-Dependent Policies
    3. Routing Policy
    4. Other Policy Disciplines
    5. Interdomain Policies
  17. References
  18. Index