Home > Store > Networking > Network Administration & Management

Policy-Based Networking: Architecture and Algorithms

Register your product to gain access to bonus material or receive a coupon.

Policy-Based Networking: Architecture and Algorithms


  • Your Price: $40.00
  • List Price: $50.00
  • Usually ships in 24 hours.


  • Copyright 2000
  • Dimensions: 7.375 X 9.125
  • Pages: 336
  • Edition: 1st
  • Book
  • ISBN-10: 1-57870-226-7
  • ISBN-13: 978-1-57870-226-8

Policy-based networking is the new frontier in networking. A high-level directive given to the network at a single console, it promises easy management of critical network elements such as security, Quality of Service, and device configuration. The translation of high level policies into the device specific configurations is a complex procedure, requiring detailed knowledge of the topology and routes in the network, and translation-enabling algorithms. This book would take the mystery out of this process, allowing you, the network engineer to build policy support into your network architecture. Only scattered pieces of the solution can currently be found in various IETF and DMTF working groups, or in some research presentations and workshops. In-depth understanding of the algorithms behind policy-based networking is necessary for network engineers/architects who want to create new products/applications that deliver policy features.

Sample Content

Downloadable Sample Chapter

Click below for Sample Chapter related to this title:

Table of Contents


Who Will Benefit from This Book? Who Is This Book Not For? How This Book Is Organized.

1. Policy-Enabled Networking Architecture.

Policy and Network Management. Policy Disciplines. Policy Definition. Policy Application Examples. Policy Activity: A Historical Perspective. Policy Architecture Overview. Policy Management Tool. Policy Repository. Policy Decision Point. Policy Enforcement Point. An Implementation of the Architecture. Further Information.

2. IP Architecture Overview.

IP Overview. Quality of Service Overview. IP Security Overview. Further Information.

3. The Generic Provisioning Problem.

Business Environments. High-Level Policies. Low-Level Policies. The Policy Management Tool.

4. Technology Support for Business Needs.

Support of Business SLAs in the Enterprise Network. Extranet Support in the Enterprise Environment. SLA Support in the ISP Environment. VPN Support in the ISP Environment. SLA Support in the ASP Environment. Access Control Support in the ASP Environment.

5. Resource Discovery.

Topology Discovery. PEP and PDP Discovery. Role and User Discovery. Application Discovery.

6. Policy Validation and Translation Algorithms.

Policy Specification Languages. A Policy Case Example. Policy Constraint Validation. Policy Conflict Detection and Resolution. Policy Coverage Analysis. Discipline-Specific Policy Validation. Policy Translation: Conversion from High-Level to Low-Level.

7. Policy Distribution Mechanisms.

An Example of Policy Distribution. Policy Distribution Using Management Frameworks. Policy Distribution Using Scripts. Policy Distribution Using LDAP. Policy Distribution Using SNMP. Policy Distribution Using Common Open Policy Service. Policy Distribution Using Web Servers. Summary.

8. Policy Enforcement Point Algorithms

Policy Enforcement Point Components. Classification Algorithms. Policy Validation Algorithms.

9. Policy Application Instances.

Enterprise SLA Support. Extranet Support for the Enterprise Environment. SLA Support for the ISP Environment. VPN Support for the ISP Environment. Customer Support for the Application-Hosting Environment.

10. Advanced Topics.

Policy Monitoring. Dynamic and State-Dependent Policies. Routing Policy. Other Policy Disciplines. Interdomain Policies.



Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership