POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Module 11: Integrating Business Rules. Overview Lesson 1: Introduction to Business Rules Lesson 2: Integrating Business Rules.
Putting Mobile Services into ContextDynamic Context-aware Personalisation for Smart Services S. Gallacher, E. Papadopoulou, N.K.Taylor, M.H.Williams Heriot-Watt.
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks or: How to Provide Security Monitoring as a Service in Clouds? Seungwon.
XML Technology in E-Commerce
Rulebase Expert System and Uncertainty. Rule-based ES Rules as a knowledge representation technique Type of rules :- relation, recommendation, directive,
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Analysis Modeling.
Ruling Networks with RDL: A Domain-Specific Language to Task Wireless Sensor Networks Kirsten Terfloth Institute of Mathematics and Computer Science Freie.
Managing Redundant Content in Bandwidth Constrained Wireless Networks Tuan Dao, Amit K. Roy- Chowdhury, Srikanth V. Krishnamurthy U.C. Riverside Harsha.
Chapter 12: Expert Systems Design Examples
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Object-Oriented Analysis and Design
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
3-1 Chapter 3 Data and Knowledge Management
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Włodzimierz Funika, Filip Szura Automation of decision making for monitoring systems.
Evaluating Centralized, Hierarchical, and Networked Architectures for Rule Systems Benjamin Craig University of New Brunswick Faculty of Computer Science.
1 Introduction to databases concepts CCIS – IS department Level 4.
Chapter 14: Artificial Intelligence Invitation to Computer Science, C++ Version, Third Edition.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
Chapter 4 System Models A description of the various models that can be used to specify software systems.
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
Unifying Data and Domain Knowledge Using Virtual Views IBM T.J. Watson Research Center Lipyeow Lim, Haixun Wang, Min Wang, VLDB Summarized.
68 th IETF, Prague Czech Republic Issues with L2 abstractions and how they affect QOS-based handovers Nada Golmie Advanced Networking Technologies Division.
Courier Tracking System. Small Courier Operations Small courier services collect Letters and parcels from customers and issues its own POD number Then.
Stephen Booth EPCC Stephen Booth GridSafe Overview.
Auckland Connected Systems User Group November 19th 2009 Jeffrey Chilberto BizTalk Consultant
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
Chapter Two ( Data Model) Objectives Introduction to Data Models What are the Data Models Why they are important Learn how to design a DBMS.
IEEE &
Chapter 7 System models.
Storing Organizational Information - Databases
ARTIFICIAL INTELLIGENCE [INTELLIGENT AGENTS PARADIGM] Professor Janis Grundspenkis Riga Technical University Faculty of Computer Science and Information.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
CASS – Middleware for Mobile Context-Aware Applications Patrick Fahy Siobhan Clarke Trinity College Dublin, Ireland Summarized by Babar Tareen,
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
The Volcano Optimizer Generator Extensibility and Efficient Search.
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
1 GT XACML Authorization Rachana Ananthakrishnan Argonne National Laboratory.
A Throttling Layer-7 Web Switch James Furness. Motivation & Goals Specification & Design Design detail Demonstration Conclusion.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
A policy-based per-flow mobility management system design
Semantic Web Aided Itinerary Planner Rohit Sud Aditya Sakhuja Mayur Bhosle Aditya Devurkar Course: CS8803 AIAD Prof: Ling Liu.
Connect. Communicate. Collaborate Stitching framework for AutoBAHN Victor Reijs, HEAnet TNC2007, May 23 rd, 2007
Scenario-Based Analysis of Software Architecture Rick Kazman, Gregory Abowd, Len Bass, and Paul Clements Presented by Cuauhtémoc Muñoz.
The mandate of this working group is to facilitate effective service interoperability utilizing SIP in heterogeneous network environments as noted below.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
1 Enhanced Mobility Support for Roaming Users: Extending the IEEE Information Service WWIC 2010 Luleå, June 1-3, 2010 Karl Andersson*, Andrea G.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Stream SQL, Rules, Subscriptions: It’s All The Same Hans-Arno Jacobsen Bell University Laboratory Chair Middleware Systems Research Group University of.
Artificial Intelligence, simulation and modelling.
Some Thoughts to Consider 5 Take a look at some of the sophisticated toys being offered in stores, in catalogs, or in Sunday newspaper ads. Which ones.
With the rapid advancement in technology and globalization, most of the leading companies and organizations generally operate with network connectivity.
Virtual Local Area Networks In Security By Mark Reed.
Integration of and Third-Generation Wireless Data Networks
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Rules within an Enterprise
Knowledge Representation and Inference
Data Model.
AAA: A Survey and a Policy- Based Architecture and Framework
OpenSec:Policy-Based Security Using Software-Defined Networking
Database Dr. Roueida Mohammed.
Presentation transcript:

POLICY ENGINE Research: Design & Language IRT Lab, Columbia University

Control Middleware IRT Lab, Columbia University2

Current Implementation Issue: Different functions to communicate with different managers Objective: modular extensible design Design: Extensibility IRT Lab, Columbia University 3

Can we leverage MIH design ? Design: Extensibility IRT Lab, Columbia University 4

Leverage MIH Registration Policy Engine (PE) is similar to MIH Function IRT Lab, Columbia University 5

Events and Services Manager provides events and services –Events: Link change Network change Location change –Services Subscriber can query the value of certain attributes (current location, current bandwidth, etc.) Subscriber can send decisions/notifications Policy engine subscribes to events and services (put in tables) IRT Lab, Columbia University 6

Tables in Policy Engine Event Table –Events from each connected manager –Each event will trigger a different evaluation Service Table –Subscribed services from managers or other modules –Methods / API to access the service also recorded IRT Lab, Columbia University 7

POLICY LANGUAGE Research: Design & Language IRT Lab, Columbia University

Why ? Environment –Mobile Devices –Heterogeneous networks/interfaces Network selection and handover –Default rules –Manual switch Control middleware –Unified policy language IRT Lab, Columbia University 9

Use Cases Different network usage for different user scenarios –Different places (office / home) –Different time (morning / evening) –Different activities (working / playing) –Different devices (monitors / phones) –Different security options Application preferences –Some need high throughput –Some need lowest money cost IRT Lab, Columbia University 10

Related Works Policy expression framework –Standard schemas –P3P / SAML / … Rule-based policies –Accountability in RDF (AIR) Custom configurations –For particular applications IRT Lab, Columbia University 11

Language Design Attributes Evaluation Decision Knowledge base IRT Lab, Columbia University 12

Language Semantics Attribute : Network / System Term : Value (Binary evaluation) or range (T/F) Score : Evaluate score from one attribute Eval : Trigger evaluation and generate facts (each event will trigger one eval, which may evaluate several terms and scores) Fact : Predicate Logic unit Rule : Making decisions by forward chaining (facts => actions) IRT Lab, Columbia University 13

Attributes Deterministic –Location –Time –Scenario profiles (meeting / working / traveling) –Security –Devices Non-Deterministic –Quality of Service (QoS) –System Resources –Expense/Cost IRT Lab, Columbia University 14

Attribute Representation Direct attributes –Corresponding entry in the service table Derived attributes –Combination of attributes –Evaluated as a single attribute Attribute table: –Name of the attribute –How to get the value of the attribute Example: derived attr { id: bp_ratio attr: bandwidth (x1) attr: price (x2) func: x1 / x2 } IRT Lab, Columbia University 15

Deterministic Evaluation Binary (Yes/No) Range (In range or not) Term –id –attr : evaluated attribute –values : expected values –low : lowest value –high : highest value Example: term { id: at_home attr: location values: home } term { id: mid_bw attr: bandwidth low: 50 high: 200 } IRT Lab, Columbia University 16

Non-deterministic Evaluation Attribute value -> score (0 ~ 100) Priority (used as weight when evaluating multiple scores) Score –id: name of the score –attr: evaluated attr(s) –how: max, min, order –priority : 0 ~ 1 Example: score { id: bw_score attr: bandwidth order: linear max: 1000 min: 0 priority: 0.7 } bp_ratio 0.7 signal 0.2 latency Example: score { id: price_score attr: price order: linear max: 0 min: 1000 priority: 0.9 } IRT Lab, Columbia University 17

Eval Event triggered –id: used by Event Table Generate facts –attributes: directly turned –terms: which satisfies –scores: highest score Only one score Multiple scores: weighted sum fact: predicate(params) Examples: eval { id: eval1 { attr: location => location(x) } { term: mid_bw => mid_bw(x) } { score: bw_score => highest_bw(x) } { score: price_score => cheapest(x) } { score: bw_score score: price_score => most_worth(x) } } IRT Lab, Columbia University 18

Decision Attribute evaluations -> Facts Rule Engine: Facts -> Actions Actions: decisions / facts Decisions: Leverage service table Example: rule { location(home) cheapest(x) => decide(1, x) history(home, x) } IRT Lab, Columbia University 19

Knowledge Base Taking history into account IRT Lab, Columbia University 20 Data Store

Implementation Policy Language –Syntax abstracted from the examples –LRM to be developed Implementation language: C –More efficient –Inside system –Rule Engine can leverage logic language Prolog IRT Lab, Columbia University 21

Conclusion Structures –attr, term, score, eval, fact, rule Advantages –Configurable & Programmable –Configurations can be simple (XML/JSON) –Programmable rule chains can generate intelligent decisions –Extensible (attributes, evaluations, rules) IRT Lab, Columbia University 22

Next Steps Implementation Evaluation IRT Lab, Columbia University 23