Skip to main content

Load Experiments of the vDACS Scheme in Case of the 600 Connections by 300 Clients

  • Conference paper
  • First Online:
  • 1478 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 7))

Abstract

In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 600.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cerf, V., Kahn, E.: A protocol for packet network interconnection. IEEE Trans. Commun. COM-22, 637–648 (1974)

    Article  Google Scholar 

  2. Yavatkar, R., Pendarakis, D., Guerin, R.: A framework for policy-based admission control. IETF RFC 2753 (2000)

    Google Scholar 

  3. Moore, B., et al.: Policy Core Information Model – Version 1 Specification. IETF RFC 3060 (2001)

    Google Scholar 

  4. Moore, B.: Policy Core Information Model (PCIM) Extensions. IETF 3460 (2003)

    Google Scholar 

  5. Strassner, J., Moore, B., Moats, R., Ellesson, E.: Policy core lightweight directory access protocol (LDAP) schema. IETF RFC 3703 (2004)

    Google Scholar 

  6. Durham, D., et al.: The COPS (Common Open Policy Service) Protocol. IETF RFC 2748 (2000)

    Google Scholar 

  7. Herzog, S., et al.: COPS usage for RSVP. IETF RFC 2749 (2000)

    Google Scholar 

  8. Chan, K., et al.: COPS usage for policy provisioning (COPS-PR). IETF RFC 3084 (2001)

    Google Scholar 

  9. CIM Core Model V2.5 LDAP Mapping Specification (2002)

    Google Scholar 

  10. Wahl, M., Howes, T., Kille, S.: Lightweight directory access protocol (v3). IETF RFC 2251 (1997)

    Google Scholar 

  11. CIM Schema: Version 2.30.0 (2011)

    Google Scholar 

  12. ETSI ES 282 003: Telecoms and Internet converged Services and protocols for Advanced Network (TISPAN); Resource and Admission Control Subsystem (RACS); Functional Architecture, June 2006

    Google Scholar 

  13. ETSI ES 283 026: Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control; Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in the Resource and Protocol specification, April 2006

    Google Scholar 

  14. Odagiri, K., Shimizu, S., Takizawa, M., Ishii, N.: Theoretical suggestion of policy-based wide area network management system (wDACS system part-I). Int. J. Netw. Distrib. Comput. (IJNDC) 1(4), 260–269 (2013)

    Article  Google Scholar 

  15. Odagiri, K., Shimizu, S., Ishii, N., Takizawa, M.: Suggestion of the cloud type virtual policy based network management scheme for the common use between plural organizations. In: Proceedings of International Conference on Network-Based Information Systems (NBiS-2015), pp. 180–186, Septmber 2015

    Google Scholar 

Download references

Acknowledgments

This work was supported by the research grant of KDDI Foundation. We express our gratitude.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kazuya Odagiri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Odagiri, K., Shimizu, S., Ishii, N., Takizawa, M. (2018). Load Experiments of the vDACS Scheme in Case of the 600 Connections by 300 Clients. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65521-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65520-8

  • Online ISBN: 978-3-319-65521-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics