A Policy Case Example
In order to illustrate the different validation algorithms that are examined in this chapter, I will use a simple example that commonly arises in the enterprise environment. Assume that this is an enterprise that wants to support application-level SLAs for its customers. These SLAs are specified in terms of the application response time that occurs when a specific client accesses an application. The high-level policies that will be specified by a user will map each usage scenario, a client accessing an application on a server, to a service class. The service class has specific performance objectives associated with it.
A simple set of six tables can be used to represent these policies, as shown in Figure 6.2. A table of ...
Get Policy-Based Networking: Architecture and Algorithms now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.