To search, Click below search items.

 

All Published Papers Search Service

Title

Evaluating Layer 3 Device Tunneling and Access Control List Security Bandwidths Using B-Node Theory

Author

S P Maj, D Veal

Citation

Vol. 10  No. 9  pp. 127-135

Abstract

Computer networks of today consist of a multitude of devices, technologies and protocols that each in themselves may impact the performance as experienced by the end user. A number of techniques exist to predict and/or model these variations, each with their own relative merit. Bandwidth-Nodes (B-Nodes) are one such technique that allows devices and/or technologies to be modelled as a single node or as a collection of nodes, each exhibiting their own performance characteristics. A simple formula is used to calculate the theoretical maximum bandwidth of a node which allows for efficiency decomposition. This incorporates device sub-optimal operation (eDi) and using empirically derived results, eDi for an individual process on a particular device can be calculated. This paper focuses on evaluating the impact the choice of device will have on network performance. By empirically evaluating Access Control Lists (ACLs) with a varying number of statements, as well as assessing different tunneling techniques, the specific device efficiencies for these can be calculated. Using this information, the anticipated performance of an ACL network given a technical specification can be easily and quickly determined.

Keywords

Network Security, B-Nodes, Access Control Lists, Tunneling

URL

http://paper.ijcsns.org/07_book/201009/20100921.pdf