To search, Click
below search items.
|
|
All
Published Papers Search Service
|
Title
|
Evaluating Layer 3 Device Tunneling and Access Control List Security Bandwidths Using B-Node Theory
|
Author
|
S P Maj, D Veal
|
Citation |
Vol. 10 No. 9 pp. 127-135
|
Abstract
|
Computer networks of today consist of a multitude of devices, technologies and protocols that each in themselves may impact the performance as experienced by the end user. A number of techniques exist to predict and/or model these variations, each with their own relative merit. Bandwidth-Nodes (B-Nodes) are one such technique that allows devices and/or technologies to be modelled as a single node or as a collection of nodes, each exhibiting their own performance characteristics. A simple formula is used to calculate the theoretical maximum bandwidth of a node which allows for efficiency decomposition. This incorporates device sub-optimal operation (eDi) and using empirically derived results, eDi for an individual process on a particular device can be calculated. This paper focuses on evaluating the impact the choice of device will have on network performance. By empirically evaluating Access Control Lists (ACLs) with a varying number of statements, as well as assessing different tunneling techniques, the specific device efficiencies for these can be calculated. Using this information, the anticipated performance of an ACL network given a technical specification can be easily and quickly determined.
|
Keywords
|
Network Security, B-Nodes, Access Control Lists, Tunneling
|
URL
|
http://paper.ijcsns.org/07_book/201009/20100921.pdf
|
|