Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory
Document Type
Journal Article
Publisher
DOAJ
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science
RAS ID
10202
Abstract
Computer networks of today consist of a multitude of devices, technologies and protocols that each in themselves may impact the performance as experienced by the end user. A number of techniques exist to predict and/or model these variations, each with their own relative merit. Bandwidth-Nodes (B-Nodes) are one such technique that allows devices and/or technologies to be modelled as a single node or as a collection of nodes, each exhibiting their own performance characteristics. A simple formula is used to calculate the theoretical maximum bandwidth of a node which allows for efficiency decomposition. This incorporates device sub-optimal operation (eDi) and using empirically derived results, eDi for an individual process on a particular device can be calculated. This paper focuses on evaluating the impact the choice of device will have on network performance. By empirically evaluating Access Control Lists (ACLs) with a varying number of statements, as well as assessing different tunneling techniques, the specific device efficiencies for these can be calculated. Using this information, the anticipated performance of an ACL network given a technical specification can be easily and quickly determined.
Access Rights
free_to_read
Comments
Maj, S. P., & Veal, D. R. (2010). Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory. International Journal of Computer Science and Network Security, 10(9), 127-135. Available here