Title

Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory

Document Type

Journal Article

Publisher

DOAJ

Faculty

Computing, Health and Science

School

Computer & Security Science

RAS ID

10202

Comments

This article was originally published as: Maj, S. P., & Veal, D. R. (2010). Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory. International Journal of Computer Science and Network Security, 10(9), 127-135. Original article available here

Abstract

Computer networks of today consist of a multitude of devices, technologies and protocols that each in themselves may impact the performance as experienced by the end user. A number of techniques exist to predict and/or model these variations, each with their own relative merit. Bandwidth-Nodes (B-Nodes) are one such technique that allows devices and/or technologies to be modelled as a single node or as a collection of nodes, each exhibiting their own performance characteristics. A simple formula is used to calculate the theoretical maximum bandwidth of a node which allows for efficiency decomposition. This incorporates device sub-optimal operation (eDi) and using empirically derived results, eDi for an individual process on a particular device can be calculated. This paper focuses on evaluating the impact the choice of device will have on network performance. By empirically evaluating Access Control Lists (ACLs) with a varying number of statements, as well as assessing different tunneling techniques, the specific device efficiencies for these can be calculated. Using this information, the anticipated performance of an ACL network given a technical specification can be easily and quickly determined.

Access Rights

free_to_read