The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes however this has a negative effect on performance since it introduces a delay associated with packet filtering. Recommended techniques for network design imply that every packet should be checked at the first possible ingress points of the network. When access control lists (ACL's) are used within a router for this purpose then there can be a significant overhead associated with this process. The purpose of this paper is to consider the effect of delays when using router operating systems offering different levels of functionality. It considers factors which contribu...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
The use of packet filters has increased considerably due to the growth of Internet users and network...
Heterogeneous communication networks with their variety of application demands, uncertain time-varyi...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
With the use of policy based security being implemented in Access Control Lists (ACLs) at the distri...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
An ACL (access control list) is one of a few tools that network administrators often use to restrict...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
In this paper, we perform a detailed analysis of point-to-point packet delay in an operational tier-...
The main goals of the paper are towards an understanding of the delay process in best-effort Interne...
The main goals of the paper are towards an understanding of the delay process in best-effort Interne...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
The use of packet filters has increased considerably due to the growth of Internet users and network...
Heterogeneous communication networks with their variety of application demands, uncertain time-varyi...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
With the use of policy based security being implemented in Access Control Lists (ACLs) at the distri...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
An ACL (access control list) is one of a few tools that network administrators often use to restrict...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
This paper considers an optimisation problem encountered in the implementation of traffic policies o...
In this paper, we perform a detailed analysis of point-to-point packet delay in an operational tier-...
The main goals of the paper are towards an understanding of the delay process in best-effort Interne...
The main goals of the paper are towards an understanding of the delay process in best-effort Interne...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
The use of packet filters has increased considerably due to the growth of Internet users and network...
Heterogeneous communication networks with their variety of application demands, uncertain time-varyi...