AbstractACL acts as an important role in network access control, network traffic flow identify and network strategy implement, ACL designing and application will evidently affect on network performance. To decreasing packet access control delay and improving the efficiency of packet transformation this paper study two methods of ACL designing and application on comparison. By mathematic analyzing the packet transferring they make different effect on network performance with variable network load, and can optimize network performance with appropriate application. The experiment with result analysis validates the methods, and is provided as the reference to network optimization
To prevent congestion in certain sections of multi-service networks, data flow management, which lea...
This article was published in the International Journal of Multimedia and Ubiquitous Engineering [© ...
Abstract—This paper presents practical studies of the TCP performance problems caused by the asymmet...
AbstractACL acts as an important role in network access control, network traffic flow identify and n...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
This paper presents a modelling and simulation framework for analysing Access Control List (ACL) imp...
TCP/IP represents the reference standard for the implementation of interoperable communication netwo...
With the use of policy based security being implemented in Access Control Lists (ACLs) at the distri...
This paper focuses on application of Multiprotocol Label Switching (MPLS) as a viable scheme of cont...
AbstractThe conventional TCP was designed to wired networks on the assumption that the loss of data ...
peer reviewedThis paper presents a novel cross-layer approach (LLE-TCP) designed for performance enh...
All the traffic control schemes have limited appl ica t ion domains: none of them are suitable, alon...
To prevent congestion in certain sections of multi-service networks, data flow management, which lea...
This article was published in the International Journal of Multimedia and Ubiquitous Engineering [© ...
Abstract—This paper presents practical studies of the TCP performance problems caused by the asymmet...
AbstractACL acts as an important role in network access control, network traffic flow identify and n...
The infrastructure of large networks is broken down into areas that have a common security policy ca...
Among the various options for implementing Internet packet filters in the form of Access Control Lis...
The difficulty of efficiently reordering the rules in an Access Control List is considered and the e...
Organizations can no longer isolate their networks from the rest of the world and still remain compe...
This paper presents a modelling and simulation framework for analysing Access Control List (ACL) imp...
TCP/IP represents the reference standard for the implementation of interoperable communication netwo...
With the use of policy based security being implemented in Access Control Lists (ACLs) at the distri...
This paper focuses on application of Multiprotocol Label Switching (MPLS) as a viable scheme of cont...
AbstractThe conventional TCP was designed to wired networks on the assumption that the loss of data ...
peer reviewedThis paper presents a novel cross-layer approach (LLE-TCP) designed for performance enh...
All the traffic control schemes have limited appl ica t ion domains: none of them are suitable, alon...
To prevent congestion in certain sections of multi-service networks, data flow management, which lea...
This article was published in the International Journal of Multimedia and Ubiquitous Engineering [© ...
Abstract—This paper presents practical studies of the TCP performance problems caused by the asymmet...