This paper presents a modelling and simulation framework for analysing Access Control List (ACL) implementation on Internet devices. It uses the established modelling/simulation techniques of abstraction and simplification to isolate the essential components of the system from peripheral issues. As a case study, the viability of a simple real-time optimisation technique is demonstrated.
Computer and Systems Architecture | Digital Communications and Networking | Hardware Systems | Systems and Communications
Grout, V., Davies, J.N. & McGinn, J., “Traffic Modelling and Simulation Techniques for Evaluating ACL Implementation”, Proceedings of the Seventh International Network Conference (INC 2008), University of Plymouth, 8-10 July 2008, pp105-124.
Digital Commons Citation
Grout, Vic; Davies, John N.; and McGinn, John, "Traffic Modelling and Simulation Techniques for Evaluating ACL Implementation" (2008). Computing. Paper 45.