2011
DOI: 10.1109/tnet.2010.2089640
|View full text |Cite
|
Sign up to set email alerts
|

Towards Systematic Design of Enterprise Networks

Abstract: Abstract-Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks remains ad-hoc and poorly understood. In this paper, we show how a systematic design approach can handle two key areas of enterprise design: virtual local area networks (VLANs) and reachability control. We focus on these tasks given their complexity, prevalence, and time-consuming nature. Our contributions are three-fold. First, we show how these design tasks may be form… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(53 citation statements)
references
References 26 publications
0
53
0
Order By: Relevance
“…Several network products have solid constraints on the rules that they hold up. Because access control lists are measured confidential due to concerns of security, it is tricky to obtain an outsized sample of real-life access control lists [5]. Compression of access control lists may possibly permit users with larger access control lists to still make use of such devices and this may turn out to be an increasingly vital concern intended for many users as size of access control lists has developed noticeably due to an augment in Internet applications in addition to an enhance in identified vulnerabilities and attacks [2].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Several network products have solid constraints on the rules that they hold up. Because access control lists are measured confidential due to concerns of security, it is tricky to obtain an outsized sample of real-life access control lists [5]. Compression of access control lists may possibly permit users with larger access control lists to still make use of such devices and this may turn out to be an increasingly vital concern intended for many users as size of access control lists has developed noticeably due to an augment in Internet applications in addition to an enhance in identified vulnerabilities and attacks [2].…”
Section: Methodsmentioning
confidence: 99%
“…When a packet move towards to an access control list, the network device look out for the initial rule of highest priority that matches the packet and carry out the decision of that rule. Two access control list are equal if and only if they have the similar decision for each probable packet [13].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, Microsoft is also committed to access to control the development of products [14]. With VMware put forward NVGRE (network virtual GRE) and VXLAN (virtual extensible LAN), to solve cross-data center to solve large-scale VLAN communication, Virtual machine migration and other problems.…”
Section: Cloud Access Control Modelmentioning
confidence: 99%
“…Moreover, the few papers in this area often restrict to limited and specific use cases (see, e.g., [20]). As such, methodologies available to operators are often the ones proposed by vendors on the basis of their consultancy activity.…”
Section: Related Workmentioning
confidence: 99%