Summary Introduced Quaratine Model Categorized possible network separation methods Analyzed their pros and cons Proposes an appropriate methods depending on the network environment