Comparative Study of Protocols Used for Establishing VPN
نویسندگان
چکیده
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also becoming very popular and organizations benefit financially by utilizing less office space, and reducing total expenses incurred by having office workers on site. To meet such requirements organizations develop a need to communicate with these offices over highly secure, confidential and reliable connections regardless of the location of the office. Here the VPN plays a vital role in establishing a distributed business model.
منابع مشابه
Quantitative Evaluation of Virtual Private Networks and its Implications for Communication Security in Industrial Protocols
Virtual Private Networks (VPNs) are widely recommended to provide security for otherwise unsecured industrial and SCADA communication protocols. VPNs provide confidentiality, integrity, and availability and are often considered secure. However, implementation vulnerabilities and protocol flaws have exposed VPN weaknesses in many deployments. In this work, we use probabilistic modeling to evalua...
متن کاملA Comparative Study on the Effects of Functional and Non-Functional Fatigue Protocols on Dynamic Balance of Amateur Basketball Players
Objective: The purpose of the present study was to compare the effects of functional and non-functional fatigue protocols on the dynamic balance of amateur basketball players. Methods: Ten amateur basketball players (mean age= 21.4±1.5 years, mean height= 177.5±7.1 cm, and mean weight= 67.4±8.5 kg) volunteered to participate in this study. Stair climbing and specific basketball movement circui...
متن کاملP-160: A Comparative Study of Luteal Estradiol Pre-Treatment in GnRH Antagonist Protocols AndIn Micro Dose Flare Protocols for Poor Responding Patients
Background: This study aims to verify if luteal estradiol pre-treatment improves IVF/ICSI outcomes in a GnRH antagonist protocol as compared to a micro dose GnRH agonist protocol in poor-responding patients. Materials and Methods: A total of 116 IVF/ICSI cycles were included in this prospective randomized clinical trial. The selected women were randomly assigned to receive an estradiol pre-trea...
متن کاملSecure Network Solutions for Enterprise Cloud Services
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1001.4200 شماره
صفحات -
تاریخ انتشار 2009