Comparative Study of Protocols Used for Establishing VPN

نویسندگان

  • P. Venkateswari
  • T. Purusothaman
چکیده

This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also becoming very popular and organizations benefit financially by utilizing less office space, and reducing total expenses incurred by having office workers on site. To meet such requirements organizations develop a need to communicate with these offices over highly secure, confidential and reliable connections regardless of the location of the office. Here the VPN plays a vital role in establishing a distributed business model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative Evaluation of Virtual Private Networks and its Implications for Communication Security in Industrial Protocols

Virtual Private Networks (VPNs) are widely recommended to provide security for otherwise unsecured industrial and SCADA communication protocols. VPNs provide confidentiality, integrity, and availability and are often considered secure. However, implementation vulnerabilities and protocol flaws have exposed VPN weaknesses in many deployments. In this work, we use probabilistic modeling to evalua...

متن کامل

A Comparative Study on the Effects of Functional and Non-Functional Fatigue Protocols on Dynamic Balance of Amateur Basketball Players

Objective: The purpose of the present study was to compare the effects of functional and non-functional fatigue protocols on the dynamic balance of amateur basketball players. Methods: Ten amateur basketball players (mean age= 21.4±1.5 years, mean height= 177.5±7.1 cm, and mean weight= 67.4±8.5 kg) volunteered to participate in this study. Stair climbing and specific basketball movement circui...

متن کامل

P-160: A Comparative Study of Luteal Estradiol Pre-Treatment in GnRH Antagonist Protocols AndIn Micro Dose Flare Protocols for Poor Responding Patients

Background: This study aims to verify if luteal estradiol pre-treatment improves IVF/ICSI outcomes in a GnRH antagonist protocol as compared to a micro dose GnRH agonist protocol in poor-responding patients. Materials and Methods: A total of 116 IVF/ICSI cycles were included in this prospective randomized clinical trial. The selected women were randomly assigned to receive an estradiol pre-trea...

متن کامل

Secure Network Solutions for Enterprise Cloud Services

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1001.4200  شماره 

صفحات  -

تاریخ انتشار 2009