نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2016
Chengcheng Huang Zhaohao Sun

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

2003
Kenichi Kourai Toshio Hirotsu Koji Sato Osamu Akashi Kensuke Fukuda Toshiharu Sugawara Shigeru Chiba

This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environment called a portspace is bound to only one VPN, i.e., single-homed. Using this feature of portspaces, personal networks address several problems at multi-homed hosts that use multiple VPNs. Information flow is separat...

2007
Ahmed A. Joha Fathi B. Shatwan Majdi A. Ashibani

A Virtual Private Network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. This work examines and empirically evaluates the remote access VPNs, namely Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling P...

Journal: :Journal of Computer Sciences Institute 2023

The aim of the study was to check performance set-up internet connection using three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. Docker applications were used for tests, on which server configuration file launched. containers running Amazon server. tests performed a laptop virtual machine with Windows 10 Pro. has been run in Microsoft Azure cloud. next step launch docker start tools: pi...

Journal: :JNW 2012
Jun Zheng Jiantao Gu Jiansheng Gao

With the continuous deepening of China's educational reform, “multi-campus” school system has become a common phenomenon in China colleges. It is a burning question that how to improve the efficiency of the financial management. Not only is VPN (Virtual Private Network) technology provide effective solutions for “isolated island” of financial information among campus but also VPN is a safe, rel...

2010
P. Eronen

When Internet Key Exchange Protocol version 2 (IKEv2) is used for remote VPN access (client to VPN gateway), the gateway assigns the client an IP address from the internal network using IKEv2 configuration payloads. The configuration payloads specified in RFC 4306 work well for IPv4 but make it difficult to use certain features of IPv6. This document specifies new configuration attributes for I...

2017
Nal Kalchbrenner Aäron van den Oord Karen Simonyan Ivo Danihelka Oriol Vinyals Alex Graves Koray Kavukcuoglu

We propose a probabilistic video model, the Video Pixel Network (VPN), that estimates the discrete joint distribution of the raw pixel values in a video. The model and the neural architecture reflect the time, space and color structure of video tensors and encode it as a fourdimensional dependency chain. The VPN approaches the best possible performance on the Moving MNIST benchmark, a leap over...

2010
P. Eronen

When Internet Key Exchange Protocol version 2 (IKEv2) is used for remote VPN access (client to VPN gateway), the gateway assigns the client an IP address from the internal network using IKEv2 configuration payloads. The configuration payloads specified in RFC 4306 work well for IPv4 but make it difficult to use certain features of IPv6. This document specifies new configuration attributes for I...

2008
Anand Nagar

Active and programmable networks change the functionality of routers and switches by using VPN endpoints and active packets. The authors present a new packet scheduling scheme called active scheduling to control and maintain QoS parameters in virtual private networks (VPNs) within the confines of adaptive and programmable networks. In active scheduling a VPN endpoint on the router monitors the ...

2009
Steffen Schulz Ahmad-Reza Sadeghi

Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restrictions on all VPN endpoints to protect the perimeter of the VPN. However, enforcement of such restrictions becomes difficult if these endpoints are personal computers used for remote VPN access. Commonly employed measures like...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید