نتایج جستجو برای: labview و vpn

تعداد نتایج: 763406  

2002
Raouf Boutaba

irtual Private Network (VPN) is one of the major trends in the integrated broadband communications environment. There is a myriad of definitions of a VPN used in the networking community to describe a broad set of problems and solutions. In [1], Ferguson et al. define a VPN as a communications environment in which access is controlled to permit peer connections only within a defined community o...

2000
Ibrahim Khalil Torsten Braun

As today’s network infrastructure continues to grow and Differentiated Services IP backbones are now available to provide various levels of quality of service (QoS) to VPN traffic, the ability to manage increasing network complexity is considered as a crucial factor for QoS enabled VPN solutions. There is growing trend by corporate customers to outsource such complicated management services to ...

2002
Christos Xenakis Lazaros F. Merakos

A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...

2010
Murtada D. Naser

ةصلاخلا Allopeas gracilis is recorded for the first time in southern Iraq. It was collected from two localities (Abu-Al Khaseeb region and Hareer region) from Basrah city. ضرلاا عقوقلا نم ةنيع نورشعو نامث ي Allopeas gracilis مت للاخ ةرصبلا ةنيدم ،ريرح ةقطنم و بيصخلا وبا ةقطنم نم اھعمج ناسين رھش 2008 راذاو 2008 يلاوتلا ىلع . ليجستلا اذھ ربتعي دعب ةرصبلا ةنيدم نم ةيضرلاا عقاوقلا نم ثلاثلا Monacha...

1999
Eun Chul Kim Choong Seon Hong Joong-Goo Song

This paper proposes management architecture of multi-layer Virtual Private Network over the broadband network that will play an important role at the initial stage of broadband era. To provide flexible management capabilities with the administrator of the VPN, we adopt layering concept and abstraction mechanism to give a simple view of the real connection at service management level. The multil...

2004
Bushar Yousef Doan B. Hoang Glynn Rogers

Reliability and security concerns have increased demand for Virtual Private Networks (VPNs). Ideally, a VPN service should offer autonomous overlay networks with guaranteed bandwidth allocations over a shared network. Network providers seek an automated VPN creation and management process, while users of a VPN would greatly benefit from secure control over the handling of their traffic. Current...

2011
Kamil Koltys Krzysztof Pienkosz Eugeniusz Toczylowski

We consider the resource allocation problem related to Virtual Private Networks (VPNs). VPN provides connections between geographically dispersed endpoints over a shared network. To realize VPN service, sufficient amount of bandwidth of network resources must be reserved for any traffic demand specified by a customer. We assume that there are many customers that want to purchase VPN services, a...

2002
Giuseppe F. Italiano Rajeev Rastogi Bülent Yener

A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN are connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in...

2005
Osamu Honda Hiroyuki Ohsaki Makoto Imase Yoshihiro Hara Masahiro Maruyoshi Kazuhiro Matsuda

In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs. In this paper, we implement a prototype system of a VPN that enables users to be associated with multiple VPNs using existing network technologies for demonstrating the feasibility of our architecture and for clarifying the service image of a multiple association service. Our prototyp...

2012
Ya-qin Fan Chao Sun

This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید