نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2011
Sanaz Rahimi Mehdi R. Zargham

Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to evaluate and quantify the security of VPN ...

2004
Sid Sirisukha Mikhail Kotykhov

Virtual Private Network (VPN) protects information systems in enterprise organizations by building a security tunnel between the headquarters and branches, or from the headquarters to suppliers and customers. Proper and effective implementation can be evaluated by considering organizational effects and enterprise objectives. In this paper a research model is proposed to evaluate the performance...

2004
S. Andreozzi T. Ferrari E. Ronchieri

Quality of Service delivered to Grids by packet-switched networks, is one of the most important factors affecting performance and efficiency of both Grid applications and middleware. The use Virtual Private Network services can improve the overall performance of Grids in many respects. In this paper, we show how the security, privacy and Quality of Service offered by scalable on-demand VPN serv...

Journal: :Management Science 2009
Yuliang Yao Martin E. Dresner Jonathan W. Palmer

a College of Business & Economics, Lehigh University b College of Business, College of William and Mary c Robert H. Smith School of Business, University of Maryland ABSTRACT Prior literature has documented the performance benefits from the use of electronic data interchange (EDI) and the Internet. Little research, however, has provided a direct comparison between the performance of the two syst...

Journal: :RFC 2011
Parviz Yegani Kent Leung Avi Lior Kuntal Chowdhury Jay Navali

The Generic Routing Encapsulation (GRE) specification contains a Key field, which MAY contain a value that is used to identify a particular GRE data stream. This specification defines a new Mobile IP extension that is used to exchange the value to be used in the GRE Key field. This extension further allows the Mobility Agents to set up the necessary protocol interfaces prior to receiving the mo...

2003
Jingdi Zeng

This work is resulted from the effort on incorporating IP VPN services into a 10G Ethernet product for an industry vendor.

2006
Thanukrishnan Srinivasan R. Balakrishnan S. A. Gangadharan V. Hayawardh

Packet classification is the problem of identifying which one of a set of rules maintained in a database is best matched by an incoming packet at a router and taking the action specified by the rule. This is a uniform enabler for many new network services like firewalls, quality of service and virtual private networks. These services require dynamic management of rules. While many algorithms re...

Journal: :Computer Networks 2003
Wei Cui Mostafa A. Bassiouni

Dynamic link resizing is an attractive approach for resource management in virtual private networks (VPNs) serving modern real-time and multimedia traffic. In this paper, we assess the use of linear traffic predictors to dynamically resize the bandwidth of VPN links. We present the results of performance comparisons of three predictors: Gaussian, autoregressive moving average (ARMA) and fractio...

2003
Keisuke Ishibashi Mika Ishizuka Masaki Aida Hiroshi Ishii

This paper discusses research into the capacity dimensioning of Virtual Private Network (VPN) access links for elastic traffic, such as the Web or ftp. Assuming that the coreVPN network is provisioned with a sufficiently large capacity, managing the capacity of the VPN access link comes to sharing the bandwidth for the elastic traffic of the two bottlenecks, the ingress and egress access links....

Journal: :Math. Oper. Res. 2011
Fabrizio Grandoni Thomas Rothvoß Laura Sanità

The virtual private network problem (Vpn) models scenarios where traffic is uncertain or rapidly changing. The goal is supporting at minimum cost a given family of traffic matrices, which are implicitly given by upper bounds on the ingoing and outgoing traffic at each node. Costs are classically defined by a linear function (linear Vpn), but we consider here also the more general case of concav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید