نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2003
Liang Huan Ognian Kabranov Luis Orozco-Barbosa Dimitrios Makrakis

IP-based VPN technology is considered an attractive cost-effective private network service for both customers and service providers. We focus our research on the design of a minimal cost routing policy to be used by network-based IP VPN. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sour...

2003
Nathalie Rico Omar Cherkaoui

Network Management application developers are facing the challenge of the constant evolution of the information model used by the applications and the escalation of the functionalities the applications need to fulfill. The main problem is to introduce the new functionalities or new services on the platform in an efficient, cost-effective, and flexible manner. The difficulty is to minimize the i...

2004
Ole Martin Dahl

Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.

2007
DIRK OLIVER THEIS

The VPN Tree Routing Conjecture is a conjecture about the Virtual Private Network Design problem. It states that the symmetric version of the problem always has an optimum solution which has a tree-like structure. In recent work, Hurkens, Keijsper and Stougie (Proc. IPCO XI, 2005; SIAM J. Discrete Math., 2007) have shown that the conjecture holds when the network is a ring. A shorter proof of t...

2006
Chunyang Yin Noëmie Simoni Ghislain Du Chéné

The rapid growth of wired and wireless access technologies integrated with great needs of user nomad supporting services provides strong motivations to focus on the service continuity in a heterogeneous environment. In this paper, we present a personalization and mobility aware service enabler through the session mobility to support service continuity. A four-leveled architecture in the aim of ...

Journal: :RFC 2007
Fred Baker Pratik Bose

Some networks require communication between an interior and exterior portion of a Virtual Private Network (VPN) or through a concatenation of such networks resulting in a nested VPN, but have sensitivities about what information is communicated across the boundary, especially while providing quality of service to communications with different precedence. This note seeks to outline the issues an...

1999
Bob Briscoe

The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders. At the same time, the solution given preserves the scalability of receiver initiated Internet multicast for the data transfer itself. Unlike other multicast key management solutions, there are absolutely no side effects on other receivers when a single receiver j...

Journal: :RFC 2014
Raymond Key Simon Delord Frederic Jounay Lu Huang Zhihua Liu Manuel Paul

This document provides functional requirements for the support of Metro Ethernet Forum (MEF) Ethernet Tree (E-Tree) in multipoint Layer 2 Virtual Private Network solutions (referred to as simply "L2VPN"). It is intended that potential solutions will use these requirements as guidelines. Status of This Memo This document is not an Internet Standards Track specification; it is published for infor...

2006
M. Morrow

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies Operations and Management (OAM) requirements for Multi-Protocol Label Switching (MPLS), as well as for applications of MPLS, such as pseudo-wire voice and virtual private network services. Th...

2000
P. Faratin N. R. Jennings P. Buckle

This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA -OS agent framework. Particular attention is focused on the design and implementation of the negotiation algorithms.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید