نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

Journal: :IEICE Transactions 2006
Masayuki Murata Takeo Abe

An overlay network is a logical high-layer network built over the well-established IP network for creating new networkbased services. Owing to its capabilities of a flexible use of the underlying networks and fast deployment of new services, various overlay networking technologies like P2P (peer-to-peer network) and IP-VPN (virtual private network) have been actively developed and introduced in...

2000
Radu State Emmanuel Nataf Olivier Festor

In this paper we address the management of concurrent multicast sessions with security and QoS guarantees. Their main feature is a high degree of change in terms of membership, implying the necessity for fast reconfiguration and provisioning. We will approach the management problem using techniques developed in the context of virtual private networks, adapted to the high dynamicity that we are ...

Journal: :RFC 2010
Pyda Srisuresh Bryan Ford

This document identifies two deployment scenarios that have arisen from the unconventional network topologies formed using Network Address Translator (NAT) devices. First, the simplicity of administering networks through the combination of NAT and DHCP has increasingly lead to the deployment of multi-level inter-connected private networks involving overlapping private IP address spaces. Second,...

1999
Sonia Fahmy Raj Jain Bobby Vandalore Rohit Goyal

Abstract: This contribution proposes an algorithm for aggregating ABR virtual channel connections (VCCs) onto ABR virtual path connections (VPCs). ABR VPCs are particularly useful for connecting enterprise sites over the Internet, providing a virtual private network (VPN). The VPC/VCC hierarchy is also important for supporting Internet di erentiated services over ATM. The coupling between the o...

2007
Peng Zhang ZHENG YAN PENG ZHANG

Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise’s virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in...

2007
Garrett Leischner

SCADA infrastructures, which traditionally were isolated from outside systems, have now become highly integrated via internal and external communication paths. These integrations increased efficiency greatly but introduced security vulnerabilities. This paper presents a solution for mitigating those security vulnerabilities by integrating VLAN and VPN technologies. VLAN segmentation provides vi...

2001
Daniel Ranc Khaled Sammoud Noëmie Simoni Linas Maknavicius

The work presented in this paper describes the framework of the GESTICA project (Telecommunication Services Management Implemented on CorbA). This framework is a proposal to integrate a session-based Service Management Layer on CORBA for the efficient management of QoS of Virtual Private Networks over IP. It is at the same time an attempt to show how a TMN-inherited layered management architect...

2007
Koutaro YAGI Osamu HONDA Hiroyuki OHSAKI Kazuhiro MATSUDA Makoto IMASE

In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual Private Network) that provides a secure and reliable network to a large number of virtual organizations. The ring-based P2P-VPN establishes VPN by logically connecting nodes that operate autonomously in a ring topology. The ring-based P2P-VPN has an advantage of a high scalability in terms of the number of VPNs accommodated. I...

2003
Sophie De Maesschalck Didier Colle Bart Puype Qiang Yan Mario Pickavet Piet Demeester Tibor Cinkler Christian Mauz Martin Köhn Christoph M. Gauger Sergio Sanchez-Lopez Xavi Masip-Bruin Josep Sole-Pareta Slobodanka Tomic Marije Ljolje Marko Lackovic Robert Inkret Branko Mikac Dominic Schupke Mario Mattiello

This paper gives an overview of the work carried out during the course of the COST-266 action on circuit/wavelength switched network studies. Several subjects are discussed in detail in this paper. A first important topic deals with the different control plane models in singleand multi-domain networks. A second important issue is the routing and wavelength assignment problem, both in networks w...

2002
Anotai Srikitja David Tipper

 In this paper, a VPN design model is proposed for the Next Generation Internet (NGI). With the use of MultiProtocol Label Switching (MPLS) in a backbone network, it is possible to create multiple logical sink-trees (directed multipoint-to-point trees ending at one exit node) carrying traffic of multiple VPNs. This makes the VPN design problem with MPLS different from those of circuit-switched...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید