نتایج جستجو برای: virtual private network
تعداد نتایج: 890394 فیلتر نتایج به سال:
An overlay network is a logical high-layer network built over the well-established IP network for creating new networkbased services. Owing to its capabilities of a flexible use of the underlying networks and fast deployment of new services, various overlay networking technologies like P2P (peer-to-peer network) and IP-VPN (virtual private network) have been actively developed and introduced in...
In this paper we address the management of concurrent multicast sessions with security and QoS guarantees. Their main feature is a high degree of change in terms of membership, implying the necessity for fast reconfiguration and provisioning. We will approach the management problem using techniques developed in the context of virtual private networks, adapted to the high dynamicity that we are ...
This document identifies two deployment scenarios that have arisen from the unconventional network topologies formed using Network Address Translator (NAT) devices. First, the simplicity of administering networks through the combination of NAT and DHCP has increasingly lead to the deployment of multi-level inter-connected private networks involving overlapping private IP address spaces. Second,...
Abstract: This contribution proposes an algorithm for aggregating ABR virtual channel connections (VCCs) onto ABR virtual path connections (VPCs). ABR VPCs are particularly useful for connecting enterprise sites over the Internet, providing a virtual private network (VPN). The VPC/VCC hierarchy is also important for supporting Internet di erentiated services over ATM. The coupling between the o...
Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise’s virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in...
Security Through VLAN Segmentation: Isolating and Securing Critical Assets Without Loss of Usability
SCADA infrastructures, which traditionally were isolated from outside systems, have now become highly integrated via internal and external communication paths. These integrations increased efficiency greatly but introduced security vulnerabilities. This paper presents a solution for mitigating those security vulnerabilities by integrating VLAN and VPN technologies. VLAN segmentation provides vi...
The work presented in this paper describes the framework of the GESTICA project (Telecommunication Services Management Implemented on CorbA). This framework is a proposal to integrate a session-based Service Management Layer on CORBA for the efficient management of QoS of Virtual Private Networks over IP. It is at the same time an attempt to show how a TMN-inherited layered management architect...
In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual Private Network) that provides a secure and reliable network to a large number of virtual organizations. The ring-based P2P-VPN establishes VPN by logically connecting nodes that operate autonomously in a ring topology. The ring-based P2P-VPN has an advantage of a high scalability in terms of the number of VPNs accommodated. I...
This paper gives an overview of the work carried out during the course of the COST-266 action on circuit/wavelength switched network studies. Several subjects are discussed in detail in this paper. A first important topic deals with the different control plane models in singleand multi-domain networks. A second important issue is the routing and wavelength assignment problem, both in networks w...
In this paper, a VPN design model is proposed for the Next Generation Internet (NGI). With the use of MultiProtocol Label Switching (MPLS) in a backbone network, it is possible to create multiple logical sink-trees (directed multipoint-to-point trees ending at one exit node) carrying traffic of multiple VPNs. This makes the VPN design problem with MPLS different from those of circuit-switched...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید