نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2002
Christos Xenakis Lazaros F. Merakos

A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...

1999
Eun Chul Kim Choong Seon Hong Joong-Goo Song

This paper proposes management architecture of multi-layer Virtual Private Network over the broadband network that will play an important role at the initial stage of broadband era. To provide flexible management capabilities with the administrator of the VPN, we adopt layering concept and abstraction mechanism to give a simple view of the real connection at service management level. The multil...

2004
Bushar Yousef Doan B. Hoang Glynn Rogers

Reliability and security concerns have increased demand for Virtual Private Networks (VPNs). Ideally, a VPN service should offer autonomous overlay networks with guaranteed bandwidth allocations over a shared network. Network providers seek an automated VPN creation and management process, while users of a VPN would greatly benefit from secure control over the handling of their traffic. Current...

2011
Kamil Koltys Krzysztof Pienkosz Eugeniusz Toczylowski

We consider the resource allocation problem related to Virtual Private Networks (VPNs). VPN provides connections between geographically dispersed endpoints over a shared network. To realize VPN service, sufficient amount of bandwidth of network resources must be reserved for any traffic demand specified by a customer. We assume that there are many customers that want to purchase VPN services, a...

2002
Giuseppe F. Italiano Rajeev Rastogi Bülent Yener

A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN are connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in...

2005
Osamu Honda Hiroyuki Ohsaki Makoto Imase Yoshihiro Hara Masahiro Maruyoshi Kazuhiro Matsuda

In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs. In this paper, we implement a prototype system of a VPN that enables users to be associated with multiple VPNs using existing network technologies for demonstrating the feasibility of our architecture and for clarifying the service image of a multiple association service. Our prototyp...

2012
Ya-qin Fan Chao Sun

This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data...

1998
Geoff Huston

In Part I we introduced a working definition of the term "Virtual Private Network" (VPN), and discussed the motivations behind the adoption of such networks. We outlined a framework for describing the various forms of VPNs, and then examined numerous network-layer VPN structures, in particular, that of controlled route leakage and tunnelling techniques. We begin Part II with examining other net...

Journal: :Math. Oper. Res. 2011
Fabrizio Grandoni Thomas Rothvoß Laura Sanità

The virtual private network problem (Vpn) models scenarios where traffic is uncertain or rapidly changing. The goal is supporting at minimum cost a given family of traffic matrices, which are implicitly given by upper bounds on the ingoing and outgoing traffic at each node. Costs are classically defined by a linear function (linear Vpn), but we consider here also the more general case of concav...

2002
Ayhan ERDOĞAN

This paper is a survey on Virtual Private Networks (VPNs). The functionality of a VPN is precisely the same as any other private network. This means that information passed between parties on the network is protected from attackers. The difference between a VPN and another private network is that the former operates over a public network, such as the Internet. The VPN occupies its own private a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید