نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2015
Ayoub Bahnasse Najib El Kamoun David Meyer Dino Farinacci Brian Swander Victor Volpe Larry DiBurro

Dynamic Multipoint Virtual Private Network “DMVPN” is a solution for the dynamic creation of virtual Private IP tunnels between multiple sites automatically, quickly and with the least configuration. Routing protocols are component technologies' main parts of the DMVPN solution, they ensure the smooth establishment of tunnels and have a major impact on network’s behavior and transported applica...

Journal: :RFC 2006
Waldemar Augustyn Yetik Serbest

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides requirements for Layer 2 Provider-Provisioned Virtual Private Networks (L2VPNs). It first provides taxonomy and terminology and states generic and general service requirements. It covers point...

2014
Ayoub BAHNASSE Najib EL KAMOUN

The simulation of large-scale networks is a challenging task especially if the network to simulate is the Dynamic Multipoint Virtual Private Network, it requires expert knowledge to properly configure its component technologies. The study of these network architectures in a real environment is almost impossible because it requires a very large number of equipment, however, this task is feasible...

Journal: :DoubleClick 2021

<span>Persoalan mengenai persuratan yang dialami oleh instansi pemerintah, organisasi dan perusahaan swasta terkendala dalam proses database surat masuk keluar dilakukan secara manual. Ada berbagai kendala seperti pendistribusian tidak efekif, tercecer, pengarsipan rapi sehingga manajemen arsip terkontrol. Penelitian ini bertujuan merancang sebuah digital untuk memperbaharui sistem pada K...

Journal: :Electronic Notes in Discrete Mathematics 2004

2005
T. Madsen

The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the...

2008
Carlos M. D. Pazos Mario Gerla

The efficient utilization and management of bandwidth in broadband networks is of paramount importance since bandwidth costs are likely to dominate network operational costs, especially in the wide area scenario. However, relatively little attention has been given to this issue in developing the current schemes for the transport of Internet data traffic over ATM. In this paper we describe a ban...

2007
Claudia Keser Claude Montmarquette

In a series of experimental games, each of two players may choose between remuneration based on either private or team effort. Although at least one of the players has the subgame perfect equilibrium strategy to choose remuneration based on private effort, we frequently observe team remuneration chosen by both players. Team remuneration allows for high payoff for each player for cooperation, bu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید