نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2013
H. Jeng J. Uttaro

With BGP/MPLS Virtual Private Networks (VPNs), providing any-to-any connectivity among sites of a given VPN would require each Provider Edge (PE) router connected to one or more of these sites to hold all the routes of that VPN. The approach described in this document allows the VPN service provider to reduce the number of PE routers that have to maintain all these routes by requiring only a su...

2000
Vassilis Prevelakis Angelos Keromytis

The wide availability of public domain IPsec implementations allows the creation of VPNs based on low-cost platforms. However, setting up a VPN node involves a lot of work such as the creation of IPsec Security Associations and associated tunnels, including the necessary management of keys. Moreover, routing and firewall facilities must be provided to ensure the isolation of the members of the ...

2005
Dênio Mariz Judith Kelner Djamel Sadok Carlos A. Kamienski

This work considers the problem of VPN provisioning, focusing on the process of dimensioning the links belonging to the route that connects VPN endpoints, according to the specified traffic demands. To accomplish this, we propose a new model, the Accurate Hose, which can take into consideration a complete or partial traffic matrix and supports group based bandwidth requirements, while maintaini...

2003
Liang Huan Ognian Kabranov Luis Orozco-Barbosa Dimitrios Makrakis

IP-based VPN technology is considered an attractive cost-effective private network service for both customers and service providers. We focus our research on the design of a minimal cost routing policy to be used by network-based IP VPN. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sour...

2017
Junhyuk Oh Satinder Singh Honglak Lee

This paper proposes a novel deep reinforcement learning (RL) architecture, called Value Prediction Network (VPN), which integrates model-free and model-based RL methods into a single neural network. In contrast to typical model-based RL methods, VPN learns a dynamics model whose abstract states are trained to make option-conditional predictions of future values (discounted sum of rewards) rathe...

2005
Haidong Xia Jayashree Kanchana José Carlos Brustoloni

Virtual Private Networks (VPNs) enable an organization’s members to telecommute from home or while traveling. Although members may use computers that are shared, borrowed, or rented from others to connect to a VPN, VPN protocols, such as IPsec, typically do not authenticate the configuration of users’ computers. If a computer used for VPN access is compromised, an attacker can exploit it to gai...

Journal: :RFC 2007
Fred Baker Pratik Bose

Some networks require communication between an interior and exterior portion of a Virtual Private Network (VPN) or through a concatenation of such networks resulting in a nested VPN, but have sensitivities about what information is communicated across the boundary, especially while providing quality of service to communications with different precedence. This note seeks to outline the issues an...

2002
Riccardo Scandariato Fulvio Risso

Currently, the Virtual Private Network (VPN) support offered by FreeBSD is quite limited: it provides a way to establish tunnels but it does not consider the problems of multiple VPNs concurrently deployed on the same machine. Our implementation enables the provisioning of VPN services on FreeBSD by extending its routing and forwarding infrastructure. We adopted the virtual router approach, by ...

2007
Garrett Leischner

SCADA infrastructures, which traditionally were isolated from outside systems, have now become highly integrated via internal and external communication paths. These integrations increased efficiency greatly but introduced security vulnerabilities. This paper presents a solution for mitigating those security vulnerabilities by integrating VLAN and VPN technologies. VLAN segmentation provides vi...

2004
Jung-Tae Kim

A VPN is widely used in a communications environment which access is controlled to permit peer connections only within a defined community of interest. It is constructed through some form of partitioning of a common underlying communication medium, where this underlying communications medium provides services to the network on a non-exclusive basis. In this paper, we have analyzed a variety of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید