نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2005
Pratik Bose Dan Voce Dilip Gokhale

: Aggregation of flows is a natural consequence of the transition of flows across multiple network domains. The quality of service that is provided to an aggregated flow is dependent on a sufficient set of individual flow characteristics correctly transformed in to the aggregated flow characteristics. VPN routers at the boundary of the private networks encrypt information within the data packet...

2005
Tiziana Margaria Bernhard Steffen Manfred Reitenspieß

Service-Oriented Design has driven the development of telecommunication infrastructure and applications, in particular the so-called Intelligent Network (IN) Services, since the early 90s: IN services are customized telephone services, like e.g., Free-Phone, where the receiver of the call can be billed if some conditions are met, Virtual Private Network, enabling groups of customers to define t...

2010
Robert Koch Gabi Dreo Rodosek

The percentage of encrypted network traffic increases steadily not only by virtual private networks of companies but also by protocols like SSH or SSL in the private sector. Traditional Intrusion Detection Systems (IDS) are not able to cope with encrypted traffic. There are a few systems which are able to handle encrypted lines but none of them is applicable in general because of the necessity ...

2000
Manuel Günter Torsten Braun

The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has only limited means of controlling the service delivery. For example the network security guaranteed by virtual private network providers cannot be checked with a traditional static approach. This paper presents a novel ap...

2010
Varun P Saxena Varun Gupta Ajay Goel

The Multi-protocol Label Switching is one of the proposed technologies useful for traffic engineering in the specific aspects of measurement and control of Internet traffic and virtual Private network (VPN) is a concept that significant on the future of business communication, it replace existing private network with flexible architecture that is easily manage and at a same time it provide enha...

2003
Alpár Jüttner István Szabó Áron Szentesi

The hose resource provisioning model promises to provide an easy–to–use characterization framework for Virtual Private Network service offerings. Significant research effort has recently been spent on proposing new algorithms for provisioning cost–optimal networks specified according to this new model. However, a detailed comparison of the bandwidth requirement for networks designed based on th...

2009
Dherik Barison Rodrigo Sanches Miani Leonardo de Souza Mendes

The proposed work is to verify the performance and security of different cryptographic algorithms in a encrypted VPN (Virtual Private Network), created to provide confidentiality in the network VoIP traffic. The performance tests of the algorithms will occur in various network scenarios, simulating some problems like latency, packet loss, out of order packets, among others. The test architectur...

2006
Friedrich Eisenbrand Edda Happ

Virtual private network design in the hose model deals with the reservation of capacities in a weighted graph such that the terminals in this network can communicate with one another. Each terminal is equipped with an upper bound on the amount of traffic that the terminal can send or receive. The task is to install capacities at minimum cost and to compute paths for each unordered terminal pair...

Journal: :IEICE Transactions 2012
Fumisato Naruse Yoshiyuki Yamada Hiroshi Hasegawa Ken-ichi Sato

This paper presents a novel “virtual fiber” network service that exploits wavebands. This service provides virtual direct tunnels that directly convey wavelength paths to connect customer facilities. To improve the resource utilization efficiency of the service, a network design algorithm is developed that can allow intermediate path grooming at limited nodes and can determine the best node loc...

2011
Torsten RÖSSEL

Designing, implementing, running, and managing control and communication systems to state-of-the-art security standards is a major challenge to both power system integrators and operators, even more so in multi-vendor environments. In this paper, we discuss how industrially ruggedized network security appliances can provide building blocks and contribute to security solutions in both retrofit a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید