نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

2007
P. Bose

Some networks require communication between an interior and exterior portion of a Virtual Private Network (VPN) or through a concatenation of such networks resulting in a nested VPN, but have sensitivities about what information is communicated across the boundary, especially while providing quality of service to communications with different precedence. This note seeks to outline the issues an...

Journal: :RFC 2000
Bryan Gleeson Arthur Lin Juha Heinänen Grenville J. Armitage Andrew G. Malis

This document describes a framework for virtual private networks (VPN) running across IP backbones. It discusses the various different types of VPNs, their respective requirements, and proposes specific mechanisms that could be used to implement each type of VPN using existing or proposed specifications. The objective of this document is to serve as a framework for related protocol development ...

1998
Geoff Huston

The term "VPN," or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

1998
Paul Ferguson Geoff Huston

The term “VPN,” or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

2012
Jayanthi Gokulakrishnan V. Thulasi Bai

Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and secu...

2005
Cor A. J. Hurkens Judith Keijsper Leen Stougie

A basic question in Virtual Private Network (VPN) design is if the symmetric version of the problem always has an optimal solution which is a tree network. An affirmative answer would imply that the symmetric VPN problem is solvable in polynomial time. We give an affirmative answer in case the communication network within which to create the VPN is a circuit. This seems to be an important step ...

Journal: :Computer Communications 2004
Thanasis G. Papaioannou George D. Stamoulis

In the emerging context of mobile Internet, the importance of VPN services is rapidly increasing. Provision of such services was among the subjects of IST project INTERNODE. Besides the necessary technical means, charging and accounting also are key related issues, and constitute the subject of this paper. Only by dealing successfully with charging and accounting, VPN providers can recover thei...

2007
Yoshihiro HARA Hiroyuki OHSAKI Makoto IMASE Yoshitake TAJIMA Masahiro MARUYOSHI Junichi MURAYAMA Kazuhiro MATSUDA

Recent development of network technologies enables network communications in various social organizations and enables various social organizations to be virtualized in networks. We named the mass of virtual organizations ”cyber-society”. A ”person” in cyber-society needs to establish communication association s with multiple virtual organizations with adequate security. Therefore, we beli eve t...

Journal: :J. Information Security 2011
Tarek S. Sobh Yasser Aly

A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Ext...

Journal: :RFC 2013
Huajin Jeng James Uttaro Luay Jalil Bruno Decraene Yakov Rekhter Rahul Aggarwal

With BGP/MPLS Virtual Private Networks (VPNs), providing any-to-any connectivity among sites of a given VPN would require each Provider Edge (PE) router connected to one or more of these sites to hold all the routes of that VPN. The approach described in this document allows the VPN service provider to reduce the number of PE routers that have to maintain all these routes by requiring only a su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید