Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Virtual Private Network.

Zeitschriftenartikel zum Thema „Virtual Private Network“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Virtual Private Network" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Der volle Inhalt der Quelle
Annotation:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (May 16, 2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Der volle Inhalt der Quelle
Annotation:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Der volle Inhalt der Quelle
Annotation:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Su, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (December 11, 2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (July 8, 2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Der volle Inhalt der Quelle
Annotation:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (April 1, 2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Der volle Inhalt der Quelle
Annotation:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (May 25, 2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Khan, Yusera Farooq. "Cisco Secured Virtual Private Networks: A Review." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.

Der volle Inhalt der Quelle
Annotation:
Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private networ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Faizal, Faizal, and Andi Irmayana. "Sistem Persuratan Digital Berbasis Virtual Private Network." DoubleClick: Journal of Computer and Information Technology 5, no. 1 (August 31, 2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.

Der volle Inhalt der Quelle
Annotation:
<span>Persoalan mengenai persuratan yang dialami oleh instansi pemerintah, organisasi dan perusahaan swasta yang terkendala dalam proses database surat masuk dan surat keluar yang dilakukan secara manual. Ada berbagai kendala seperti pendistribusian surat yang tidak efekif, surat tercecer, dan pengarsipan yang tidak rapi sehingga manajemen arsip persuratan tidak terkontrol. Penelitian ini bertujuan merancang sebuah digital proses untuk memperbaharui sistem persuratan pada Karang Taruna Provinsi Sulawesi Selatan agar dokumen verifikasi, persuratan organisasi dan pertukaran Informasi antar
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Chou, David C., David C. Yen, and Amy Y. Chou. "Adopting virtual private network for electronic commerce." Industrial Management & Data Systems 105, no. 2 (February 2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Keng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, and Hui Zhang. "Customizable virtual private network service with QoS." Computer Networks 36, no. 2-3 (July 2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." SIAM Journal on Computing 37, no. 3 (January 2007): 706–21. http://dx.doi.org/10.1137/060654827.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Altın, A., E. Amaldi, P. Belotti, and M. Ç. Pınar. "Virtual Private Network Design Under Traffic Uncertainty." Electronic Notes in Discrete Mathematics 17 (October 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Kang, Sunyoung, Hyuncheol Kim, and Seungae Kang. "Virtual private network for wellness sports information." Multimedia Tools and Applications 74, no. 16 (June 24, 2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Der volle Inhalt der Quelle
Annotation:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan V
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Yu, Wei, and Jian Wang. "Scalable network resource management for large scale Virtual Private Networks." Simulation Modelling Practice and Theory 12, no. 3-4 (July 2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Kande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (March 31, 2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.

Der volle Inhalt der Quelle
Annotation:
Virtual Private Networks (VPNs) are critical tools for maintaining secure communication and privacy. However, encrypted VPN traffic can create blind spots for network monitoring, increasing organizational vulnerability to threats such as data breaches and policy violations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Marzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (June 28, 2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.

Der volle Inhalt der Quelle
Annotation:
Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overca
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Ekawati, Inna, and Dadan Irwan. "Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik." JREC (Journal of Electrical and Electronics) 9, no. 1 (November 25, 2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.

Der volle Inhalt der Quelle
Annotation:
Pemanfaatan teknologi komunikasi dan informasi perlu diterapkan pada instansi yang saat ini masih menggunakan sistem manual dan mengharuskan administrator untuk mengakses router dan memantau traffic internet secara langsung pada server. Virtual private network bersifat private dimana pada dasarnya jaringan ini tidak ada secara fisik, namun hanya berupa jaringan virtual, sehingga tidak semua orang dapat mengaksesnya. Selain jaringan internet, virtual private network juga diperlukan oleh perusahaan sebagai jaringan pribadi dengan jalur khusus yang bersifat lebih aman untuk mengakses jaringan lok
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Der volle Inhalt der Quelle
Annotation:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Immidisetti, Venkata Raman. "Azure private DNS zones: Architecture, Implementation Best Practices, And Organizational Use Cases." International Journal of Multidisciplinary Research and Growth Evaluation. 2, no. 6 (2021): 446–49. https://doi.org/10.54660/.ijmrge.2021.2.6.446-449.

Der volle Inhalt der Quelle
Annotation:
As enterprises transition to cloud-based infrastructures, efficient and secure domain name resolution becomes critical for ensuring seamless network operations. Azure Private DNS Zones offer a robust solution by enabling private domain name resolution within virtual networks (VNets) without exposing DNS records to the public internet. This study examines the architecture of Azure Private DNS Zones, including key concepts such as virtual network links, private DNS records, and integration with Azure services. It also presents practical use cases, such as hybrid cloud deployments, multi-VNet arc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Spiekermann, Daniel, Tobias Eggendorfer, and Jörg Keller. "Deep Learning for Network Intrusion Detection in Virtual Networks." Electronics 13, no. 18 (September 11, 2024): 3617. http://dx.doi.org/10.3390/electronics13183617.

Der volle Inhalt der Quelle
Annotation:
As organizations increasingly adopt virtualized environments for enhanced flexibility and scalability, securing virtual networks has become a critical part of current infrastructures. This research paper addresses the challenges related to intrusion detection in virtual networks, with a focus on various deep learning techniques. Since physical networks do not use encapsulation, but virtual networks do, packet analysis based on rules or machine learning outcomes for physical networks cannot be transferred directly to virtual environments. Encapsulation methods in current virtual networks includ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Nagaraj, Rathod, Akkala Abhilasha, and seekoli Avinash. "Amazon virtual private cloud experimental and application." IJRSET MAY Volume 10 Issue 5 10, no. 5 (September 27, 2023): 10–18. https://doi.org/10.5281/zenodo.8382910.

Der volle Inhalt der Quelle
Annotation:
Amazon Virtual Private Cloud  lets you create a secure, private network utilising Amazon VPC. Using AWS' scalable architecture, this virtual network is almost identical to one you would find in your own data centre. To create, access, and manage VPCs, you may make use of any of the following APIs: Using the AWS Management Console, you may manage your virtual private networks . Using the CLI, you may access all of AWS's services, including VPC. Many of the complexities of a connection, such as calculating signatures, retrying requests, and fixing issues, are handled by the AWS
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Patibandla, Kondala Rao. "Design and Create VPC in AWS." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 1, no. 1 (January 22, 2024): 273–82. http://dx.doi.org/10.60087/jaigs.v1i1.208.

Der volle Inhalt der Quelle
Annotation:
This article describes the design and creation of Amazon Virtual Private Network (VPC) using the VPC Designer tool and Cloud Formation templates. It also provides details of VPC Components such as Subnets, Route tables, Security Groups, Internet Gateway, NAT Gateway, VPC endpoints, Network Interfaces, Network Access Control Lists (ACLs), and VPC Peering. Amazon Virtual Private Cloud (VPC) enables you to create your own dedicated, logically isolated virtual private network in your AWS account. This virtual network closely resembles a traditional network that you operate in your data center (on-
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Lota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.

Der volle Inhalt der Quelle
Annotation:
Abstract Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Qu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.

Der volle Inhalt der Quelle
Annotation:
Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (July 21, 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Der volle Inhalt der Quelle
Annotation:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activitie
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Shi, Baohui. "Computer Network Information Security Protection Based on Virtual Private Network." Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Makhija, Deven. "5G Communication Systems: Network Slicing and Virtual Private Network Architecture." ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.

Der volle Inhalt der Quelle
Annotation:
5G communication systems are being rolled out with multiple technological solutions and applications being fielded on existing as well as enhanced infrastructure. The utilization of 5G systems and infrastructure by verticals over different platforms as well as industries is achieved with slicing. Slicing in 5G provides guaranteed resources for end users of vertical industries and applications over varied platforms, architecture, and infrastructure. Standards for network slicing in 5G have been formulated by 3GPP and further specifications are being released. Implementation of slicing at variou
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Timberg, Chris, Leah Liebovitz, and Ben Miller. "The Private Virtual Network Operator Model for Field Area Network." Climate and Energy 40, no. 6 (December 5, 2023): 8–16. http://dx.doi.org/10.1002/gas.22381.

Der volle Inhalt der Quelle
Annotation:
Uninterrupted grid edge connectivity is essential for distribution utilities driving towards a future where efficient, secure, and reliable field area network (FAN) operation is not just preferable but required. Communications and network connectivity have been rapidly evolving over the last several years and will continue to do so—including in the areas of spectrum options, carrier solutions, device manufacturers, core manufacturers, and network management options. Utilities have a greater choice of options to deploy, while needing to remain prudent in their investments. One of the options ga
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Krile, Srecko, and Martin Medvecky. "Virtual Network Construction Technique, Treating All VPNs Simultaneously." Elektronika ir Elektrotechnika 26, no. 2 (April 25, 2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.

Der volle Inhalt der Quelle
Annotation:
In the paper, a new construction technique for virtual network (e.g., Virtual Private Network (VPN)) based on flow permutation algorithm is proposed. In existing methods for creating virtual networks, whereby virtual networks are constructed one by one in time and the new virtual network can use only the remaining resources, it could be non-optimal. Our approach treats all traffic flows simultaneously and is capable of balancing the network much better than other existing techniques. As we show, the proposed new construction technique work well, even in the condition of hard loaded networks op
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Dayana, D. S. "An Efficient Approach for Network Mobility Based on AES Algorithm." Advanced Materials Research 984-985 (July 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.

Der volle Inhalt der Quelle
Annotation:
Users interested to use the Internet from anywhere and at any time. For this purpose, the Internet Engineering Task Force proposed the concept of network mobility. But the IETF’s mobile Virtual Private Network does not support for real time applications. In this paper, the user’s communication between public networks and the private networks can be secured by using Virtual Private Network gateway. This secured user’s communication is based on Session Initiation Protocol and AES algorithm. The security impact is computed analytically and the performance is simulated. The signaling cost can also
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Der volle Inhalt der Quelle
Annotation:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the present
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Bhat, Anjum Zameer, and Imran Ahmed. "A Simulation Environment for enhancing the student experience in advanced networking concepts." SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.

Der volle Inhalt der Quelle
Annotation:
Several subjects in Computer science necessitate practical and realistic classes in addition to supporting the theoretical underpinning taught to the students. In various subjects’ practical exposure & skill is imperative to meet the industry requirements. However, educational establishments can't provide an out-and-out environment for every student to practice. Providing an appropriate Lab for apprentices that bestows desired exposure and feel of a real Network has been a challenging task for every educational establishment. Virtual Labs have been a major milestone and are effectively imp
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Usanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (July 30, 2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.

Der volle Inhalt der Quelle
Annotation:
The use of wireless media such as the internet in building computer networks is so widely used. However, performance and security must also be considered. VPN (Virtual Private Network) is one of the methods in network security that works by creating a tunnel so that a trusted network can connect to networks outside via the internet. PT. Laris Manis Utama is a private company engaged in the field of fresh fruits export-import and distributor. And already has several branch offices located outside the city. Designing a VPN (Virtual Private Network) with a Site to site (OpenVPN) system at PT. Lar
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Álvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (February 4, 2023): 1747. http://dx.doi.org/10.3390/s23041747.

Der volle Inhalt der Quelle
Annotation:
The defence-in-depth (DiD) methodology is a defensive approach usually performed by network administrators to implement secure networks by layering and segmenting them. Typically, segmentation is implemented in the second layer using the standard virtual local area networks (VLANs) or private virtual local area networks (PVLANs). Although defence in depth is usually manageable in small networks, it is not easily scalable to larger environments. Software-defined networks (SDNs) are emerging technologies that can be very helpful when performing network segmentation in such environments. In this
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Der volle Inhalt der Quelle
Annotation:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enter
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Sobh, Tarek S., and Awad H. Khalil. "Securing Wargames System Using Effective Virtual Private Network." Recent Patents on Computer Science 11, no. 4 (December 13, 2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Iryani, Nanda, and Dyas Dendi Andika. "Implementasi Dynamic Multipoint Virtual Private Network Dual Hub." Jurnal Telekomunikasi dan Komputer 11, no. 2 (August 20, 2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.

Der volle Inhalt der Quelle
Annotation:
Pesatnya perkembangan internet berdampak ke semua elemen orang yang memunculkan kebutuhan baru bagaimana menggunakan internet dengan cepat dan aman terutama bagi suatu perusahaan yang ingin terhubung dengan cabangnya. DMVPN menghadirkan sebuah solusi bagaimana menhubungkan beberapa perusahaan secara dinamis, fleksibel,cepat dan aman. Penelitian ini berusaha untuk mengimplementasikan DMVPN dengan routing IGP link state dan distance vector. Model pada penelitian akan menerapkan juga konsep bernama high availability yang akan menghasilkan ketersediaan yang tetap tinggi bahkan ketika salah satu pe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Ben-Yacoub, Leila Lamti. "On managing traffic over virtual private network links." Journal of Communications and Networks 2, no. 2 (June 2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Suryani, Erma, and Syamsu Nur Row Honey. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS." JUTI: Jurnal Ilmiah Teknologi Informasi 6, no. 1 (January 1, 2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Cui, Wei, and Mostafa A. Bassiouni. "Virtual private network bandwidth management with traffic prediction." Computer Networks 42, no. 6 (August 2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Wu, Jing, Michel Savoie, Scott Campbell, Hanxi Zhang, and Bill Arnaud. "Layer 1 virtual private network management by users." IEEE Communications Magazine 44, no. 12 (December 2006): 86–93. http://dx.doi.org/10.1109/mcom.2006.273104.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!