To see the other types of publications on this topic, follow the link: Virtual Private Network (VPN).

Dissertations / Theses on the topic 'Virtual Private Network (VPN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Virtual Private Network (VPN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
2

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO, and other styles
4

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Full text
Abstract:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environm
APA, Harvard, Vancouver, ISO, and other styles
5

Lukaszewski, Daniel. "Multipath transport for virtual private networks." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kern
APA, Harvard, Vancouver, ISO, and other styles
6

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999,
APA, Harvard, Vancouver, ISO, and other styles
7

Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.

Full text
Abstract:
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup
APA, Harvard, Vancouver, ISO, and other styles
8

Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.

Full text
Abstract:
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definit
APA, Harvard, Vancouver, ISO, and other styles
9

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Full text
Abstract:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO, and other styles
10

Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.

Full text
Abstract:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
APA, Harvard, Vancouver, ISO, and other styles
11

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a var
APA, Harvard, Vancouver, ISO, and other styles
12

Wagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.

Full text
Abstract:
This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hierarchy Process (AHP) to determine which technology is better under a hypothetical set of circumstances.
APA, Harvard, Vancouver, ISO, and other styles
13

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, s
APA, Harvard, Vancouver, ISO, and other styles
14

Cote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, Dec. 2000.<br>Thesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
15

Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.

Full text
Abstract:
As broadband connections to the home become more prevalent, through Digital Subscriber Lines (DSL) and cable modems, students and faculty will desire to access the NPS Internet via these new means instead of their 56K modems. The introduction of these new technologies will require NPS to re- evaluate how to allow remote access to their internal resources in a secure way, while still allowing for the use of broadband technologies. This thesis will examine the alternative methods for implementing VPNs, from simple use of Point to Point Protocols (PPP) to high end specialized internet appliances
APA, Harvard, Vancouver, ISO, and other styles
16

Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.

Full text
Abstract:
En la presente tesina se realiza una descripción de la tecnología de Conmutación Multi-Protocolo mediante etiquetas usando una red privada virtual para la comunicación de una entidad empresarial. Se realizó una descripción de la tecnología MPLS con VPN mostrando sus cualidades, ventajas y desventajas, se promueve la esta tecnología a la red de comunicación de datos de la empresa tenga un performance y confidencialidad en los datos transmitidos, diseñando un esquema así como la infraestructura que podría ser usada en esta implementación, con características modulares las cuales permitirá a la e
APA, Harvard, Vancouver, ISO, and other styles
17

Goh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.

Full text
Abstract:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial
APA, Harvard, Vancouver, ISO, and other styles
18

Kilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Ballapuram, Vijayanand Sreenivasan. "Impact of Queuing Schemes and VPN on the Performance of a Land Mobile Radio VoIP System." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33033.

Full text
Abstract:
Land mobile radio (LMR) systems are used for communication by public safety and other government and commercial organizations. LMR systems offer mission-critical or even life-critical service in the day-to-day activities of such organizations. Traditionally, a variety of different LMR systems have been deployed by different organizations, leading to a lack of radio interoperability. A voice application that connects LMR systems via a packet-switched network is called an LMR Voice over IP (LMRVoIP) system and is a potential solution to the interoperability problem. LMRVoIP systems are time
APA, Harvard, Vancouver, ISO, and other styles
20

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO, and other styles
21

Космина, Андрій Сергійович, та Andrii Kosmyna. "Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36800.

Full text
Abstract:
Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів// Дипломна робота ОР «Магістр» // Космина Андрій Сергійович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно-інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБмз-61 // Тернопіль, 2021 // С. 75 , рис. – 14 , табл. – 3 , додат. – 5<br>Дана магістерська кваліфікаційна робота присвячена дослідженню відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес- процесів. Проведено аналіз видів VPN та їх використання для
APA, Harvard, Vancouver, ISO, and other styles
22

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.

Full text
Abstract:
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be of
APA, Harvard, Vancouver, ISO, and other styles
23

Machado, João Pedro Morais Damms. "Design and implementation of MPLS laboratorial scenarios." Master's thesis, Universidade de Aveiro, 2010. http://hdl.handle.net/10773/5612.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>O Multiprotocol Label Switching (MPLS) é um mecanismo de transporte de dados, sob a forma de um protocolo agnóstico, com grande potencial de crescimento e adequação. Opera na “Camada 2.5” do modelo OSI e constitui um mecanismo de alto desempenho utilizado nas redes de núcleo para transportar dados de um nó da rede para outro. O sucesso do MPLS resulta do facto de permitir que a rede transporte todos os tipos de dados, desde tráfego IP a tráfego da camada de ligação de dados, devido ao encapsulamento dos pacotes dos diversos proto
APA, Harvard, Vancouver, ISO, and other styles
24

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Full text
Abstract:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main pro
APA, Harvard, Vancouver, ISO, and other styles
25

Janeček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.

Full text
Abstract:
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the modul
APA, Harvard, Vancouver, ISO, and other styles
26

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Full text
Abstract:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by ut
APA, Harvard, Vancouver, ISO, and other styles
27

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.

Full text
Abstract:
En 2012, le trafic mobile mondial représentait 70% de plus qu'en 2011. L'arrivée de la technologie 4G a multiplié par 19 le volume de trafic non 4G, et en 2013 le nombre de mobiles connectés à l'Internet a dépassé le nombre d'êtres humains sur la planète. Les fournisseurs d'accès Internet (FAI) subissent une forte pression, car ils ont pour obligations d'assurer à leurs clients l'accès au réseau et le maintien de la qualité de service. À court/moyen terme, les opérateurs doivent délester une partie de leur trafic sur des réseaux d'accès alternatifs afin de maintenir les mêmes caractéristiques
APA, Harvard, Vancouver, ISO, and other styles
28

Ešner, Oldřich. "Implementace OpenVPN na platformě Windows CE." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235969.

Full text
Abstract:
The motivation for inception of this MSc. thesis which follows on from a term project of the same name was the transfer of the application for building private virtual OpenVPN networks from Windows XP operating system to Windows CE Embedded 6.0 platform. The project deals with virtual private networks in general and looks more closely at its implementation - OpenVPN. It also introduces the basic features of the Windows CE operating system. The project goes on to describe device drivers in NT-based Windows operating systems, the Windows Driver Model used, the NDIS network interface model and al
APA, Harvard, Vancouver, ISO, and other styles
29

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Full text
Abstract:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulati
APA, Harvard, Vancouver, ISO, and other styles
30

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Full text
Abstract:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infra
APA, Harvard, Vancouver, ISO, and other styles
33

Солодкий, В. Б., та V. B. Solodkiy. "Дослідження віртуальних приватних мереж на основі технології MPLS". Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2015. http://elartu.tntu.edu.ua/handle/lib/20797.

Full text
Abstract:
Дипломну роботу магістра присвячено аналізу та проектуванню віртуальних приватних мереж на базі технології MPLS. Зроблено загальний огляд принципів побудови сучасних глобальних мереж зв’язку, що застосовуються для організації VPN-мереж з встановленням та без встановлення з’єднання. Детально досліджено технологію MPLS VPN та її принципи роботи. Здійснено порівняння з іншими VPN-технологіями, встановлено переваги. Спроектовано модель мережі для міжобласного провайдера на базі технології IP/MPLS, яка підтримує віртуальні приватні мережі, а також забезпечує функції якості обслуговування. Здійсне
APA, Harvard, Vancouver, ISO, and other styles
34

Gaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /." [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ng, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hořejš, Jan. "Anonymní pohyb v síti internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220609.

Full text
Abstract:
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their spe
APA, Harvard, Vancouver, ISO, and other styles
37

Richter, Riedel, Grunewald, and Schier. "Mitteilungen des URZ 1/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Chowdavarapu, Pradeep Kumar, Pramod Kati, and Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.

Full text
Abstract:
This thesis identifies some key Considerations to be considered to create an efficient virtual private network and also investigates to understand some efficiency problems affecting the interchange of information in such networks. It then outlines some possible solutions to manage such problems.The ICT and the telecommunications have been advancing at a rapid rate. This has been seen in the exchange of information in virtual networks such as the social networks like Facebook, Skype, Google talk, Yahoo messenger, Twitter etc. The need for maximum security, privacy and cost effectiveness in diff
APA, Harvard, Vancouver, ISO, and other styles
39

Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.

Full text
Abstract:
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to suppo
APA, Harvard, Vancouver, ISO, and other styles
40

Хазар’янц, Олександра Владиславівна. "Принципи побудови і практичної реалізації корпоративних мереж підприємства з використанням технології VPN". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/34928.

Full text
Abstract:
Дипломна робота: 88 с., 28 рис., 3 табл., 1 дод., 32 джерел. Об`єкт дослідження – методи та засоби побудови корпоративних віртуальних приватних мереж Метою роботи є з’ясувування особливостей організації та функціонування віртуальної корпоративної мережі банківської установи для виявлення шляхів поліпшення її експлуатаційних характеристик. Проведено аналіз специфікацій роботи інформаційних систем і мереж АБ «УКРГАЗБАНК», призначених для його обслуговування. Визначено, що для побудови корпоративної мережі підприємства доцільно застосовувати технологію VPN.<br>Thesis of bachelor’s: 88 p., 3tab
APA, Harvard, Vancouver, ISO, and other styles
41

Tabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.

Full text
Abstract:
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administra
APA, Harvard, Vancouver, ISO, and other styles
42

SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA, and Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services." 電子情報通信学会, 2012. https://search.ieice.org/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Våge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.

Full text
Abstract:
The activity based workplace model is becoming more and more com- mon and the Swedish Insurance Agency is an authority that has em- braced this model. The new way of working means that more employ- ees work from home or another place than the office. The new working model needs IT solutions that can handle communication and secure document management. This has caused two problems at the Swedish Insurance Agency. The first problem is concerning confusion about how employees should connect correctly to the authority’s conference room equipment. The solution proposal should be able to evaluate if
APA, Harvard, Vancouver, ISO, and other styles
45

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Full text
Abstract:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) en
APA, Harvard, Vancouver, ISO, and other styles
46

Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.

Full text
Abstract:
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own desig
APA, Harvard, Vancouver, ISO, and other styles
47

Nawej, Mukatshung Claude. "Evaluation of virtual private network impact on network performance." Diss., 2016. http://hdl.handle.net/10500/22177.

Full text
Abstract:
The aim of the study is to investigate what impact the use of VPN has on network performance. An empirical investigation using quantitative research methods was carried out. Two sample scenarios were involved in the study: scenario without VPN and scenario with VPN. In both scenarios, three applications were used in turns, an HTTP, an FTP, and a CBR. FTP was configured to use window size and packet size, while CBR used connection rate and packet size. On the other side, the number of connection was the only parameter used for HTTP. These applications were injected in a 100 Mbps fixed link of a
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Hu-Mu, and 陳護木. "Research of Media VPN (Virtual Private Network)IPTV system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/87280713497575113610.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>企業管理系<br>98<br>There are more than 5,000 network TV stations in the Internet and many of them have very good content. Compared with traditional cable TV, most users can only watch network TV content via web browsers, which brings them great inconvenience. This paper proposes a concept of MVPN (Media Virtual Private Network) as a delivery method of IPTV. The structure of MVPN can offer five Like! TV&apos;s user interface according to consumer’s user behaviors, to satisfy different age level users’ demands. We invited around 300 of overseas Chinese and Taiwan businessmen loca
APA, Harvard, Vancouver, ISO, and other styles
49

Ferreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Master's thesis, 2003. http://hdl.handle.net/10216/12537.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Redes e Serviços de Comunicação, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do professor Doutor José António Ruela Simões Fernandes
APA, Harvard, Vancouver, ISO, and other styles
50

Ferreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Dissertação, 2003. http://hdl.handle.net/10216/12537.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Redes e Serviços de Comunicação, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do professor Doutor José António Ruela Simões Fernandes
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!