To see the other types of publications on this topic, follow the link: Virtual Private Network.

Dissertations / Theses on the topic 'Virtual Private Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Virtual Private Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Full text
Abstract:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main pro
APA, Harvard, Vancouver, ISO, and other styles
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO, and other styles
3

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Full text
Abstract:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by ut
APA, Harvard, Vancouver, ISO, and other styles
4

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO, and other styles
5

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Full text
Abstract:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Full text
Abstract:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulati
APA, Harvard, Vancouver, ISO, and other styles
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Full text
Abstract:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infra
APA, Harvard, Vancouver, ISO, and other styles
11

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999,
APA, Harvard, Vancouver, ISO, and other styles
12

Gaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /." [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Full text
Abstract:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environm
APA, Harvard, Vancouver, ISO, and other styles
14

Ng, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chowdavarapu, Pradeep Kumar, Pramod Kati, and Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.

Full text
Abstract:
This thesis identifies some key Considerations to be considered to create an efficient virtual private network and also investigates to understand some efficiency problems affecting the interchange of information in such networks. It then outlines some possible solutions to manage such problems.The ICT and the telecommunications have been advancing at a rapid rate. This has been seen in the exchange of information in virtual networks such as the social networks like Facebook, Skype, Google talk, Yahoo messenger, Twitter etc. The need for maximum security, privacy and cost effectiveness in diff
APA, Harvard, Vancouver, ISO, and other styles
16

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, s
APA, Harvard, Vancouver, ISO, and other styles
17

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a var
APA, Harvard, Vancouver, ISO, and other styles
18

Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.

Full text
Abstract:
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to suppo
APA, Harvard, Vancouver, ISO, and other styles
19

Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.

Full text
Abstract:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
APA, Harvard, Vancouver, ISO, and other styles
20

Tabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.

Full text
Abstract:
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administra
APA, Harvard, Vancouver, ISO, and other styles
21

SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA, and Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services." 電子情報通信学会, 2012. https://search.ieice.org/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, Dec. 2000.<br>Thesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
23

Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.

Full text
Abstract:
As broadband connections to the home become more prevalent, through Digital Subscriber Lines (DSL) and cable modems, students and faculty will desire to access the NPS Internet via these new means instead of their 56K modems. The introduction of these new technologies will require NPS to re- evaluate how to allow remote access to their internal resources in a secure way, while still allowing for the use of broadband technologies. This thesis will examine the alternative methods for implementing VPNs, from simple use of Point to Point Protocols (PPP) to high end specialized internet appliances
APA, Harvard, Vancouver, ISO, and other styles
24

Wagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.

Full text
Abstract:
This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hierarchy Process (AHP) to determine which technology is better under a hypothetical set of circumstances.
APA, Harvard, Vancouver, ISO, and other styles
25

Kilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
26

Goh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.

Full text
Abstract:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial
APA, Harvard, Vancouver, ISO, and other styles
27

Våge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.

Full text
Abstract:
The activity based workplace model is becoming more and more com- mon and the Swedish Insurance Agency is an authority that has em- braced this model. The new way of working means that more employ- ees work from home or another place than the office. The new working model needs IT solutions that can handle communication and secure document management. This has caused two problems at the Swedish Insurance Agency. The first problem is concerning confusion about how employees should connect correctly to the authority’s conference room equipment. The solution proposal should be able to evaluate if
APA, Harvard, Vancouver, ISO, and other styles
28

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO, and other styles
29

Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.

Full text
Abstract:
En la presente tesina se realiza una descripción de la tecnología de Conmutación Multi-Protocolo mediante etiquetas usando una red privada virtual para la comunicación de una entidad empresarial. Se realizó una descripción de la tecnología MPLS con VPN mostrando sus cualidades, ventajas y desventajas, se promueve la esta tecnología a la red de comunicación de datos de la empresa tenga un performance y confidencialidad en los datos transmitidos, diseñando un esquema así como la infraestructura que podría ser usada en esta implementación, con características modulares las cuales permitirá a la e
APA, Harvard, Vancouver, ISO, and other styles
30

Harris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.

Full text
Abstract:
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history. There are two major issues effecting the development of the Internet for the 21st century; performance and security. This thesis is concerned with the later; in particular the issues raised by the interconnection of TCP/IP based networks between trusted and untrusted network domains. Four main topics are addressed: the common threats and vulnerabilities that effect the TCP/IP protocol suite at the Network, Tran
APA, Harvard, Vancouver, ISO, and other styles
31

Lukaszewski, Daniel. "Multipath transport for virtual private networks." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kern
APA, Harvard, Vancouver, ISO, and other styles
32

Космина, Андрій Сергійович, та Andrii Kosmyna. "Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36800.

Full text
Abstract:
Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів// Дипломна робота ОР «Магістр» // Космина Андрій Сергійович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно-інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБмз-61 // Тернопіль, 2021 // С. 75 , рис. – 14 , табл. – 3 , додат. – 5<br>Дана магістерська кваліфікаційна робота присвячена дослідженню відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес- процесів. Проведено аналіз видів VPN та їх використання для
APA, Harvard, Vancouver, ISO, and other styles
33

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Full text
Abstract:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) en
APA, Harvard, Vancouver, ISO, and other styles
34

Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Evlogimenou, Anna. "Programmable accounting management for Virtual Private Networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ62962.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Balasubramanian, Ashok. "Protected virtual private networks in the hose model." Thesis, University of Hawaii at Manoa, 2003. http://hdl.handle.net/10125/7018.

Full text
Abstract:
A Virtual Private Network (VPN) is a service by a Telecommunication (TSP) or Internet Service Provider (ISP) to emulate a private network for a customer. The hose model is for VPNs where the customer is not required to know the exact pair wise traffic pattern between VPN sites, but specifies the maximum traffic rate that can originate or terminate at each VPN site. Hose VPNs protected from single link failures are considered. Two strategies for protection - Path and Line are described, and mixed integer linear programming problems (MILP) are formulated to determine the bandwidth requirements o
APA, Harvard, Vancouver, ISO, and other styles
37

Flodin, Carl, and Pontus Lantz. "Studenters användning och syn på Virtual Private Networks." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ben, Houidi Zied. "Scalable routing in provider provisoned virtual private networks." Paris 6, 2010. http://www.theses.fr/2010PA066611.

Full text
Abstract:
Les entreprises ont souvent des sites dispersés dans des endroits éloignés et qui ont besoin de communiquer. Au lieu de construire leur propre infrastructure de communication, la plupart des entreprises aujourd'hui, préfèrent acheter un service de réseau privé virtuel (VPN) à un fournisseur de services. Le fournisseur de service VPN est responsable de réaliser le routage afin d'interconnecter les différents sites des entreprises. Dans cette thèse, on fait d'abord un effort pour unifier la vision du routage dans les réseaux privés virtuels fournis par un opérateur. En particulier, on s'intéress
APA, Harvard, Vancouver, ISO, and other styles
39

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.

Full text
Abstract:
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be of
APA, Harvard, Vancouver, ISO, and other styles
40

Jia, Yuxiao. "Dynamic quality of service support in virtual private networks." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26667.

Full text
Abstract:
This thesis presents a framework for the provision of dynamic Quality of Service (QoS) support in Virtual Private Networks (VPNs). Specifically, we focus on MPLS based VPN, with the QoS components including use of MPLS Diffserv, MPLS Traffic Engineering, RSVP-TE signaling protocol etc. The framework consists of a Dynamic Bandwidth Allocation model that includes traffic estimators and the development of a resource reservation technique. The Dynamic Bandwidth Allocation (DBA) uses traffic estimators whose outputs are used for the reservation of resource within some time duration in the future. T
APA, Harvard, Vancouver, ISO, and other styles
41

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Full text
Abstract:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.<br>The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These r
APA, Harvard, Vancouver, ISO, and other styles
42

Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.

Full text
Abstract:
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own desig
APA, Harvard, Vancouver, ISO, and other styles
43

Isaacs, Rebecca. "Dynamic provisioning of resource-assured and programmable virtual private networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rosenbaum, Gustav Filip Computer Science &amp Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.

Full text
Abstract:
This thesis focuses on efficient provisioning of resilient Virtual Private Network (VPN) services. It first confirms the intuition that network resources can be more efficiently utilized when resilience mechanisms are implemented by a network provider in the physical network than by its VPN customers in their VPNs. Next, a Multiprotocol Label Switching-based programmable VPN architecture is presented that delivers virtual links as resilient quality of service (QoS) connections and virtual sites. Virtual sites allow customers to implement functionality like customized routing and content adapta
APA, Harvard, Vancouver, ISO, and other styles
45

Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.

Full text
Abstract:
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup
APA, Harvard, Vancouver, ISO, and other styles
46

Valella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
47

Janeček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.

Full text
Abstract:
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the modul
APA, Harvard, Vancouver, ISO, and other styles
48

Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.

Full text
Abstract:
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definit
APA, Harvard, Vancouver, ISO, and other styles
49

Ballapuram, Vijayanand Sreenivasan. "Impact of Queuing Schemes and VPN on the Performance of a Land Mobile Radio VoIP System." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33033.

Full text
Abstract:
Land mobile radio (LMR) systems are used for communication by public safety and other government and commercial organizations. LMR systems offer mission-critical or even life-critical service in the day-to-day activities of such organizations. Traditionally, a variety of different LMR systems have been deployed by different organizations, leading to a lack of radio interoperability. A voice application that connects LMR systems via a packet-switched network is called an LMR Voice over IP (LMRVoIP) system and is a potential solution to the interoperability problem. LMRVoIP systems are time
APA, Harvard, Vancouver, ISO, and other styles
50

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.

Full text
Abstract:
En 2012, le trafic mobile mondial représentait 70% de plus qu'en 2011. L'arrivée de la technologie 4G a multiplié par 19 le volume de trafic non 4G, et en 2013 le nombre de mobiles connectés à l'Internet a dépassé le nombre d'êtres humains sur la planète. Les fournisseurs d'accès Internet (FAI) subissent une forte pression, car ils ont pour obligations d'assurer à leurs clients l'accès au réseau et le maintien de la qualité de service. À court/moyen terme, les opérateurs doivent délester une partie de leur trafic sur des réseaux d'accès alternatifs afin de maintenir les mêmes caractéristiques
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!