نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

Journal: :RFC 2005
Yacine El Mghazli Thomas D. Nadeau Mohamed Boucadair Kwok-Ho Chan Arnaud Gonguet

This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this ...

2006
Lise Préfontaine Line Ricard Hélène Sicotte D. Skander

This research examines nine ICT-intensive and innovative projects involving both public and private sectors in the delivery of public services and attempts to identify their main critical success factors (CSFs). Several respondents from both sectors were interviewed. Results show that political leadership, thorough planning and communication stand out as the first necessary conditions to the su...

2012
Gautam Kumar Mosharaf Chowdhury Sylvia Ratnasamy Ion Stoica

We consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Our primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. We argue that network resources should be shared in a performance-centric fashion that aids p...

2013
Xia Zhao Ling Xue Fuqiang Zhang

T his paper studies an outsourcing problem where two service providers (suppliers) compete for the service contract from a client. The suppliers face uncertain cost for providing the service because they do not have perfect information about the client’s type. The suppliers receive differential private signals about the client type and thus compete under asymmetric information. We first charact...

2003
Lina Alchaal Vincent Roca Ayman El-Sayed Michel Habert

In this paper we show how to build a fully secure and efficient group communication service between several sites. This service is built on top of a VPN environment where IPSec tunnels are created, on-demand, between the various sites that need to communicate. This paper is a follow-up of previous work on group communications in a VPN environment and on application-level multicast. We show that...

2017
Mohammed M. Alani

This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed “how-to” instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configurat...

Journal: :RFC 2006
Loa Andersson Eric C. Rosen

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs.

2005
Yiting Li Akihiko Matsui Kazuya Kamiya Takashi Shimizu

This paper explicitly considers strategic interaction between governments to study currency competition and its effects on the circulation of currencies and welfare in a two-country, twocurrency search theoretic model. Each government uses seigniorage to provide public goods. Agents consume private goods, and the public goods of their own country. We have several Þndings. The negative impact of...

2001
BRUCE L. BENSON

In this study, we use county data on private security establishments and employment for 1977–92 to test two hypotheses. First, we test whether private security deters crime. Second, we test whether John Lott and David Mustard’s estimates of the impact of shall-issue laws on crime are biased because of a lack of controls for private security. We find little evidence that private security reduces...

2015
Cynthia Dwork Moni Naor Omer Reingold Guy N. Rothblum

We consider the task of data analysis with pure differential privacy. We construct new and improved mechanisms for statistical release of interval and rectangle queries. We also obtain a new algorithm for counting over a data stream under continual observation, whose error has optimal dependence on the data stream’s length. A central ingredient in all of these result is a differentially private...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید