نتایج جستجو برای: virtual private network
تعداد نتایج: 890394 فیلتر نتایج به سال:
This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this ...
This research examines nine ICT-intensive and innovative projects involving both public and private sectors in the delivery of public services and attempts to identify their main critical success factors (CSFs). Several respondents from both sectors were interviewed. Results show that political leadership, thorough planning and communication stand out as the first necessary conditions to the su...
We consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Our primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. We argue that network resources should be shared in a performance-centric fashion that aids p...
T his paper studies an outsourcing problem where two service providers (suppliers) compete for the service contract from a client. The suppliers face uncertain cost for providing the service because they do not have perfect information about the client’s type. The suppliers receive differential private signals about the client type and thus compete under asymmetric information. We first charact...
In this paper we show how to build a fully secure and efficient group communication service between several sites. This service is built on top of a VPN environment where IPSec tunnels are created, on-demand, between the various sites that need to communicate. This paper is a follow-up of previous work on group communications in a VPN environment and on application-level multicast. We show that...
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed “how-to” instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configurat...
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs.
This paper explicitly considers strategic interaction between governments to study currency competition and its effects on the circulation of currencies and welfare in a two-country, twocurrency search theoretic model. Each government uses seigniorage to provide public goods. Agents consume private goods, and the public goods of their own country. We have several Þndings. The negative impact of...
In this study, we use county data on private security establishments and employment for 1977–92 to test two hypotheses. First, we test whether private security deters crime. Second, we test whether John Lott and David Mustard’s estimates of the impact of shall-issue laws on crime are biased because of a lack of controls for private security. We find little evidence that private security reduces...
We consider the task of data analysis with pure differential privacy. We construct new and improved mechanisms for statistical release of interval and rectangle queries. We also obtain a new algorithm for counting over a data stream under continual observation, whose error has optimal dependence on the data stream’s length. A central ingredient in all of these result is a differentially private...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید