نتایج جستجو برای: labview و vpn

تعداد نتایج: 763406  

1998
Geoff Huston

The term "VPN," or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

1998
Paul Ferguson Geoff Huston

The term “VPN,” or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

2012
Jayanthi Gokulakrishnan V. Thulasi Bai

Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and secu...

2005
Cor A. J. Hurkens Judith Keijsper Leen Stougie

A basic question in Virtual Private Network (VPN) design is if the symmetric version of the problem always has an optimal solution which is a tree network. An affirmative answer would imply that the symmetric VPN problem is solvable in polynomial time. We give an affirmative answer in case the communication network within which to create the VPN is a circuit. This seems to be an important step ...

Journal: :Computer Communications 2004
Thanasis G. Papaioannou George D. Stamoulis

In the emerging context of mobile Internet, the importance of VPN services is rapidly increasing. Provision of such services was among the subjects of IST project INTERNODE. Besides the necessary technical means, charging and accounting also are key related issues, and constitute the subject of this paper. Only by dealing successfully with charging and accounting, VPN providers can recover thei...

2007
Yoshihiro HARA Hiroyuki OHSAKI Makoto IMASE Yoshitake TAJIMA Masahiro MARUYOSHI Junichi MURAYAMA Kazuhiro MATSUDA

Recent development of network technologies enables network communications in various social organizations and enables various social organizations to be virtualized in networks. We named the mass of virtual organizations ”cyber-society”. A ”person” in cyber-society needs to establish communication association s with multiple virtual organizations with adequate security. Therefore, we beli eve t...

Journal: :J. Information Security 2011
Tarek S. Sobh Yasser Aly

A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Ext...

Journal: :RFC 2013
Huajin Jeng James Uttaro Luay Jalil Bruno Decraene Yakov Rekhter Rahul Aggarwal

With BGP/MPLS Virtual Private Networks (VPNs), providing any-to-any connectivity among sites of a given VPN would require each Provider Edge (PE) router connected to one or more of these sites to hold all the routes of that VPN. The approach described in this document allows the VPN service provider to reduce the number of PE routers that have to maintain all these routes by requiring only a su...

2016
Chengcheng Huang Zhaohao Sun

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

2003
Kenichi Kourai Toshio Hirotsu Koji Sato Osamu Akashi Kensuke Fukuda Toshiharu Sugawara Shigeru Chiba

This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environment called a portspace is bound to only one VPN, i.e., single-homed. Using this feature of portspaces, personal networks address several problems at multi-homed hosts that use multiple VPNs. Information flow is separat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید