نتایج جستجو برای: virtual private network

تعداد نتایج: 890394  

2007
Yannick Brehon Daniel Kofman Augusto Casaca

Metro Ethernet has been widely adopted lately. One of its goals is to provide clients with VPN services, and in this context, loadbalancing and protection have become important issues. This paper presents an original formulation of these problems in Metro Ethernet, and introduces an algorithm for load balancing which provides good numerical results.

2002
Gustavo de Veciana Steven Weber

In this paper we investigate various questions associated with routing and provisioning virtual private networks (VPNs) based on hose traffic models or constraints, i.e., using aggregate (hose) traffic characterizations in/out of VPN end-points. This appears to be a promising simple approach to dealing with traffic engineering for VPNs. We evaluate the possible efficiencies derived from spatial...

Journal: :CoRR 2011
Patricia Marcu David Schmitz Wolfgang Fritz Mark Yampolskiy Wolfgang Hommel

Novel large scale research projects often require cooperation between various different project partners that are spread among the entire world. They do not only need huge computing resources, but also a reliable network to operate on. The Large Hadron Collider (LHC) at CERN is a representative example for such a project. Its experiments result in a vast amount of data, which is interesting for...

2011
Rodrigo Roman Javier Lopez Jianying Zhou

Virtual Private Networks (VPNs) provide a cost-effective way for securing communications using public and insecure networks like the Internet. The main purpose of a VPN is to securely and transparently connect two or more remote networks to form virtually a single network, using centralized security policies for better management and protection. However, in certain scenarios, users may not requ...

2009
L Berger

Status of This Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. Abstract This document defines an OSPFv3-based (Open Shortest Path First version 3) Layer 1 Virtual Private Network (L1VPN) auto-discovery mechanism. This...

Journal: :RFC 2006
Thomas D. Nadeau Monique J. Morrow George Swallow David Allan Satoru Matsushima

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies Operations and Management (OAM) requirements for Multi-Protocol Label Switching (MPLS), as well as for applications of MPLS, such as pseudo-wire voice and virtual private network services. Th...

Journal: :CoRR 2010
Mahalakshmi Chidambara Natarajan Ramaswamy Muthiah Alamelu Nachiappan

A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance in the present scenario due to varied traffic. Each VPN endpoint specifies bounds on the total amount of traffic that it is likely to send or receive at any time. The network provider tailors the VPN so that there is ...

Journal: :Computing and Informatics 2012
Joanna Kosinska Jacek Kosinski Slawomir Zielinski Krzysztof Zielinski

The paper proposes an architecture of a system automating the provisioning process of cloud computing infrastructures. Its structure and components are specified, based on an analysis of three types of requirements: infrastructure providers, service providers and end users. These considerations have led us to formulate a new infrastructural model, offered to end users as a collection of Virtual...

2002
Elmar Klute Roland Schott Rüdiger Geib Heinrich Gebehenne

Abbildung 1: AH und ESP im Transport-und Tunnelmodus (vereinfachte Darstellung) Der Transportmodus hat den Vorteil, dass jedem IP-Paket nur wenige Bytes hinzugefügt werden. Demgegenüber bietet der Tunnelmodus eine höhere Sicherheit, weil das gesamte IP-Paket authentifiziert bzw. verschlüsselt wird.on Authority (RA) und Certificate Authority (CA) zusammen, die in einem Trust Center angesiedelt s...

2005
Friedrich Eisenbrand Fabrizio Grandoni Gianpaolo Oriolo Martin Skutella

Virtual private network design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent the amount of flow that a node can send to and receive from the network. The task is to reserve capacities at minimum cost and to specify paths between every ordered pair of nodes such that all valid traffic-matrices ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید