نتایج جستجو برای: virtual private network
تعداد نتایج: 890394 فیلتر نتایج به سال:
Virtual Private Networks (VPNs) [1] allow individuals and business to create and maintain secure communication channels between their own local networks using public and insecure networks, like Internet, instead of private and leased lines. The main purpose of a VPN is to securely and transparently connect two or more remote networks to form virtually a single network. Network architectures def...
This document specifies an Inter-Chassis Communication Protocol (ICCP) that enables Provider Edge (PE) device redundancy for Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS) applications. The protocol runs within a set of two or more PEs, forming a Redundancy Group, for the purpose of synchronizing data among the systems. It accommodates multi-chassis attachment circui...
Within CAWICOMS a configuration workbench for customisable products and services will be developed which will have the following advantages versus current commercially available configuration technology: It will automate over the Web the skills of salespersons by developing adaptation and personalisation technology for inclusion in Web based configurators. The interaction with the user will be ...
We propose different formulations as well as efficient solution approaches for the VPN design problem under traffic uncertainty with symmetric bandwidths.
We present the GOSMR architecture, a modular agent architecture designed to actuate web browsers and other network applications, and demonstrate the importance of modeling how users think about the past and future in accurately modeling network traffic. The architecture separates the hierarchical generation of goals and incentives (Behaviors) from hierarchical implementations of their pursuit (...
Attacks against the information flowing on the Internet cause a serious security threat nowadays, and force the developers to consider the system security aspects. This paper presents the use and suitability of Virtual Private Networks (VPNs) in the prevention of security breaches. An Open Service Gateway Initiative (OSGi) platform is presented and integration with VPN is studied as a case stud...
This paper proposes an algorithm for aggregating virtual channel connections (VCCs) onto virtual path connections (VPCs) in asynchronous transfer mode (ATM) networks. We focus on the interesting problem of multiplexing onto an available bit rate (ABR) VPC. ABR VPCs are particularly useful for connecting enterprise sites over the Internet, providing a virtual private network (VPN). The VPC/VCC h...
Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...
A Layer 1 Virtual Private Network (L1-VPN) has two models for service management: the resource-partition based model and the domain-service based model. In this paper, we present a network management tool for resourcepartition based L1-VPNs. A Transaction Language One (TL1) proxy is designed to achieve resource partitioning at the network element level. Building on top of a TL1 proxy, we implem...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید