نتایج جستجو برای: virtual private network
تعداد نتایج: 890394 فیلتر نتایج به سال:
In this paper we present a model of e-learning suitable for teacher training sessions. The main purpose of our work is to define the components of the educational system which influences the successful adoption of e-learning in the field of education. We also present the factors of the readiness of e-learning mentioned in the literature available and classifies them into the 3 major categories ...
VPN services have been available for decades but not widely used until recently. A combination of new VPN technologies, network technologies and business communication requirements is the driving force behind the take-up of VPN services. This paper gives an overview of recent VPN solutions and analyses their scalability and flexibility. VPN solutions are categorized and related to potential cus...
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an information model. We propose in this paper a model for validation based on XML schema trees. By using an existing logical formalism called TQL, we express imp...
In this article we describe recent work done in building a university-wide grid at the University of Cambridge based on the Condor middleware [1]. Once the issues of stakeholder concerns (e.g. security policies) and technical problems (e.g. firewalls and private IP addresses) have been taken into account, a solution based on two separate Condor environments was decided on. The first of these is...
The term “private” in virtual private network is sometimes taken for granted, and people can be too distracted by the “virtual” and “network” to really consider what is meant by “private.” In this paper, we consider the issues and meanings of the term private, and look at these issues with respect to two of the dominant VPN technologies, IPsec and MPLS.
The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation based on adaptation of standard protocols (IPSec and Mobile IP) and initial performance results are discussed.
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document addresses security aspects pertaining to Provider-Provisioned Virtual Private Networks (PPVPNs). First, it describes the security threats in the context of PPVPNs and defensive techniques to combat tho...
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document addresses security aspects pertaining to Provider-Provisioned Virtual Private Networks (PPVPNs). First, it describes the security threats in the context of PPVPNs and defensive techniques to combat tho...
The term "VPN," or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...
The liberalisation of the telecommunications industry has resulted in a proliferation of new services and services providers. This is particularly the case in the rapidly expanding IPbased services market. Providers include ISPs, Virtual Private Network (VPN) and application service providers, and backbone operators. The final service set delivered to the customer will result from the combinati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید