Auswahl der wissenschaftlichen Literatur zum Thema „Virtual private network servers“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Virtual private network servers" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Virtual private network servers"

1

Mohammed, Subhi Aswad. „Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study“. Al-Nahrain Journal for Engineering Sciences 22, Nr. 4 (20.12.2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Roşu, Marius, und George Drăgoi. „VPN solutions and network monitoring to support virtual teams work in virtual enterprises“. Computer Science and Information Systems 8, Nr. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Der volle Inhalt der Quelle
Annotation:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hariyadi, I. Putu, und Akbar Juliansyah. „Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan“. MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, Nr. 1 (29.11.2018): 1–12. http://dx.doi.org/10.30812/matrik.v18i1.329.

Der volle Inhalt der Quelle
Annotation:
STMIK Bumigora Mataram strives to develop a curriculum that adopts the needs of the industrial world. In the past 2 years, Network Management lecturers have experienced problems related to practicum implementation. During this time the learning process uses virtualization installed on each laboratory computer. However, the system has various weaknesses, especially related to the freedom of access and availability. The implementation of Private Cloud Computing based on Proxmox Virtual Environment (PVE) which in the cluster can be a solution to the problems faced. PVE cluster which is made using four servers and integrated with one storage server can be used as a learning media for network management practicum and support high availability so that live migration can be done. Users can manage Virtual Private Servers using Linux Container (LXC) independently with a login and limited access permission account and the configuration can be done through the console and SSH. All practicum materials were successfully tested on LXC. An FTP-based local repository built on a storage server can minimize the bandwidth usage of an Internet connection and speed up the package installation. In addition port forwarding on the gateway router can facilitate the remote access needs on LXC from the Internet.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova und Bulbul Ongar. „USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS“. Series of Geology and Technical Sciences 447, Nr. 3 (15.06.2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Der volle Inhalt der Quelle
Annotation:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for organizing a VPN. Also, the work analyzes the specifics of the work of corporate information systems and networks intended for their maintenance, showed that for building a corporate network it is advisable to use virtual private network (VPN) technology, which makes it possible to ensure the fulfillment of the basic requirements for the security and quality of customer service and applications and the current state and direction of development of VPN technology when creating new generation corporate networks, while highlighting the main tasks that need to be addressed when creating a network. Some features of setting up an IPSec VPN server for corporate networks are considered.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Salim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee und Jong Hyuk Park. „Homomorphic Encryption Based Privacy-Preservation for IoMT“. Applied Sciences 11, Nr. 18 (20.09.2021): 8757. http://dx.doi.org/10.3390/app11188757.

Der volle Inhalt der Quelle
Annotation:
Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks on hospital systems result in user data being held at ransom. Furthermore, mathematical operations on data stored in the Cloud are exposed to untrusted external entities that sell private data for financial gain. In this paper, we propose a privacy-preserving scheme using homomorphic encryption to secure medical plaintext data from being accessed by attackers. Secret sharing distributes computations to several virtual nodes on the edge and masks all arithmetic operations, preventing untrusted cloud servers from learning the tasks performed on the encrypted patient data. Virtual edge nodes benefit from cloud computing resources to accomplish computing-intensive mathematical functions and reduce latency in device–edge node data transmission. A comparative analysis with existing studies demonstrates that homomorphically encrypted data stored at the edge preserves data privacy and integrity. Furthermore, secret sharing-based multi-node computation using virtual nodes ensures data confidentiality from untrusted cloud networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System“. Applied Mechanics and Materials 321-324 (Juni 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.

Der volle Inhalt der Quelle
Annotation:
Vehicle information system is the data center of vehicle communication networks, for the sake of connecting the IPv6 host through IPv4 network area, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack. The VND can establish a virtual tunnel between the vehicle information device and agent server. Both vehicle information device and agent server can support IPv4 and IPv6.Through the virtual tunnel, the agent server picked up the IPv6 packet which was built in IPv4 UDP data area, and transmit the IPv6 packets to the IPv6 remote server. So it works like a VPN device. The hardware platform of the vehicle gateway is based on ARM9, and the software is based on ARM-Linux. The instruction of hardware and software are as well as put forward.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sano, Albert Verasius Dian. „Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id“. ComTech: Computer, Mathematics and Engineering Applications 2, Nr. 2 (01.12.2011): 946. http://dx.doi.org/10.21512/comtech.v2i2.2845.

Der volle Inhalt der Quelle
Annotation:
The objective of this research is to develop a web-based-online-stock-simulation application applying Virtual Private Network (VPN) technology. The web-based application is prefered for user’s convenience and comfort since it does not require any software to be installed on the client side and is also accessable anywhere and anytime with internet connection availability. The application is developed by means of analysis and design towards the technology needed to establish the connectivity between servers through internet as well as database analysis and design. The data are real time derived from the Indonesia Stock Exchange (IDX) and forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and succesfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network“. Applied Mechanics and Materials 475-476 (Dezember 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.

Der volle Inhalt der Quelle
Annotation:
Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both input and output processing for the sake of checking the route before the packets transmission. Both the terminal and the agent have the driver middleware to ensure smooth flow routing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lizarti, Nora, und Wirta Agustin. „Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)“. SATIN - Sains dan Teknologi Informasi 1, Nr. 1 (23.06.2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Der volle Inhalt der Quelle
Annotation:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan VPN (Virtual Private Network) berbasis web, yang menjadi salah satu solusi dalam menyelesaikan masalah yang ada. VPN (Virtual Private Network) merupakan suatu cara memanfaatkan jaringan public sebagai jaringan private secara aman melalui internet yang menggunakan perpaduan teknologi tunneling dan enkapsulasi. SNMP merupakan sebuah protokol yang didesain untuk memberikan kemampuan pengumpulan data manajemen perangkat jaringan dan pengkonfigurasian perangkat jaringan secara jarak jauh (remotely). Sistem operasi yang digunakan pada server administator adalah Linux Ubuntu 12.04. Linux Ubuntu merupakan distro linux yang stabil dan cukup handal. Dengan adanya aplikasi network traffic monitoring pada jaringan VPN dapat membantu pihak administrator untuk memantau lalu lintas data sehingga penggunaan internet lebih optimal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Umaroh, Lia, und Machsun Rifauddin. „IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG“. BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, Nr. 2 (11.12.2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Der volle Inhalt der Quelle
Annotation:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Virtual private network servers"

1

Bergvall, Ricardo. „Secure remote access to a work environment“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Der volle Inhalt der Quelle
Annotation:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) enter the picture, as it has a broad application scope and is particularly useful for secure remote access. My project was subdivided into three parts: How to implement secure remote access to a working environment within the requirements of the chosen company, which are an inexpensive solution with high-security features.  Automate the creation and distribution of all the necessary parts that their employees will need in a VPN structure. Research about the future direction regarding VPN and the importance of cybersecurity to help ensure security preparedness for the company. The chosen solution was OpenVPN and Google authenticator, together with a written bash script. It became a solution that was free, flexible, secure and scalable. But why the need and what about the future?  Research shows that a high percentage of small and medium-sized enterprises are vulnerable to cyberattacks. It also shows that these companies have the lowest cybersecurity. "It wouldn't happen to us" is dangerous but, sadly, a typical mindset throughout the S&M companies. It's primarily because of this S&M's are more exposed than larger companies. The future of VPN's has become more important than ever before, and it's something that during Covid-19 has risen in use all over the world, the research and development of VPNs has accelerated. The research objectives of this project are of high interest to many other organizations in the same position, and the presented work has helped answer the question: "Where will we stand in a few years regarding secure remote work, cybersecurity andencrypted networks?"
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Celestino, Pedro. „Private virtual network“. Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Der volle Inhalt der Quelle
Annotation:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main prominences of this technology will be presented using the protocol IPSec with the purpose of presenting a more atractive tool to the organizations due to its safety and economical viability.
Com as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Samuelsson, Joakim, und Richard Sandsund. „Implementing a virtual private network“. Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Der volle Inhalt der Quelle
Annotation:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett säkert och smidigt sätt samt metoder att göra sin VPN-anslutning säker. Vi redovisar också den lösning vi har implementerat hos Confidence, för vilka arbetet utfördes. Problemen med att använda de produkter som redan fanns på företaget beskrivs. Förslag på lösningar ges för att lösa dessa problem i framtida arbeten.
Companies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Davis, Carlton R. „IPSec base virtual private network“. Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Der volle Inhalt der Quelle
Annotation:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by utilizing VPN for inter-company or intra-company communications rather than using expensive lease or privately own network infrastructure with its associated high maintenance costs. In this thesis, we will discuss the architecture, design and use of IPSec base VPN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ikiz, Suheyla. „Performance Parameters Of Wireless Virtual Private Network“. Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, Sü
heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Norin, Anders, und Henrik Ohlsson. „VPN : Virtual Private Network i Windows 2000“. Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Liang, Huan. „Minimal cost design of virtual private network“. Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Der volle Inhalt der Quelle
Annotation:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulations are applied to the resource allocation in network-based IP VPN, in order to develop a cost-effective routing proposal. Compared with RFC 2676, one of the Open Shortest Path First (OSPF) algorithms, various improvements in routing costs are obtained corresponding to different proposed network topologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rüegg, Maurice. „Virtual private network provisioning in the hose model /“. Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lin, Zhangxi. „Virtual private network traffic pricing : an exploratory study /“. Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Habibovic, Sanel. „VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions“. Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Der volle Inhalt der Quelle
Annotation:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase performance for the users and save costs for organizations who wish to deploy VPNs. With the remote workforce increasing issues of network reliability also increases, due to wireless connections and networks beyond the control of companies. This demands an answer to the question how do VPN solutions differ in performance with stable and unstable networks? This work attempted to answer this question. This study is generally concerning VPN performance but mainly how the specific solutions perform under unreliable network conditions.It was achieved by researching past comparisons of VPN solutions to identify what metrics to analyze and which VPN solutions have been recommended. Then a test bed was created in a lab network to control the network when testing, so the different VPN implementations and operating systems have the same premise. To establish baseline results, performance testing was done on the network without VPNs, then the VPNs were tested under reliable network conditions and then with unreliable network conditions. The results of that were compared and analyzed. The results show a difference in the performance of the different VPNs, also there is a difference on what operating system is used and there are also differences between the VPNs with the unreliability aspects switched on. The novel VPN protocol looks promising as it has overall good results, but it is not conclusive as the current VPN solutions can be configured based on what operating system and settings are chosen. With this set-up, VPNs on Linux performed much better under unreliable network conditions when compared to setups using other operating systems. The outcome of this work is that there is a possibility that the novel VPN protocol is performing better and that certain combinations of VPN implementation and OS are better performing than others when using the default configuration. This works also pointed out how to improve the testing and what aspects to consider when comparing VPN implementations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Virtual private network servers"

1

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

(Corporation), NIIT, Hrsg. Building a virtual private network. Cincinnati, Ohio: Premier Press, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Virtual private networking: New issues for network security. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Paul, Wolfe, und Erwin Mike 1969-, Hrsg. Virtual Private Networks. 2. Aufl. Beijing [China]: O'Reilly, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

1969-, Erwin Mike, und Wolfe Paul, Hrsg. Virtual Private Networks. Sebastopol, CA: O'Reilly, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ng, Walfrey. MIBlet approach to virtual private network management: Design, applications and implementation. Ottawa: National Library of Canada, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

A technical guide to IPSec virtual private networks. Boca Raton, FL: Auerbach, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Virtual private network servers"

1

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller und Daniel Behnke. „Virtual Private Network (VPN)“. In Computernetze und Internet of Things, 211–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Masuda, Mineyoshi, Yutaka Yoshimura, Toshiaki Tarui, Toni Shonai und Mamoru Sugie. „VPDC: Virtual Private Data Center“. In Integrated Network Management VIII, 473–76. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_47.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sinha, Sanjib. „Virtual Private Network or VPN“. In Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Prenn, Caroline, und Paul van Marcke. „Value-chain, virtual private network (VPN)“. In Projektkompass eLogistik, 235–40. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-84977-9_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wang, Lina, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang und Zhe Mei. „A Virtual Private Network for Virtual Enterprise Information Systems“. In Web-Age Information Management, 165–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45151-x_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Augot, Daniel, Françoise Levy-dit-Vehel und Abdullatif Shikfa. „A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers“. In Cryptology and Network Security, 222–39. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo und Martin Skutella. „New Approaches for Virtual Private Network Design“. In Automata, Languages and Programming, 1151–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11523468_93.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Brehon, Yannick, Daniel Kofman und Augusto Casaca. „Virtual Private Network to Spanning Tree Mapping“. In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 703–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72606-7_60.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gali, Alex, und Stefan Covaci. „Active Virtual Private Network Services on Demand“. In Next Generation Networks. Networks and Services for the Information Society, 160–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40019-2_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Lakshmi, M. L. S. N. S., und Naga Venkata Sai Sudheer Bandaru. „Configuring MPLS Cloud Providers with Virtual Private Network“. In Lecture Notes in Electrical Engineering, 817–26. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2256-7_76.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Virtual private network servers"

1

Pavlicek, Antonin, und Frantisek Sudzina. „Use of virtual private networks (VPN) and proxy servers: Impact of personality and demographics“. In 2018 Thirteenth International Conference on Digital Information Management (ICDIM). IEEE, 2018. http://dx.doi.org/10.1109/icdim.2018.8846991.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chen, Qian, Xuefeng Sun und Zhihong Shangguan. „A Utility Model of Environmental Radiation Online Monitoring System of Nuclear Power Plants“. In 2013 21st International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/icone21-16842.

Der volle Inhalt der Quelle
Annotation:
Most of the existing nuclear power plants locate in coastal mountainous region. In the traditional way, radio communication is used between the environmental radiation monitoring stations and monitoring center. As the terrain and thunderstorms have great impact on radio, the signal is easily disturbed or intercepted. At the same time, the technologies and functions of the conventional system is no able to fully meet the requirements of the environmental monitoring of nuclear power plant in new situation. A utility model of environmental radiation online monitoring system of nuclear power plants is put forward to solve the former problems. The system includes a monitoring center with capability of data processing and multiple monitoring stations with capability of environmental radiation online monitoring. Each of stations has radiation detectors as the monitoring center consists of a main server and a backup server. The communications between the monitoring center and Stations include wire communication and wireless communication. Wire communication mentioned above consists of public telephone network and telephone lines between the network and monitoring stations. The wireless communication mentioned above consists of public telecommunication service network and virtual private network (VPN) which is able to transfer data confidentially. Through the network, monitoring center uses two servers to provide wire and wireless data reception service. Monitoring stations choose one of the normal channels to transfer environmental radiation monitoring data. Based on the status of communication, data will be shared and synchronized automatically between the main server and backup server. On the basic of the architecture of equipment and network, some software systems are designed and developed. The main subsystems of the software systems are the data acquisition workstation software systems and the central station software system. These two kinds of subsystems play different role in system. Some new computer technology (such as Microsoft .Net, Geographic Information System) is used in these software systems to provide better functions which include data storage, data management, data show, statistics and analysis to enhance efficiency and reliability. In the practical application of some NPPs in China, the utility model solves the former problems of environmental radiation online monitoring effectively and makes the system more dependable. It can be transplanted and popularized in other coastal nuclear power plants.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Takeda, Tomonori. „Layer 1 Virtual Private Network“. In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348578.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gupta, Anupam, Jon Kleinberg, Amit Kumar, Rajeev Rastogi und Bulent Yener. „Provisioning a virtual private network“. In the thirty-third annual ACM symposium. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/380752.380830.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kim, Kangseok, Marlon E. Pierce und Rajarshi Guha. „SQMD: Architecture for Scalable, Distributed Database System Built on Virtual Private Servers“. In 2008 IEEE Fourth International Conference on eScience (eScience). IEEE, 2008. http://dx.doi.org/10.1109/escience.2008.35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jaha, Ahmed A., Fathi Ben Shatwan und Majdi Ashibani. „Proper Virtual Private Network (VPN) Solution“. In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE, 2008. http://dx.doi.org/10.1109/ngmast.2008.18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Hernandez, Harold, und Ping-Tsai Chung. „Case study of virtual private network“. In ITCom 2001: International Symposium on the Convergence of IT and Communications, herausgegeben von Anura P. Jayasumana und V. Chandrasekar. SPIE, 2001. http://dx.doi.org/10.1117/12.434430.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Benzid, Djedjiga, und Michel Kadoch. „Virtual Private Network over Wireless Mesh Networks“. In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.60.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kang, Sunyoung, und Seungae Kang. „Virtual Private Network for Wellness Sports Information“. In 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717897.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kim, Jaehoon, Myeong-wuk Jang, Byoung-Joon Lee und Kiho Kim. „Content Centric Network-based Virtual Private Community“. In 2011 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2011. http://dx.doi.org/10.1109/icce.2011.5722896.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Virtual private network servers"

1

Andersson, L., und T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC Editor, März 2005. http://dx.doi.org/10.17487/rfc4026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Rosen, E., Y. Cai und A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. RFC Editor, Juli 2015. http://dx.doi.org/10.17487/rfc7582.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Schliesser, B., und T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Baker, F., und P. Bose. Quality of Service (QoS) Signaling in a Nested Virtual Private Network. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4923.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Takeda, T., Hrsg. Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode. RFC Editor, Juli 2008. http://dx.doi.org/10.17487/rfc5253.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nadeau, T., und H. van, Hrsg. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, Februar 2006. http://dx.doi.org/10.17487/rfc4382.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

De, J., D. Ooms, M. Carugi und F. Le. BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN. RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4659.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Adrangi, F., und H. Levkowetz, Hrsg. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4093.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sathappan, S., K. Nagaraj und W. Lin. Propagation of ARP/ND Flags in an Ethernet Virtual Private Network (EVPN). Herausgegeben von J. Rabadan. RFC Editor, Juni 2021. http://dx.doi.org/10.17487/rfc9047.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Luo, W. Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP). RFC Editor, September 2006. http://dx.doi.org/10.17487/rfc4667.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie