To see the other types of publications on this topic, follow the link: Virtual private network servers.

Dissertations / Theses on the topic 'Virtual private network servers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Virtual private network servers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Full text
Abstract:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) enter the picture, as it has a broad application scope and is particularly useful for secure remote access. My project was subdivided into three parts: How to implement secure remote access to a working environment within the requirements of the chosen company, which are an inexpensive solution with high-security features.  Automate the creation and distribution of all the necessary parts that their employees will need in a VPN structure. Research about the future direction regarding VPN and the importance of cybersecurity to help ensure security preparedness for the company. The chosen solution was OpenVPN and Google authenticator, together with a written bash script. It became a solution that was free, flexible, secure and scalable. But why the need and what about the future?  Research shows that a high percentage of small and medium-sized enterprises are vulnerable to cyberattacks. It also shows that these companies have the lowest cybersecurity. "It wouldn't happen to us" is dangerous but, sadly, a typical mindset throughout the S&M companies. It's primarily because of this S&M's are more exposed than larger companies. The future of VPN's has become more important than ever before, and it's something that during Covid-19 has risen in use all over the world, the research and development of VPNs has accelerated. The research objectives of this project are of high interest to many other organizations in the same position, and the presented work has helped answer the question: "Where will we stand in a few years regarding secure remote work, cybersecurity andencrypted networks?"
APA, Harvard, Vancouver, ISO, and other styles
2

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Full text
Abstract:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main prominences of this technology will be presented using the protocol IPSec with the purpose of presenting a more atractive tool to the organizations due to its safety and economical viability.
Com as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
APA, Harvard, Vancouver, ISO, and other styles
3

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Full text
Abstract:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett säkert och smidigt sätt samt metoder att göra sin VPN-anslutning säker. Vi redovisar också den lösning vi har implementerat hos Confidence, för vilka arbetet utfördes. Problemen med att använda de produkter som redan fanns på företaget beskrivs. Förslag på lösningar ges för att lösa dessa problem i framtida arbeten.
Companies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
APA, Harvard, Vancouver, ISO, and other styles
4

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Full text
Abstract:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by utilizing VPN for inter-company or intra-company communications rather than using expensive lease or privately own network infrastructure with its associated high maintenance costs. In this thesis, we will discuss the architecture, design and use of IPSec base VPN.
APA, Harvard, Vancouver, ISO, and other styles
5

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Full text
Abstract:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, Sü
heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
APA, Harvard, Vancouver, ISO, and other styles
6

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Full text
Abstract:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulations are applied to the resource allocation in network-based IP VPN, in order to develop a cost-effective routing proposal. Compared with RFC 2676, one of the Open Shortest Path First (OSPF) algorithms, various improvements in routing costs are obtained corresponding to different proposed network topologies.
APA, Harvard, Vancouver, ISO, and other styles
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Full text
Abstract:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase performance for the users and save costs for organizations who wish to deploy VPNs. With the remote workforce increasing issues of network reliability also increases, due to wireless connections and networks beyond the control of companies. This demands an answer to the question how do VPN solutions differ in performance with stable and unstable networks? This work attempted to answer this question. This study is generally concerning VPN performance but mainly how the specific solutions perform under unreliable network conditions.It was achieved by researching past comparisons of VPN solutions to identify what metrics to analyze and which VPN solutions have been recommended. Then a test bed was created in a lab network to control the network when testing, so the different VPN implementations and operating systems have the same premise. To establish baseline results, performance testing was done on the network without VPNs, then the VPNs were tested under reliable network conditions and then with unreliable network conditions. The results of that were compared and analyzed. The results show a difference in the performance of the different VPNs, also there is a difference on what operating system is used and there are also differences between the VPNs with the unreliability aspects switched on. The novel VPN protocol looks promising as it has overall good results, but it is not conclusive as the current VPN solutions can be configured based on what operating system and settings are chosen. With this set-up, VPNs on Linux performed much better under unreliable network conditions when compared to setups using other operating systems. The outcome of this work is that there is a possibility that the novel VPN protocol is performing better and that certain combinations of VPN implementation and OS are better performing than others when using the default configuration. This works also pointed out how to improve the testing and what aspects to consider when comparing VPN implementations.
APA, Harvard, Vancouver, ISO, and other styles
11

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Full text
Abstract:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infrastructure without adding operational complexity. In this thesis, we investigate and analyze several implementation methods of Multicast Virtual Private Network (MVPN) schemes by carrying out tests in a research testbed environment. These schemes are intended for offering multicast services over layer 3 VPN. However, some of these technologies can be tuned to offer multicast services over layer 2 VPN as well. We also provide tools and tactics on how to implement and evaluate the scalability and performance of two MPVN schemes in IP/MPLS core networks such as Rosen scheme and NG MVPN.
APA, Harvard, Vancouver, ISO, and other styles
12

Montironi, Adolfo Angel. "Digital Forensic Acquisition of Virtual Private Servers Hosted in Cloud Providers that Use KVM as a Hypervisor." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10845501.

Full text
Abstract:

Kernel-based Virtual Machine (KVM) is one of the most popular hypervisors used by cloud providers to offer virtual private servers (VPSs) to their customers. A VPS is just a virtual machine (VM) hired and controlled by a customer but hosted in the cloud provider infrastructure. In spite of the fact that the usage of VPS is popular and will continue to grow in the future, it is rare to find technical publications in the digital forensic field related to the acquisition process of a VPS involved in a crime. For this research, four VMs were created in a KVM virtualization node, simulating four independent VPSs and running different operating systems and applications. The utilities virsh and tcpdump were used at the hypervisor level to collect digital data from the four VPSs. The utility virsh was employed to take snapshots of the hard drives and to create images of the RAM content while the utility tcpdump was employed to capture in real-time the network traffic. The results generated by these utilities were evaluated in terms of efficiency, integrity, and completeness. The analysis of these results suggested both utilities were capable of collecting digital data from the VPSs in an efficient manner, respecting the integrity and completeness of the data acquired. Therefore, these tools can be used to acquire forensically-sound digital evidence from a VPS hosted in a cloud provider’s virtualization node that uses KVM as a hypervisor.

APA, Harvard, Vancouver, ISO, and other styles
13

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999, when MPLS first started in the laboratories, development has continued. Today it is possible to introduce MPLS or tunneled national virtual local area network into an existing network. This requires high speed, fault tolerant, and stable hardware and software. Going beyond the separation of traffic at layer 3 using Virtual Private Networks, i.e., IPSec, we can tunnel layer 2 traffic through a network. Although the first layer 3 VPN products are already in use, layer 2 VPNs still need to be evaluated and brought into regular use. There are currently two ways of tunneling VLANs in a core network: tunneled VLANs (or as Extreme Networks calls them, VMANs) and MPLS. This project showed that it is possible to start with a VLAN-only solution, and then upgrade to MPLS to solve scalability issues. The VMAN solution can not be used at Arrowhead, since there are too many disadvantages in the way Extreme Networks has implemented it. However, a mix of tunneling VMAN in a VLAN core is possible, and enables customer tagging of VLANs in a Layer 2 VPN. Furthermore, the testing of EAPS and per-VLAN Spanning Tree Protocol turned out well, and showed that EAPS should not be used when there is more than one loop.
APA, Harvard, Vancouver, ISO, and other styles
14

Gaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /." [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ng, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Full text
Abstract:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environment (IDE) Eclipse and Java programming language.   There are many similar software-hardware based products in the market, but these solutions usually demand high budgets. This thesis shows the development of a communication prototype of a new, and low cost, alternative product. This report also describes how the Java SOCKS methods are increased with further functionality in order to reach the designed communication infrastructure. The entire implementation is tested by using a network analyzer software called Wireshark and a log function which writes out messages in order for us to know which part of the code is running.
APA, Harvard, Vancouver, ISO, and other styles
17

Chowdavarapu, Pradeep Kumar, Pramod Kati, and Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.

Full text
Abstract:
This thesis identifies some key Considerations to be considered to create an efficient virtual private network and also investigates to understand some efficiency problems affecting the interchange of information in such networks. It then outlines some possible solutions to manage such problems.The ICT and the telecommunications have been advancing at a rapid rate. This has been seen in the exchange of information in virtual networks such as the social networks like Facebook, Skype, Google talk, Yahoo messenger, Twitter etc. The need for maximum security, privacy and cost effectiveness in different organizations, institutions and private sectors etc makes it useful and needful to have efficient virtual private networks.Understanding the problems affecting the information interchange in such networks and suggesting some probable solutions will both help the provider and the user.
Program: Magisterutbildning i informatik
APA, Harvard, Vancouver, ISO, and other styles
18

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter of pick and choose. This study is dedicated to developing a unique process-testing framework for personal devices by comparing the default security encryptions of different VPN architectures to the Federal Information Processing Standards (FIPS) set of complying encryptions. VPN architectures include a vendor-supplied VPN, Palo Alto Networks, open-sourced OpenVPN application, and a Windows PPTP server to test security protocols and measure network speed through different operating platforms. The results achieved in this research reveal the differences between the default security configurations and the encryption settings enforced by FIPS, shown through the collected averaged bandwidth between multiple network tests under those settings. The results have been given additional analysis and confidence through t-tests and standard deviation. The configurations, including difficulty in establishing, between different VPNs also contribute to discovering OpenVPN under FIPS settings to be favorable over a Palo Alto firewall using FIPS-CC mode due to higher bandwidth rate despite following the same encryption standards.
APA, Harvard, Vancouver, ISO, and other styles
19

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, such as elevated security, enhanced scalability, optimum utilization of network resources and further reduction in operational costs. Hence, the motivation of this thesis is to develop secure and scalable VPLS architectures for future communication networks. First, a scalable secure flat-VPLS architecture is proposed based on a Host Identity Protocol (HIP). It contains a session key-based security mechanism and an efficient broadcast mechanism that increase the forwarding and security plane scalability of VPLS networks. Second, a secure hierarchical-VPLS architecture is proposed to achieve control plane scalability. A novel encrypted label-based secure frame forwarding mechanism is designed to transport L2 frames over a hierarchical VPLS network. Third, a novel Distributed Spanning Tree Protocol (DSTP) is designed to maintain a loop free Ethernet network over a VPLS network. With DSTP it is proposed to run a modified STP (Spanning Tree Protocol) instance in each remote segment of the VPLS network. In addition, two Redundancy Identification Mechanisms (RIMs) termed Customer Associated RIMs (CARIM) and Provider Associated RIMs (PARIM) are used to mitigate the impact of invisible loops in the provider network. Lastly, a novel SDN (Software Defined Networking) based VPLS (Soft-VPLS) architecture is designed to overcome tunnel management limitations in legacy secure VPLS architectures. Moreover, three new mechanisms are proposed to improve the performance of legacy tunnel management functions: 1) A dynamic tunnel establishment mechanism, 2) a tunnel resumption mechanism and 3) a fast transmission mechanism. The proposed architecture utilizes a centralized controller to command VPLS tunnel establishment based on real-time network behavior. Hence, the results of the thesis will help for more secure, scalable and efficient system design and development of VPLS networks. It will also help to optimize the utilization of network resources and further reduction in operational costs of future VPLS networks
Tiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
APA, Harvard, Vancouver, ISO, and other styles
20

Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.

Full text
Abstract:
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to support the planning, design, and implementation of the MFC VPN. The SDLC consists of five phases. For Phase 1, the Research Phase, the author examined the business requirements for a VPN, conducted a survey of MFC employees, and performed participant observation. In Phase 2, the Analysis Phase, the author analyzed the data collected during Phase 1 to facilitate the development of a requirements list. Next, in Phase 3, the Logical Design Phase, the author designed and developed standardized diagrams of the MFC VPN implementation. In Phase 4, the Physical Design Phase, the author identified specific processes, procedures, and technologies. For Phase 5, the Implementation Phase, the author described the implementation processes for the MFC VPN initiative. Finally, the author analyzed and interpreted the data collected and then reported the results of the research. The findings from this investigation demonstrate that the SDLC methodology was a framework for planning, designing, and implementing a secure and reliable VPN solution to support teleworking. Utilizing the SDLC methodology resulted in thorough documentation, including a review of in-place network documentation, results from a survey, prioritized functional and nonfunctional requirements lists, logical design diagram, and specific hardware/software components and configurations. Using the findings from the case study and SDLC methodology, the MFC VPN implementation model is presented. The MFC implementation model may be used in small businesses, of a size similar to MFC, in which VPN initiatives are being considered.
APA, Harvard, Vancouver, ISO, and other styles
21

Tabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.

Full text
Abstract:

The networking field has become a core component for any company. All of the

businesses rely on the networking industry, due its vastness and significance. Every day

companies are planning and thinking to develop better strategies that can offer efficient

and reliable communication solutions between their employees and customers for

maximum revenue. The planning of a company’s network requires a lot of resources and

aspects to study, and to evaluate them carefully to build a comprehensive secure and

reliable platform. It is the job of a network administrator to take care of the company’s

network infrastructure and upgrade or update the required components and applications

from time-to-time that can follow new standards.

This thesis is a practical work aimed to evaluate a company network infrastructure in its

real environment. The purpose of this thesis is to evaluate different aspects of the

network infrastructure used such as VPN, WLAN, firewall and physical security and give

recommendations to make their performance better and to offer more advanced strategies.

This study will also provide an inclusive observation of the company’s needs and their

network infrastructure, and will provide a concept how to evaluate and fix small mistakes,

the kind of problems that can occur in an evolving company network. Lastly, this research

will make recommendations and suggest a possible implementation on the studied

network infrastructure.

APA, Harvard, Vancouver, ISO, and other styles
22

SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA, and Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services." 電子情報通信学会, 2012. https://search.ieice.org/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, Dec. 2000.
Thesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
24

Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.

Full text
Abstract:
As broadband connections to the home become more prevalent, through Digital Subscriber Lines (DSL) and cable modems, students and faculty will desire to access the NPS Internet via these new means instead of their 56K modems. The introduction of these new technologies will require NPS to re- evaluate how to allow remote access to their internal resources in a secure way, while still allowing for the use of broadband technologies. This thesis will examine the alternative methods for implementing VPNs, from simple use of Point to Point Protocols (PPP) to high end specialized internet appliances and gateways. Pros and cons of each will be discussed. A mock-up of the schools network will be created to test each of the discussed methods. Final recommendations will be made for a model that can be used by the NPS to implement a VPN. Also discussed will be how that model may be altered to fit other commands throughout the US Navy who desire similar secure remote access to their internal network resources.
APA, Harvard, Vancouver, ISO, and other styles
25

Wagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.

Full text
Abstract:
This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hierarchy Process (AHP) to determine which technology is better under a hypothetical set of circumstances. This paper will explain each technology, establish parameters for a hypothetical comparison, and discuss the capabilities and limitations of both technologies.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
26

Hořejš, Jan. "Anonymní pohyb v síti internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220609.

Full text
Abstract:
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
APA, Harvard, Vancouver, ISO, and other styles
27

Kilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
28

Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.

Full text
Abstract:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
APA, Harvard, Vancouver, ISO, and other styles
29

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:

In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.

However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security

within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.

By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.

An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.

APA, Harvard, Vancouver, ISO, and other styles
30

Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Våge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.

Full text
Abstract:
The activity based workplace model is becoming more and more com- mon and the Swedish Insurance Agency is an authority that has em- braced this model. The new way of working means that more employ- ees work from home or another place than the office. The new working model needs IT solutions that can handle communication and secure document management. This has caused two problems at the Swedish Insurance Agency. The first problem is concerning confusion about how employees should connect correctly to the authority’s conference room equipment. The solution proposal should be able to evaluate if the correct equipment has been connected and present connection status information. The second is for connection to the authority’s Private Network (VPN). The problem is that users often lose or not get proper connection to the network devices when they connect through VPN. A technical solution for each problem were developed. The application for connection against conference room equipment evaluates that the user has a USB dock (with more components connected to it) connected, that the user has network connection and that the USB dock driver has installed correctly. Usability test showed that the application works as intended, except some confusion about the navigation, which was corrected. The application for VPN connection visually shows the user through an icon in the taskbar if the user is properly connected to VPN or not. The application also got the option of calling a connection script if the user loses connection. Evaluation based on Requirements Specifi- cation showed that both applications could meet their requirements and the applications were packaged and distributed to employees at the Swedish Insurance Agency.
Aktivitetsbaserad arbetsmodell blir mer och mer vanligt och Försäkringskassan är en myndighet som anammat detta arbetssätt. Det nya sättet att jobba innebär att fler anställda jobbar hemifrån eller annan plats. Arbetssättet medför att det behövs IT-lösningar som kan hantera bland annat kommunikation och säker dokumenthantering. Det har gett upphov till två problem på Försäkringskassan. Det första problemet är förvirring kring hur anställda skall koppla upp sig korrekt mot Försäkringskassans konferensrumsutrustning. Lösningsförslaget skall kunna utvärdera ifall korrekt utrustning har kopplats in och presentera information gällande anslutningsstatus. Det andra gäller uppkoppling mot Försäkringskassans Virtuella Privata Nätverk (VPN). Problemet gäller att användare ofta tappar eller inte får korrekt anslutning till nätverksenheterna då de ansluter sig via VPN. Ett tekniskt lösningsförslag för respektive problem utvecklades. Applikationen gällande uppkoppling mot konferensrumsutrustning utvärderar att användaren har USB-docka (med fler komponenter ansluten till den) ansluten, att användaren har nätverksuppkoppling samt att drivrutin för USB-docka har hunnit installerats. Användbarhetstest visade på att applikationen fungerar som tänkt, förutom lite förvirring kring navigation, vilket korrigerades. Applikationen gällande VPN- uppkoppling visar visuellt för användaren genom en ikon i aktivitetsfältet om användaren är korrekt ansluten till VPN eller inte. Applikationen fick också inbyggt alternativet att ropa på ett uppkopplingsskript om användaren tappar anslutning. Utvärdering utifrån Kravspecifikation visade att båda applikationerna kunde uppnå sina krav och applikationerna har paketerats och distribuerats till anställda på Försäkringskassan.
APA, Harvard, Vancouver, ISO, and other styles
32

Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.

Full text
Abstract:
En la presente tesina se realiza una descripción de la tecnología de Conmutación Multi-Protocolo mediante etiquetas usando una red privada virtual para la comunicación de una entidad empresarial. Se realizó una descripción de la tecnología MPLS con VPN mostrando sus cualidades, ventajas y desventajas, se promueve la esta tecnología a la red de comunicación de datos de la empresa tenga un performance y confidencialidad en los datos transmitidos, diseñando un esquema así como la infraestructura que podría ser usada en esta implementación, con características modulares las cuales permitirá a la empresa ir creciendo a la medida de que su tráfico o demanda de transporte vaya aumentando al igual que la integración de las demás extensiones se amerita el caso; para el diseño nos ayudaremos del programa de simulación “GNS3” el mismo que se hará un bosquejo de la configuración y modelo para la transmisión de sucursal a matriz y viceversa. This thesis is a description of MPLS VPN using a communication from the business entity. Was a description of MPLS VPN showing his qualities, advantages and disadvantages, promotes the introduction of this technology to the data communication network of the company to have a performance traffic and confidentiality of the data transmitted, designing scheme as well as the infrastructure that could be used in this implementation, modular features which allow the company to grow to the extent that their traffic and transport demand will increase as the integration of other extensions are merited case, to help us design simulation program "GNS3" the same to be made a sketch of the model configuration and transmission branch to parent and vice versa.
APA, Harvard, Vancouver, ISO, and other styles
33

Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.

Full text
Abstract:
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.
APA, Harvard, Vancouver, ISO, and other styles
34

Janeček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.

Full text
Abstract:
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the module's functionality is realized through different sets of tests and a virtual environment that simulates the corporate environment. The result of the draft is a module that allows to verify access based on the device, and this module is moreover integrated into the Safetica security platform.
APA, Harvard, Vancouver, ISO, and other styles
35

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.

Full text
Abstract:
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed
APA, Harvard, Vancouver, ISO, and other styles
36

Pavelka, Martin. "Systém pro automatickou správu serverů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403213.

Full text
Abstract:
The goal of this diploma thesis is to design the user interface and implement the information system as a web application. Using the custom implemented library the system communicates with GraphQL server which manages the client data. The thesis describes possible solutions for physical servers automatization. The application provides the application interface to manage virtual servers. Automatization is possible without human interaction. Connection to the virtualization technologies is handled by web interface APIs or custom scripts running in the virtual system terminal. There is a monitoring system built over project components. The thesis also describes the continuous integration using Gitlab tools. Running the configuration task is solved using the Unix CRON system.
APA, Harvard, Vancouver, ISO, and other styles
37

Richter, Riedel, Grunewald, and Schier. "Mitteilungen des URZ 1/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

"Private virtual network." Tese, BDTD-UNITAU, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lee, Chi-Hung, and 李其鴻. "Multiple Virtual Private Network Architecture." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55973395397191257921.

Full text
Abstract:
碩士
中國文化大學
資訊管理學系
100
Along with the broadband popularization, the network security and the related ap-plication is getting progressively importantly. How to establish a secret channel for re-mote user to transfer the secret information has become an important task. Globalization in industry epoch has already arrived. VPN has become a crucial op-tion for enterprise and coordination purpose. Information, data transmission, remote controlling, management are increasing in enterprises. Communication between office are inevitable among all. If those things can be dealt by network, it not only facilitates the work but also lowers the operation cost. Generally speaking, single layer VPN allows to connect to LAN within the intranet. However, DMZ's storage is unable to connect to LAN. It needs to access to other's in-tranet first before DMZ and this structure might be cause a security threat to two sides' intranet. Therefore, single layer VPN is no longer satisfied with multi-nations coporate's need. Multiple layer VPN is required. When you need to transfer data or information in “Lan to Lan”,”Lan to DMZ”,”DMZ to DMZ”, the multiple VPN is a more flexible structure.
APA, Harvard, Vancouver, ISO, and other styles
40

Nawej, Mukatshung Claude. "Evaluation of virtual private network impact on network performance." Diss., 2016. http://hdl.handle.net/10500/22177.

Full text
Abstract:
The aim of the study is to investigate what impact the use of VPN has on network performance. An empirical investigation using quantitative research methods was carried out. Two sample scenarios were involved in the study: scenario without VPN and scenario with VPN. In both scenarios, three applications were used in turns, an HTTP, an FTP, and a CBR. FTP was configured to use window size and packet size, while CBR used connection rate and packet size. On the other side, the number of connection was the only parameter used for HTTP. These applications were injected in a 100 Mbps fixed link of an NS2 simulation environment. Throughput and delay averages were measured respectively for the two scenarios and values compared using Student’s t-test. While the TCP and HTTP throughputs were found decreasing, the UDP throughput was not affected by the presence of this VPN. Concerning the delay; the TCP, UDP and HTTP delay were found increasing.
Electrical Engineering
M. Tech. (Electrical Engineering (Computer Systems))
APA, Harvard, Vancouver, ISO, and other styles
41

Ferreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Dissertação, 2003. http://hdl.handle.net/10216/12537.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Redes e Serviços de Comunicação, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do professor Doutor José António Ruela Simões Fernandes
APA, Harvard, Vancouver, ISO, and other styles
42

Ferreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Master's thesis, 2003. http://hdl.handle.net/10216/12537.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Redes e Serviços de Comunicação, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do professor Doutor José António Ruela Simões Fernandes
APA, Harvard, Vancouver, ISO, and other styles
43

楊琮仁. "Virtual Private-Network Status Monitoring System for Enterprises." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/71502863525831458214.

Full text
Abstract:
碩士
國立彰化師範大學
電機工程學系
101
With the advancement of science and technology and vigorous development of internet, the operation mode of enterprises is also changed from the traditional business model to the e-commerce era. Under the premise of cost-down and competition enhancement, more and more enterprises use the virtual private network (VPN) technology to replace the existing international long-distance lines. In addition to advantages of low cost and good redundancy, VPN also has same safety as that of dedicated lines to give enterprises tremendous convenience. However, to achieve rapid information exchange, the required internet equipment becomes more and more. Once the internet is disconnected, it will cause great losses to the enterprises. Therefore, how to manage VPN well is a serious issue to the information management staff with attention. The purpose of this thesis is to reduce implementation costs by proposing a set of system architecture based on Simple Network Management Protocol(SNMP), which allows enterprises to monitor and manage their VPNs and to build a prototype system for keeping monitoring network equipment. Once abnormal equipment leads to disconnection, the information management staff will be informed through sending a web audible alarm and e-mail to their smart phones so that the network status can always be in hand at any time. The system architecture is easy to operate and it can help other enterprises of similar types to monitor and manage their VPNs effectively so as to make good use of network resources and reduce the possible operating downtime to effectively and promptly solve business network problems.
APA, Harvard, Vancouver, ISO, and other styles
44

Ram, Kaushik Kumar. "New Architectures and Mechanisms for the Network Subsystem in Virtualized Servers." Thesis, 2012. http://hdl.handle.net/1911/71683.

Full text
Abstract:
Machine virtualization has become a cornerstone of modern datacenters. It enables server consolidation as a means to reduce costs and increase efficiencies. The communication endpoints within the datacenter are now virtual machines (VMs), not physical servers. Consequently, the datacenter network now extends into the server and last hop switching occurs inside the server. Today, thanks to increasing core counts on processors, server VM densities are on the rise. This trend is placing enormous pressure on the network I/O subsystem and the last hop virtual switch to support efficient communication, both internal and external to the server. But the current state-of-the-art solutions fall short of these requirements. This thesis presents new architectures and mechanisms for the network subsystem in virtualized servers to build efficient virtualization platforms. Specifically, there are three primary contributions in this thesis. First, it presents a new mechanism to reduce memory sharing overheads in driver domain-based I/O architectures. The key idea is to enable a guest operating system to reuse its I/O buffers that are shared with a driver domain. Second, it describes Hyper-Switch, a highly streamlined, efficient, and scalable software-based virtual switching architecture, specifically for hypervisors that support driver domains. The Hyper-Switch combines the best of the existing architectures by hosting the device drivers in a driver domain to isolate any faults and placing the virtual switch in the hypervisor to perform efficient packet switching. Further, the Hyper-Switch implements several optimizations, such as virtual machine state-aware batching, preemptive copying, and dynamic offloading of packet processing to idle CPU cores, to enable efficient packet processing, better utilization of the available CPU resources, and higher concurrency. This architecture eliminates the memory sharing overheads associated with driver domains. Third, this thesis proposes an alternate virtual switching architecture, called sNICh, which explores the idea of server/switch integration. The sNICh is a combined network interface card (NIC) and datacenter switching accelerator. This takes the Hyper-Switch architecture one step further. It offloads the data plane of the switch to the network device, eliminating driver domains entirely.
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Hu-Mu, and 陳護木. "Research of Media VPN (Virtual Private Network)IPTV system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/87280713497575113610.

Full text
Abstract:
碩士
國立臺灣科技大學
企業管理系
98
There are more than 5,000 network TV stations in the Internet and many of them have very good content. Compared with traditional cable TV, most users can only watch network TV content via web browsers, which brings them great inconvenience. This paper proposes a concept of MVPN (Media Virtual Private Network) as a delivery method of IPTV. The structure of MVPN can offer five Like! TV's user interface according to consumer’s user behaviors, to satisfy different age level users’ demands. We invited around 300 of overseas Chinese and Taiwan businessmen locate in 44 countries to join the test of proving the Media VPN IPTV structure can provide well-acceptable global service with one system at one place. This system utilizes emulated transmission technology to adaptively adjust the most appropriate video quality based on current usable bandwidth. This study tries to find an approach which is different from the mainstream P2P and Client / Server implements, to achieve cost-effective global wide area network television services.
APA, Harvard, Vancouver, ISO, and other styles
46

Lin, Yuh-Min, and 林育民. "A Prototype System of Host-based Virtual Private Network." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23602374850844881280.

Full text
Abstract:
碩士
國立交通大學
資訊工程系
87
Because of many network communications, network security becomes more and more important. The concept of VPN has been considered valued. People agree the security and convenience of it. So we design “A Prototype System of Host-based Virtual Private Network” to indemnify the secure communications of data. At this time, some use the cryptosystems to encrypt data at socket layer to confirm the secure communications of data. So we choose SSL to develop our system. If client and server both use the SSL communication protocol, one private and secure channel will be build. Communications between two points will be secure. In this paper, we will design a SSL-FTP application to demo our system. We will see the secure communications of data between client and server , that both of them use the SSL communication protocol.
APA, Harvard, Vancouver, ISO, and other styles
47

Lin, Ping-Chern, and 林炳辰. "The Design and Implementation of Virtual Private Network Service on Intelligent Network." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/87231690010466976570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tsai, Ming-Yuan, and 蔡銘源. "Spam Filtering Improvement of an e-mail Server by the Cooperation of Multi-Filter Firewall and Virtual Private Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/35594340263845146048.

Full text
Abstract:
碩士
輔仁大學
電子工程學系
96
In this paper we propose a new multi-filter firewall method instead of only a single e-mail server to enhance the efficiency of the processing of spam. The idea of a multi-filter firewall is to combine firewall, mail frontier and mail server, and with their different functions such as virus scan, anti-spam find, link brush-off in IP blacklist of unwelcome senders to ensure the safety of the mail server and efficient lift-up. In addition, to estimate system performance, we use a serial equivalent model representing a multi-filter firewall. Due to the use of the multi-filter firewall when processing e-mail our method stops spam by a cooperation method and reduces the workload of the actual mail server. For the receiving and sending nodes we use a Firewall Virtual Private Network (VPN) to share the loading for mail processing. Because the VPN is not only a virtual private Internet established between two nodes but also the use of Multi-Protocol Label Switching (MPLS), it is like an interior Internet passing data quickly between two nodes. MPLS supports Multi-Protocol Networks Transfer Protocol and core networks transfer with efficient label switching. MPLS VPN is also compatible with many communication protocols and supports free safety services.
APA, Harvard, Vancouver, ISO, and other styles
49

Huang, Chien-Chung, and 黃建中. "Security of communication of the Virtual Private Network technology in the wireless network." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/29293514286543414831.

Full text
Abstract:
碩士
義守大學
資訊管理學系碩士班
94
The application of the wireless regional network develops fast in recent years. However, it face information threat and risk of intercepting. WEP safe protocol is offered to strengthen the standard of security in wireless regional network, but the password of WEP safe protocol is easy to be analyzed and explained. Wi-Fi announces Wi-Fi Protected Access (WPA) wireless communication safety standard to improve the wireless network security. VPN is the network connected by establishing secure private tunnel in Internet, which adopts encryption and authentication technology. The connection made of VPN could protect the security of transmitted data to the fullest extent. With the rapid development of VPN, many companies use VPN to implement their private communication and increase the competitiveness. This research is to explore the creation of a secure “tunnel” to transmit data on WLAN through VPN and the usage of the characteristics of VPN for strengthening the safety of wireless network.
APA, Harvard, Vancouver, ISO, and other styles
50

"Schemes for building an efficient all-optical virtual private network." 2006. http://library.cuhk.edu.hk/record=b5892830.

Full text
Abstract:
by Tam Scott Kin Lun.
Thesis submitted in: October 2005.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 58-64).
Abstracts in English and Chinese.
Chapter 1. --- Introduction --- p.1
Chapter 1.1. --- Optical Networks --- p.1
Chapter 1.1.1. --- IP over Optical Networks --- p.1
Chapter 1.1.2. --- Challenges in Optical Networks --- p.4
Chapter 1.2. --- Virtual Private Networks (VPN) --- p.5
Chapter 1.2.1. --- CE Based VPN --- p.6
Chapter 1.2.2. --- Network Based VPN --- p.7
Chapter 1.2.2.1. --- MPLS Layer 2 VPN --- p.8
Chapter 1.2.2.2. --- MPLS Layer 3 VPN --- p.9
Chapter 1.2.3. --- Optical VPN --- p.9
Chapter 1.2.4. --- Challenges in VPN Technologies --- p.11
Chapter 1.3. --- Objective of this Thesis --- p.11
Chapter 1.4. --- Outline of this Thesis --- p.12
Chapter 2. --- Architecture of an All-Optical VPN --- p.13
Chapter 2.1. --- Introduction --- p.13
Chapter 2.2. --- Networking Vendor Activities --- p.13
Chapter 2.3. --- Service Provider Activities --- p.15
Chapter 2.4. --- Standard Bodies Activities --- p.16
Chapter 2.5. --- Requirements for All-Optical VPN --- p.17
Chapter 2.6. --- Reconfigurability of an All-Optical VPN --- p.19
Chapter 2.7. --- Switching Methods in All-Optical VPN --- p.20
Chapter 2.8. --- Survivability of an All-Optical VPN --- p.23
Chapter 3. --- Maximizing the Utilization Of A Survivable Multi-Ring WDM Network --- p.25
Chapter 3.1. --- Introduction --- p.25
Chapter 3.2. --- Background --- p.25
Chapter 3.3. --- Method --- p.26
Chapter 3.3.1. --- Effect on packet based services --- p.28
Chapter 3.3.2. --- Effect on optical circuit based services --- p.28
Chapter 3.4. --- Simulation results --- p.29
Chapter 3.5. --- Chapter Summary --- p.36
Chapter 4. --- Design of an All-Optical VPN Processing Engine --- p.37
Chapter 4.1. --- Introduction --- p.37
Chapter 4.2. --- Concepts of Optical Processors --- p.38
Chapter 4.3. --- Design Principles of the All-Optical VPN Processing Engine --- p.40
Chapter 4.3.1. --- Systolic System --- p.41
Chapter 4.3.2. --- Design Considerations of an Optical Processing Cell --- p.42
Chapter 4.3.2.1. --- Mach-Zehnder Structures --- p.43
Chapter 4.3.2.2. --- Vertical Cavity Semiconductor Optical Amplifier --- p.43
Chapter 4.3.2.3. --- The Optical Processing Cell --- p.44
Chapter 4.3.3. --- All-Optical VPN Processing Engine --- p.47
Chapter 4.4. --- Design Evaluation --- p.49
Chapter 4.5. --- Application Example --- p.50
Chapter 4.6. --- Chapter Summary --- p.54
Chapter 5. --- Conclusion --- p.55
Chapter 5.1. --- Summary of the Thesis --- p.55
Chapter 5.2. --- Future Works --- p.56
Chapter 6. --- References --- p.58
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography