Dissertations / Theses on the topic 'Virtual private network servers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Virtual private network servers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Full textCelestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Full textCom as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Full textCompanies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Full textIkiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Full textheyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Full textLiang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Full textRüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Full textLin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textHabibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Full textBazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.
Full textMontironi, Adolfo Angel. "Digital Forensic Acquisition of Virtual Private Servers Hosted in Cloud Providers that Use KVM as a Hypervisor." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10845501.
Full textKernel-based Virtual Machine (KVM) is one of the most popular hypervisors used by cloud providers to offer virtual private servers (VPSs) to their customers. A VPS is just a virtual machine (VM) hired and controlled by a customer but hosted in the cloud provider infrastructure. In spite of the fact that the usage of VPS is popular and will continue to grow in the future, it is rare to find technical publications in the digital forensic field related to the acquisition process of a VPS involved in a crime. For this research, four VMs were created in a KVM virtualization node, simulating four independent VPSs and running different operating systems and applications. The utilities virsh and tcpdump were used at the hypervisor level to collect digital data from the four VPSs. The utility virsh was employed to take snapshots of the hard drives and to create images of the RAM content while the utility tcpdump was employed to capture in real-time the network traffic. The results generated by these utilities were evaluated in terms of efficiency, integrity, and completeness. The analysis of these results suggested both utilities were capable of collecting digital data from the VPSs in an efficient manner, respecting the integrity and completeness of the data acquired. Therefore, these tools can be used to acquire forensically-sound digital evidence from a VPS hosted in a cloud provider’s virtualization node that uses KVM as a hypervisor.
Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.
Full textGaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /." [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.
Full textNg, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.
Full textSoler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.
Full textChowdavarapu, Pradeep Kumar, Pramod Kati, and Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.
Full textProgram: Magisterutbildning i informatik
Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.
Full textLiyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.
Full textTiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.
Full textTabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.
Full textThe networking field has become a core component for any company. All of the
businesses rely on the networking industry, due its vastness and significance. Every day
companies are planning and thinking to develop better strategies that can offer efficient
and reliable communication solutions between their employees and customers for
maximum revenue. The planning of a company’s network requires a lot of resources and
aspects to study, and to evaluate them carefully to build a comprehensive secure and
reliable platform. It is the job of a network administrator to take care of the company’s
network infrastructure and upgrade or update the required components and applications
from time-to-time that can follow new standards.
This thesis is a practical work aimed to evaluate a company network infrastructure in its
real environment. The purpose of this thesis is to evaluate different aspects of the
network infrastructure used such as VPN, WLAN, firewall and physical security and give
recommendations to make their performance better and to offer more advanced strategies.
This study will also provide an inclusive observation of the company’s needs and their
network infrastructure, and will provide a concept how to evaluate and fix small mistakes,
the kind of problems that can occur in an evolving company network. Lastly, this research
will make recommendations and suggest a possible implementation on the studied
network infrastructure.
SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA, and Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services." 電子情報通信学会, 2012. https://search.ieice.org/.
Full textCote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.
Full textThesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.
Full textWagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.
Full textMaster of Arts
Hořejš, Jan. "Anonymní pohyb v síti internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220609.
Full textKilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.
Full textThesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.
Full textKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.
Full textVåge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.
Full textAktivitetsbaserad arbetsmodell blir mer och mer vanligt och Försäkringskassan är en myndighet som anammat detta arbetssätt. Det nya sättet att jobba innebär att fler anställda jobbar hemifrån eller annan plats. Arbetssättet medför att det behövs IT-lösningar som kan hantera bland annat kommunikation och säker dokumenthantering. Det har gett upphov till två problem på Försäkringskassan. Det första problemet är förvirring kring hur anställda skall koppla upp sig korrekt mot Försäkringskassans konferensrumsutrustning. Lösningsförslaget skall kunna utvärdera ifall korrekt utrustning har kopplats in och presentera information gällande anslutningsstatus. Det andra gäller uppkoppling mot Försäkringskassans Virtuella Privata Nätverk (VPN). Problemet gäller att användare ofta tappar eller inte får korrekt anslutning till nätverksenheterna då de ansluter sig via VPN. Ett tekniskt lösningsförslag för respektive problem utvecklades. Applikationen gällande uppkoppling mot konferensrumsutrustning utvärderar att användaren har USB-docka (med fler komponenter ansluten till den) ansluten, att användaren har nätverksuppkoppling samt att drivrutin för USB-docka har hunnit installerats. Användbarhetstest visade på att applikationen fungerar som tänkt, förutom lite förvirring kring navigation, vilket korrigerades. Applikationen gällande VPN- uppkoppling visar visuellt för användaren genom en ikon i aktivitetsfältet om användaren är korrekt ansluten till VPN eller inte. Applikationen fick också inbyggt alternativet att ropa på ett uppkopplingsskript om användaren tappar anslutning. Utvärdering utifrån Kravspecifikation visade att båda applikationerna kunde uppnå sina krav och applikationerna har paketerats och distribuerats till anställda på Försäkringskassan.
Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.
Full textElis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.
Full textJaneček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.
Full textPalomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.
Full textPavelka, Martin. "Systém pro automatickou správu serverů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403213.
Full textRichter, Riedel, Grunewald, and Schier. "Mitteilungen des URZ 1/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400186.
Full text"Private virtual network." Tese, BDTD-UNITAU, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=40.
Full textLee, Chi-Hung, and 李其鴻. "Multiple Virtual Private Network Architecture." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55973395397191257921.
Full text中國文化大學
資訊管理學系
100
Along with the broadband popularization, the network security and the related ap-plication is getting progressively importantly. How to establish a secret channel for re-mote user to transfer the secret information has become an important task. Globalization in industry epoch has already arrived. VPN has become a crucial op-tion for enterprise and coordination purpose. Information, data transmission, remote controlling, management are increasing in enterprises. Communication between office are inevitable among all. If those things can be dealt by network, it not only facilitates the work but also lowers the operation cost. Generally speaking, single layer VPN allows to connect to LAN within the intranet. However, DMZ's storage is unable to connect to LAN. It needs to access to other's in-tranet first before DMZ and this structure might be cause a security threat to two sides' intranet. Therefore, single layer VPN is no longer satisfied with multi-nations coporate's need. Multiple layer VPN is required. When you need to transfer data or information in “Lan to Lan”,”Lan to DMZ”,”DMZ to DMZ”, the multiple VPN is a more flexible structure.
Nawej, Mukatshung Claude. "Evaluation of virtual private network impact on network performance." Diss., 2016. http://hdl.handle.net/10500/22177.
Full textElectrical Engineering
M. Tech. (Electrical Engineering (Computer Systems))
Ferreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Dissertação, 2003. http://hdl.handle.net/10216/12537.
Full textFerreira, António Pedro Valinhas Santos. "Tecnologias de suporte a VPNs (Virtual Private Network) e VPDNs (Virtual Private Dial Networks)." Master's thesis, 2003. http://hdl.handle.net/10216/12537.
Full text楊琮仁. "Virtual Private-Network Status Monitoring System for Enterprises." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/71502863525831458214.
Full text國立彰化師範大學
電機工程學系
101
With the advancement of science and technology and vigorous development of internet, the operation mode of enterprises is also changed from the traditional business model to the e-commerce era. Under the premise of cost-down and competition enhancement, more and more enterprises use the virtual private network (VPN) technology to replace the existing international long-distance lines. In addition to advantages of low cost and good redundancy, VPN also has same safety as that of dedicated lines to give enterprises tremendous convenience. However, to achieve rapid information exchange, the required internet equipment becomes more and more. Once the internet is disconnected, it will cause great losses to the enterprises. Therefore, how to manage VPN well is a serious issue to the information management staff with attention. The purpose of this thesis is to reduce implementation costs by proposing a set of system architecture based on Simple Network Management Protocol(SNMP), which allows enterprises to monitor and manage their VPNs and to build a prototype system for keeping monitoring network equipment. Once abnormal equipment leads to disconnection, the information management staff will be informed through sending a web audible alarm and e-mail to their smart phones so that the network status can always be in hand at any time. The system architecture is easy to operate and it can help other enterprises of similar types to monitor and manage their VPNs effectively so as to make good use of network resources and reduce the possible operating downtime to effectively and promptly solve business network problems.
Ram, Kaushik Kumar. "New Architectures and Mechanisms for the Network Subsystem in Virtualized Servers." Thesis, 2012. http://hdl.handle.net/1911/71683.
Full textChen, Hu-Mu, and 陳護木. "Research of Media VPN (Virtual Private Network)IPTV system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/87280713497575113610.
Full text國立臺灣科技大學
企業管理系
98
There are more than 5,000 network TV stations in the Internet and many of them have very good content. Compared with traditional cable TV, most users can only watch network TV content via web browsers, which brings them great inconvenience. This paper proposes a concept of MVPN (Media Virtual Private Network) as a delivery method of IPTV. The structure of MVPN can offer five Like! TV's user interface according to consumer’s user behaviors, to satisfy different age level users’ demands. We invited around 300 of overseas Chinese and Taiwan businessmen locate in 44 countries to join the test of proving the Media VPN IPTV structure can provide well-acceptable global service with one system at one place. This system utilizes emulated transmission technology to adaptively adjust the most appropriate video quality based on current usable bandwidth. This study tries to find an approach which is different from the mainstream P2P and Client / Server implements, to achieve cost-effective global wide area network television services.
Lin, Yuh-Min, and 林育民. "A Prototype System of Host-based Virtual Private Network." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/23602374850844881280.
Full text國立交通大學
資訊工程系
87
Because of many network communications, network security becomes more and more important. The concept of VPN has been considered valued. People agree the security and convenience of it. So we design “A Prototype System of Host-based Virtual Private Network” to indemnify the secure communications of data. At this time, some use the cryptosystems to encrypt data at socket layer to confirm the secure communications of data. So we choose SSL to develop our system. If client and server both use the SSL communication protocol, one private and secure channel will be build. Communications between two points will be secure. In this paper, we will design a SSL-FTP application to demo our system. We will see the secure communications of data between client and server , that both of them use the SSL communication protocol.
Lin, Ping-Chern, and 林炳辰. "The Design and Implementation of Virtual Private Network Service on Intelligent Network." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/87231690010466976570.
Full textTsai, Ming-Yuan, and 蔡銘源. "Spam Filtering Improvement of an e-mail Server by the Cooperation of Multi-Filter Firewall and Virtual Private Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/35594340263845146048.
Full text輔仁大學
電子工程學系
96
In this paper we propose a new multi-filter firewall method instead of only a single e-mail server to enhance the efficiency of the processing of spam. The idea of a multi-filter firewall is to combine firewall, mail frontier and mail server, and with their different functions such as virus scan, anti-spam find, link brush-off in IP blacklist of unwelcome senders to ensure the safety of the mail server and efficient lift-up. In addition, to estimate system performance, we use a serial equivalent model representing a multi-filter firewall. Due to the use of the multi-filter firewall when processing e-mail our method stops spam by a cooperation method and reduces the workload of the actual mail server. For the receiving and sending nodes we use a Firewall Virtual Private Network (VPN) to share the loading for mail processing. Because the VPN is not only a virtual private Internet established between two nodes but also the use of Multi-Protocol Label Switching (MPLS), it is like an interior Internet passing data quickly between two nodes. MPLS supports Multi-Protocol Networks Transfer Protocol and core networks transfer with efficient label switching. MPLS VPN is also compatible with many communication protocols and supports free safety services.
Huang, Chien-Chung, and 黃建中. "Security of communication of the Virtual Private Network technology in the wireless network." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/29293514286543414831.
Full text義守大學
資訊管理學系碩士班
94
The application of the wireless regional network develops fast in recent years. However, it face information threat and risk of intercepting. WEP safe protocol is offered to strengthen the standard of security in wireless regional network, but the password of WEP safe protocol is easy to be analyzed and explained. Wi-Fi announces Wi-Fi Protected Access (WPA) wireless communication safety standard to improve the wireless network security. VPN is the network connected by establishing secure private tunnel in Internet, which adopts encryption and authentication technology. The connection made of VPN could protect the security of transmitted data to the fullest extent. With the rapid development of VPN, many companies use VPN to implement their private communication and increase the competitiveness. This research is to explore the creation of a secure “tunnel” to transmit data on WLAN through VPN and the usage of the characteristics of VPN for strengthening the safety of wireless network.
"Schemes for building an efficient all-optical virtual private network." 2006. http://library.cuhk.edu.hk/record=b5892830.
Full textThesis submitted in: October 2005.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 58-64).
Abstracts in English and Chinese.
Chapter 1. --- Introduction --- p.1
Chapter 1.1. --- Optical Networks --- p.1
Chapter 1.1.1. --- IP over Optical Networks --- p.1
Chapter 1.1.2. --- Challenges in Optical Networks --- p.4
Chapter 1.2. --- Virtual Private Networks (VPN) --- p.5
Chapter 1.2.1. --- CE Based VPN --- p.6
Chapter 1.2.2. --- Network Based VPN --- p.7
Chapter 1.2.2.1. --- MPLS Layer 2 VPN --- p.8
Chapter 1.2.2.2. --- MPLS Layer 3 VPN --- p.9
Chapter 1.2.3. --- Optical VPN --- p.9
Chapter 1.2.4. --- Challenges in VPN Technologies --- p.11
Chapter 1.3. --- Objective of this Thesis --- p.11
Chapter 1.4. --- Outline of this Thesis --- p.12
Chapter 2. --- Architecture of an All-Optical VPN --- p.13
Chapter 2.1. --- Introduction --- p.13
Chapter 2.2. --- Networking Vendor Activities --- p.13
Chapter 2.3. --- Service Provider Activities --- p.15
Chapter 2.4. --- Standard Bodies Activities --- p.16
Chapter 2.5. --- Requirements for All-Optical VPN --- p.17
Chapter 2.6. --- Reconfigurability of an All-Optical VPN --- p.19
Chapter 2.7. --- Switching Methods in All-Optical VPN --- p.20
Chapter 2.8. --- Survivability of an All-Optical VPN --- p.23
Chapter 3. --- Maximizing the Utilization Of A Survivable Multi-Ring WDM Network --- p.25
Chapter 3.1. --- Introduction --- p.25
Chapter 3.2. --- Background --- p.25
Chapter 3.3. --- Method --- p.26
Chapter 3.3.1. --- Effect on packet based services --- p.28
Chapter 3.3.2. --- Effect on optical circuit based services --- p.28
Chapter 3.4. --- Simulation results --- p.29
Chapter 3.5. --- Chapter Summary --- p.36
Chapter 4. --- Design of an All-Optical VPN Processing Engine --- p.37
Chapter 4.1. --- Introduction --- p.37
Chapter 4.2. --- Concepts of Optical Processors --- p.38
Chapter 4.3. --- Design Principles of the All-Optical VPN Processing Engine --- p.40
Chapter 4.3.1. --- Systolic System --- p.41
Chapter 4.3.2. --- Design Considerations of an Optical Processing Cell --- p.42
Chapter 4.3.2.1. --- Mach-Zehnder Structures --- p.43
Chapter 4.3.2.2. --- Vertical Cavity Semiconductor Optical Amplifier --- p.43
Chapter 4.3.2.3. --- The Optical Processing Cell --- p.44
Chapter 4.3.3. --- All-Optical VPN Processing Engine --- p.47
Chapter 4.4. --- Design Evaluation --- p.49
Chapter 4.5. --- Application Example --- p.50
Chapter 4.6. --- Chapter Summary --- p.54
Chapter 5. --- Conclusion --- p.55
Chapter 5.1. --- Summary of the Thesis --- p.55
Chapter 5.2. --- Future Works --- p.56
Chapter 6. --- References --- p.58