To see the other types of publications on this topic, follow the link: Virtual Private Network.

Journal articles on the topic 'Virtual Private Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Virtual Private Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for organizing a VPN. Also, the work analyzes the specifics of the work of corporate information systems and networks intended for their maintenance, showed that for building a corporate network it is advisable to use virtual private network (VPN) technology, which makes it possible to ensure the fulfillment of the basic requirements for the security and quality of customer service and applications and the current state and direction of development of VPN technology when creating new generation corporate networks, while highlighting the main tasks that need to be addressed when creating a network. Some features of setting up an IPSec VPN server for corporate networks are considered.
APA, Harvard, Vancouver, ISO, and other styles
6

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (December 11, 2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (May 25, 2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (April 1, 2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden and external connections prohibited. The influence of a virtual private network (VPN) on a standard network's performance is studied by producing and assessing CBR, HTTP, and FTP payloads. The evaluation used throughput and time delay as performance measures after analysis of the finding, deep learning (DL) can predict attacks. Because that learns attack patterns during training to effectively forecast attacks. To detect attacks, deep learning-based attack prevention model was created This method uses Nave Bayes and FFNN to enhace network performance. The results show that VPNs affect packet latency and performance differently depending on the data type. The FFNN algorithm detects intrusions with 98% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
12

Faizal, Faizal, and Andi Irmayana. "Sistem Persuratan Digital Berbasis Virtual Private Network." DoubleClick: Journal of Computer and Information Technology 5, no. 1 (August 31, 2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.

Full text
Abstract:
<span>Persoalan mengenai persuratan yang dialami oleh instansi pemerintah, organisasi dan perusahaan swasta yang terkendala dalam proses database surat masuk dan surat keluar yang dilakukan secara manual. Ada berbagai kendala seperti pendistribusian surat yang tidak efekif, surat tercecer, dan pengarsipan yang tidak rapi sehingga manajemen arsip persuratan tidak terkontrol. Penelitian ini bertujuan merancang sebuah digital proses untuk memperbaharui sistem persuratan pada Karang Taruna Provinsi Sulawesi Selatan agar dokumen verifikasi, persuratan organisasi dan pertukaran Informasi antar Instansi terkait menjadi lebih efektif dan aman dengan pemanfaatan Teknologi Virtual Private Network (VPN). Penelitian ini menggunakan metode eksperimen dalam hal pembuatan program menggunakan bahasa pemrograman web dan database MySQL. Penelitian ini berjenis penelitian kualitatif, dimana sistem yang dihasilkan akan diuji spesifikasinya, baik itu spesifikasi keamanan maupun spesifikasi fungsional menggunakan metode pengujian black box. Teknologi virtual private network berhasil deterapkan pada manajemen persuratan dan telah diuji dimana sistem seluruhnya telah sesuai dengan skenario pengujian untuk semua fungsi pada sistem. Melalui sistem yang dibuat pada penelitian ini, menciptakan fasilitas pertukaran surat yang menarik, dapat dijangkau dimanapun dan kapanpun serta menjaga kerahasiaan dan keamanan dokumen bagi instansi pemerintahan.</span>
APA, Harvard, Vancouver, ISO, and other styles
13

Chou, David C., David C. Yen, and Amy Y. Chou. "Adopting virtual private network for electronic commerce." Industrial Management & Data Systems 105, no. 2 (February 2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Keng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, and Hui Zhang. "Customizable virtual private network service with QoS." Computer Networks 36, no. 2-3 (July 2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." SIAM Journal on Computing 37, no. 3 (January 2007): 706–21. http://dx.doi.org/10.1137/060654827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Altın, A., E. Amaldi, P. Belotti, and M. Ç. Pınar. "Virtual Private Network Design Under Traffic Uncertainty." Electronic Notes in Discrete Mathematics 17 (October 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kang, Sunyoung, Hyuncheol Kim, and Seungae Kang. "Virtual private network for wellness sports information." Multimedia Tools and Applications 74, no. 16 (June 24, 2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yu, Wei, and Jian Wang. "Scalable network resource management for large scale Virtual Private Networks." Simulation Modelling Practice and Theory 12, no. 3-4 (July 2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Khan, Yusera Farooq. "Cisco Secured Virtual Private Networks: A Review." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.

Full text
Abstract:
Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.
APA, Harvard, Vancouver, ISO, and other styles
20

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan VPN (Virtual Private Network) berbasis web, yang menjadi salah satu solusi dalam menyelesaikan masalah yang ada. VPN (Virtual Private Network) merupakan suatu cara memanfaatkan jaringan public sebagai jaringan private secara aman melalui internet yang menggunakan perpaduan teknologi tunneling dan enkapsulasi. SNMP merupakan sebuah protokol yang didesain untuk memberikan kemampuan pengumpulan data manajemen perangkat jaringan dan pengkonfigurasian perangkat jaringan secara jarak jauh (remotely). Sistem operasi yang digunakan pada server administator adalah Linux Ubuntu 12.04. Linux Ubuntu merupakan distro linux yang stabil dan cukup handal. Dengan adanya aplikasi network traffic monitoring pada jaringan VPN dapat membantu pihak administrator untuk memantau lalu lintas data sehingga penggunaan internet lebih optimal.
APA, Harvard, Vancouver, ISO, and other styles
21

Marzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (June 28, 2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.

Full text
Abstract:
Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overcame the problem, namely speeding up configuration and reducing human error or errors in configuring virtual networks. The automation system can speed up the virtual network management process compared to the manual method based on 5 (five) experiments, namely when the manufacturing operation has an average time of 08 minutes and 42 seconds faster. Whereas when the addition operation has an average faster time of 08 minutes 17 seconds. On the other hand, when the deletion operation has an average time of 42 seconds faster.
APA, Harvard, Vancouver, ISO, and other styles
22

Ekawati, Inna, and Dadan Irwan. "Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik." JREC (Journal of Electrical and Electronics) 9, no. 1 (November 25, 2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.

Full text
Abstract:
Pemanfaatan teknologi komunikasi dan informasi perlu diterapkan pada instansi yang saat ini masih menggunakan sistem manual dan mengharuskan administrator untuk mengakses router dan memantau traffic internet secara langsung pada server. Virtual private network bersifat private dimana pada dasarnya jaringan ini tidak ada secara fisik, namun hanya berupa jaringan virtual, sehingga tidak semua orang dapat mengaksesnya. Selain jaringan internet, virtual private network juga diperlukan oleh perusahaan sebagai jaringan pribadi dengan jalur khusus yang bersifat lebih aman untuk mengakses jaringan lokal perusahaan dan memantau traffic internet pada router perusahaan dari jarak jauh. Perancangan virtual private network ini dilakukan dengan metode point-to-point tunneling protocol. Setelah dilakukan perancangan dan implementasi dapat disimpulkan bahwa virtual private network memiliki sistem kerja mengenkripsi semua data yang berada di jaringan instansi atau perusahaan, sehingga jalur komunikasi dengan jaringan publik menjadi lebih aman dan pihak lain diluar administrator tidak dapat mengetahui informasi yang berada dalam jaringan perusahaan.
APA, Harvard, Vancouver, ISO, and other styles
23

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Internet. The paper follows and sets standards for different types of protocols and techniques, the VPN (Virtual Private Network) architectural feature is made to deliver dependable and safe network that is not in line with regular networks that provide a higher trust and a higher secure channel between user and organization. The current study took place to summaries the usage of existing VPNs protocol and to show the strength of every VPN. Through different studies that have been made by other researchers as well as an extra focus on the state of art protocol, Wire guard. It is also worthy to mention that wire guard compared with other protocols such as IPsec and GRE. The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN.
APA, Harvard, Vancouver, ISO, and other styles
24

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (July 21, 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Full text
Abstract:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activities carried out in the VPN tunnel are not known by others. Users find it simpler to finish their daily agenda as a result.
APA, Harvard, Vancouver, ISO, and other styles
25

Shi, Baohui. "Computer Network Information Security Protection Based on Virtual Private Network." Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Makhija, Deven. "5G Communication Systems: Network Slicing and Virtual Private Network Architecture." ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.

Full text
Abstract:
5G communication systems are being rolled out with multiple technological solutions and applications being fielded on existing as well as enhanced infrastructure. The utilization of 5G systems and infrastructure by verticals over different platforms as well as industries is achieved with slicing. Slicing in 5G provides guaranteed resources for end users of vertical industries and applications over varied platforms, architecture, and infrastructure. Standards for network slicing in 5G have been formulated by 3GPP and further specifications are being released. Implementation of slicing at various layers are being researched. This Paper reviews the advancements in development of specifications for Layer 2 implementation of slicing and communication systems using virtual Private Network and Virtual Transport Network and its architecture. The enhancements to communication systems using existing Multi-Protocol Label Switching (MPLS) and its exploitation based on slicing technology has been reviewed. The research challenges and way ahead on same have been discussed including end resource allocation.
APA, Harvard, Vancouver, ISO, and other styles
27

Timberg, Chris, Leah Liebovitz, and Ben Miller. "The Private Virtual Network Operator Model for Field Area Network." Climate and Energy 40, no. 6 (December 5, 2023): 8–16. http://dx.doi.org/10.1002/gas.22381.

Full text
Abstract:
Uninterrupted grid edge connectivity is essential for distribution utilities driving towards a future where efficient, secure, and reliable field area network (FAN) operation is not just preferable but required. Communications and network connectivity have been rapidly evolving over the last several years and will continue to do so—including in the areas of spectrum options, carrier solutions, device manufacturers, core manufacturers, and network management options. Utilities have a greater choice of options to deploy, while needing to remain prudent in their investments. One of the options gaining traction in the United States is the private virtual network operator (PVNO) model.
APA, Harvard, Vancouver, ISO, and other styles
28

Qu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.

Full text
Abstract:
Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both input and output processing for the sake of checking the route before the packets transmission. Both the terminal and the agent have the driver middleware to ensure smooth flow routing.
APA, Harvard, Vancouver, ISO, and other styles
29

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Full text
Abstract:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
APA, Harvard, Vancouver, ISO, and other styles
30

Lota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.

Full text
Abstract:
Abstract Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by the virtual CSR1000v and virtual machines running Windows 8.1 on two different virtual private cloud platforms: VMware vSphere 5.5 and Microsoft Hyper-V Server 2012 R2. In such prepared testbed we study the response time (delay) and throughput of virtual network devices.
APA, Harvard, Vancouver, ISO, and other styles
31

Dayana, D. S. "An Efficient Approach for Network Mobility Based on AES Algorithm." Advanced Materials Research 984-985 (July 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.

Full text
Abstract:
Users interested to use the Internet from anywhere and at any time. For this purpose, the Internet Engineering Task Force proposed the concept of network mobility. But the IETF’s mobile Virtual Private Network does not support for real time applications. In this paper, the user’s communication between public networks and the private networks can be secured by using Virtual Private Network gateway. This secured user’s communication is based on Session Initiation Protocol and AES algorithm. The security impact is computed analytically and the performance is simulated. The signaling cost can also be reduced in this approach. Cryptographic mechanism like encryption and decryption is applied through the AES algorithm, so that the data transmitted through the VPN gateway is quality and secured.
APA, Harvard, Vancouver, ISO, and other styles
32

Krile, Srecko, and Martin Medvecky. "Virtual Network Construction Technique, Treating All VPNs Simultaneously." Elektronika ir Elektrotechnika 26, no. 2 (April 25, 2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.

Full text
Abstract:
In the paper, a new construction technique for virtual network (e.g., Virtual Private Network (VPN)) based on flow permutation algorithm is proposed. In existing methods for creating virtual networks, whereby virtual networks are constructed one by one in time and the new virtual network can use only the remaining resources, it could be non-optimal. Our approach treats all traffic flows simultaneously and is capable of balancing the network much better than other existing techniques. As we show, the proposed new construction technique work well, even in the condition of hard loaded networks operating on the edge of capacity, i.e., in situations when traditional techniques could cause unbalanced network and significant congestion problems. For huge number of traffic flows, heuristic algorithm, whose complexity rises linearly, is evaluated.
APA, Harvard, Vancouver, ISO, and other styles
33

Sobh, Tarek S., and Awad H. Khalil. "Securing Wargames System Using Effective Virtual Private Network." Recent Patents on Computer Science 11, no. 4 (December 13, 2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Iryani, Nanda, and Dyas Dendi Andika. "Implementasi Dynamic Multipoint Virtual Private Network Dual Hub." Jurnal Telekomunikasi dan Komputer 11, no. 2 (August 20, 2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.

Full text
Abstract:
Pesatnya perkembangan internet berdampak ke semua elemen orang yang memunculkan kebutuhan baru bagaimana menggunakan internet dengan cepat dan aman terutama bagi suatu perusahaan yang ingin terhubung dengan cabangnya. DMVPN menghadirkan sebuah solusi bagaimana menhubungkan beberapa perusahaan secara dinamis, fleksibel,cepat dan aman. Penelitian ini berusaha untuk mengimplementasikan DMVPN dengan routing IGP link state dan distance vector. Model pada penelitian akan menerapkan juga konsep bernama high availability yang akan menghasilkan ketersediaan yang tetap tinggi bahkan ketika salah satu perangkat pada DMPVN mengalami down dengan cara menambahkan sebuah hub baru (dual hub) sebagai router pusat dari DMVPN. Hasil yang didapatkan ketika menerapkan pada jaringan DMVPN dual hub menunjukan jika baik dari segi throughput, delay, jitter dan packet loss nilai terbaiknya terjadi ketika scenario komunikasi antar spoke atau antar cabang dengan menggunakan EIGRP. Nilai parameter yang ada berdasarkan standar tiphon tergolong kedalam kategori sangat bagus untuk throughput, jitter, dan packet loss dan masuk ke kategori bagus pada delaynya. Skenario pemodelan berikutnya mencoba hanya menggunakan satu buah hub saja, dari scenario tersebut diperoleh jika parameter yang dihasilkan routing EIGRP dan OSPF sama sama berimbang dengan throughput terbaik dimiliki oleh OSPF dengan kategori , delay dimiliki oleh EIGRP kategori standar sedang, jitter beserta packet loss kategori standar sangat bagus, keduanya dimilki OSPF dan EIGRP dengan catatan model komunikasi terbaiknya sama-sama menggunakan komunikasi hub spoke.
APA, Harvard, Vancouver, ISO, and other styles
35

Ben-Yacoub, Leila Lamti. "On managing traffic over virtual private network links." Journal of Communications and Networks 2, no. 2 (June 2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Suryani, Erma, and Syamsu Nur Row Honey. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS." JUTI: Jurnal Ilmiah Teknologi Informasi 6, no. 1 (January 1, 2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cui, Wei, and Mostafa A. Bassiouni. "Virtual private network bandwidth management with traffic prediction." Computer Networks 42, no. 6 (August 2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wu, Jing, Michel Savoie, Scott Campbell, Hanxi Zhang, and Bill Arnaud. "Layer 1 virtual private network management by users." IEEE Communications Magazine 44, no. 12 (December 2006): 86–93. http://dx.doi.org/10.1109/mcom.2006.273104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Moradi, Ahmad, Andrea Lodi, and S. Mehdi Hashemi. "On the difficulty of virtual private network instances." Networks 63, no. 4 (March 7, 2014): 327–33. http://dx.doi.org/10.1002/net.21548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bhat, Anjum Zameer, and Imran Ahmed. "A Simulation Environment for enhancing the student experience in advanced networking concepts." SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.

Full text
Abstract:
Several subjects in Computer science necessitate practical and realistic classes in addition to supporting the theoretical underpinning taught to the students. In various subjects’ practical exposure & skill is imperative to meet the industry requirements. However, educational establishments can't provide an out-and-out environment for every student to practice. Providing an appropriate Lab for apprentices that bestows desired exposure and feel of a real Network has been a challenging task for every educational establishment. Virtual Labs have been a major milestone and are effectively implemented in numerous colleges and universities throughout the world. In this article, the author is providing a complete setup and functionality of Implementing Virtual Private Networks using virtual Labs to reflect a more realistic and appropriate Networking environment for instructional and educational purposes. Fresh graduates or Diploma holders rarely have practical exposure and experience in deploying and implementing VPNs. Establishing a Virtual Private Network is a cumbersome job, and lack of practical exposure makes it even difficult for a fresher to establish one exclusively for the employer. The Author is providinga guideline for the users so that they can establish Virtual Private Networks using virtual machines. Hencepresenting an environment wherein students can have numerous deployments of VPNs with different features. The students gain the required exposure and develop an understanding of Virtual Private Networks meticulously and pragmatically.
APA, Harvard, Vancouver, ISO, and other styles
41

Álvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (February 4, 2023): 1747. http://dx.doi.org/10.3390/s23041747.

Full text
Abstract:
The defence-in-depth (DiD) methodology is a defensive approach usually performed by network administrators to implement secure networks by layering and segmenting them. Typically, segmentation is implemented in the second layer using the standard virtual local area networks (VLANs) or private virtual local area networks (PVLANs). Although defence in depth is usually manageable in small networks, it is not easily scalable to larger environments. Software-defined networks (SDNs) are emerging technologies that can be very helpful when performing network segmentation in such environments. In this work, a corporate networking scenario using PVLANs is emulated in order to carry out a comparative performance analysis on defensive strategies regarding CPU and memory usage, communications delay, packet loss, and power consumption. To do so, a well-known PVLAN attack is executed using simulated attackers located within the corporate network. Then, two mitigation strategies are analysed and compared using the traditional approach involving access control lists (ACLs) and SDNs. The results show the operation of the two mitigation strategies under different network scenarios and demonstrate the better performance of the SDN approach in oversubscribed network designs.
APA, Harvard, Vancouver, ISO, and other styles
42

Usanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (July 30, 2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.

Full text
Abstract:
The use of wireless media such as the internet in building computer networks is so widely used. However, performance and security must also be considered. VPN (Virtual Private Network) is one of the methods in network security that works by creating a tunnel so that a trusted network can connect to networks outside via the internet. PT. Laris Manis Utama is a private company engaged in the field of fresh fruits export-import and distributor. And already has several branch offices located outside the city. Designing a VPN (Virtual Private Network) with a Site to site (OpenVPN) system at PT. Laris Manis Utama functions as a communication liaison for media and data transfer between the head office server and branch servers so that they are connected in real-time and can develop application systems and updated databases
APA, Harvard, Vancouver, ISO, and other styles
43

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Full text
Abstract:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO, and other styles
44

Nourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.

Full text
Abstract:
Wireless networks are susceptible to many security problems since the wireless medium is open. Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network. One of the solutions is the development of tunneling technology as an attempt to secure communication networks. Virtual Private Network (VPN) tunneling technology when integrated with firewall would provide a suitable security. In this study, number of Jammers would interfere with the normal operation of the network resulting in performance degradation of network. These Jammers decrease throughput and increase delay and data dropped. The aim of this study is to improve the performance of Wireless Local Area Network (WLAN) by integrating Firewall with VPN in number of different Riverbed Modeler simulation scenarios which it is utilized in this study for video and data applications. Firewall is a technology employed to regulate the level of network connectivity. It can block unauthorized access from an external network to an internal network’s resources. In this study, the tunneling technology of VPN was integrated with firewall to improve the performance by increasing the throughput and decreasing delay and data dropped. The firewall would block any access to the server from the workstations and the VPN would filter the packets to allow a specific access to the specific server. The results showed that VPN when integrated with firewall increased the throughput from 1,350,000 to 1,500,000 bits/sec and decreased the delay from 0.0054 sec to 0.0047 sec and data dropped from 7,800 to 5,000 bits/sec so that this study proved that VPN incorporated with firewall provides a good throughput and delay improvement for wireless local area network.
APA, Harvard, Vancouver, ISO, and other styles
45

Qu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System." Applied Mechanics and Materials 321-324 (June 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.

Full text
Abstract:
Vehicle information system is the data center of vehicle communication networks, for the sake of connecting the IPv6 host through IPv4 network area, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack. The VND can establish a virtual tunnel between the vehicle information device and agent server. Both vehicle information device and agent server can support IPv4 and IPv6.Through the virtual tunnel, the agent server picked up the IPv6 packet which was built in IPv4 UDP data area, and transmit the IPv6 packets to the IPv6 remote server. So it works like a VPN device. The hardware platform of the vehicle gateway is based on ARM9, and the software is based on ARM-Linux. The instruction of hardware and software are as well as put forward.
APA, Harvard, Vancouver, ISO, and other styles
46

Peng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.

Full text
Abstract:
With the further development of Internet, VPN technology would provide high-quality and low-cost wide-area data network, and would be safer than the majority of corporate special network. Main purpose of VPN technology is to save communication expenses for enterprises, especially replace existing special lines of enterprises and reduce communication cost. With constant mergers and acquisitions of enterprises and the occurrence of new relationship between enterprises and employees, traditional corporate network mode faces challenges. One solution is to use virtual private network when constructing enterprise information environment. During network design, if only for simple point-to-point data transmission, making full use of transmission security is enough, security mechanisms such as encrypted tunnel, flows separating, packet authentication, user authentication, authorization system and access control etc have been taken to ensure the security. From perspective of engineering, comparison between the construction of corporate VPN and tunneling protocol that realizes VPN is made.
APA, Harvard, Vancouver, ISO, and other styles
47

Yin, Chengrui. "Application of Virtual Private Network Technology in University Network Information Security." Journal of Physics: Conference Series 1915, no. 4 (May 1, 2021): 042071. http://dx.doi.org/10.1088/1742-6596/1915/4/042071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hidayatulloh, Syarif, and Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)." Jurnal Teknik Komputer 5, no. 1 (February 6, 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.

Full text
Abstract:
The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.
APA, Harvard, Vancouver, ISO, and other styles
49

Fajjari, Ilhem, Nadjib Aitsaadi, Boutheina Dab, and Guy Pujolle. "Novel adaptive virtual network embedding algorithm for Cloud’s private backbone network." Computer Communications 84 (June 2016): 12–24. http://dx.doi.org/10.1016/j.comcom.2016.03.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.

Full text
Abstract:
Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on computer communications with the same security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography