Tesi sul tema "Virtual Private Network"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Virtual Private Network".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Celestino, Pedro. "Private virtual network". Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.
Testo completoCom as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
Samuelsson, Joakim, e Richard Sandsund. "Implementing a virtual private network". Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.
Testo completoCompanies of today want to give their employees the opportunity to work from home or while they travel. A common solution to accomplish this is to implement a VPN over top of the existing network. Using VPN gives the employees access to the company’s local area network from outside, via the internet. The VPN provides a secure channel for these employees to connect to the local services attached to the company’s network that they need to reach. Which VPN technology is most suitable to deliver a secure, fast, and reliable connection to theses employees? In this thesis examines we are taking a closer look at different VPN solutions. We describe different VPN-protocols like L2TP, IPSec and PPTP. How to authenticate users in a secure and flexible way and also methods used to make the VPN-connection secure. Lastly we will show the solution we have implemented at the company Confidence, for whom we made the solution. The difficulties in using existing products with the company’s infrastructure are described. Suggestions are offered for future work to address these problems.
Davis, Carlton R. "IPSec base virtual private network". Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.
Testo completoHabibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.
Testo completoNorin, Anders, e Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000". Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.
Testo completoIkiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.
Testo completoheyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo
s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless networks. Most VPNs have built on IP Security Protocol (IPSec) to support end-to-end secure data transmission. IPSec is a wellunderstood and widely used mechanism for wired network communication. Because, wireless networks have limited bandwidth and wireless devices have limited power and less capable CPU, the performance of the networks when VPN&rsquo
s are used is an important research area. We have investigated the use of VPNs in wireless LANs to provide end &ndash
to &ndash
end security. We have selected IPSec as the VPN protocol and investigated the effects of using IPSec on the throughput, packet loss, and delay of the wireless LANs. For this purpose, we have set up a test bed and based, our results on the actual measurements obtained from the experiments performed using the test bed. v The wireless LAN we have used is an 802.11g network and the results show that the performance of the network is adversely affected when VPN&rsquo
s are used but the degradation is not as bad as expected.
Liang, Huan. "Minimal cost design of virtual private network". Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.
Testo completoRüegg, Maurice. "Virtual private network provisioning in the hose model /". Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.
Testo completoLin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /". Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Testo completoBazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.
Testo completoÖgren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks". Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.
Testo completoGaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /". [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.
Testo completoSoler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.
Testo completoNg, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.
Testo completoChowdavarapu, Pradeep Kumar, Pramod Kati e Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation". Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.
Testo completoProgram: Magisterutbildning i informatik
Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services". Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.
Testo completoTiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks". BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.
Testo completoFerguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study". NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.
Testo completoCorfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.
Testo completoTabassum, Mujahid, e Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.
Testo completoThe networking field has become a core component for any company. All of the
businesses rely on the networking industry, due its vastness and significance. Every day
companies are planning and thinking to develop better strategies that can offer efficient
and reliable communication solutions between their employees and customers for
maximum revenue. The planning of a company’s network requires a lot of resources and
aspects to study, and to evaluate them carefully to build a comprehensive secure and
reliable platform. It is the job of a network administrator to take care of the company’s
network infrastructure and upgrade or update the required components and applications
from time-to-time that can follow new standards.
This thesis is a practical work aimed to evaluate a company network infrastructure in its
real environment. The purpose of this thesis is to evaluate different aspects of the
network infrastructure used such as VPN, WLAN, firewall and physical security and give
recommendations to make their performance better and to offer more advanced strategies.
This study will also provide an inclusive observation of the company’s needs and their
network infrastructure, and will provide a concept how to evaluate and fix small mistakes,
the kind of problems that can occur in an evolving company network. Lastly, this research
will make recommendations and suggest a possible implementation on the studied
network infrastructure.
SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA e Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services". 電子情報通信学会, 2012. https://search.ieice.org/.
Testo completoCote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.
Testo completoThesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet". Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.
Testo completoWagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)". Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.
Testo completoMaster of Arts
Kilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.
Testo completoThesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
Goh, Vik Tor. "Intrusion detection framework for encrypted networks". Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Testo completoVåge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt". Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.
Testo completoAktivitetsbaserad arbetsmodell blir mer och mer vanligt och Försäkringskassan är en myndighet som anammat detta arbetssätt. Det nya sättet att jobba innebär att fler anställda jobbar hemifrån eller annan plats. Arbetssättet medför att det behövs IT-lösningar som kan hantera bland annat kommunikation och säker dokumenthantering. Det har gett upphov till två problem på Försäkringskassan. Det första problemet är förvirring kring hur anställda skall koppla upp sig korrekt mot Försäkringskassans konferensrumsutrustning. Lösningsförslaget skall kunna utvärdera ifall korrekt utrustning har kopplats in och presentera information gällande anslutningsstatus. Det andra gäller uppkoppling mot Försäkringskassans Virtuella Privata Nätverk (VPN). Problemet gäller att användare ofta tappar eller inte får korrekt anslutning till nätverksenheterna då de ansluter sig via VPN. Ett tekniskt lösningsförslag för respektive problem utvecklades. Applikationen gällande uppkoppling mot konferensrumsutrustning utvärderar att användaren har USB-docka (med fler komponenter ansluten till den) ansluten, att användaren har nätverksuppkoppling samt att drivrutin för USB-docka har hunnit installerats. Användbarhetstest visade på att applikationen fungerar som tänkt, förutom lite förvirring kring navigation, vilket korrigerades. Applikationen gällande VPN- uppkoppling visar visuellt för användaren genom en ikon i aktivitetsfältet om användaren är korrekt ansluten till VPN eller inte. Applikationen fick också inbyggt alternativet att ropa på ett uppkopplingsskript om användaren tappar anslutning. Utvärdering utifrån Kravspecifikation visade att båda applikationerna kunde uppnå sina krav och applikationerna har paketerats och distribuerats till anställda på Försäkringskassan.
Konstantaras, Dimitrios, e Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Testo completoIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima". Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.
Testo completoHarris, B. A. "Firewalls and virtual private networks". Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.
Testo completoLukaszewski, Daniel. "Multipath transport for virtual private networks". Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.
Testo completoVirtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kernels, we further introduce a full-multipath kernel, implementing a basic Multipath UDP (MPUDP) protocol into an existing Linux MPTCP kernel.We demonstrate the MPUDP protocol provides performance improvements over single path UDP tunnels and in some cases MPTCP tunnels. The MPUDP kernel should be further developed to include more efficient scheduling algorithms and path managers to allow better performance and mobility benefits seen with MPTCP.
Outstanding Thesis
Lieutenant, United States Navy
Космина, Андрій Сергійович, e Andrii Kosmyna. "Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36800.
Testo completoДана магістерська кваліфікаційна робота присвячена дослідженню відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес- процесів. Проведено аналіз видів VPN та їх використання для бізнесу, аналіз OpenVPN технології та порівняння продуктивності алгоритмів шифрування. Організовано мережу відмовостійкого з’єднання OpenVpn з функцією автоматичної зміни сервера. У першій главі розглянуто основні характеристики віртуальних приватних мереж та проведено аналіз видів VPN та способи їх використання для потреб бізнесу. У другій главі проведено загальний аналіз технології OpenVPN та проведено порівняння продуктивності основних алгоритмів шифрування У третій главі проведено практичну побудову відмовостійкого з’єднання OpenVpn з функцією автоматичної зміни сервера з використанням найоптимальніших налаштувань та продуктивних алгоритмів вибраних на основі порівняння в попередньому розділі. У підрозділі "Охорона праці" розглянуто загальні правила охорони праці та питання забезпечення електробезпеки користувачів ПК.
This master's thesis is devoted to the study of fault tolerance of OpenVPN connections to ensure business continuity. The analysis of VPN types and their use for business, the analysis of OpenVPN technology and the comparison of productivity of encryption algorithms are carried out. Organize a failover OpenVpn connection with automatic server change. The first chapter discusses the main characteristics of virtual private networks and analyzes the types of VPN and ways to use them for business purposes. The second chapter provides a general analysis of OpenVPN technology and compares the performance of basic encryption algorithms The third chapter provides a practical way to build a failover OpenVpn connection with an automatic server change function using the most optimal settings and productive algorithms selected based on the comparison in the previous section. In the subsection "Labor protection" the general rules of labor protection and questions of ensuring electrical safety of PC users are considered.
ВСТУП ...8 РОЗДІЛ 1 ЗАГАЛЬНИЙ АНАЛІЗ ТЕХНОЛОГІЇ ВІРТУАЛЬНИХ МЕРЕЖ ...10 1.1 Загальні положення технології VPN ... 10 1.2 Класифікація VPN ... 12 1.3 Функції безпеки, які забезпечються технологією VPN ... 12 1.4 Порівняння найпоширеніших протоколів (PPTP,L2TP,IPSec ) ...18 1.5 Порівняння готових рішень VPN для бізнесу ... 21 Висновки до розділу 1... 23 РОЗДІЛ 2 АНАЛІЗ ТЕХНОЛОГІЇ OPENVPN ... 25 2.1 OpenVPN, призначення, мережі та схема використання ... 25 2.2 Переваги та недоліки протоколу OpenVpn. ... 30 2.3 Реалізація відмовостійкого з’єднання на базі програмного забезпечення OpenVpn... 33 2.4 Порівняння продуктивності алгоритмів шифрування які підтримує OpenVPN... 34 Висновки до розділу 2... 36 РОЗДІЛ 3 ОРГАНІЗАЦІЯ ЗАХИЩЕНОГО ВІДДАЛЕНОГО ПІДКЛЮЧЕННЯ ДО РЕСУРСІВ КОРПОРАТИВНИХ МЕРЕЖ ВИКОРИСТОВУЮЧИ ТЕХНОЛОГІЮ OPENVPN ... 38 3.1 Описання проблеми та моделювання мережі. ... 38 3.2 Створення реальної моделі відмовостійкої мережі. .... 39 3.2.1 Встановлення OpenVPN ...39 3.2.2 Створення директорії центру сертифікації ... 40 3.2.3 Налаштування центру сертифікації ... 40 3.2.4 Створення центру сертифікації ... 41 3.2.5 Створення сертифіката, ключа і файлів шифрування для сервера ... 43 3.2.6 Створення сертифіката і пари ключів для клієнта ... 44 3.2.7 Налаштування сервісу OpenVPN ... 45 3.2.8 Налаштування мережевої конфігурації сервера .... 45 3.2.9 Відкриття порту OpenVPN і застосування змін ... 46 3.2.10 Включення сервісу OpenVPN ... 47 3.2.11 Налаштування серверу 2. ... 48 3.2.12 Налаштування серверу 3 ... 48 3.3 Порядок дій для налаштування клієнта ... 49 3.3.1 Завантаження необхідного ПЗ ... 49 3.3.2 Створення файлу конфігурації ... 49 3.4 Практичне виконання відмовостійкого з’єднання ... 50 Висновки до розділу 3... 56 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ .. 57 4.1 Охорона праці ... 57 4.2 Забезпечення електробезпеки користувачів ПК ... 58 ВИСНОВКИ ... 61 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ... 63 ДОДАТКИ ... 65
Bergvall, Ricardo. "Secure remote access to a work environment". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Testo completoSirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007". Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.
Testo completoEvlogimenou, Anna. "Programmable accounting management for Virtual Private Networks". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ62962.pdf.
Testo completoBalasubramanian, Ashok. "Protected virtual private networks in the hose model". Thesis, University of Hawaii at Manoa, 2003. http://hdl.handle.net/10125/7018.
Testo completovii, 52 leaves
Flodin, Carl, e Pontus Lantz. "Studenters användning och syn på Virtual Private Networks". Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414714.
Testo completoBen, Houidi Zied. "Scalable routing in provider provisoned virtual private networks". Paris 6, 2010. http://www.theses.fr/2010PA066611.
Testo completoPalomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.
Testo completoJia, Yuxiao. "Dynamic quality of service support in virtual private networks". Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26667.
Testo completoSherry, Zaida. "Governance of virtual private networks using COBIT as framework". Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.
Testo completoThe purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.
Testo completoIsaacs, Rebecca. "Dynamic provisioning of resource-assured and programmable virtual private networks". Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621158.
Testo completoRosenbaum, Gustav Filip Computer Science & Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks". Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.
Testo completoTryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks". Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.
Testo completoToday increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.
The results show that it is quite complicated to setup a VPN network and to get operational. The results also show that there are security compromises within the VPN structure that indicate that if proper precaution is not taken it may give a false sense of security, where the user believes that it is a secure communication when in reality it is not.
Valella, William. "Securing open source Virtual Private Networks a study in Linux security /". [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.
Testo completoTitle from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
Janeček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.
Testo completoWikström, Alexander, Mark Thomson e Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.
Testo completoBallapuram, Vijayanand Sreenivasan. "Impact of Queuing Schemes and VPN on the Performance of a Land Mobile Radio VoIP System". Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33033.
Testo completoAn experimental test bed was created to evaluate four QoS queuing schemes: first-in first-out queuing (FIFO), priority queuing (PQ), weighted fair queuing (WFQ), and class-based weighted fair queuing (CBWFQ). Quantitative results were obtained for voice application throughput, delay, jitter, and signaling overhead. Results show that, compared to a baseline case with no background traffic, LMRVoIP traffic suffers when carried over links with heavy contention from other traffic sources when FIFO queuing is used. There is significant packet loss for voice and control traffic and jitter increases. FIFO queuing provides no QoS and, therefore, should not be used for critical applications where the network may be congested. The situation can be greatly improved by using one of the other queuing schemes, PQ, WFQ, or CBWFQ, which perform almost equally well with one voice flow. Although PQ has the best overall performance, it tends to starve the background traffic. CBWFQ was found to have some performance benefits over WFQ in most cases and, thus, is a good candidate for deployment.
The LMRVoIP application was also tested using a VPN, which led to a modest increase in latency and bandwidth utilization, but was found to perform well.
Master of Science
Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.
Testo completoDuring 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed