Implementation of a Virtual Private Network by Linux Operation System [PDF]
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj +1 more source
Background: Remote reporting in anatomic pathology is an important advantage of digital pathology that has not been much explored. The COVID-19 pandemic has provided an opportunity to explore this important application of digital pathology system in a ...
Veena Ramaswamy +2 more
doaj +1 more source
IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS
Dalam dunia bisnis, biasanya sebuah organisasi ingin membangun Wide Area Network (WAN) untuk menghubungkan beberapa kantor cabangnya. Sebelum munculnya Virtual Private Network (VPN), mereka umumnya menggunakan ” leased line” yang mahal sehingga hanya ...
Erma Suryani, Syamsu Nur Row Honey
doaj +1 more source
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL [PDF]
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj
Creation of a virtual antidotes network between pharmacy departments of catalan hospitals [PDF]
Objetive: To design a virtual antidote network between hospitals that could help to locate on-line those hospitals that stocked those antidotes with the highest difficulty in terms of availability, and ensured that the medication was loaned in case of
Raquel Aguilar-Salmerón +5 more
doaj +1 more source
Wireless VPN network structure and safety protection in the north and south call center of SGCC
The wireless virtual private network structure suitable for the north and south call center of SGCC was explored. In the structure,the wireless applications and communication of the north and south call center of SGCC were considered. The existing access
Ying ZOU +3 more
doaj +2 more sources
Intra and Inter-PON ONU to ONU Virtual Private Networking using OFDMA in a Ring Topology [PDF]
—In this paper, we propose a novel WDM-PON architecture to support efficient and bandwidth-scalable virtual private network (VPN) emulation over both inter-PON and intra- PON.
Deng, Lei +5 more
core +2 more sources
IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj +1 more source
Virtual closed networks: A secure approach to autonomous mobile ad hoc networks [PDF]
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew +2 more
core +1 more source
Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad) +2 more
core

