Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances ...
Twana Saeed Ali
doaj +1 more source
Optimal Pricing to Manage Electric Vehicles in Coupled Power and Transportation Networks
We study the system-level effects of the introduction of large populations of Electric Vehicles on the power and transportation networks. We assume that each EV owner solves a decision problem to pick a cost-minimizing charge and travel plan.
Alizadeh, Mahnoosh +5 more
core +1 more source
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
Secure Hierarchical VPLS Architecture for Provider Provisioned Networks
Virtual private LAN service (VPLS) is a Layer 2 virtual private network technique that has gained enormous popularity in industrial networks. However, the deployment of legacy VPLS architectures in large-scale networks is challenging due to unresolved ...
Madhusanka Liyanage +2 more
doaj +1 more source
VIoLET: A Large-scale Virtual Environment for Internet of Things
IoT deployments have been growing manifold, encompassing sensors, networks, edge, fog and cloud resources. Despite the intense interest from researchers and practitioners, most do not have access to large-scale IoT testbeds for validation.
A Shukla +4 more
core +1 more source
Analysis of MPLS/BGP/VPN Performance Advertising BGP Routing Algorithm
The provider edge router of the service provider establishes VPNs (Virtual Private Network) performing routing between users and core network through the virtual routers (VR). The virtual routers develop routing to the networking MPLS/VPN/BGP through VRF
Mónica Espinosa-Buitrago +2 more
doaj
Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network [PDF]
The development of information technology has developed rapidly from year to year. The use of the Internet as a very useful addition to mediation communications but still has weaknesses in its security.Ecosystem service assurance is one unit of work on ...
Badru, M. (Mohammad) +1 more
core
АНАЛИЗ СПЕЦИАЛЬНЫХ ПРОГРАММ ДЛЯ СОЗДАНИЯ ВИРТУАЛЬНОЙ СЕТИ [PDF]
Когда нужно организовать для нескольких компьютеров доступ к ресурсам друг друга, первое, что приходит в голову, — объединить их в локальную сеть. Поэтому для решения поставленной задачи необходимо всего лишь программно реализовать виртуальную сеть ...
Чернов, В.В.
core
Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core
Simulasi Multi Protocol Label Switching Virtual Private Network (MPLS VPN) Dengan Virtual Local Area Network (VLAN) Menggunakan Router MIKROTIK [PDF]
Untuk mendapatkan komunikasi yang cepat, aman, dan mudah diakses digunakan jaringan MPLS VPN menggunakan VLAN. Jaringan MPLS akan mengirimkan paket sesuai dengan label yang ada pada header paket ke tujuan yang diinginkan dan VPN akan membatasi siapa ...
Euginia, B. (Bertha) +1 more
core

