Results 61 to 70 of about 486,360 (195)

Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity

open access: yesSulaimani Journal for Engineering Sciences
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances ...
Twana Saeed Ali
doaj   +1 more source

Optimal Pricing to Manage Electric Vehicles in Coupled Power and Transportation Networks

open access: yes, 2016
We study the system-level effects of the introduction of large populations of Electric Vehicles on the power and transportation networks. We assume that each EV owner solves a decision problem to pick a cost-minimizing charge and travel plan.
Alizadeh, Mahnoosh   +5 more
core   +1 more source

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Secure Hierarchical VPLS Architecture for Provider Provisioned Networks

open access: yesIEEE Access, 2015
Virtual private LAN service (VPLS) is a Layer 2 virtual private network technique that has gained enormous popularity in industrial networks. However, the deployment of legacy VPLS architectures in large-scale networks is challenging due to unresolved ...
Madhusanka Liyanage   +2 more
doaj   +1 more source

VIoLET: A Large-scale Virtual Environment for Internet of Things

open access: yes, 2018
IoT deployments have been growing manifold, encompassing sensors, networks, edge, fog and cloud resources. Despite the intense interest from researchers and practitioners, most do not have access to large-scale IoT testbeds for validation.
A Shukla   +4 more
core   +1 more source

Analysis of MPLS/BGP/VPN Performance Advertising BGP Routing Algorithm

open access: yesTecnoLógicas, 2013
The provider edge router of the service provider establishes VPNs (Virtual Private Network) performing routing between users and core network through the virtual routers (VR). The virtual routers develop routing to the networking MPLS/VPN/BGP through VRF
Mónica Espinosa-Buitrago   +2 more
doaj  

Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network [PDF]

open access: yes, 2015
The development of information technology has developed rapidly from year to year. The use of the Internet as a very useful addition to mediation communications but still has weaknesses in its security.Ecosystem service assurance is one unit of work on ...
Badru, M. (Mohammad)   +1 more
core  

АНАЛИЗ СПЕЦИАЛЬНЫХ ПРОГРАММ ДЛЯ СОЗДАНИЯ ВИРТУАЛЬНОЙ СЕТИ [PDF]

open access: yes, 2012
Когда нужно организовать для нескольких компьютеров доступ к ресурсам друг друга, первое, что приходит в голову, — объединить их в локальную сеть. Поэтому для решения поставленной задачи необходимо всего лишь программно реализовать виртуальную сеть ...
Чернов, В.В.
core  

Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]

open access: yes, 2016
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core  

Simulasi Multi Protocol Label Switching Virtual Private Network (MPLS VPN) Dengan Virtual Local Area Network (VLAN) Menggunakan Router MIKROTIK [PDF]

open access: yes, 2018
Untuk mendapatkan komunikasi yang cepat, aman, dan mudah diakses digunakan jaringan MPLS VPN menggunakan VLAN. Jaringan MPLS akan mengirimkan paket sesuai dengan label yang ada pada header paket ke tujuan yang diinginkan dan VPN akan membatasi siapa ...
Euginia, B. (Bertha)   +1 more
core  

Home - About - Disclaimer - Privacy