IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG [PDF]
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj +2 more sources
Network Security Analysis Using Virtual Private Network in Vocational School
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj +1 more source
Harnessing HPC resources for CMS jobs using a Virtual Private Network [PDF]
The processing needs for the High Luminosity (HL) upgrade for the LHC require the CMS collaboration to harness the computational power available on non-CMS resources, such as High-Performance Computing centers (HPCs). These sites often limit the external
Tovar Benjamin +4 more
doaj +1 more source
Solution to Cross-domain VPN Based on Virtualization [PDF]
To address the problems of complex implementation of cross-domain virtual private networks built in current carrier networks,excessive load on devices at the border of autonomous systems,and the existence of single points of failure,this paper proposes a
TAO Zhiyong, ZHANG Jin, YANG Wangdong
doaj +1 more source
Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual ...
Try Budi Septiandoko +2 more
doaj +1 more source
A Simple WDM-PON Architecture Together With Private Interconnected ONUs
In this paper, we present and investigate a wavelength-division-multiplexing passive optical network (WDM-PON) with symmetrical 28 Gbit/s on-off keying (OOK) access signals and 3 Gbit/s virtual private network (VPN) link between the optical network units
Chien-Hung Yeh +4 more
doaj +1 more source
To Design a Network That Delivers Reliable Performance 24 Hours a Day 7 Days a Week for Higher Education in Uganda [PDF]
It aims at existing defects of traditional VPN (Virtual Private Network) in constructing enterprise network, analyses problems which must be considered in designing secure enterprise network, puts forward solution of DMVPN (Dynamic ...
Yakubu Makeri
doaj +1 more source
IPSec VPN Closure Detection Method Based on Side-channel Features [PDF]
IPSec VPN can be divided into closed networks and open networks according to different application scenarios.Closed networks are generally used to customize virtual private networks,and open network proxies are commonly used to avoid network auditing ...
SUN Yunxiao, LI Jun, WANG Bailing
doaj +1 more source
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj +1 more source

