Results 11 to 20 of about 24,263 (216)

Flexible and Concurrent All-Optical VPN in OFDMA PON

open access: yesIEEE Photonics Journal, 2013
We propose and experimentally demonstrate a new scheme to support an all-optical virtual private network (VPN) in orthogonal frequency-division multiple-access passive optical networks (OFDMA PONs). In our scheme, VPN communications among optical network
Xiaofeng Hu   +5 more
doaj   +3 more sources

qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era

open access: yesIEEE Access
This paper introduces qTrustNet VPN, a next-generation Virtual Private Network (VPN) designed to enhance security in the quantum era. As traditional encryption methods face obsolescence due to the advent of quantum computing, there is an urgent need for ...
Hyoungsub Shim   +4 more
doaj   +3 more sources

Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office

open access: yesJournal of Information Systems and Informatics, 2023
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the last four years.
Bintang Agung Gumelar   +2 more
doaj   +1 more source

Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms

open access: yesEgyptian Informatics Journal, 2022
Virtual Private Networks (VPNs) are one example of encrypted communication services commonly used to bypass censorship and access geographically locked services.
Ammar Almomani
doaj   +1 more source

Intra and Inter-PON ONU to ONU Virtual Private Networking using OFDMA in a Ring Topology [PDF]

open access: yes, 2011
—In this paper, we propose a novel WDM-PON architecture to support efficient and bandwidth-scalable virtual private network (VPN) emulation over both inter-PON and intra- PON.
Deng, Lei   +5 more
core   +2 more sources

QoS Parameters Evaluation in a VPN-MPLS Diffserv Network under a Complete Free Software Emulation Environment

open access: yesRevista Científica y Tecnológica UPSE, 2017
The use of Virtual Private Network – Multi Protocol Label Switching (VPN-MPLS) networks has become very common inside enterprises thanks to their multiple advantages; such as, the private communication across a public network infrastructure between ...
Miroslava Aracely Zapata Rodríguez   +3 more
doaj   +1 more source

Analisis Quality of Services Jaringan VoIP pada VPN menggunakan InterAsteriks Exchange dan Session Initiation Protocol

open access: yesTechno.Com, 2020
Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP),
Agus Heriyanto   +2 more
doaj   +1 more source

Securing Online Payment Using Virtual Private Network (VPN)

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2021
In the present advanced time, innovation plays a vital part inside the improvement of business, E-commerce, and Finance. In present days Network security become a significant thought. Internet gives a great facility to everyone like internet banking, Online shopping, Communications, organizations or associations.
Yesha Bhatt   +2 more
openaire   +1 more source

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

open access: yesIEEE Access, 2021
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam   +3 more
doaj   +1 more source

Optimal Orchestration of Virtual Network Functions [PDF]

open access: yes, 2017
-The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks. NFV introduces volatility in the management of network functions, which can be dynamically orchestrated,
Addis, Bernardetta   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy