Results 81 to 90 of about 24,263 (216)

Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]

open access: yes, 2016
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core  

Analisis Site to Site Virtual Private Network (VPN) pada PT.Excel Utama Indonesia Palembang [PDF]

open access: yes
Internet merupakan sebuah jaringan global dan terbuka akan tetapi permasalahan keamanan masih menjadi faktor utama,salah satu teknologi yang dapat memenuhi kebutuhan pada PT.Excel Utama Indonesia Palembang adalah Site to Site Virtual Private Network (VPN)
Chelara, Gumay   +1 more
core  

Reduction of Routing Delay in an Enterprise Network using Dynamic Multipoint Private Network [PDF]

open access: yes, 2013
The more integrated networks are with the internet, the more our security concerns grow. Virtual Private Networks (VPNs) have been used to solve the problem of internet security.
Adenrele, Adeyemi M.   +3 more
core  

Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]

open access: yes, 2015
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad)   +2 more
core  

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]

open access: yes, 2020
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core   +1 more source

VPN Traffic Analysis: A Survey on Detection and Application Identification

open access: yesIEEE Access
Network traffic analysis is fundamental for cybersecurity, network management, and policy enforcement. The widespread adoption of encryption, particularly through Virtual Private Networks (VPNs), presents a significant challenge by obscuring traditional ...
Yasameen Sajid Razooqi, Adrian Pekar
doaj   +1 more source

Microwave Photonic Filter Based All-Optical Virtual Private Network Supporting Dynamic Bandwidth Allocation in OFDMA-PON System

open access: yesIEEE Photonics Journal, 2018
We propose an all-optical virtual private network (VPN) supporting dynamic bandwidth allocation (DBA) in an orthogonal frequency division multiple access-based passive optical network. A microwave photonic bandpass filter (MP-BPF) is used to transmit the
Chang-Hun Kim   +2 more
doaj   +1 more source

Pengujian Performansi Penyedian Layanan VPN Dalam Lingkungan Jaringan MPLS (IT Center Laweyan) [PDF]

open access: yes, 2015
Layanan internet pada saat sekarang menjadi suatu kebutuhan bagi semua orang dari berbagai kalangan. Beberapa fungsi internet dimanfaatkan oleh perusahaan-perusahaan swasta seperti perusahaan yang bergerak di bidang jasa, telekomunikasi, perbankan. Salah
, Dr. Heru Supriyono, M.Sc.   +1 more
core   +1 more source

Analysis of MPLS/BGP/VPN Performance Advertising BGP Routing Algorithm

open access: yesTecnoLógicas, 2013
The provider edge router of the service provider establishes VPNs (Virtual Private Network) performing routing between users and core network through the virtual routers (VR). The virtual routers develop routing to the networking MPLS/VPN/BGP through VRF
Mónica Espinosa-Buitrago   +2 more
doaj  

Leveraging an open source VPN technology to end user. [PDF]

open access: yes, 2009
Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment.
Azmat, Farok   +2 more
core  

Home - About - Disclaimer - Privacy