Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core
Analisis Site to Site Virtual Private Network (VPN) pada PT.Excel Utama Indonesia Palembang [PDF]
Internet merupakan sebuah jaringan global dan terbuka akan tetapi permasalahan keamanan masih menjadi faktor utama,salah satu teknologi yang dapat memenuhi kebutuhan pada PT.Excel Utama Indonesia Palembang adalah Site to Site Virtual Private Network (VPN)
Chelara, Gumay +1 more
core
Reduction of Routing Delay in an Enterprise Network using Dynamic Multipoint Private Network [PDF]
The more integrated networks are with the internet, the more our security concerns grow. Virtual Private Networks (VPNs) have been used to solve the problem of internet security.
Adenrele, Adeyemi M. +3 more
core
Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad) +2 more
core
Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core +1 more source
VPN Traffic Analysis: A Survey on Detection and Application Identification
Network traffic analysis is fundamental for cybersecurity, network management, and policy enforcement. The widespread adoption of encryption, particularly through Virtual Private Networks (VPNs), presents a significant challenge by obscuring traditional ...
Yasameen Sajid Razooqi, Adrian Pekar
doaj +1 more source
We propose an all-optical virtual private network (VPN) supporting dynamic bandwidth allocation (DBA) in an orthogonal frequency division multiple access-based passive optical network. A microwave photonic bandpass filter (MP-BPF) is used to transmit the
Chang-Hun Kim +2 more
doaj +1 more source
Pengujian Performansi Penyedian Layanan VPN Dalam Lingkungan Jaringan MPLS (IT Center Laweyan) [PDF]
Layanan internet pada saat sekarang menjadi suatu kebutuhan bagi semua orang dari berbagai kalangan. Beberapa fungsi internet dimanfaatkan oleh perusahaan-perusahaan swasta seperti perusahaan yang bergerak di bidang jasa, telekomunikasi, perbankan. Salah
, Dr. Heru Supriyono, M.Sc. +1 more
core +1 more source
Analysis of MPLS/BGP/VPN Performance Advertising BGP Routing Algorithm
The provider edge router of the service provider establishes VPNs (Virtual Private Network) performing routing between users and core network through the virtual routers (VR). The virtual routers develop routing to the networking MPLS/VPN/BGP through VRF
Mónica Espinosa-Buitrago +2 more
doaj
Leveraging an open source VPN technology to end user. [PDF]
Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment.
Azmat, Farok +2 more
core

