Vpn Research Papers - Academia.edu (original) (raw)

Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems,... more

Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) being used for long time without addressing any security holes for the past few years. This work, addresses this issue and presents a simulated wireless LAN of IEEE802.11g protocol, and analyzes impact of integrating Virtual Private Network technology to secure the flow of traffic between the client and the server within the LAN, using OPNET WLAN utility. Two Wireless LAN scenarios have been introduced and simulated. These are based on normal extension to a wired network and VPN over extension to a wired network. The re...

This article discusses the economic benefits of the implementation of the sustainable building LEED (Leadership in Energy and Environmental Design) certification in the Centro Ático building located in Bogotá, Colombia. Initially, the... more

This article discusses the economic benefits of the implementation of the sustainable building LEED (Leadership in Energy and Environmental Design) certification in the Centro Ático building located in Bogotá, Colombia. Initially, the consumption of water and electricity are determined, as well as the costs of construction and operation of the building under its original design (built without regard to the parameters set by LEED). Then, strategies to allow the Centro Ático building to obtain the LEED GOLD New Construction V3 2009 certification are proposed and the economic increases associated with them are calculated. Also, the new consumption of water and electricity, when these strategies are applied (modified design), and their operating costs are calculated. Finally, indicators of economic goodness of investment are determined using a cash flow analysis.

Se presenta el diseño de un Method Of Procedure para la evaluación de Alta Disponibilidad en los anillos de Agregación basados en MPLS de un Service Provider. Este Protocolo de Actividades permite realizar, únicamente con acceso a los... more

Se presenta el diseño de un Method Of Procedure para la evaluación de Alta Disponibilidad en los anillos de Agregación basados en MPLS de un Service Provider. Este Protocolo de Actividades permite realizar, únicamente con acceso a los equipos de Backbone, la revisión y medición de los tiempos de convergencia de las redundancias en varios niveles: Capa 3 de conectividad con los equipos Provider Egde, Capa 2 de conectividad entre Customer Egde dentro de una VPLS y a nivel de Hardware de las controladoras.

This article examines the recent move by many television sports broadcasters of streaming their content online behind geographically restricted “geofences.” Despite the increasing use of this distribution method, we argue that Internet... more

This article examines the recent move by many television sports broadcasters of streaming their content online behind geographically restricted “geofences.” Despite the increasing use of this distribution method, we argue that Internet users are increasingly bypassing geofences that center sports consumption within a nationalized television broadcasting framework through the use of VPN (virtual private network) technologies. Importantly, the geographic fluidity of the Internet often allows users to do this legally—producing meaningful ruptures in the logic that seeks to replicate the structures of mediation central to the television broadcast model within the space of the Internet. We argue that the streaming of sports content, then, should be understood and analyzed as an enforcement of corporate media strategies and reflection of telecommunication policy, as well as a cultural practice and tactic. Large transnational media corporations, typically the holders of popular sporting rights, attempt to bend digital sports content consumption to the broadcast models that they have historically employed. Yet, amidst this emerging model of digital broadcasting lie the problems of digital geography and the cultural practice of a streaming culture within the conditions of post-convergence. This practice often rejects the restrictions and stipulations of digital broadcasting in favor of a globetrotting, station-hopping exercise of content hunting.

The emphasis here is the need to understand both the normative gap and the role of digital architecture in order to display the inherent challenge that copyright meets in a digital society. Consequently, in being a descriptively focused... more

The emphasis here is the need to understand both the normative gap and the role of digital architecture in order to display the inherent challenge that copyright meets in a digital society. Consequently, in being a descriptively focused study, this article studies contemporary Hungarian copyright and contrasts this to the findings from a survey with over 500 respondents from the Hungarian file-sharing community. In addition, this sample of Hungarian file-sharers is also compared to the findings from a near global sample of over 96,000 respondents to allow for determining distinctive traits of the Hungarian respondents. The findings indicate that due to their specific language, Hungarians are more motivated to set up and run their own darknet sites where copyrighted contents – mainly movies and TV-shows – are available not only in original releases, but with Hungarian translations as well. The popularity of darknet sites is similarly due to their special focus on different subject ma...

Network VPN enables remote access to corporate network resources that should only be available if the user is directly connected to the corporate LAN. VPN connections create "virtual" link point-to-point between the remote VPN users and... more

Network VPN enables remote access to corporate network resources that should only be available if the user is directly connected to the corporate LAN. VPN connections create "virtual" link point-to-point between the remote VPN users and corporate networks. Applications and services running on the user's computer treats the VPN link as an Ethernet connection. One of the main advantages of using a VPN connection, the client / server web application, is that VPN users in remote locations have the potential to access all the protocols and servers on a corporate network. Users can access various services in their local networks in the same way as they did when they were in the location of the company. VPN remote access users do not need special software to connect to each network services and administrators no longer need to create application specific proxy to connect to these resources.

En el presente artículo se estudian los beneficios económicos de la aplicación del programa de certificación de construcciones sostenibles LEED, en el Edificio Centro Ático situado en Bogotá - Colombia. Inicialmente, se determinan los... more

En el presente artículo se estudian los beneficios económicos de la aplicación del programa de certificación de construcciones sostenibles LEED, en el Edificio Centro Ático situado en Bogotá - Colombia. Inicialmente, se determinan los consumos de agua y energía eléctrica, y los costos de construcción y operación del edificio bajo su diseño original (construido sin tener en cuenta los parámetros establecidos por LEED). Seguido a esto se plantean estrategias para lograr que el edificio Centro Ático alcance la certificación LEED GOLD New Construction V3 2009 y se calculan los incrementos económicos asociados a éstas. Así mismo, se calculan los nuevos consumos de agua y energía eléctrica bajo la aplicación de dichas estrategias (diseño modificado) y sus correspondientes costos de operación. Finalmente, se determinan los indicadores de bondad económica de la inversión mediante un análisis de flujo de caja.

Vpn attention au failles de sécurités-Qu est ce qu'une fuite DNS ? Il est indispensable de boucher les 3 failles de sécurités si vous voulez que votre anonymat soit préservé. *Les fuites D.N.S (dnsleak) * Il faut changer ses d.n.s je vous... more

Vpn attention au failles de sécurités-Qu est ce qu'une fuite DNS ? Il est indispensable de boucher les 3 failles de sécurités si vous voulez que votre anonymat soit préservé. *Les fuites D.N.S (dnsleak) * Il faut changer ses d.n.s je vous recommande :-Opennic-DNS servers in France L idéal c'est que le pays du vpn et le pays des dns soient identiques. il faut exécutez cmd en mode administrateur ... Tapez la commande ipconfig /flushdns (vide le cache DNS) *La faille de navigateur Webrtc* Cet faille de sécurité révèle votre ISP lorsque vous êtes derrière un VPN.

This paper provides an overview of Multicast principles and Internet protocol (IP) multicast in the IPV4 environment. In traditional IP networks, it is not possible to generate a single transmission of data. IP Multicast, an extension to... more

This paper provides an overview of Multicast principles and Internet protocol (IP)
multicast in the IPV4 environment. In traditional IP networks, it is not possible to
generate a single transmission of data. IP Multicast, an extension to IP, is required to
efficiently support these communications needs; as these term implies IP Multicast has
been developed to support efficient communication between a source and multiple
remote destinations. This paper also discusses several mechanisms involved in
multicast transmission. Routing protocols that may be utilized include: the protocol
independent multicasting (PIM), PIM is currently the most widely used protocol.
Internet group management protocol (IGMP) is used by host receivers to join or leave
a multicast host group

This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the... more

This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of traffic into shared trees to manage the forwarding state vs. bandwidth saving trade-off. This sort of traffic engineering mechanism requires

"Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private... more

Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a... more

Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment. With a good reception of internet in Malaysia it is unfortunate that the major Internet Service Providers (ISPs) have imposed packet filtering. In effect they have throttled the fast broadband to become a slow medium. As a result it gives a disadvantage to active end user. To overcome an ISP packet filtering which slows down internet traffic, this paper intends to study and provide a sample of VPN solution service to end user to improve the current problem.

Abstract:- Private access to corporate servers from Internet can be achieved using various security mechanisms. This article presents a network access control mechanism that employs a policy management architecture empowered with dynamic... more

Abstract:- Private access to corporate servers from Internet can be achieved using various security mechanisms. This article presents a network access control mechanism that employs a policy management architecture empowered with dynamic firewalls. With the existence of such an architecture, system and/or network administrators do not need to reconfigure firewalls when there is a location change in user settings, reconfiguration will be automatic and seamless. The proposed architecture utilizes dynamic firewalls, which adapt their policies according to user locations through the guidance of a policy server. This architecture is composed of a VPN client at user site, a domain firewall with VPN capabilities, a policy server containing a policy decision engine, and policy agents residing in dynamic firewalls, which map policy server decisions to firewall policy rules, at server site.