Effect of investigationVPN to Secure Wireless LAN
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Manycorporationsare seriously concerne dabout security of network sand the refore, the ir network superviso rsarestill reluctanttoinstallWLANs.In thisregards,theIEEE802.11istandard wasdevelopedto addressthesecurityproblems,eventhoughthe mistrustofthewirelessLANtechnologystill exists. The thoughtwasthatthebestsecuritysolutionscouldbefoundin openstandards based technologies that can be delivered by Virtual Private Networking(VPN)beingusedfor a long timewithoutaddressingany security holes for the pas tfew years.This work, addresses this issue and presentsa simulatedwirelessLANofIEEE802.11gprotocol,andanalyzesimpactofintegratingVirtualPrivateNetworktechnologyto securetheflowof trafficbetweentheclientandtheserverwithinthe LAN, usingthe OPNET WLAN utility. Two Wireless LAN scenarioshavebeenintroducedandsimulated.Thesearebasedon a normal extensiontoawired network andVPNover extension toawired network.Theresultsofthetwoscenariosarecomparedandindicate the impact ofimproving performance, measured byresponse time andload,ofVirtualPrivateNetworkoverwirelessLAN.
Authors and Affiliations
El Mutaz Mahdi Osman Elawad, Dr. Haala El Dawo,
Data Security Model Enhancement In Cloud Environment
Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associat...
[sub][/sub]Designing Educational Computer Games to Enhance Teaching and Learning
Abstract: The paper presents an overview of the potential of educational computer games for enhancing teaching and learning activities. When applied to educational contexts, educational computer games can enhance student...
A novel semantic level text classification by combining NLP and Thesaurus concepts
Abstract: Text categorization (also known as text classification or topic spotting) is the task of automatically sorting a set of documents into categories from a predefined set. Automated text classification is at...
Study of Hiding Sensitive Data in Data Mining Using Association Rules
Abstract: This paper describes Apriori algorithm for association rules for hiding sensitive data in data mining if Large data contain sensitive information that data must be protected from the unauthorized users. Here, w...
Context Based Indexing in Search Engines Using Ontology:Review
Abstract: Nowadays, the World Wide Web is the collection of large amount of information which is increasingday by day. For this increasing amount of information, there is a need for efficient and effective index st...