Virtual Enterprise Network based on IPSec VPN Solutions and Management
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 11
Abstract
Informational society construction can’t be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. Internet Protocol Security is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network. Network management represents the activities, methods, procedures, and tools (software and hardware) that pertain to the operation, administration, maintenance, and provisioning of networked systems. Therefore, this work analyses the network architecture for an enterprise (industrial holding) geographically dispersed. In addition, the paper presents a network management solution for a large enterprise us
Authors and Affiliations
Sebastian Mariu Rosu , Marius Marian Popescu , George Dragoi , Ioana Raluca Guica
A Multi-Task Distributed Vision System Embedded on a Hex-Rotorcraft UAV
In this paper, are presented the general architecture and implementation of a multi-task distributed vision system designed and embedded onboard a Hex-Rotorcraft UAV. The system uses multiple cheap heterogeneous cameras...
An Algorithm Research for Supply Chain Management Optimization Model
In this paper, we consider the extended linear complementarity problem on supply chain management optimization model. We first give a global error bound for the extended linear complementarity problem, and then propose a...
A Novel Method for Secured Transaction of Images and Text on Cloud
Implementation of privacy preservation of data on cloud storage is tedious and complex. Cloud is a third party on – demand service to hold data for a specific period. There is no assurance from the cloud storage provider...
Corporate Responsibility in Combating Online Misinformation
In the age of mass information and misinformation, the corporate duty of developers of browsers, social media, and search engines are falling short of the minimum standards of responsibility. The tools and technologies a...
Exploiting Temporal Information in Documents and Query to Improve the Information Retrieval Process: Application to Medical Articles
In the medical field, scientific articles represent a very important source of knowledge for researchers of this domain. But due to the large volume of scientific articles published on the web, an efficient detection and...