Virtual Private Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.
Authors and Affiliations
Nnochiri, I. U. , M. Eng.
Design an Expert System for Ranking of Software metrics
This research paper represents a framework for ranking of software metrics based on expert opinion elicitation and fuzzy-based matrix methodology. The proposed methodology is able to accommodate the imprecise and inexac...
Analysis of Different Lubricants in Gearbox Performance using Ansys
In the present paper CFD based investigation has been reported in order to study about the power losses for different gear oils in operating conditions and alternative of it. It has been observed that there is significa...
Thermal Analysis of Radiator with Different Nano Fluids
The advancement in automobile technology is increasing day to day. The efficiency of the engine depends on heat transfer rate of radiator in automobile and further it relays on flow capacity of fluids and material used...
Design of Deterministic Finite Automata using Pattern Matching Strategy
An automaton is an entity work for specific computation and designed for that computation. Based on the problem automaton can be designed to satisfy the given problem. Automata have finite and infinite types. Finite aut...
Stresses around dental implant and its failures: A Review
Dental implant is more important for failures of real teeth. Dental implant is an option for the damaged teeth. This paper shows the important value of dental implant and the when masticatory forces acts on the surface...