Virtual Private Networking

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 138 Experts worldwide ranked by ideXlab platform

Ampalavanapillai Nirmalathas - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of multiple secure Virtual Private networks over passive optical networks using electronic CDMA
    IEEE Photonics Technology Letters, 2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmission of the electronically coded data is carried out using Fabry-Peacuterot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference

  • Implementation of Multiple Secure Virtual Private Networks Over Passive Optical Networks
    2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmisison of the electronically coded data is carried out using Fabry-Perot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference. Index Terms—Electronic code-division multiple access (E-CDMA), Fabry-Perot laser diode (FP-LD), multiple access interference (MAI), optical beat interference (OBI), passive optical networks (PONs), Virtual Private networks (VPNs).

Nishaanthan Nadarajah - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of multiple secure Virtual Private networks over passive optical networks using electronic CDMA
    IEEE Photonics Technology Letters, 2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmission of the electronically coded data is carried out using Fabry-Peacuterot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference

  • Implementation of Multiple Secure Virtual Private Networks Over Passive Optical Networks
    2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmisison of the electronically coded data is carried out using Fabry-Perot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference. Index Terms—Electronic code-division multiple access (E-CDMA), Fabry-Perot laser diode (FP-LD), multiple access interference (MAI), optical beat interference (OBI), passive optical networks (PONs), Virtual Private networks (VPNs).

Elaine Wong - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of multiple secure Virtual Private networks over passive optical networks using electronic CDMA
    IEEE Photonics Technology Letters, 2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmission of the electronically coded data is carried out using Fabry-Peacuterot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference

  • Implementation of Multiple Secure Virtual Private Networks Over Passive Optical Networks
    2006
    Co-Authors: Nishaanthan Nadarajah, Elaine Wong, Ampalavanapillai Nirmalathas
    Abstract:

    An optical layer solution for implementing multiple secure Virtual Private networks (VPNs) over a passive optical network (PON) using electronic code-division multiple access is proposed. The multiple Virtual Private Networking capability is experimentally demonstrated with 40-Mb/s data multiplexed with a 640-Mb/s electronic code that is unique to each of the VPNs in the PON, and the transmisison of the electronically coded data is carried out using Fabry-Perot laser diodes. Experimental results show that this technique can potentially support high data rate traffic while imposing minimal penalty resulting from optical beat interference. Index Terms—Electronic code-division multiple access (E-CDMA), Fabry-Perot laser diode (FP-LD), multiple access interference (MAI), optical beat interference (OBI), passive optical networks (PONs), Virtual Private networks (VPNs).

Renato Figueiredo - One of the best experts on this subject based on the ideXlab platform.

  • a peer to peer microblogging service based on ip multicast and social Virtual Private Networking
    Consumer Communications and Networking Conference, 2013
    Co-Authors: Pierre St Juste, Renato Figueiredo
    Abstract:

    Microblogging services such as Twitter have become an indispensable communication tool on the Internet. However, due to their centralized nature, microblogging services have been susceptible to blocking by governments and powerful groups. To address this issue, we present a peer-to-peer microblogging service that is resistant to government intrusions and censorship. The strength of our design lies in the fact that we leverage trusted, peer-to-peer connections for the dissemination of information. Our proposed design consists mainly of two key components: a microblogging service which uses UDP and IP multicasting to push and pull updates, and a peer-to-peer VPN (SocialVPN) which enable IP multicasting over the Internet and provide direct IP connectivity among social peers. We also implemented and deployed a prototype to show the feasibility of our approach.

Thomas W. Shinder - One of the best experts on this subject based on the ideXlab platform.

  • Creating Remote Access and Site-to-Site VPNs with ISA Firewalls
    The Best Damn Firewall Book Period, 2007
    Co-Authors: Thomas W. Shinder
    Abstract:

    This chapter discusses the ISA 2006 firewall's Virtual Private Networking (VPN) remote access server and VPN gateway features. It is observed that when a VPN remote-access client establishes a connection with the VPN server, the VPN client acts like a machine that is directly connected to the corporate network. This Virtual link to the corporate network enables the remote VPN user to access almost every resource on the corporate network limited only by the access controls configured on the servers and workstations. User mapping is a feature that allows you to map Virtual Private network (VPN) clients connecting to ISA Server using an authentication method that is not based on Windows authentication to the Windows Active Directory namespace. One of the major improvements that the ISA 2004/2006 firewall has over ISA Server 2000 is that it can be configured to use IPSec tunnel mode for site-to-site VPN connections. The ISA firewall can authenticate VPN users with Remote Access Dial-In User Service (RADIUS). The RADIUS Protocol allows the ISA 2006 firewall to forward user credentials of a RADIUS server on the Internal network. It is suggested that one can significantly enhance the security of your ISA firewall's VPN remote access client connections by using Extensible Authentication Protocol user certificate authentication.

  • Chapter 6 – Creating Remote Access and Site-to-Site VPNs with ISA Firewalls
    Dr. Tom Shinder's ISA Server 2006 Migration Guide, 2007
    Co-Authors: Thomas W. Shinder
    Abstract:

    Publisher Summary This chapter discusses the ISA 2006 firewall's Virtual Private Networking (VPN) remote access server and VPN gateway features. It is observed that when a VPN remote-access client establishes a connection with the VPN server, the VPN client acts like a machine that is directly connected to the corporate network. This Virtual link to the corporate network enables the remote VPN user to access almost every resource on the corporate network limited only by the access controls configured on the servers and workstations. User mapping is a feature that allows you to map Virtual Private network (VPN) clients connecting to ISA Server using an authentication method that is not based on Windows authentication to the Windows Active Directory namespace. One of the major improvements that the ISA 2004/2006 firewall has over ISA Server 2000 is that it can be configured to use IPSec tunnel mode for site-to-site VPN connections. The ISA firewall can authenticate VPN users with Remote Access Dial-In User Service (RADIUS). The RADIUS Protocol allows the ISA 2006 firewall to forward user credentials of a RADIUS server on the Internal network. It is suggested that one can significantly enhance the security of your ISA firewall's VPN remote access client connections by using Extensible Authentication Protocol user certificate authentication.

  • Configuring Virtual Private Networking
    The Best Damn Firewall Book Period, 2007
    Co-Authors: Thomas W. Shinder
    Abstract:

    Virtual Private networks (VPNs) securely tunnel traffic between two sites over a public network such as the Internet. VPNs are commonly used to connect branch offices, mobile users, and business partners. Connecting Private networks or hosts by securely tunneling through a public network infrastructure has both commercial and practical applications. VPNs can connect branch offices, mobile users, and business partners. VPNs ensure confidentiality and authentication. VPNs provide a number of solutions, including economical connectivity between offices (using site-to-site VPNs) and the ability to provision connections quickly. Remote access VPNs provide connectivity for mobile workers or telecommuters, allowing them to securely gain access to their home network, regardless of where they are or how they connect. The PIX firewall supports both site-to-site and remote access VPNs using IPsec. VPNs can be very complicated, and a single connection might be implemented using a combination of many protocols that work together to provide tunneling, encryption, authentication, access control, and auditing. This chapter shows how to configure VPNs on the PIX firewall. It configures site-to-site VPNs using IPsec and IKE with preshared keys and digital certificates. The PIX firewall can act as a concentrator for terminating Cisco software VPN clients for remote-access VPNs.