Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Virtual Private Network: Survey and Research Challenges

View through CrossRef
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. Upon the establishment of a tunnel, it becomes possible to transmit data between the two servers. This paper provides a comprehensive analysis of Virtual Private Networks (VPNs), including their historical background, architectural design, employed protocols, and identified vulner- abilities. A Virtual Private Network (VPN) is implemented to secure the private network by utilising encryption and other security measures, thereby ensuring that solely authorised users are granted access to the system and preventing data interception. This survey comprehensively covers the topics of Virtual Private Networks (VPNs), their protocols, and the security measures implemented within VPNs. The present article has conducted an overview of the diverse protocols employed in the domain of Virtual Private Networking.
Title: Virtual Private Network: Survey and Research Challenges
Description:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data.
A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet.
Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection.
Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels.
Upon the establishment of a tunnel, it becomes possible to transmit data between the two servers.
This paper provides a comprehensive analysis of Virtual Private Networks (VPNs), including their historical background, architectural design, employed protocols, and identified vulner- abilities.
A Virtual Private Network (VPN) is implemented to secure the private network by utilising encryption and other security measures, thereby ensuring that solely authorised users are granted access to the system and preventing data interception.
This survey comprehensively covers the topics of Virtual Private Networks (VPNs), their protocols, and the security measures implemented within VPNs.
The present article has conducted an overview of the diverse protocols employed in the domain of Virtual Private Networking.

Related Results

Persons and Their Private Personas: Living with Yourself
Persons and Their Private Personas: Living with Yourself
Public life is usually understood to be whatever we do or say in our formal and professional relationships. At the workplace, at the doctor’s office or at the café, we need to make...
EFEKTIFITAS PELATIHAN LABORATORIUM VIRTUAL SEBAGAI MEDIA PEMBELAJARAN BAGI GURU KIMIA
EFEKTIFITAS PELATIHAN LABORATORIUM VIRTUAL SEBAGAI MEDIA PEMBELAJARAN BAGI GURU KIMIA
EFFECTIVITY OF VIRTUAL LABORATORY TRAINING AS A LEARNING MEDIA FOR CHEMISTRY TEACHERSAchmad Lutfi, SukarminUniversitas Negeri Surabaya, Indonesia achmadlutfi@unesa.ac.idAbstractThe...
Adverbs in -ως in Documents of Graeco-Roman Egypt
Adverbs in -ως in Documents of Graeco-Roman Egypt
This book is part of an ongoing research to investigate adverbials in the ancient Greek language. This first volume is devoted to the use of the adverbs in -ως in texts from Graeco...
VR 101
VR 101
Today we call many things “virtual.” Virtual corporations connect teams of workers located across the country. In leisure time, people form clubs based on shared interests in polit...
Alts and Automediality: Compartmentalising the Self through Multiple Social Media Profiles
Alts and Automediality: Compartmentalising the Self through Multiple Social Media Profiles
IntroductionAlt, or alternative, accounts are secondary profiles people use in addition to a main account on a social media platform. They are a kind of automediation, a way of rep...
Defining "Virtual Community"
Defining "Virtual Community"
The rise of the Internet has spawned the prolific use of the adjective “virtual.” Both the popular press and scholarly researchers have written about virtual work, virtual teams, v...
Defining "Virtual Community"
Defining "Virtual Community"
The rise of the Internet has spawned the prolific use of the adjective “virtual.” Both the popular press and scholarly researchers have written about virtual work, virtual teams, v...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...

Back to Top