scholarly journals Remote access virtual private network architecture for high-speed wireless internet users

2004 ◽  
Vol 4 (5) ◽  
pp. 567-578 ◽  
Author(s):  
O. Elkeelany ◽  
M. M. Matalgah ◽  
J. Qaddour
Author(s):  
Kankan Dev

Abstract: To get first-hand experience for setting up a network infrastructure in a medium size hospital to manage the patient’s services, check-ups, follow-up plans from different parts of the hospital primes and store the data into the secured and safe manner in the database and use the data whenever required from the management team for their references. The network architecture based on the concept of the Three- layer network architecture combination of Mesh topology & Bus topology taking into the consideration of the primary data security, remote access to the network, size of the hospital organization, cost-effective, user-friendly and most importantly scalability required in the network architecture for future changes based on the size of the database, utilization of applications remotely, and for security of the data, changing technology etc. The goal of any network architecture is to protect the DATA from any attacks both internally and externally. For internal DATA security it is protected through various user permissions in different layers in the network for the end users. For Outside threat VPN tunnel, Policies, traffic filtering configured at the firewall level. Keywords: HIS-Hospital Information System, VPN- virtual private network tunnel, VLAN- Virtual LAN, HL7- Health Level Seven International, L3- Layer 3, ISP- Internet service provider


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Gajendra Sharma

With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.


Author(s):  
Gazi Zahirul Islam ◽  
Aman Ullah Juman ◽  
Al- Nahian Bin Emran ◽  
Md. Abbas Ali Khan ◽  
Md. Fokhray Hossain ◽  
...  

<p class="Abstract">Not all Internet Service Providers provide a sufficient amount of bandwidth to their users. Although the amount of local bandwidth is reasonable, global bandwidth is not satisfactory at all. Based on bandwidth allocation, location and price; service providers capped their users’ global bandwidth i.e., reducing global internet speed. As a consequence, we observe severe global bandwidth limitation among Internet users. In this article, we implement a flexible and pragmatic solution for Internet users to bypass global bandwidth restriction. To achieve robust global bandwidth, we utilize a combination of communication technologies and devices namely, Internet Exchange Point, Virtual Private Network, chain VPN technology etc. In this project, we show that internet speed of international route i.e., global bandwidth can enhance significantly if there are multiple ISPs use a common IXP and at least one of those ISPs provides pleasant global bandwidth. Usually, regional ISPs use a common IXP to route their local traffic using local bandwidth within the region without wasting global bandwidth. We show that using our proposed method global internet speed of a user can raise several times effectively utilizing assigned local bandwidth. In addition, we also implement a geo-restriction bypassing technique integrating an offshore ISP with local ISP using VPN. Thus, we enjoy tremendous Internet speed along with unrestricted access to the websites.</p>


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2020 ◽  
Vol 91 (6) ◽  
pp. 3236-3255 ◽  
Author(s):  
Ittai Kurzon ◽  
Ran N. Nof ◽  
Michael Laporte ◽  
Hallel Lutzky ◽  
Andrey Polozov ◽  
...  

Abstract Following the recommendations of an international committee (Allen et al., 2012), since October 2017, the Israeli Seismic Network has been undergoing significant upgrades, with 120 stations being added or upgraded throughout the country and the addition of two new datacenters. These enhancements are the backbone of the TRUAA project, assigned to the Geological Survey of Israel (GSI) by the Israeli Government, to provide earthquake early warning (EEW) capabilities for the state of Israel. The GSI contracted Nanometrics (NMX), supported by Motorola Solutions Israel, to deliver these upgrades through a turnkey project, including detailed design, equipment supply, and deployment of the network and two datacenters. The TRUAA network was designed and tailored by the GSI, in collaboration with the NMX project team, specifically to achieve efficient and robust EEW. Several significant features comprise the pillars of this network:Coverage: Station distribution has high density (5–10 km spacing) along the two main fault systems—the Dead Sea Fault and the Carmel Fault System;Instrumentation: High-quality strong-motion accelerometers and broadband seismometers with modern three-channel and six-channel dataloggers sampling at 200 samples per second;Low latency acquisition: Data are encapsulated in small packets (&lt;1  s), with primary routing via high-speed, high-capacity telemetry links (&lt;1  s latency);Robustness: High level of redundancy throughout the system design:Dual active-active redundant acquisition routes from each station, each utilizing multicast streaming over an IP security Virtual Private Network tunnel, via independent high-bandwidth telemetry systemsTwo active-active independent geographically separate datacentersDual active-active redundant independent automatic seismic processing tool chains within each datacenter, implemented in a high availability protected virtual environment. At this time, both datacenters and over 100 stations are operational. The system is currently being commissioned, with initial early warning operation targeted for early 2021.


2021 ◽  
Vol 5 (9 (113)) ◽  
pp. 56-69
Author(s):  
Gulzinat Ordabayeva ◽  
Abdizhapar Saparbayev ◽  
Bibinur Kirgizbayeva ◽  
Gulzat Dzhsupbekova ◽  
Nazira Rakhymbek

A Software-Defined Network (SDN) on a Wide Area Network (WAN) is a computer network that is controlled and created by software. SD-WAN is an emerging research area that has received a lot of attention from industry and government. This technology offers tremendous opportunities to support the creation of consolidated data centers and secure networks. This is an innovation that allows the network to be monitored and programmed so that it can respond to network events caused by security breaches. This solution provides network security, offers a single network management console, and provides complete control over the network architecture. Also controls security in the cloud software-defined infrastructure (SDI), such as dynamically changing the network configuration when forwarding packets, blocking, redirecting, changing Media Access Control (MAC) or Internet Protocol (IP) addresses, limiting the packet flow rate etc. Using SD-WAN technology, it is possible to reduce the cost of dedicated bandwidth channels, achieve a high-quality Virtual Private Network (VPN), and the ability to automatically select a channel for certain channels. The main advantages of SD-WAN are the management of an unlimited number of devices from a single center, reducing the cost of deploying branch infrastructure. According to the results of the survey, 7 % of respondents use SD-WAN for security solutions, 14% at the piloting stage. As a result of the research, it was revealed that by 2024, to increase the flexibility and support of cloud applications, more than 60 % of SD-WAN customers will implement the SASE (Secure Access Service Edge) architecture, which is 30% more than in 2020 and the main concept - application security and cloud functions. Keywords: OpenFlow, Software defined wide area network (SD-WAN), architecture, DDoS attack, WAN network


Author(s):  
Samuel Ndichu ◽  
◽  
Sylvester McOyowo ◽  
Henry Okoyo ◽  
Cyrus Wekesa

Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.


2019 ◽  
Vol 7 (01) ◽  
pp. 60
Author(s):  
I Kadek Susila Satwika

The need to access data remotely is a person's need to be more efficient in doing a job. Currently there are many remote access application programs, one of which is TeamViewer by utilizing the internet public network. By installing a TeamViewer program on a client and server computer someone can do data work and repair remotely as long as it is connected to the internet. To be able to do remote access, of course, a client must already know the user and password from the server computer. The disadvantage of TeamViewer is that other people will easily remote access data simply by entering the user and password that the computer has on the server. To overcome this problem, VPN technology is used with the PPTP protocol where only the IP address of the client that has been registered on the proxy device can access data on the server. VPN allows clients to connect to the server privately through public networks. To find out the performance of the VPN network that is built, QoS (Quality of Service) parameter analysis is needed which includes delay, jitter, throughput and packet loss. From the results of the tests carried out, the results of QOS with an index of 3.75, which if converted to the standard TIPHON, VPN network at STMIK STIKOM Indonesia has a satisfactory quality.


Sign in / Sign up

Export Citation Format

Share Document