Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published October 18, 2018 | Version v1
Journal article Open

Evaluated Performance of Protocols

  • 1. Associate Professor,Department of Electronics Engineering Sardar Patel University,Uttar Pradesh,India.
  • 2. Student,Department of Electronics Engineering Sardar Patel University,Uttar Pradesh,India.

Description

Maximum organizations attempt to set up their improvement facilities and department workplaces the world over. Personnel running from their houses also are turning into very popular and companies advantage financially by way of making use of less office area, and decreasing total expenses incurred by way of having office employees on website online. To satisfy such necessities agencies broaden a need to speak with these offices over surprisingly cozy, personal and dependable connections regardless of the area of the workplace. The VPN performs a vital function in setting up an allotted business model.

Files

(1-4) Evaluated performance of protocols.pdf

Files (173.8 kB)

Name Size Download all
md5:52b3abbe4c8021c7a31d3a0c13273f33
173.8 kB Preview Download

Additional details

References

  • 1. Kent, S. and Atkinson, R., security architecture for the net Protocol", RFC2401, November 1998.
  • 2. Townsley, W. et al, "Layer two Tunneling Protocol - L2TP", RFC 2661, August1999.
  • 3. Gleeson, B. et al, "A Framework for IP based totally virtual private Networks", RFC2764, February 2000.
  • 4. Hamzeh, okay. et al, "point-to-factor Tunneling Protocol (PPTP)", RFC 2637, July1999.
  • 5. Oppliger, R., "protection technology for the world huge internet", Artech residencelaptop Library, 2000.