Evaluated Performance of Protocols
- 1. Associate Professor,Department of Electronics Engineering Sardar Patel University,Uttar Pradesh,India.
- 2. Student,Department of Electronics Engineering Sardar Patel University,Uttar Pradesh,India.
Description
Maximum organizations attempt to set up their improvement facilities and department workplaces the world over. Personnel running from their houses also are turning into very popular and companies advantage financially by way of making use of less office area, and decreasing total expenses incurred by way of having office employees on website online. To satisfy such necessities agencies broaden a need to speak with these offices over surprisingly cozy, personal and dependable connections regardless of the area of the workplace. The VPN performs a vital function in setting up an allotted business model.
Files
(1-4) Evaluated performance of protocols.pdf
Files
(173.8 kB)
Name | Size | Download all |
---|---|---|
md5:52b3abbe4c8021c7a31d3a0c13273f33
|
173.8 kB | Preview Download |
Additional details
References
- 1. Kent, S. and Atkinson, R., security architecture for the net Protocol", RFC2401, November 1998.
- 2. Townsley, W. et al, "Layer two Tunneling Protocol - L2TP", RFC 2661, August1999.
- 3. Gleeson, B. et al, "A Framework for IP based totally virtual private Networks", RFC2764, February 2000.
- 4. Hamzeh, okay. et al, "point-to-factor Tunneling Protocol (PPTP)", RFC 2637, July1999.
- 5. Oppliger, R., "protection technology for the world huge internet", Artech residencelaptop Library, 2000.
Subjects
- Electrical Engineering
- http://matjournals.com/Journal-of-Optical-Communication-Electronics.html