
Virtual Private Network (VPN) peut être mis en œuvre par l'entreprise et l'utilisateur public de quelques méthodes. Les méthodes comprenaient des solutions propriétaires ou open source. Il a montré un grand potentiel en raison de son flux de trafic crypté qui lui donne un environnement sécurisé. Avec une bonne réception d'Internet en Malaisie, il est regrettable que les principaux fournisseurs d'accès Internet (FAI) aient imposé le filtrage de paquets. En effet, ils ont étranglé le haut débit rapide pour devenir un support lent. En conséquence, il donne un inconvénient à l'utilisateur final actif. Pour surmonter un filtrage de paquets FAI qui ralentit le trafic Internet, cet article a l'intention d'étudier et de fournir un échantillon de service de solution VPN à l'utilisateur final pour améliorer le problème actuel.
La red privada virtual (VPN) puede ser implementada por usuarios corporativos y públicos de varias maneras. Los métodos incluían soluciones propietarias o de código abierto. Ha demostrado un gran potencial debido a su flujo de tráfico cifrado que le da un entorno seguro. Con una buena recepción de Internet en Malasia, es desafortunado que los principales proveedores de servicios de Internet (ISP) hayan impuesto el filtrado de paquetes. En efecto, han estrangulado la banda ancha rápida para convertirse en un medio lento. Como resultado, le da una desventaja al usuario final activo. Para superar el filtrado de paquetes de un ISP que ralentiza el tráfico de Internet, este documento tiene la intención de estudiar y proporcionar una muestra del servicio de solución VPN al usuario final para mejorar el problema actual.
Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods.The methods included proprietary or open source solutions.It has shown great potential due to its encrypted traffic flow which gives it a secure environment.With a good reception of internet in Malaysia it is unfortunate that the major Internet Service Providers (ISPs) have imposed packet filtering.In effect they have throttled the fast broadband to become a slow medium.As a result it gives a disadvantage to active end user.To overcome an ISP packet filtering which slows down internet traffic, this paper intends to study and provide a sample of VPN solution service to end user to improve the current problem.
يمكن تنفيذ الشبكة الخاصة الافتراضية (VPN) من قبل الشركات والمستخدمين العامين بطرق قليلة. تضمنت الطرق حلولًا خاصة أو مفتوحة المصدر. وقد أظهرت إمكانات كبيرة بسبب تدفق حركة المرور المشفر الذي يمنحها بيئة آمنة. مع استقبال جيد للإنترنت في ماليزيا، من المؤسف أن مزودي خدمة الإنترنت الرئيسيين (ISPs) قد فرضوا تصفية الحزم. في الواقع، قاموا بخنق النطاق العريض السريع ليصبح وسيطًا بطيئًا. ونتيجة لذلك، فإنه يعطي عيبًا للمستخدم النهائي النشط. للتغلب على تصفية حزم مزود خدمة الإنترنت التي تبطئ حركة المرور على الإنترنت، تعتزم هذه الورقة دراسة وتقديم عينة من خدمة حلول VPN للمستخدم النهائي لتحسين المشكلة الحالية.
Artificial intelligence, Computer Networks and Communications, Economics, Encryption, Broadband, Internet traffic, Engineering, Private network, Artificial Intelligence, Computer security, Service (business), FOS: Electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Disadvantage, Computer network, Network packet, Transport Layer Security (TLS), Economy, Open source, Computer science, Internet service provider, World Wide Web, Service provider, Operating system, Machine Learning for Internet Traffic Classification, Wireless Mobility and Network Handoff Management, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, End user, Telecommunications, The Internet, Software
Artificial intelligence, Computer Networks and Communications, Economics, Encryption, Broadband, Internet traffic, Engineering, Private network, Artificial Intelligence, Computer security, Service (business), FOS: Electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Disadvantage, Computer network, Network packet, Transport Layer Security (TLS), Economy, Open source, Computer science, Internet service provider, World Wide Web, Service provider, Operating system, Machine Learning for Internet Traffic Classification, Wireless Mobility and Network Handoff Management, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, End user, Telecommunications, The Internet, Software
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
