Search results
1 – 10 of over 16000David C. Chou, David C. Yen and Amy Y. Chou
To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.
Abstract
Purpose
To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.
Design/methodology/approach
A range of virtual private network concepts and technologies are identified and compared. The capability, suitability, and pros and cons of adopting virtual private network for electronic commerce are discussed. An economic analysis is used to compare the cost and benefit of adopting virtual private network in organizations.
Findings
This paper provides information about virtual private network technology. It also indicates the advantages and disadvantages of adopting virtual private network for electronic commerce practices. The economic analysis provides a real example of technology adoption decision making. Strategic implications of adopting virtual private network are detected.
Practical implications
The economic analysis on adopting virtual private network provides an example of information technology selection decision for the electronic commerce community.
Originality/value
This paper provides an economic approach to analyzing the decision process for information technology adoption. It suggests that the integration of virtual private network into electronic commerce architecture would perform secure and inexpensive online transactions for adopters of this new technology.
Details
Keywords
Volker Stocker, William Lehr and Georgios Smaragdakis
The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…
Abstract
The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.
Details
Keywords
Steve Hawkins, David C. Yen and David C. Chou
Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…
Abstract
Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data transmission and storage, including encryption, firewalls, and private networks. This article discusses the awareness of Internet security and challenges faced in both the public and the private sectors.
Details
Keywords
Karri Huhtanen, Bilhanan Silverajan and Jarmo Harju
The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers…
Abstract
Purpose
The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers and are forced to use network address translation (NAT) and port forwarding to solve connectivity issues to the different home services. This paper seeks to introduce a secure connectivity solution utilising both IPv6 and IPv6 transition mechanisms in cooperation with existing virtual private network (VPN) solutions.
Design/methodology/approach
The proposed solution to avoid route conflicts and other problems with private IPv4 address space collisions is to utilise 6to4, an IPv6 transition mechanism, to obtain routable IPv6 network addresses first for the home network and services and then, to utilise the same IPv6 network for connectivity by bridging it over a VPN connection to the mobile terminal.
Findings
The paper finds that the adoption of this solution and these technologies will depend on how useful they are seen by vendors or service providers and included in their products. Regular vendors and service providers probably want to wait until there is a greater customer need. On the other hand, customers do not know about the possibilities before they are shown to them in practice. The best approach to this challenge is to find a cooperating vendor, or even better, a service provider willing to develop the concept further and to integrate it into the devices and services they are already offering.
Originality/value
The technologies for enhancing home service connectivity are already available. In the proof‐of‐concept implementation the paper has shown that all these components can be integrated and utilised to build home routers for present and future home networks. The technical disadvantages and challenges are solvable with further work and the whole concept is ready to be turned into products and services. As indicated in the paper, one of the issues for further work is to find and convince a vendor or service provider to integrate the proposed solution in their home router.
Details
Keywords
Virtualization is the simulation or emulation of computer resources to the user (Grauer, n.d.; Simpson, 2008). This chapter discusses virtualization as a viable classroom…
Abstract
Virtualization is the simulation or emulation of computer resources to the user (Grauer, n.d.; Simpson, 2008). This chapter discusses virtualization as a viable classroom methodology for providing students with course relevant hands-on experience (Simpson, 2008) while synchronizing course specific content in traditional on-ground and online courses (Pheils, 2010). More specifically, this chapter provides an overview of virtualization, detailing several open source tools, and offering possible applications for incorporation into other courses including free resources for sample content. Proof-of-concept is established through examples of successful usage at two colleges. The adoption of virtualization within course development may provide a solution that spans disciplines and offers students the ability to practice and further their studies beyond the classroom.
This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and…
Abstract
This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and digital signals, synchronous and asynchronous transmission formats, transmission media and equipment, transmission techniques and characteristics, multiplexing, network types, access technologies, network architectures and topologies, local‐area network technologies and attributes, protocols and protocol issues, gateways, internetworking, local networking alternatives, equipment certification, and various aspects of network management. It is intended to provide the practicing professional in the field of library and information science with a broad, up‐to‐date technical review that might serve to support and facilitate further investigation of current developments in networks and networking. Although the broad range of topics is not treated in depth, numerous references are provided for further investigation.
Eduard Grasa, Sergi Figuerola, Albert López, Gabriel Junyent, Michel Savoie, Bill St Arnaud and Mathieu Lemay
Purpose – The purpose of this paper is to illustrate the advantages of using the UCLP software for network operators, advanced and regular end users in the research networking…
Abstract
Purpose – The purpose of this paper is to illustrate the advantages of using the UCLP software for network operators, advanced and regular end users in the research networking community. Design/methodology/approach – This paper provides an example of the deployment of UCLP in the GÉANT2/National Research and Education Networks (NRENs) scenario, and compares how network operators, advanced users and regular end users would do their work, with and without UCLP. Findings – The paper provides high‐level technical information about UCLP as well as depicting the drivers for its use in the European research networking community. Research limitations/implications – This paper does not explain the details of the deployment of the software in the GÉANT2/National Research and Education Networks (NRENs) scenario, it just explains the benefits that the deployment of the software would provide. If the deployment was to be done today, some improvements to UCLP should be done, as well as support for more equipment vendors should be added. Practical implications – UCLP could provide more flexibility to the e‐science community if it was deployed over the European research networking infrastructure, because it would isolate network users from each other while providing them an unprecedented degree of control over the network. Originality/value – Nowadays, several control/management solutions for networks exist, but none that is capable of partitioning a physical network into slices and handoff its management to the users, like UCLP does. This is the first UCLP paper that studies a hypothetical deployment of UCLP in the European research networking scenario, and evaluates the drivers and implications of such a deployment.
Details
Keywords
Giuseppe Portelli, Giovanni Malnati and Fabio Forno
Home networks enable, potentially, an increased level of integration among appliances present in the house, enabling an ubiquitous control of devices and simplifying man/machine…
Abstract
Purpose
Home networks enable, potentially, an increased level of integration among appliances present in the house, enabling an ubiquitous control of devices and simplifying man/machine interactions. This paper aims to present the home network interoperability (HoNeY) platform.
Design/methodology/approach
Home networks and their challenges are analyzed, then the technology that constitutes the base for the present implementation is briefly revised. The HoNeY platform is presented, in terms of its architecture, implementation, and constraints.
Findings
The HoNeY platform is an multimedia home platform (MHP)‐based, low‐complex, cost‐effective architecture for automatic discovery, configuration, and dynamic access to distributed services in home environments.
Originality/value
This paper describes HoNeY, a mechanism of service discovery and code mobility designed for interoperability of devices connected to home networks, compatible with the MHP standard.
Details
Keywords
Graham P. Bell and David Kavanagh
If you understand the fundamental objectives of your organization andhow your telecommunication network assists you to achieve theseobjectives you will have a sound basis for the…
Abstract
If you understand the fundamental objectives of your organization and how your telecommunication network assists you to achieve these objectives you will have a sound basis for the development of network security. The types of potential interruption must also be understood remembering that small, intermittent failures can be worse than complete collapse. Risk exposures can be prioritized and contingency plans established. Duplicated carrier communications, private network triangulation, and virtual private networks are considered as well as ISDN and switched backup services. The consolidation of discrete services to make switching to alternative sites much easier is also suggested.
Details
Keywords
The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated…
Abstract
The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated into three main pillars, which we refer to as the Triple-Win. The first and most obvious pillar is technology as a tool. The second pillar is the design and sustainability of the business model, without which the previous factor would be merely a cost and not an investment. And last but not the least, there is the purpose which gives meaning to the proposal, focusing on the human being and their environment. The DIDPAGA business model sits at the intersection of these three elements.
Details