• Corpus ID: 60426929

Beginning OpenVPN 2.0.9 : build and integrate virtual private networks using OpenVPN

  title={Beginning OpenVPN 2.0.9 : build and integrate virtual private networks using OpenVPN},
  author={Markus Feilner and Norbert Graf},
This book is an easy introduction to OpenVPN. While providing only necessary theoretical background, it takes a practical approach, presenting plenty of examples. It is written in a friendly style making this complex topic easy and a joy to read. It first covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before covering advanced uses of OpenVPN. This book is for both experienced and new OpenVPN users. If you are interested in security and privacy in the internet… 


This thesis work describes how to configure and use OpenVPN with Windows operating system and discusses what OpenVPN is all about, the cryptography involved, the configuration process and key generation in both server and client, how to use it and why it is a necessity to all business corporations.

A Study of VoIP Performance in Anonymous Network - The Onion Routing (TOR)

Examining VoIP performance in an anonymous network – The Onion Routing (Tor), two scenarios are implemented using the real Tor network to investigate three QoS metrics for VoIP: latency, jitter and packet loss, and results show that the QoS of VoIP over the two Tor relays was better than the Vo IP over the three Tor relay.

Empirical performance analysis of anonymizing VoIP over The Onion Router (TOR) network

This research investigates the QoS of VoIP on an existing anonymous system - The Onion Router (TOR) in two scenarios: TOR with 3 relays and TOR with 2 relays to reveal that percentages of acceptable quality calls in both scenarios were less than 50% for 1% packet loss.

Securing autonomous networks through virtual closure

Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs, a Virtual Closed Network (VCN) architecture is proposed.

Application of virtualization technology to the study of quality of service techniques

In this article, the teaching of quality of service mechanisms in packet-switched networks is presented. To this end, a methodology based on virtualization technology is introduced. As a result, a

Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System

This paper proposes an adaptive end-to-end security model that supports the defense requirements for a scalable IoT infrastructure integrating both the IoT devices and the controller as one embedded device, with a focus on the integration of a security protocol at the embedded interface.

A Software Architecture for Parallel List Processing on Grids

DLML-Grid is presented, a software architecture for DLML to run in Grid environments composed of multiple distributed clusters that is hierarchical and tends to localise communication within clusters, thus reducing communication overhead.