1. Introduction
There are 15.618 students in Bilkent University [1], including undergraduate students, Master students and PhD students. Currently 4025 students are living in the Bilkent dormitories [2] so 11.261 students live out of Bilkent University. When I conduct an online survey with these Bilkenters, according to survey results, %78.38 of Bilkenters use Bilkent Virtual Private Network from out of Bilkent [3]. This means that 8200 Bilkenters use Virtual Private Network of Bilkent. Also, according to survey results %51.36 of Bilkenters, in other words 4100 people use Bilkent Virtual Private Network in their daily life [4]. Therefore, Bilkent Virtual Private Network has a vital importance for Bilkenters. So that, if any problem occurring to the connection to the Bilkent VPN service, it needs to be solved as soon as possible.
I experienced that when I want to connect to the Bilkent Virtual Private Network, I have connection problems and I conducted a survey to see whether this is common problem or not. I asked the question “Are you have connection problem to the Bilkent VPN server?" the answer is clearly indicates that this problem is not use related problem. It is totally server related problem because %74 of participants votes for "yes" [5]. Since the Bilkent VPN has a vital importance to complete numerous tasks, solving this problem has a direct relation with increasing performance of the Bilkent students. This proposal intends to examine the factors creating a connection problem and investigates possible solutions to change this negative state by taking cost and duration of the implementation into account.
2. Problem definition
2.1 Poor quality servers
The servers which are used for Virtual Private Network services are...
... middle of paper ...
...ector of Bilkent Computer Center, Bilkent Dormitories Administration. Interview. Ankara, Turkey. March 19, 2014
[7] Uğur Ayfer. Director of Bilkent Computer Center, Interview. Ankara, Turkey. March 19, 2014
[8] Vice Chief Executive of Bilkent Computer Center, Bilkent Dormitories Administration. Interview. Ankara, Turkey. March 19, 2014
[9] Bobcares, “Physical Vs Virtual server : Which one should you choose?” http://bobcares.com/blog/virtualization-or-physical-server/#sthash.C0uX5FS7.dpuf” 2011. [Online]. Available: http://bobcares.com/blog/virtualization-or-physical-server/ [Accessed March 23, 2014].
[10] Bobcares, “Physical Vs Virtual server : Which one should you choose?” http://bobcares.com/blog/virtualization-or-physical-server/#sthash.C0uX5FS7.dpuf” 2011. [Online]. Available: http://bobcares.com/blog/virtualization-or-physical-server/ [Accessed March 23, 2014].
Server Virtualization: Server virtualization utilizes regular physical equipment to have virtual machines. A physical host machine could have any number of virtual machines running on it with the goal that one arrangement of equipment is utilized to run diverse machines. Virtual machines can be introduced with their own particular working framework and their own distinctive arrangement of utilizations; the working frameworks or applications don't should be the same over the virtual machines.
anybody can do? IBM has taken on the leader of software with an innovative new
Virtualizing your server lets you run different Operating Systems, such as Windows and Linux, in different virtual servers on the same physical server. Once you have one virtual server configured, you can use that same configuration to set up new virtual servers, which takes just a few minutes. Compared to the hours it takes to configure a new physical server, server virtualization is far more efficient (Marshall, 2011).
For that hardware virtualisation is more beneficial to handle all servers together and provide data from data centre of server to user virtual desktop.
Paranet Solutions Seamlessly Tranforms Granite Properties’ Aging Server Network into a High-Tech Virtual Environment with Zero Downtime
Hardware, software, support and maintenance costs grow each year with multiple systems in each local region running different types of software and hardware. The application and hardware support teams are larger than could be possible with one integrated solution.
Top 10 VPN Services for Netflix That Still Works Safely Introduction: We spend a lot of time on Netflix, and why shouldn’t we? You get the best television and movies for just ten dollars a month. Though we spend a lot of time TV online, we are unaware of the danger we pose to our information. Hackers, spyware, and viruses attack unprotected PC’s taking personal information when we do transactions online.
Virtual Private Network presents some advantages over the traditional network technologies. VPN offers direct cost savings over leased lines or long-distance calls for remote access, savings resulting from reduced training requirements and equipment, increased flexibility, scalability, and security. The main advantage of VPN is the cost savings of Internet VPN when compared to networks built using conventional leased lines. Leased lines include tariffs that have an installation fee, a fixed monthly cost, and a mileage charge. The cost to an organization of traditional leased lines may be reasonable at first but can increase exponentially as the organization grows. As an organization grows and more companies must be added to the network, the number of leased lines required increases dramatically. VPN that utilizes the Internet avoids this problem by simply tapping into the geographically distributed access already available. Another way VPN reduces costs is by reducing the need for long-distance telephone charges for remote access. Instead of having the offsite team of a company dial into the corporate modem bank via long distance lines, the company’s VPN allows them to simply place local calls to the ISP’s POP in order to connect to the corporate network.
Once the new application architecture is implemented, employees will be required to run an internet browser (preferably IE6) with a minimum of 128-bit encryption. User will then browse to a secured URL through their web browser to establish a secure connection with the corporate VPN. This will require that each location's firewall be configured to pass all secured traffic over port 443. Once a secured connection is established, users will be prompted to login with either their username or clock number and their chosen password.
Against the above background, this report is intended to provide an objective review of where and how Linux might fit into your business related plans and activities moving forward. The aim is to deliver insight rather than recommendations – i.e. it is not my intention to either advocate or discourage desktop Linux adoption, just to help understand the potential benefits, issues and practicalities so the fit...
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
Over the last couple of years Network connection methods have been growing better and better so that the internet is easier to access and much more convenient. About 10 years ago it would have been hard to play games on the computer because of the speed of the connection and signals were received slower, But now days you don’t have to wait for a video to load or to receive a message from across the world. Below I have listed three different types of connections and explained their how they work.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
The agreement between the company and I was to advice the company management toward adopting the best network management plan and security plan. Through the study, I carried out in the firm I was required to evaluate the firm requirement in term of network planning and making sure that the firm has proper mechanism to secure its systems against malicious damage. Considering that, the management personnel have background in IT therefore; they required me to give an expert opinion on the best ways in which they can adopt the network management and the security plan. They required me to evaluate firm needs and what the IT world would offer the firm to enable them to lay down plans for the network and security in the firm.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...