1. Introduction
There are 15.618 students in Bilkent University [1], including undergraduate students, Master students and PhD students. Currently 4025 students are living in the Bilkent dormitories [2] so 11.261 students live out of Bilkent University. When I conduct an online survey with these Bilkenters, according to survey results, %78.38 of Bilkenters use Bilkent Virtual Private Network from out of Bilkent [3]. This means that 8200 Bilkenters use Virtual Private Network of Bilkent. Also, according to survey results %51.36 of Bilkenters, in other words 4100 people use Bilkent Virtual Private Network in their daily life [4]. Therefore, Bilkent Virtual Private Network has a vital importance for Bilkenters. So that, if any problem occurring to the connection to the Bilkent VPN service, it needs to be solved as soon as possible.
I experienced that when I want to connect to the Bilkent Virtual Private Network, I have connection problems and I conducted a survey to see whether this is common problem or not. I asked the question “Are you have connection problem to the Bilkent VPN server?" the answer is clearly indicates that this problem is not use related problem. It is totally server related problem because %74 of participants votes for "yes" [5]. Since the Bilkent VPN has a vital importance to complete numerous tasks, solving this problem has a direct relation with increasing performance of the Bilkent students. This proposal intends to examine the factors creating a connection problem and investigates possible solutions to change this negative state by taking cost and duration of the implementation into account.
2. Problem definition
2.1 Poor quality servers
The servers which are used for Virtual Private Network services are...
... middle of paper ...
...ector of Bilkent Computer Center, Bilkent Dormitories Administration. Interview. Ankara, Turkey. March 19, 2014
[7] Uğur Ayfer. Director of Bilkent Computer Center, Interview. Ankara, Turkey. March 19, 2014
[8] Vice Chief Executive of Bilkent Computer Center, Bilkent Dormitories Administration. Interview. Ankara, Turkey. March 19, 2014
[9] Bobcares, “Physical Vs Virtual server : Which one should you choose?” http://bobcares.com/blog/virtualization-or-physical-server/#sthash.C0uX5FS7.dpuf” 2011. [Online]. Available: http://bobcares.com/blog/virtualization-or-physical-server/ [Accessed March 23, 2014].
[10] Bobcares, “Physical Vs Virtual server : Which one should you choose?” http://bobcares.com/blog/virtualization-or-physical-server/#sthash.C0uX5FS7.dpuf” 2011. [Online]. Available: http://bobcares.com/blog/virtualization-or-physical-server/ [Accessed March 23, 2014].
Server Virtualization: Server virtualization utilizes regular physical equipment to have virtual machines. A physical host machine could have any number of virtual machines running on it with the goal that one arrangement of equipment is utilized to run diverse machines. Virtual machines can be introduced with their own particular working framework and their own distinctive arrangement of utilizations; the working frameworks or applications don't should be the same over the virtual machines.
anybody can do? IBM has taken on the leader of software with an innovative new
Virtualizing your server lets you run different Operating Systems, such as Windows and Linux, in different virtual servers on the same physical server. Once you have one virtual server configured, you can use that same configuration to set up new virtual servers, which takes just a few minutes. Compared to the hours it takes to configure a new physical server, server virtualization is far more efficient (Marshall, 2011).
For that hardware virtualisation is more beneficial to handle all servers together and provide data from data centre of server to user virtual desktop.
Paranet Solutions Seamlessly Tranforms Granite Properties’ Aging Server Network into a High-Tech Virtual Environment with Zero Downtime
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Hardware, software, support and maintenance costs grow each year with multiple systems in each local region running different types of software and hardware. The application and hardware support teams are larger than could be possible with one integrated solution.
Although VPN is very popular in the market for networking technology, it may raise some concerns for IT managers. VPN requires an in-depth understanding of public network security issues and proper deployment precautions. The task of choosing and deploying a VPN solution is far from being simple and may require the training of workers in at least the basics...
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
Zero-knowledge DNS: Use the DNS from the VPN instead of your own. Speed check: Keep an eye on speed, download speed and bandwidth usage at your own pace. Choose your VPN protocol: Choose the way you want to be connected to the VPN server.
Against the above background, this report is intended to provide an objective review of where and how Linux might fit into your business related plans and activities moving forward. The aim is to deliver insight rather than recommendations – i.e. it is not my intention to either advocate or discourage desktop Linux adoption, just to help understand the potential benefits, issues and practicalities so the fit...
Over the last couple of years Network connection methods have been growing better and better so that the internet is easier to access and much more convenient. About 10 years ago it would have been hard to play games on the computer because of the speed of the connection and signals were received slower, But now days you don’t have to wait for a video to load or to receive a message from across the world. Below I have listed three different types of connections and explained their how they work.
Once the new application architecture is implemented, employees will be required to run an internet browser (preferably IE6) with a minimum of 128-bit encryption. User will then browse to a secured URL through their web browser to establish a secure connection with the corporate VPN. This will require that each location's firewall be configured to pass all secured traffic over port 443. Once a secured connection is established, users will be prompted to login with either their username or clock number and their chosen password.
The network management plan and security plan is important to help the company figure out how they will improve its network and security procedures for the company. Planning involves outlining objectiv...
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...