A Study of Security Limitations in Virtual Local Area Network Implementation
Virtual Local Area Network (VLAN) in simple terms is defined as a group of Local Area Network (LAN) that has different physical connections, but communicates as if they are connected on a single network segment.VLAN was developed mainly for the need in network segmenting solution, since network tra...
| Main Author: | Balasundaram, Arumugam |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/244/ http://psasir.upm.edu.my/id/eprint/244/1/549490_FK_2004_83.pdf |
Similar Items
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
by: Haron, Muhammad Adib, et al.
Published: (2008)
by: Haron, Muhammad Adib, et al.
Published: (2008)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
Secure address resolution protocol proxy in software defined network
by: Munther, Munther Numan
Published: (2018)
by: Munther, Munther Numan
Published: (2018)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
by: Khairi, Kharina
Published: (2003)
by: Khairi, Kharina
Published: (2003)
Embedded Ethernet Web Server for a Robot Arm Control
by: Zaw, Toe Oo
Published: (2002)
by: Zaw, Toe Oo
Published: (2002)
Voice/data integration over ethernet network.
by: Mohd Ali, Borhanuddin
Published: (1990)
by: Mohd Ali, Borhanuddin
Published: (1990)
Enhancing the MAC throughput by two schemes of frames aggregation with eA-MSDU in WLANs
by: Al-Dulaimy, Osamah Samer
Published: (2017)
by: Al-Dulaimy, Osamah Samer
Published: (2017)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
Class-based weighted window for TCP fairness in WLANs
by: Seyedzadegan, Mojtaba, et al.
Published: (2009)
by: Seyedzadegan, Mojtaba, et al.
Published: (2009)
Seamless vertical handover between 3g universal mobile telecommunications system and wireless LAN with modified mobile stream control transmission protocol
by: Hamza, Bashar Jabbar
Published: (2011)
by: Hamza, Bashar Jabbar
Published: (2011)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Integrated OBD-II and direct controller area network access for vehicle monitoring system
by: Khosravinia, Kavian
Published: (2018)
by: Khosravinia, Kavian
Published: (2018)
TM Net promoting broadband lifestyle
Published: (2008)
Published: (2008)
Affordable broadband technology for rural folk
Published: (2008)
Published: (2008)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Fairness Of the TCP-based new AIMD congestion control algorithm.
by: Jasem, Hayder Natiq, et al.
Published: (2009)
by: Jasem, Hayder Natiq, et al.
Published: (2009)
SINR based algorithm for vertical handover between WiMAX and Wi-Fi networks / Ammar Bathich
by: Bathich, Ammar
Published: (2014)
by: Bathich, Ammar
Published: (2014)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Monitoring and Controlling of Mobile Harvesting Robot Through Wireless LAN
by: Lim, Yu Jian
Published: (2004)
by: Lim, Yu Jian
Published: (2004)
Performance Evaluation of a Modified Carrier Sense Multiple Access with Collision Detection Protocol
by: Kabir, Shamima
Published: (2005)
by: Kabir, Shamima
Published: (2005)
Quaternion model of enhanced rotating polarization wave for robust higher order modulation Low Power Wide Area Network wireless communication
by: Ahmad, Zaid
Published: (2022)
by: Ahmad, Zaid
Published: (2022)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Global-local multidisciplinary optimisation of aircraft
by: Sferza, Massimo
Published: (2023)
by: Sferza, Massimo
Published: (2023)
Similar Items
-
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
by: Haron, Muhammad Adib, et al.
Published: (2008) -
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006) -
Secure address resolution protocol proxy in software defined network
by: Munther, Munther Numan
Published: (2018) -
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011) -
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
by: Khairi, Kharina
Published: (2003)