|
參考文獻[1]張家瑜、曾柏堯,探索VPN,網路通訊,資訊與電腦,2001.9[2]葉筱楓,IP-VPN技術及應用發展之探討,電信研究雙月刊 第31卷第二期,2001.4[3]談應衡,企業網路功能需求分析之研究,實踐大學企業管理研究所碩士論文,2001.2[4]張書馨、范國寶,IP-VPN服務品質管理技術之探討,第93期電腦與通訊,2000.5[5]羅建昌,企業虛擬私有網路之探討-MPLS技術簡介,電腦科技第55期,1999.12[6]陳春秀、劉萬鈞,IP-base Virtual Private Network服務與技術,第84期電腦與通訊,1999.11[7] Bellman,B., “Do-it-yourself VPNs,” Business Communications Review, Vol.32 , pp.28-32 , May 2002.[8] Wright, A., “Virtual Private Network Security,” Network Security Vol. 2000, Issue: 7, pp. 11-14, July 2000.[9] Brown, A., “VPNs: Only Part of the Remote Access Security Solution,” Network Security, Vol. 2001, Issue: 1, pp.12-14, January 2001.[10] Gunter, M., Braun, T. and Khalil, I., “An architecture for managing QoS-enabled VPNs over the Internet,” Local Computer Networks, 1999. LCN ''99. Conference on , 1999 pp. 122 -131[11] Younglove, R. , “Virtual private networks - how they work,” Computing & Control Engineering Journal , Vol. 11 ,Issue: 6 , pp.260 –262 ,Dec. 2000.[12] Patton, S. and Smith, B., “A Virtual Private Network Deployment Framework,” Local Computer Networks, Proceedings. 25th Annual IEEE Conference on , 2000, pp.225 -226[13] Venkateswaran, R. , “Various services and implementation scenarios-Virtual Private Network,” IEEE Communications Magazine, March 2001. [14] Lee, H., Hwang, J., Kang, B., and Jun, K., “End-To-End QoS Architecture for VPNs:MPLS Deployment in a Backbone Network,” IEEE Electronics and Telecommunications Research Institute, September 2000.[15] Zhang, G. and Mouftah, H. T., “End-to-End QoS Guarantees Over Diffserv Networks,” IEEE Computing & Control Engineering Journal, January 2001.[16] Yurcik, W. and Doss D., “A Planning Framework for Implementing Virtual Private Network,” IEEE Communications Magazine ,June 2001.[17] Perry, B. G., “What is a VPN,” Information Security Technical Report, Vol. 6, No.1 , pp.15-22 , 2001.[18] Broderick, J. S., “VPN Security Policy,” Information Security Technical Report, Vol. 6 , No.1 , pp.31-34 , 2001.[19] Alexander, H., Alexander, R.B., Jing Z. and Qun Z., “Value added service-voice, data, frame relay, ATM, and IP all on one,” Communication Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on , Vol.1 , pp.621 -626 , 2000.[20] Daniel, M., “Next-gen VPNs: The design challenge,” Data Communications, Vol.28 , pp.83-95 , Sep 1999.[21] Wexler, J., “QOS: What can service providers deliver,” Business Communications Review, Vol.29 , pp.25-30 , Apr 1999.[22] Braun, T., Guenter, M. and Khalil, I., “Management of Quality of Service Enabled VPNs,” IEEE Communications Magazine, pp.90-98 , May 2001.[23] De Clercq, J., Paridaens, O., “Scalability implications of virtual private networks,” IEEE Communications Magazine , Vol. 40 , pp.151 –157, May 2002.[24]“Marketing Opportunity and paths for Implementation, A Guide for Enterprises and Service Providers with Market Forecasts Provided by Infonetics Research,” 1999 by VPNet Technologies Inc.[25] RFC 2637:Point-to-Point Tunneling Protocol(PPTP)[26] RFC 2401:Security Architecture for the Internet Protocol[27] RFC 2402:IP Authentication Header[28] RFC 2406:IP Encapsulating Security Payload(ESP)[29] RFC 2408:Internet Security Association and Key Management Protocol[30] RFC 2409:The Internet Key Exchange (IKE)[31]“Layer Two Tunneling Protocol (L2TP)”, [32] http://www.worldcom.com/main.phtml[33] http://www.ipservices.att.com[34] http://www.hinet.net/hiproduct/product.htm
|