scholarly journals A Lightweight Internet Sharing Scheme for Sectional Medical Images according to Existing Hospital Network Facilities and Basic Information Security Rules

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Liang Qiao ◽  
Hao Wu ◽  
Yi Wu ◽  
Wenjing Wu ◽  
Jingyi Yang ◽  
...  

Background. With the outbreak of COVID-19, large-scale telemedicine applications can play an important role in the epidemic areas or less developed areas. However, the transmission of hundreds of megabytes of Sectional Medical Images (SMIs) from hospital’s Intranet to the Internet has the problems of efficiency, cost, and security. This article proposes a novel lightweight sharing scheme for permitting Internet users to quickly and safely access the SMIs from a hospital using an Internet computer anywhere but without relying on a virtual private network or another complex deployment. Methods. A four-level endpoint network penetration scheme based on the existing hospital network facilities and information security rules was proposed to realize the secure and lightweight sharing of SMIs over the Internet. A “Master-Slave” interaction to the interactive characteristics of multiplanar reconstruction and maximum/minimum/average intensity projection was designed to enhance the user experience. Finally, a prototype system was established. Results. When accessing SMIs with a data size ranging from 251.6 to 307.04 MB with 200 kBps client bandwidth (extreme test), the network response time to each interactive request remained at approximately 1 s, the original SMIs were kept in the hospital, and the deployment did not require a complex process; the imaging quality and interactive experience were recognized by radiologists. Conclusions. This solution could serve Internet medicine at a low cost and may promote the diversified development of mobile medical technology. Under the current COVID-19 epidemic situation, we expect that it could play a low-cost and high-efficiency role in remote emergency support.

Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


Author(s):  
Bongsik Shin ◽  
Daniel C. Kinsella Jr.

An Internet-based Virtual Private Network (IVPN) is a system and service that enables secure communication within a controlled user group across the Internet public infrastructure. For the last few years, the Internet-based VPN has been available, providing organizational use for meaningful applications. The paper empirically investigates the value of IVPNs in managing communications among distributed business entities. For this, we conducted two case studies based on the information gathered from two companies. Then, a general decision model of the IVPN is proposed, which could be used for the assessment of its strategic value as well as for the design of virtual telecommunication networks at other organizations.


2009 ◽  
pp. 152-153
Author(s):  
Rana Tassabehji ◽  
James Wallace ◽  
Anastasios Tsoularis

The Internet has reached a stage of maturity where its innovative adoption and implementation can be a source of competitive advantage. Supply chains are one of the areas that has reportedly benefited greatly, achieving optimisation through low cost, high efficiency use of the Internet, almost seamlessly linking global supply chains into e-supply networks. This field is still in its academic and practical infancy, and there is a need for more empirical research to build a robust theoretical foundation, which advances our knowledge and understanding. Here, the main aims and objectives are to highlight the importance of information flows in e-supply chains/networks, and the need for their standardisation to facilitate integration, legality, security, and efficiency of operations. This chapter contributes to the field by recommending a three-stage framework enabling this process through the development of standardised Internet technology platforms (e-platforms), integration requirements and classification of information flows.


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


Author(s):  
Elly Mufida ◽  
Dedi Irawan ◽  
Giatika Chrisnawati

Technology VPN (Virtual Private Network) allows everyone to be able to access the local network from outside by using the internet. Through the VPN, the user can access the resources within the local network, gain rights and settings are the same as physically being in a place where the local network is located. Data security and secrecy of data transmission from unauthorized access in transmission on the Internet becomes the main standard in the VPN, so that the VPN is always included will be the main feature is the encryption and tunneling.


2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


2018 ◽  
Vol 2018 ◽  
pp. 1-6
Author(s):  
Yoh Sugawara ◽  
Tetsuya Miyashita ◽  
Yusuke Mizuno ◽  
Yusuke Nagamine ◽  
Tomoyuki Miyazaki ◽  
...  

Background. We previously reported a tele-anesthesia system that connected Sado General Hospital (SGH) to Yokohama City University Hospital (YCUH) using a dedicated virtual private network (VPN) that guaranteed the quality of service. The study indicated certain unresolved problems, such as the high cost of constantly using a dedicated VPN for tele-anesthesia. In this study, we assessed whether use of a best-effort system affects the safety and cost of tele-anesthesia in a clinical setting. Methods. One hundred patients were enrolled in this study. We provided tele-anesthesia for 65 patients using a guaranteed transmission system (20 Mbit/s; guaranteed, 372,000 JPY per month: 1 JPY = US$0.01) and for 35 patients using a best-effort system (100 Mbit/s; not guaranteed, 25,000 JPY per month). We measured transmission speed and number of commands completed from YCUH to SGH during tele-anesthesia with both transmission systems. Results. In the guaranteed system, anesthesia duration was 5780 min (88.9 min/case) and surgical duration was 3513 min (54.0 min/case). In the best-effort system, anesthesia duration was 3725 min (106.4 min/case) and surgical duration was 2105 min (60.1 min/case). The average transmission speed in the best-effort system was 17.3 ± 3.8 Mbit/s. The system provided an acceptable delay time and frame rate in clinical use. All commands were completed, and no adverse events occurred with both systems. Discussion. In the field of tele-anesthesia, using a best-effort internet VPN system provided equivalent safety and efficacy at a better price as compared to using a guaranteed internet VPN system.


Author(s):  
David Romyn ◽  
Mark Kebbell

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.


Sign in / Sign up

Export Citation Format

Share Document