<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-07T11:39:56Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/6192" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/6192</identifier>
        <datestamp>2021-12-13T05:00:46Z</datestamp>
        <setSpec>1582963342780:1596102355557</setSpec>
        <setSpec>user-uit</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Design And Implementation Of A Secure Network Connection Of The University</dc:title>
          <dc:creator>Thin Naing</dc:creator>
          <dc:creator>Aung Nway Oo</dc:creator>
          <dc:description>A network security is the most vital component of a campus network design. Campus network faces the security
challenges which are influenced by network infrastructure. Secured network will guard valuable data and
information of an organization from security attacks associated with network. A university network has a various
type of usages, such as teaching, learning, research, management, e-library, result publishing and connection with
the external users. The university network needs to have security network design to protect from different types of
threats and attacks. Most of organizations use physical firewalls and encryption mechanisms to adapt the security
features of campus network. This paper provides a framework for implementing secure VPN connection with IPCop
opensource firewall in campus network. According to the evaluation of the users’ interview, the usage of this
technique has become possible to provide cost effective, reliability and data integrity in secure data transmission.</dc:description>
          <dc:date>2019-05-01</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000006192</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/6192</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
