網的虛擬專網 的英文怎麼說

中文拼音 [wǎngdezhuānwǎng]
網的虛擬專網 英文
ip-based virtual private network
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ動詞(獨自掌握和佔有) monopolize; take possession alone Ⅱ形容詞(集中在一件事上的) concentrate...
  • 虛擬 : 1. (虛構的) invented; fictitious 2. (假設的) suppositional; 虛擬語氣 [語言學] subjunctive mood
  1. High - speed, muti - services and economy have become the major issues of the future ip backbone technology as far as thes poiflt is concerned, thes paper explores layer 3 switdrig technology which separates control component and forward compontal in the traditional roulers. two forwarding al gori thms - - - - d ata - driven mo d el and top olo gy driven model are also compared, a next generation ip backbone echno l o gy - - - - multiproto co l label switching is developed, with its operation and its deployinent in traffic engineering, c1ass - ofservce and virtual private network

    本文從未來ip骨幹技術所要求高速化、多業務支持、經濟性出發,介紹了在傳統路由器基礎上將控制部件和轉發部件分離第三層交換技術,比較了數據驅動模型和控制驅動(拓撲驅動)模型兩種轉發演算法,並由此引出下一代ip骨幹路技術? ?多協議標記交換,闡述了其工作原理以及在流量工程、服務等級區分和應用。
  2. Study of virtual private network qos based on rsvp

    基於資源預留協議服務質量研究
  3. This paper starts the research of the liquid floated pendulous accelerometer testing system according to the engineering. at first, this paper gives the brief introduction of the history and present status of accelerometer and its testing technology, the working principium and math model of the liquid floated pendu - lous accelerometer, and then, decides the binary width pulse force retrim loop as the design proposal of testing system, researches the transfer function of every part in the system emphasizly, analyses the stability of the whole accelerometer testing system from the angle of control theoretics by the open loop transfer function of system, and designed the correcting net, analyses the basal problems such as resolution, sampling restraint, precision and so on, designs the hardware testing circuits such as preamplification, band - pass filter, alternating amplifier, phase sensitive demodulatorn, pulse - width modulation, frequency scale circuit, moment current generator. finally, using the graphics program language labv - iew which is designed for testing field especially by ni accomplishes the solfware design of testing system, realized the testing functions

    首先對加速度計及其測試技術發展歷史和現狀,液浮擺式加速度計工作原理和數學模型等作了簡要介紹,然後確定了以二元調寬脈沖再平衡測試迴路為設計方案,並從控制理論角度進行了分析,著重研究了系統中各部分傳遞函數,利用系統開環傳遞函數分析了系統穩定性,同時設計了系統校正路;分析了二元調寬脈沖再平衡測試迴路解析度、采樣約束以及測試精度等基本問題,並按照系統分析結果設計了包括前置放大、帶通濾波、交流放大、相敏解調、脈寬調制、頻標電路以及力矩電流發生器等測試系統各部分硬體電路,驗證了電路正確性,最後按照測試系統要求,採用了美國ni公司為測試領域所開發儀器工具? ? labview作為測試軟體開發工具,利用該圖形化編程語言完成了測試系統軟體部分設計,實現了測試功能。
  4. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是能否取代傳統關鍵,本文對mplsvpn體系結構安全性進行了深入分析,包括地址空間和路由隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別結論。
  5. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議由來和優點之後,詳細闡述了概念、特點、安全技術及實現關鍵隧道協議,通過對實現技術分析比較,選用了安全性強大ipsec隧道技術,接著深入研究了ipv6安全協議ipsec體系結構、操作模式,詳細論述了ipsec協議簇各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對路層ip數據包安全保護。
  6. A relatively security, reliable virtual private network _ and implementary plan was designed to meet the demands of data traffic, security of information transmission, transmission of video frequency, ip telephone, oa of companies. the design applied vpn and realized data increment service, for example, transimission of video frequency, ip telephone and oa and so on. these projects gained good economic and social utility for si chuan unicom

    論文依據四川某集團公司對路數據通信、路信息傳輸安全、視頻傳輸、 ip電話、集團公司oa需求,具體設計了一個相對安全、可靠建設和實施方案,依據此方案在集團公司實施了vpn ,又在該vpn路平臺上實現了相關數據增值業務,如:視頻傳輸、 ip電話及集團公司oa等。
  7. Vpn technology based on ipsec and its realization

    技術及其實現
  8. Currently there are three popular applications for mpls in the core of large isp networks : traffic engineering ; class of service ( cos ) ; virtual private networks ( vpns )

    摘要介紹了mpls原理、優勢及其在大型isp核心應用:流量工程、服務等級和
  9. Mazhaode itself is not a technical background, but marketing professional, beginning in the year 2000, he and the first high - tech " mixes " were burgeoning virtual host, enterprise service the station, on that occasion he has not only earned money, but also to experience a profound truth : the only innovation can survive

    馬昭德本身不是技術出身,而是市場營銷業,從2000年開始,他第一次和高科技「觸電」是當時方興未艾主機、企業建站服務,那一次他不僅賺到了錢,還體會到一個深刻道理:路只有創新者能存活。
  10. Instead of continuing the conventional " see one, do one, teach one " apprenticeship model, all basic surgical trainees in ntec will need to undergo virtual reality training which fosters practice and development of laparoscopic techniques under different computer simulated scenarios before operating on a real patient. " hong kong is in urgent need of dedicated laboratory - setting training facilities for repetitive training and practices of skills in different simulated scenarios with no risk to patients

    見習外科醫生,除了採用傳統學徒形式學習(即由科醫生帶領見習醫生以病人作實習)外,在治理病人前,必須經過一糸列現實外科手術訓練,運用不同電腦模實境,加
  11. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「路」 ( vpn )隧道模型和企業級安全子結構模型為基礎,提出安全子抽象模型,然後詳細討論了安全子雙向認證訪問控制機制。
  12. In realizing the model, a d / 300pci - e1 board is adopted as the core component of voice server and globalcall ? api offered by dialogic is applied as the platform for software development

    系統將d 300pci - e1數字中繼卡作為語音服務器核心部件,以美國dialogic公司提供globalcall _ ( tm ) api為軟體開發介面,利用線程和等技術來實現其功能。
  13. Super - encrypt from keyboard to end user, set up a virtual private network for you and yours, and anyone who cracks the 802. 11 transmissions will sniff garbage

    從鍵盤到最終用戶超級加密為您設置路,破壞802 . 11傳輸任何人都將嗅探無用信息。
  14. Highlink believes it ' s a small world when there ' re friends around, we ' d like to be the bridge between you and your customers by providing voice & data services, internet access, enterprise virtual private network ( vpn ), e - commerce, enterprise telecommunications integration, telecommunications project design / construction and building / residential telecommunications facilities, and customized value - added telecommunication services

    海鄰電訊以「海內存知己,天涯若比鄰」為服務理念,為客戶提供語音/數據線、路接入、企業( vpn ) 、電子商務、企業通信整合、通信項目設計/施工及樓宇/住宅通信配套,並根據客戶需求提供定製化增值電信服務,輔助客戶通過海鄰電訊搭建通信橋梁,溝通無限。
  15. In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance

    在此基礎上,詳細闡述了集成模型解決方案? ? mplsvpn工作原理,包括mplsvpn路構成和運行模式,對實現所面臨問題:用戶地址空間重疊、路連通性約束、 vpn路由信息更新、節省骨幹帶寬資源、降低pe路由器處理復雜性以及如何在內訪問internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面優勢進行了說明。
  16. Cdma2000 1x packet data service is completely based on ip technique. when subscribers use packet data service, packet network offers a channel to connect ip network to mobile terminal. on this way, cdma2000 1x packet network can offer internet accessing 、 vpn ( virtual private network ) special network accessing service and so on. as 3g ( the third ganeration ) telecommunication technique come, packet network offers many expecting service, such as image flowing medium 、 video meeting 、 interactive game service, etc. this engineering design helps to construct cdma2000 1x packet network of sichuan unicom

    Cdma20001x分組數據業務完全基於ip技術。當用戶使用分組數據業務時候,分組域將為移動終端提供一個接入ip通道,在此基礎上, cdma20001x分組核心可以向移動用戶提供路、接入等多種分組數據業務。隨著3g通信技術發展,提供給移動終端用戶傳輸速率和可用帶寬將大大增加。
  17. But we should give attention to the security of vpns. if the hackers sniff, alter or fake the unprotected data while transferring through public networks, it may cause incalculable loss

    但需要指出是:如果在未採取安全措施上傳輸數據時,數據容易被監聽、篡改和偽造,將會給企業和組織造成難以估量損失。
  18. Virtual private network based on ipsec

    安全體系結構
  19. Analysis of security and implementation of virtual private network based on ipsec

    路實現及其安全性分析
  20. Key exchange implementation and security analysis for ipsec based virtual private network

    路密鑰交換實現及其安全分析
分享友人