虛擬專用網 的英文怎麼說

中文拼音 [zhuānyòngwǎng]
虛擬專用網 英文
virtual private network vpn
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ動詞(獨自掌握和佔有) monopolize; take possession alone Ⅱ形容詞(集中在一件事上的) concentrate...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • 虛擬 : 1. (虛構的) invented; fictitious 2. (假設的) suppositional; 虛擬語氣 [語言學] subjunctive mood
  1. High - speed, muti - services and economy have become the major issues of the future ip backbone technology as far as thes poiflt is concerned, thes paper explores layer 3 switdrig technology which separates control component and forward compontal in the traditional roulers. two forwarding al gori thms - - - - d ata - driven mo d el and top olo gy driven model are also compared, a next generation ip backbone echno l o gy - - - - multiproto co l label switching is developed, with its operation and its deployinent in traffic engineering, c1ass - ofservce and virtual private network

    本文從未來ip骨幹技術所要求的高速化、多業務支持、經濟性出發,介紹了在傳統路由器基礎上將控制部件和轉發部件分離的第三層交換技術,比較了數據驅動模型和控制驅動(拓撲驅動)模型兩種轉發演算法,並由此引出下一代ip骨幹路技術? ?多協議標記交換,闡述了其工作原理以及在流量工程、服務等級區分和虛擬專用網中的應
  2. Study of virtual private network qos based on rsvp

    基於資源預留協議的虛擬專用網服務質量研究
  3. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  4. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對路層ip數據包的安全保護。
  5. A relatively security, reliable virtual private network _ and implementary plan was designed to meet the demands of data traffic, security of information transmission, transmission of video frequency, ip telephone, oa of companies. the design applied vpn and realized data increment service, for example, transimission of video frequency, ip telephone and oa and so on. these projects gained good economic and social utility for si chuan unicom

    論文依據四川某集團公司對路數據通信、路信息傳輸安全、視頻傳輸、 ip電話、集團公司oa的需求,具體設計了一個相對安全、可靠的虛擬專用網建設和實施方案,依據此方案在集團公司實施了vpn ,又在該vpn路平臺上實現了相關的數據增值業務,如:視頻傳輸、 ip電話及集團公司oa等。
  6. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業路安全策略進行討論,分析了現有主機防火墻在企業中應的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業中的主機防火墻模型,並對這一模型進行了較深入地研究。
  7. Elementary analysis of ipsec and the vpn security technology

    虛擬專用網安全技術
  8. Vpn technology based on ipsec and its realization

    虛擬專用網技術及其實現
  9. Currently there are three popular applications for mpls in the core of large isp networks : traffic engineering ; class of service ( cos ) ; virtual private networks ( vpns )

    摘要介紹了mpls原理、優勢及其在大型isp路的核心應:流量工程、服務等級和虛擬專用網
  10. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「虛擬專用網路」 ( vpn )隧道模型和企業級安全子結構模型為基礎,提出安全子的抽象模型,然後詳細討論了安全子的雙向認證訪問控制機制。
  11. In realizing the model, a d / 300pci - e1 board is adopted as the core component of voice server and globalcall ? api offered by dialogic is applied as the platform for software development

    系統將d 300pci - e1數字中繼卡作為語音服務器的核心部件,以美國dialogic公司提供的globalcall _ ( tm ) api為軟體開發介面,利線程和虛擬專用網等技術來實現其功能。
  12. Super - encrypt from keyboard to end user, set up a virtual private network for you and yours, and anyone who cracks the 802. 11 transmissions will sniff garbage

    從鍵盤到最終戶的超級加密為您設置虛擬專用網路,破壞802 . 11傳輸的任何人都將嗅探無信息。
  13. Highlink believes it ' s a small world when there ' re friends around, we ' d like to be the bridge between you and your customers by providing voice & data services, internet access, enterprise virtual private network ( vpn ), e - commerce, enterprise telecommunications integration, telecommunications project design / construction and building / residential telecommunications facilities, and customized value - added telecommunication services

    海鄰電訊以「海內存知己,天涯若比鄰」為服務理念,為客戶提供語音/數據線、路接入、企業虛擬專用網( vpn ) 、電子商務、企業通信整合、通信項目的設計/施工及樓宇/住宅通信配套,並根據客戶需求提供定製化的增值電信服務,輔助客戶通過海鄰電訊搭建的通信橋梁,溝通無限。
  14. In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance

    在此基礎上,詳細闡述了集成模型的解決方案? ? mplsvpn的工作原理,包括mplsvpn的路構成和運行模式,對實現虛擬專用網所面臨的問題:戶地址空間重疊、路連通性約束、 vpn路由信息更新、節省骨幹帶寬資源、降低pe路由器處理的復雜性以及如何在虛擬專用網內訪問internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面的優勢進行了說明。
  15. Establishment and preliminary application of the interactive tele - radiologic conference system based on virtual private network

    基於虛擬專用網的互動式影像遠程會診體系的創建與初步應
  16. The active directory client extension does not deliver advanced virtual private networking protocols, like internet protocol security ipsec or layer 2 tunneling protocol l2tp

    該active directory客戶端擴展不提供高級虛擬專用網路vpn協議,如internet協議安全性ipsec或第2層隧道協議l2tp 。
  17. The main functions of the centralized management system are service provision management, such as virtual private network ( vpn ), service level agreement ( sla ), traffic engineering ( te ), billing and network resources management, and network auxiliary planning

    集中管理系統的主要功能是服務提供管理,如虛擬專用網( vpn ) 、服務水平協議( sla ) 、流量工程( te ) 、計費以及路資源管理、路輔助規劃等。
  18. Following a ta statement in april 1996 that the operation of virtual private network ( vpn ) services was outside the exclusivities of hkti ' s licence by the end of 1997, 17 licences for vpn services were issued

    在一九九六年四月,電訊管理局局長發出聲明,公布虛擬專用網路服務並不屬于香港國際電訊牌照的營范圍,自此至一九九七年底,該局共發出17個經營虛擬專用網路服務的牌照。
  19. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底層對數據傳輸提供安全保護與其它在高層協議中提供安全保護的技術不同,在ip層提供安全性保護對應程序和終端戶都是透明的,不需要應程序、其它通信層次和路部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使ip協議進行通信的任何機器上,不論是運行在路由器、防火墻主機、各種各樣的應服務器上,還是運行在終端戶的個人計算機或筆記本電腦上,它都能提供一定的安全保障;最後,利ipsec實現虛擬專用網是目前通過internet實現企業內部的主要解決方案之一。
  20. The network connection wizard guides you through the creation of dial - up connections, virtual private network connections, direct serial connections, and incoming connections

    路連接向導會引導您一步步地創建撥號連接、虛擬專用網路連接、直接串列連接和傳入連接。
分享友人