虛路由 的英文怎麼說

中文拼音 [yóu]
虛路由 英文
vr virtual route
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : causereason
  1. High - speed, muti - services and economy have become the major issues of the future ip backbone technology as far as thes poiflt is concerned, thes paper explores layer 3 switdrig technology which separates control component and forward compontal in the traditional roulers. two forwarding al gori thms - - - - d ata - driven mo d el and top olo gy driven model are also compared, a next generation ip backbone echno l o gy - - - - multiproto co l label switching is developed, with its operation and its deployinent in traffic engineering, c1ass - ofservce and virtual private network

    本文從未來ip骨幹網技術所要求的高速化、多業務支持、經濟性出發,介紹了在傳統器基礎上將控制部件和轉發部件分離的第三層交換技術,比較了數據驅動模型和控制驅動(拓撲驅動)模型兩種轉發演算法,並此引出下一代ip骨幹網技術? ?多協議標記交換,闡述了其工作原理以及在流量工程、服務等級區分和擬專用網中的應用。
  2. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  3. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的來和優點之後,詳細闡述了擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網層ip數據包的安全保護。
  4. In wormhole meshes, a reliable routing is supposed to be deadlock - free and fault - tolerant. many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none of them, however, is capable of handling two convex fault regions with distance two by using only two virtual networks

    在應用蟲孔的mesh結構的多處理機系統中,已經有許多基於維數序的容錯的演算法被提出,其中大多數演算法只能容忍矩型或凸型的故障節點組成的區域,但是,至今還沒有一個演算法能應用兩個擬通道處理凸型convex故障區域距離大於和等於2的情況。
  5. But because different unit ' s java standard libraries has different aim, and some unit ' s java standard libraries only be used in their interior, at present, it ca n ' t be shared. we bring forward a idea that is making a virtual parts library in the web

    但是於各單位和部門所建的標準件庫的使用目的和標準不同,而且很多標準件只是供創建單位內部使用,無法達到共享資源的目的,因此本文提出了基於網擬設計的思想,並進行了初步嘗試,建立了擬零部件庫。
  6. This new developing social phenomenon of fictitious property of the network, because there is difference in the academia and judicial circle understanding of its legal attribute, and then has caused the dispute applicable to law of the fictitious property case of the network

    擬財產這一新興的社會現象,於在學術界與司法界對其法律屬性的認識存在分歧,進而導致了針對網擬財產個案的法律適用的爭議。
  7. The vitality and anonymity make the traditional signature unable to adapt to the social communication lack of paper environment, which leads to legal subject unable to be identified, idea express distrusted, the right and duty independent. electronic signature, electronic certification and the law of electronic signature appear accordingly

    於網空間的擬性和匿名性,使得傳統書面簽章因缺乏紙本環境而無法適應以網際網為載體的社會交往模式,從而造成了主體雖然存在,卻缺乏可靠驗證無法辨認其身份,不可信任其意思表示,權利義務無所憑依等問題。
  8. In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance

    在此基礎上,詳細闡述了集成模型的解決方案? ? mplsvpn的工作原理,包括mplsvpn的網構成和運行模式,對實現擬專用網所面臨的問題:用戶地址空間重疊、網連通性約束、 vpn信息更新、節省骨幹網帶寬資源、降低pe器處理的復雜性以及如何在擬專用網內訪問internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面的優勢進行了說明。
  9. There is an important problem for the wdm network which is the traffic on the wdm network is dynamically variable, as a result, if the traffic on the virtual topology has changed, the performence of the network such as average number of weighted hops, the throughput of the network, the congestion of the network will decline, obviously, this is not acceptable for both the network administrators and network clients. in this thesis, the research of the plan of the wdm network under dynamically variable traffic can be classified into two main directions

    Wdm光傳送網是下一代高速廣域骨幹網的最具競爭力的候選者,但是, wdm網存在的一個重要問題是在wdm網上運行的業務量是動態變化的,這造成的結果是最初通過搭建光設計好的光網拓撲在新的業務量矩陣下它的性能如網平均權重跳數,網負載均衡性,網擁塞等性能指標都有可能下降,這顯然是各個網運營商和網用戶所不能忍受的。
  10. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底層對數據傳輸提供安全保護與其它在高層協議中提供安全保護的技術不同,在ip層提供安全性保護對應用程序和終端用戶都是透明的,不需要應用程序、其它通信層次和網部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使用ip協議進行通信的任何機器上,不論是運行在器、防火墻主機、各種各樣的應用服務器上,還是運行在終端用戶的個人計算機或筆記本電腦上,它都能提供一定的安全保障;最後,利用ipsec實現擬專用網是目前通過internet實現企業內部網的主要解決方案之一。
  11. Finally, we implement the olsr on the target operation system and network a manet by the criterion ieee802. 11b. the implementation is done in a modular fashion. it is divided into three layers, visl ( virtual interface service layer ), mesl ( message and event schedule layer ) and rsml ( routing service manage layer )

    實現方案以模塊化的方式來設計,分為三個層:擬介面服務層( virtualinterfaceservicelayer ,簡稱visl ) ,消息及事件調度層( messageandeventschedulelayer ,簡稱mesl )和服務管理層( routingservicemanagelayer ,簡稱rsml ) 。
  12. While they typically do not include the protocol filtering and other routing functions offered by backbone switches, some workgroup switches support advanced software including stp, simple network management protocol and virtual lans

    一般而言,雖然它們不包含基幹交換機提供的協議過濾和其它功能,但某些工作組交換機支持高級軟體,如stp 、簡單網管理協議和擬局域網。
  13. A server running the routing and remote access service can route network traffic or set up either dial - up networking or a virtual private network ( vpn )

    執行及遠端存取服務的伺服器可以流量,或設定撥號網擬私人網( vpn )的其中一種。
  14. Fault - tolerant wormhole routing with 2 virtual channels in meshes

    Mesh中應用兩個擬通道的容錯的蟲孔演算法
  15. A virtual machine with nat enabled acts much like a real computer that connects to the internet through a router

    設置為通過nat方式連接的一臺擬機能像一臺真正的計算機一樣訪問網際網,主機就是一隻器。
  16. Rras server can route network traffic or set up either dial - up networking or a virtual private network ( vpn )

    Rras伺服器可以流量,或設定撥號網擬私人網( vpn ) 。
  17. A rras server can route network traffic or set up either dial - up networking or a virtual private network ( vpn )

    Rras伺服器可以流量,或設定撥號網擬私人網( vpn ) 。
  18. A network access server can route network traffic or set up either dial - up networking or a virtual private network ( vpn )

    存取伺服器可以流量,或設定撥號網擬私人網( vpn )的其中一種。
  19. With analyzing the shortcoming of ip load balancing technique vs / nat and the non - symmetric property of internet services, we propose two techniques vs / tun and vs / dr for building a virtual server via ip tunneling and direct routing respectively, which can greatly improve scalability of the system

    在ip負載均衡技術上,針對網服務非對稱性的特點,為克服vs nat伸縮能力差的缺點,本文提出通過ip隧道和直接實現擬服務器的兩種方法vs tun和vs dr ,極大地提高了系統的伸縮性。
  20. Therefore, author not only pay attention to key distribution protocol research and implementation, but also attend to build up a wsn simulated application structure. choosing aodv routing protocol as under - communication protocol, combining data integration, cluster selection, cluster building and other techniques, author intend to realize wsn low - consuming network communication by various measures

    因此在本文中作者不僅對密鑰預分配協議進行實現,更模擬建立了一個無線傳感器網實際應用的擬環境,選擇aodv協議作為低層通信協議,融入數據融合技術,簇首節點選擇和簇結構生成等技術,以達到低功耗安全通信技術探究與實現的目的。
分享友人