network access control 中文意思是什麼

network access control 解釋
網路訪問控制
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,授權用戶就可以在任一internet終端實現對監控主機的訪問和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. Its support for granular access control, inheritance, and delegation of administrative task gives you the flexibility to secure resources without compromising your network ' s purpose

    它支持管理任務的粒狀通路控制、繼承和授權,使用戶能靈活保護資源而不會泄露計算機網路目的。
  3. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  4. The paper particularly analyzed the satellite resource management structure, satellite connect admission control and mac ( media access control ) protocol. then the proposed delay equalization algorithm was applied in this satellite network

    論文通過對衛星網路資源調度管理結構、衛星接入以及mac ( mediaaccesscontrol )協議的研究,將提出的基於時延均衡的調度演算法在衛星網路中實現。
  5. Model for access control of network security based on smart card

    基於群體智能的網路信息自組織方式
  6. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由器,用來提供網路層一級的安全訪問機制;代理服務器,用來提供應用層一級的訪問控制機制;認證服務器,用來提供用戶身份認證。
  7. The content of this article is the research on the protocols for wireless communications on the media access control ( mac ) layer, which is a sublayer of the link layer, one of the five layers ( the physics layer, the link layer, the network layer, the transmission layer and the application layer ) which construct the stack of protocols for wireless communications. the emphasis of the research is on the applicability and superiority of two protocols on the mac layer

    本文的研究內容是mac ( mediaaccesscontrol )層? ?無線傳輸的五層協議棧結構(物理層、鏈路層、網路層、傳輸層、應用層)中數據鏈路層的媒體接入控制子層? ?無線通信協議,重點研究兩種協議在傳感器網路應用中的適用性和優越性。
  8. The communication and automation control room of the china research institute of electric power automation applies the xbrothers security and facility control system which includes : the air conditioning control system, ; the ups control system ; the leaking control system ; the electric power supply system ; the temperature and humidity control system ; the video surveillance system ; the access control system ; the ventilating control system ; the fire alarm system ; the intruder alarm system ; the internet network system and ; the communications management system

    系統將通信機房和自動化機房內包括:空調監控系統ups監控系統漏水監控系統機房配電系統監控系統機房環境溫濕度監測系統視頻監視系統門禁監測系統新風機監測系統煙霧報警監控系統報警系統web瀏覽系統通信管理站系統等設備系統在同一系統平臺上集中監控管理。
  9. Jdy - 280 electromagnetic lock with led product characteristic : easily installed, low noise and durable ; strong magnetic force, no magnet left when power off with led and network signal output built - in reverse wave protection function usage range : be used with intercoms and access control systems can be installed onto wooden door, metal door, glass door, fireproof door function : working voltage : 12vdc, 24vdc working current : 12vdc 0. 53a, 24vdc 0. 27a working condition : 40 50 working mode : cut off power to open wires are insulated, dc500v absolutely insulated in 1 minute. dimension of the magnet board : : 184 x 36 x 11mm dimension : 235 x 45 x 30mm weight : 1980g yiwu qimingxing computer company copy right

    Jdy - 280磁力鎖帶指示燈產品特性:安裝方便噪音低壽命長吸力強無剩磁內置反向突波保護功能適用於90開門,有門偵測信號帶鎖狀態指示燈及聯網信號輸出適用於樓宇對講門禁系統配套使用適用門型:木門金屬門玻璃門防火門電氣性能:工作電壓: 12vdc 24vdc工作電流: 12vdc 0 . 53a 24vdc 0 . 27a工作環境: 40 50工作方式:斷電開鎖鎖狀態有指示燈指示:鎖門時綠燈指示燈亮開門時,紅色指示燈亮絕緣電阻測試: dc500v 1分鐘無擊穿鐵板尺寸: 184 x 36 x 11mm外形尺寸: 235 x 45 x 30mm重量: 1980g
  10. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控制框架及機制的相關理論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。
  11. People take a good many measures to protect their hosts and network, including access control, authentication table and the most important one : firewall

    為了保護主機和內部網路的安全,人們建立了多種安全機制,例如訪問控制、認證表,以及最重要、最基礎的機制:防火墻。
  12. Network aspects - metropolitan area network - medium access control layer management ; english version ets 300273 : 1994

    網路特徵.都市區網路.媒介入口控制層管理用一致性規
  13. Local and metropolitan area networks - port - based network access control

    局域網和城域網.基於埠的網路通路控制
  14. ". the use of individual mac addresses with eapol permits the use of eapol in shared media lan environments, and, in particular, this has been allowed in order to support the use of port - based network access control in ieee 802. 11 wireless lan infrastructures

    「將個體mac地址與eapol ( 7 . 8 )一起使用,可以允許在共享媒體局域網環境中使用eapol ,而且特別是它已經過允許,以便支持在ieee 802 . 11無線局域網基礎結構中使用基於埠的網路訪問控制。
  15. Port based network access control

    基於埠的網路訪問控制
  16. Network access control

    網路接達控制
  17. The thesis reviews the development of internet and network access control technology currently. it analyzes some product about www contents access control and discusses their specialties and disadvantages

    本文首先回顧近年來網路以及網路訪問控制技術的發展情況,對目前的一些網路內容訪問控制產品進行分析,討論網路訪問控制技術的特點等。
  18. Management system of user network business is one important component of user management and network access control platform. it is divided into two subsystems : management subsystem of user business and management subsystem of unit business

    「用戶網路業務管理系統」是「用戶上網管理控制平臺」的一個重要組成部分,它又分為兩個子系統: 「用戶業務管理子系統」和「單位業務管理子系統」 。
  19. It is absolutely necessary to strictly manage the internal users and standardize network behaviors of these users in order to improve the security of computer network as well to ensure the security of information source and to weaken the security threaten, which are the aims of user management and network access control platform

    根據這一迫切需求,我們研製了「用戶上網管理控制平臺」 ,以加強內部用戶的管理和規范用戶的上網行為,從端系統著眼,通過確保信息源的安全來降低網路安全風險,該平臺的實現具有非常重大的現實意義和應用推廣價值。
  20. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病毒等各種網路危險的入侵,全面保護個人上網安全。
分享友人