vpns 中文意思是什麼

vpns 解釋
虛擬私人空間
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. Currently there are three popular applications for mpls in the core of large isp networks : traffic engineering ; class of service ( cos ) ; virtual private networks ( vpns )

    摘要介紹了mpls原理、優勢及其在大型isp網路的核心應用:流量工程、服務等級和虛擬專用網。
  3. Vpns provide secure and stable tunnels through shared ip - based networks for remote access. extranet. and intranet connectivity at a significantly less cost than those associated with private leased lines

    Vpns利用隧道技術,以很低的成本為遠程訪問、 extranet和intranet應用提供了穿越公用網路的安全穩定的通道。
  4. Ideally, enterprises need their vpns to be cost - effective and to emulate the kinds of connections they ' ve become accustomed to, including support for pre - allocated bandwidth, transparent point - to - point connections, end - to - end security, and maximum up time

    理想的情況是,企業需要的vpn是低成本的、能模擬他所熟悉的各種連接,其中包括預分配的帶寬、透明的點對點連接、端至端的安全以及最大的不停機工作時間等。
  5. Mpls can, therefore, provide an excellent base technology for standards - based vpns. the development of mpls and vpn, which including the basic algorithm of mpls and vpn, the reason of using mpls, the traditional model of vpn, etc. are introduced summarily at first. then, the comparison of ip switching and mpls switching architecture are given

    論文首先介紹mpls和vpn的發展、基本原理以及傳統的vpn模型;接著對ip交換體系結構和mpls交換體系結構進行了比較;然後重點介紹基於mpls的vpn的實現;最後結合大連有線電視公司寬帶ip骨幹網這個典型案例介紹mplsvpn在實際工程中的應用並提出構建mplsvpn的一些基本方法。
  6. In our paper discussed both vpns and multicast by two clues

    在本文中我們通過兩條線索展開討論了上述兩種技術。
  7. Vpns irtual private networks

    虛擬專用網
  8. Using vpns, users can easily and securely connect to the corporate network

    利用vpn ,用戶可以方便安全地連接到企業網上。
  9. These pillars are firewalls, vpns, antivirus software, and intrusion detection systems ( ids )

    防護方法包括四個方面:防火墻、 vpn 、反病毒軟體,以及入侵檢測系統( ids ) 。
  10. Virtual private networks ( vpns ) are one of the most promising methods available for leveraging the power of public networks for private networking applications

    虛擬專用網( vpns )是有效利用公用網路作為專用網的一種最有前途的方法。
  11. This has created strong interest in ip - based vpns running over the public internet using standards - based interoperable implementations that work across multiple sps

    現實中需要基於ip的vpn能運行在公用internet上,能夠跨越多個服務商,並且實現方法簡單可操作性強。
  12. These solutions include firewalls, vpns, information auditing system, and other network security products and services, all these products and services have the same brand, net guard

    Ts是一家專業從事提供網路安全產品與服務的公司,其主要產品- - -防火墻在國內防火墻市場中佔有領先地位。
  13. But we should give attention to the security of vpns. if the hackers sniff, alter or fake the unprotected data while transferring through public networks, it may cause incalculable loss

    但需要指出的是:如果在未採取安全措施的虛擬專用網上傳輸數據時,數據容易被監聽、篡改和偽造,將會給企業和組織造成難以估量的損失。
  14. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用非vpn傳輸數據高,因為一個組織依靠vpn擴展其可信的內部邊界,允許外部分支訪問內部網路,破壞隧道的安全性等於破壞了所有內部網路。
  15. In the thesis, through management of vpn membership and provisioning of new vpns for rapid deployment provided by mpls / vpn, author find out the method of making a new service more accessible and fast implement of the services. by limit the vpn road internal, and make mpls / vpn have privacy and security equal to that provided by layer - 2 vpns by limiting the distribution of a vpn ' s routes to only those routers that are members of the vpn, ensure the method of the high credibility of the services ; by access to services projects of three layers and four area, realize support for multiple classes of service and priorities within vpns and independences, according with the method of network project with safety provide by the state grid corporation of china

    在論文中介紹了,作者通過mpls / vpn提供的vpn內部多級別業務,應用vpn創建及規范vpn成員管理、找出新業務的便利接入及業務的快速實施的方法;通過限制vpn路由信息的傳播僅在vpn成員內部,及使mpls / vpn具有與傳統的第二層vpn相同的私密性及安全性、實現業務隔離,保障業務的高可靠性的方法;通過業務接入三層四區的劃分方案,實現不同業務的優先級劃分及獨立性、滿足國家電網對數據網路規劃的安全性要求的方法。
  16. That is to say that ipsec is not suit for the guizhou electric power data network. to this point, after synthesizing the feature of the security, the expansibility and the flexibility, this thesis conclude that mpls vpn is a reasonable way out to connect all parts of businesses and operations in the guizhou electric power system. by this means, different applications run within different vpns, separately in logic, safely and extended well and if necessary, every department can get easy access to the bone net only through a physical interface and interact each other

    在綜合對多協議標記交換虛擬專用網( mplsvpn )安全特性的描述,以及mplsvpn固有的高擴展性和靈活性的特點后,為保證各專業系統在骨幹網傳輸的安全性,論文認為完全可以使用mplsvpn的架構,把貴州電力系統的每個業務和相應的vpn對應起來,建議可通過電力數據通信骨幹網mplsvpn方式,不同的應用在各自不同的vpn上,邏輯上相互獨立,安全可靠,並且擴展性好,每家單位只需要一個物理介面接入骨幹網路,即使在同一個局域網上也可將vpn區分出來。
  17. With the increased scalability over current mpls / vpn implementations, thousands of sites per vpn and hundred and thousands of vpns per service can be provided to meet the need for the accessing of services in the power system and

    Mpls / vpn具有良好的擴展性,網路中可以設定數萬vpn ,每個vpn可有數千個現場。以保障電力業務的接入需要及電力業務點的數量。
  18. So the network ' s average blocking probability is minimized. simulation results show that the algorithm performs well in dynamic traffic load situation. secondly, for mpls based approach, we study the problem of designing logical topology for virtual private networks ( vpns ) over ip / wdm networks considering different qos requirements

    對于給定的網路物理拓撲及業務矩陣,對不同qos要求的vpn進行資源分配時,首先照顧較高質量要求的vpn業務,並且,對于相同qos要求的vpn業務,優先考慮業務量比重較大的節點對,並盡量保證負載在全網均勻分佈。
分享友人