隧道協議 的英文怎麼說

中文拼音 [suìdàoxié]
隧道協議 英文
gprs tunneling protocol gtp
  • : Ⅰ名詞1. (隧道; 地道) tunnel; underground pass2. [書面語] (道路) road3. (郊外的地方) suburbsⅡ動詞[書面語] (旋轉) turn
  • : Ⅰ名詞(道路) road; way; route; path 2 (水流通過的途徑) channel; course 3 (方向; 方法; 道理) ...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 隧道 : tunnel; tunneling; tunnelling; chunnel; drive
  1. These characteristics give l2tp an advantage on building vpn. there are some disadvantages : one is that l2tp has a little of universality because it only encapsulate ppp frames ; the other is that the working of l2tp is dissymmetrical because lac is one end of l2tp and lns is other end of l2tp

    但是,早期的二層隧道協議(第一版的l2f和pptp ,以及第2版的l2tp )的通用性不強,分別在封裝對象上有局限性(例如只針對ppp ) ;應用工作模式為非對稱的,未能將該技術的應用范圍拓寬。
  2. By far, microsoft ’ s teredo is the only tunnel mechanism that supports nat users in a certain extent, but meanwhile has many limits such as not supporting symmetric nat, not being able to provide bidirectional ipv6 connections, having poor security, etc. silkroad exploits the client - server tunnel mode and makes use of the stateful characteristic of tunnel servers to resolve the teredo ’ s problems

    目前已有的機制中,只有微軟公司提出的teredo在一定程度上支持nat 。然而, teredo實際上不能為nat用戶提供雙向的端到端ipv6連接,不支持對稱類型的nat ,並且存在安全隱患。 silkroad採用客戶端-服務器模式的系統結構,利用服務器的有狀態特性,解決了teredo存在的問題。
  3. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec技術,接著深入研究了ipv6安全ipsec的體系結構、操作模式,詳細論述了ipsec簇的各個組成部分,如認證報頭ah、封裝安全載荷esp、密鑰管理ike、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何作,來共同實現對網路層ip數據包的安全保護。
  4. Hong kong gifts premium and houseware fair experienced renewed international interest which demonstrated the vitality of an international city always geared to strengthen its leading role as the " events capital of asia, " said mr cliff wallace, managing director of hkcec. hml is a subsidiary of nws holdings limited " nws holdings ", stock code : 0659, the flagship servicing company of new world development company limited stock code : 017. nws holdings embraces a diversified range of businesses in hong kong, macau and in the mainland

    新創建集團有限公司(新創建集團;股票編號: 0659 )乃新世界發展有限公司(股票編號: 017 )之服務業旗艦公司,業務遍及香港、澳門及中國內地,公司業務主要由三大部門構成,計有:服務業,包括設施管理(香港會展覽中心之營運管理、富城物業管理和大眾安全警衛) 、建築機電(興建築和新創機電) 、交通運輸(新巴和新渡輪) 、金融保險及環境工程;傳統基建的投資項目則涵蓋電力、收費路、食水及污水處理、橋梁和、 ;以及港口,包括貨櫃及貨物裝卸、倉庫儲存和提供物流運輸網路。
  5. L2tp ( layer 2 tunneling protocol ) is a protocol that can be used for encapsulating the second layer frame

    二層隧道協議是一種對二層進行封裝后前傳的
  6. Layer 2 tunneling protocol ( l2tp ), a more secure version of point - to - point tunneling protocol ( pptp )

    第二層隧道協議( l2tp ) ,是一種比點對點隧道協議( pptp )更安全的版本。
  7. 900 1800mhz tdma digital cellular mobile communication network technical specification for gprs general packet rervice tunnelling protocol

    900 1800mhz tdma數字蜂窩移動通信網通用分組無線業務gprs隧道協議技術規范
  8. Gsns are responsible for the delivery and routing of data packets between the mobile stations and the external packet data networks

    Gprs支持節點的連接是建立在基於ip的gprs核心網上,利用gprs隧道協議( gtp )進行通訊。
  9. This dissertation comprises two parts : a comprehensive study of layer 2 tunneling and a comparatively complete implementation of the l2tpv3 signaling control in the linux environment

    本論文覆蓋的工作包括兩部分:對第二層隧道協議的分析研究和在linux環境下對l2tpv3信令控制技術的實現。
  10. The active directory client extension does not deliver advanced virtual private networking protocols, like internet protocol security ipsec or layer 2 tunneling protocol l2tp

    該active directory客戶端擴展不提供高級虛擬專用網路vpn,如internet安全性ipsec或第2層隧道協議l2tp 。
  11. So we choose the l2tp protocol to implement 。 at first , we describe the l2tp protocol and give the whole description about the protocol 。 we use many state machine in the implementing

    在論文的研究過程中,研究了各種機制,通過對各種隧道協議的比較,決定對l2tp進行實現。對l2tp做了詳細的描述,作出了完整的l2tp數據結構。
  12. We have found the encryption ( both 40 - bit and 128 - bit ) to be equally weak, and have discovered a series of bad design decisions that make other attacks against this encryption possible

    其加密mppe存在加密強度較低問題,利用字典攻擊部分密文可被破譯;其隧道協議實現存在安全漏洞,使其它攻擊成為可能,並且容易使安裝pptp的用戶遭受拒絕服務攻擊。
  13. After introducing the correlative knowledge of vpn, such as tcp / ip protocols, encryption technology and so on, the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp

    本文在介紹tcp / ip、加密技術等與vpn相關知識的基礎上,較詳細論述了ipsec和vpn的兩個主要:點到點隧道協議( pptp )和層2隧道協議( l2tp ) 。
  14. In all kinds of existing tunneling techniques, ipsec protocol, which is brought forward by ietf, can provide the preferable security. it can ensure the security of the important data of enterprises by using the tunnel mode of ipsec to construct vpn

    技術是實現vpn的關鍵技術。在眾多隧道協議中,由ietf提出的ipsec具有更好的安全性。利用ipsec的模式構建vpn可確保企業敏感數據安全。
  15. This thesis has made thorough research to ipsec protocol architecture and esp protocol and ah protocol. it has proposed the design methods of realizing vpn security gateway based on ipsec protocol under linux, and has discussed in detail the implementation of esp protocol and ah protocol in tunnel mode, as well as the secure kernel improvements to ip protocol stack on linux vpn security gateway machine

    本文對ipsec的體系結構、 esp、 ah進行深入研究,提出了在linux上實現基於ipsec的vpn安全網關的設計方法,並討論了在模式下esp和ah在linux上的的具體實施和對linuxvpn安全網關上內核ip棧的安全內核改造。
  16. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全? ? ah和esp ,包括每種的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  17. This paper is mainly studying the technology about the transition of ipv4 network to ipv6 network. we discussed clearly several solutions abut this problem, such as dual stack > tunnel and nat - pt

    本文的重點是深入研究ipv4網路向ipv6網路過渡的問題,重點講了目前幾種比較成熟的技術:雙棧技術、技術和網路地址翻譯-翻譯技術。
  18. This dissertation presented a theoretical work as well as an experimental implementation of the l2tp carried out at the sichuan network communication key laboratory. this project was spurred by idea of extending the application of the tunneling technique to a broad area as a result of a preliminary study on tunneling techniques, especially on l2f, pptp and l2tp ( commonly referred to as l2tpv2 )

    本論文所反映的工作,是四川省網路通信技術重點實驗室「二層隧道協議課題組」的共同成果,該項目起因是試圖對早期版本的傳輸技術( l2f 、 pptp和l2tp )的非對稱應用模式推廣到對稱應用模式,以及將該思想應用於其他層傳輸。
  19. This is achieved by allowing the user to tunnel through the internet or another public network using a protocol such as microsoft point - to - point tunneling protocol pptp available with the microsoft windows nt version 4. 0 or microsoft windows 2000 operating system, or layer two tunneling protocol l2tp available with the windows 2000 operating system

    其實現方法是允許用戶使用如microsoft windows nt 4 . 0或microsoft windows 2000操作系統中的microsoft點對點隧道協議( pptp )或者windows 2000操作系統中的第二層隧道協議( l2tp ) ,將internet或另一公用網路作為通
  20. Layer 2 tunneling is a technique which forwards layer 2 protocol data units ( pdus ), especially ppp, through a data transfer tunnel established on top of public data network services, so as to provide a means for setting up layer 2 virtual " leased links ". for its convenience and cost effectiveness, it has become a popular technology for setting up intranets for geographically dispersed enterprises

    第二層隧道協議( layer2tunnelingprotocol )作為借用公用數據網建立公用在遠程用戶之間提供對第二層(特別是使用極廣的點到點( ppp ) )進行中繼,提供實現遠程專用虛鏈路的技術,近年來受到廣泛的重視,並逐漸成為建立安全的跨地域虛擬專用網路( vpn )的重要手段之一。
分享友人