隧道技術 的英文怎麼說

中文拼音 [suìdàoshù]
隧道技術 英文
tunneling
  • : Ⅰ名詞1. (隧道; 地道) tunnel; underground pass2. [書面語] (道路) road3. (郊外的地方) suburbsⅡ動詞[書面語] (旋轉) turn
  • : Ⅰ名詞(道路) road; way; route; path 2 (水流通過的途徑) channel; course 3 (方向; 方法; 道理) ...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 隧道 : tunnel; tunneling; tunnelling; chunnel; drive
  1. With the development of the technology to build tunnels with sunken tubes in china, more and more subaquatic tumiels are built with sunken tubes and construction of the tubes in dry - docks is one of the important factors for building subaquatic tunnels with sunken tubes

    摘要隨著我國沉管法修建隧道技術的發展,越來越多的水下採用沉管法施工,而干塢是沉管修建的重要因素之一。
  2. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全及實現的關鍵協議,通過對實現的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  3. In all kinds of existing tunneling techniques, ipsec protocol, which is brought forward by ietf, can provide the preferable security. it can ensure the security of the important data of enterprises by using the tunnel mode of ipsec to construct vpn

    隧道技術是實現vpn的關鍵。在眾多協議中,由ietf提出的ipsec協議具有更好的安全性。利用ipsec的模式構建vpn可確保企業敏感數據安全。
  4. This paper is mainly studying the technology about the transition of ipv4 network to ipv6 network. we discussed clearly several solutions abut this problem, such as dual stack > tunnel and nat - pt

    本文的重點是深入研究ipv4網路向ipv6網路過渡的問題,重點講了目前幾種比較成熟的:雙協議棧隧道技術和網路地址翻譯-協議翻譯
  5. At first, the definition, taxonomy, mplement, management and the key technolodgy are introduced. the tunelling techenolodgy, ip security protocol is the emphasis of research, including the functions, the modes, domain of interpretation, the series protocols of ipsec. the other clue is the research of multicast

    首先介紹了vpn的定義、分類、實施和管理,對vpn的關鍵進行了分析和討論;論述了安全隧道技術,重點放在vpn協議的ip層安全協議( ipsec , ipsecurity )的結構體系,包括ipsec的功能、實施、模式、解釋域等。
  6. The application of the vpn tunnel technology in the special - purpose net

    隧道技術在專用網接入中的應用
  7. This dissertation focuses on problems of these mechanisms

    本論文圍繞隧道技術存在的這些問題進行了深入研究。
  8. Modern tunnelling technology

    現代隧道技術
  9. And now the widely used tunnel technology is based on ipsec protocol

    其中最核心的是安全隧道技術,目前普遍使用的是利用ipsec協議實現的安全隧道技術
  10. The main work and innovation of the dissertation are listed as follows. 1. a new nat users - orinted ipv6 tunnel mechanism named silkroad is proposed

    論文的主要工作和創新點如下: 1 .提出了一種新的面向nat用戶的ipv6隧道技術,稱之為silkroad 。
  11. Vpn is the technology of building a intranet based on the public network with the support of tunneling technology, encapsulation and authentication methods

    虛擬專用網( vpn )是採用隧道技術以及加密、身份認證等方法,在公共網路上構建企業網路的
  12. The layer 2 tunneling technique is one of the vpn techniques, which is dedicated to ferry the layer 2 protocols through public data networks

    二層隧道技術則是一種利用公用數據網建立通信實現對公用數據網兩端的第2層協議(特別是ppp )進行中繼的組建第2層vpn的方法。
  13. We give the actual problem it needs to address and the method it uses, and describe its working mechanism, which consists of agent researching, registration and tunnel

    通過定義移動ip所解決的問題和解決的手段,給出了移動ip的概況。並描述了移動ip的工作機制:代理搜索、注冊和隧道技術
  14. Vpns provide secure and stable tunnels through shared ip - based networks for remote access. extranet. and intranet connectivity at a significantly less cost than those associated with private leased lines

    Vpns利用隧道技術,以很低的成本為遠程訪問、 extranet和intranet應用提供了穿越公用網路的安全穩定的通
  15. Vpn is a very important technology and widely used. through building the vpn on the internet , a enterprise can reduce the spending and have a privacy communication 。 for vpn provider , it will provide many kinds of service for user

    目前,隧道技術不光在vpn中得到了全面的應用,在其它領域,例如移動ip , mpls等,也有著廣泛的用途。
  16. Based on the pki identity certification and data encryption technology, we proposed a security certification and channel - based data encryption mechanism. this paper discussed both the security certification and channel - based data encryption in detail. a prototype system was also built

    本文詳細描述了基於pki身份認證的用戶管理系統安全認證機制,並通過隧道技術實現了報文的安全數據加密,並給出了相應的工程實現。
  17. Then it demonstrated that layer 3 mpls vpn has high security, the ability of overloading multi - service, function of routing and can realize central management and configuration. it has mature and credible technology and is the most appropriate ip vpn technology for the development of telecom service provider. on the basis, it analyzed the security of mpls vpn and the characteristic of qos, and proved the high security of layer 3 mpls vpn, then by combing with technology of differ service and te ( transfer engineering ), it proved layer 3 mpls vpn can provide qos of low delay and high reliability to satisfy the need of telecom network

    論文首先討論了ipvpn的隧道技術及標志交換,尤其結合當前最新的詳細討論了標志交換中的三層mpls (多協議標簽交換) vpn和各類二層mplsvpn,論證了三層mplsvpn具有高安全性、多業務的承載能力、路由功能,可以實現集中管理和配置,上成熟可靠,是當前最適合電信運營商發展的ipvpn;在此基礎上全面探討了mplsvpn的安全及qos特性,說明了三層mplsvpn具有很高的安全性能,同時通過結合differservice及流量工程, mplsvpn能夠提供低時延、高可靠的qos保障能力,滿足電信網路運行的需要;並且根據當前最新的雙平面組網和iptn跟蹤分析了mplsvpn當前的最新發展趨勢和動向。
  18. We designed a wireless asymmetric physical layer link model with a direct sequence spread spectrum system as a transmitted reference. uplink and downlink are both one - way links connected by an ip tunneling. uplink is consisted with the narrowband radio data link of the warfighter information networks ( win )

    研究了無線非對稱鏈路,提出了一種用參考法直接序列擴頻( dsss )實現的無線非對稱數據傳輸的物理層鏈路模型:利用現有戰斗員信息網電臺的窄帶數據鏈作為上行通,通過ip隧道技術保證單向鏈路的連通性。
  19. It is the technology of applet and servlet that realizes uniting web technology with network management technology and solves secure communication between client port and server port by using http tunnel technology. and the system modules are analyzed and designed successfully so the secure communication among all module is solved by using jms technology. furthermore, graphic processing toolkit of graph editor toolkit for java is united with network topological management so that the multi - selection of topological show is achieved

    通過applet以及servlet,實現了web與網管的成功結合、並利用http隧道技術解決了客戶端applet與服務器端servlet的可靠通信;完成了系統模塊的分析設計,利用jms成功地解決了各個模塊之間地可靠通信;成功地把grapheditortoolkitforjava圖形處理工具包結合到網路拓撲管理中,實現了拓撲顯示的多種選擇。
  20. Because of using web link analysis technique and tunneling technique, the crawler can significantly improve its topic coverage and topic precision, overcome the crawler ' s inherent disadvantage to some degree that the topic coverage and topic precision seriously depends on the seed urls. the collaborative crawler is well suitable for searching those broad - topic scholarly web resources

    本論文所設計的合作式主題爬行器,利用了web超鏈信息和隧道技術,可以有效地提高主題資源的覆蓋度和主題的準確度,在一定程度上克服了一般爬行器的固有缺陷,使得爬行網頁的主題覆蓋度和主題準確度不再完全依賴于種子站點的數量和質量。
分享友人