计算机网络双语论文-局域网的设计

上传人:aa****6 文档编号:30009236 上传时间:2018-01-26 格式:DOC 页数:30 大小:243KB
返回 下载 相关 举报
计算机网络双语论文-局域网的设计_第1页
第1页 / 共30页
计算机网络双语论文-局域网的设计_第2页
第2页 / 共30页
计算机网络双语论文-局域网的设计_第3页
第3页 / 共30页
计算机网络双语论文-局域网的设计_第4页
第4页 / 共30页
计算机网络双语论文-局域网的设计_第5页
第5页 / 共30页
点击查看更多>>
资源描述

《计算机网络双语论文-局域网的设计》由会员分享,可在线阅读,更多相关《计算机网络双语论文-局域网的设计(30页珍藏版)》请在金锄头文库上搜索。

1、东北电力大学计算机网络双语论文作 者: 学 号:院 系: 自动化工程学院 专 业: 自动化 题 目: 局域网的设计 指导教师: WANTechnologyAndVPNDesign Chapter1 Introduction.3Chapter 2 WAN.3Chapter 3 Routing7Chart 4 “infinite counting” question.14Chapter 5 Network Present Situation And Demand Survey.16Chapter 6 Realization of VPN Technology.18Chapter 7 Realize

2、s The VPN Network Hardware Disposition.21Chapter 8 VPN Network Realization.23WAN Technology And VPN DesignAbstractIn recent years, the Internet with its rich internet applications can be spread in the community for its swift, internet technology, advanced, causing widespread concern in the enterpris

3、e. So the use of internet technology, the idea of the enterprise local area network (LAN), be applied to form an intranet Intranet become fashionable. So, to understand technology, wide area networks and wide area network to form a good network for our system is essential. Here, we compare the WAN a

4、nd LAN, come to their differences and linkages. The same time, connect to the network of the most important type of equipment - routers in the network and address of the principle of the work of routing in-depth analysis.In the familiar with the wide-area network and wide area network technology, ba

5、sed on, we give an advantage of WAN, VPN technology, the words of a companys INTERNET Netcom had connected into a virtual local area network design. Through the hardware and software settings, use of IPsec security protocol of the VPN and encryption capabilities, to achieve between the two businesse

6、s across the Internet, internal network connections to achieve a secure internal data communications. The internal control system through the firewall policy on the VPN, the data can be an effective control and management of the enterprises internal network traffic has good scalability and manageabi

7、lity. Key words: WAN technology, routing algorithm, router, VPN design, IP addressChapter1 IntroductionThe role of local area network from the original host connectivity, file and print services, turning around the client / server model of the large data streaming applications, Intranet, WWW browsin

8、g, real-time audio / video transmission and other services has become increasingly large and growing data flow continues increase in network load. The same time, based on work group or department-level enterprise-class server solution has been replaced by the server to facilitate data flow to a fund

9、amental change in the status of the network backbone and further improved. These have all contributed to local area network technology from the bridge technology, the backbone routing technology to LAN switching technology transition. The development of switching technology LAN switch provides an un

10、precedented opportunity for development, but also greatly contributed to the LAN switch technology and product upgrading.With the development and application of information technology, information security, content in the continuous extension of the confidentiality of information from the initial de

11、velopment of information integrity, availability, controllability and non-repudiation, which in turn developed into the attack (attack) , anti-(against), measured (test), control (control), tube (management), evaluation (assessment) and other aspects of the basic theory and implementation of technol

12、ogy. Modern information systems in the information security and its core issue is the password Theory and Its Applications, based on credible information system structure to make and evaluation. Overall, the current field of information security the focus of attention by people mainly the following

13、aspects: 1) Password theory and technology; 2) security protocol theory and technology; 3) The security architecture theory and technology; 4) information against the theory and technology; 5) network security and security products.Chapter 2 WAN2.1 IntroductionA WAN is a data communications network

14、that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network laye

15、r. Figure 3-1 illustrates the relationship between the common WAN technologies and the OSI model.In general,a network technology is classified into one of three broad categories, depending on the size of networks that can be created LAN,MAN and WAN which can span sites in moltiple cities,countries or continents.2.2 The Difference Between LAN And WANTo appreciate the distinction,it is important to understand how the size of a network is measured.We have seen that although LAB thchnologies are designed to be used at a single site,techniques exist that can extend the distanc

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 其它办公文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号