期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on Tunneling Techniques in Virtual Private Networks 被引量:2
1
作者 赵阿群 袁媛 +1 位作者 吉逸 顾冠群 《Journal of Southeast University(English Edition)》 EI CAS 2000年第1期6-12,共7页
It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lin... It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition. 展开更多
关键词 VPN tunneling protocol GRE L2TP IPSEC IP/IP
在线阅读 下载PDF
Rebuilding the Extrant's Architecture with VPN
2
作者 雍建明 吴国新 伍俊明 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期69-74,共6页
This article describes how to utilize the VPN to construct the new Extranet’s topology. Firstly, it tells what is the Extranet. Secondly, some basic principles and technical idioms of the VPN are dealt with. Thirdly,... This article describes how to utilize the VPN to construct the new Extranet’s topology. Firstly, it tells what is the Extranet. Secondly, some basic principles and technical idioms of the VPN are dealt with. Thirdly, tunnel protocols about VPN are discussed. Finally, three kinds of Extranet’s architectures with VPNs are given. Through integrating the VPNs into the Extranet, we can get much more benefits from shared networks (e.g., Internet, ISDN, PSDN, etc.). 展开更多
关键词 VPN tunnel protocol EXTRANET INTRANET Internet
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部