共查询到20条相似文献,搜索用时 109 毫秒
1.
Novell网与VAX小型机在我国获得了广泛应用.为了充分利用已有资源,本文分析了一种Novell网和VAX机的互连方案,并采用该方案实现了Novell网与VAX机之间的文件传送与维护功能. 相似文献
2.
计算机基础实验室的网络规划及管理 总被引:2,自引:0,他引:2
从方便机房工作人员管理机房,便于用户安全使用网络资源角度出发,以Novell网络为例介绍了计算机基础实验室的网络规划设计,并对网络安全管理作了有益的探讨。 相似文献
3.
《电子与电脑》1997,(11)
Novell 新任首席执行官访华 今年4月刚刚成为Novell新领袖的Eric Schmidt博士近日来华访问,并作了题为“Novell Future”的精彩演讲。 Schmidt先生曾在Sun Microsystems公司工作了14年,离开时位居Sun公司的首席技术主管,他为Java语言的产生和推广立下了汗马功劳,被誉为Java之父。Schmidt加盟Novell在华尔街引起热烈反响,短期内Novell的股价便上涨了22%。专家和投资者认为,这位前Sun公司首席技术主管为Novell所带来的将不仅仅是灸手可热的Java技术,其在技术上的超凡想象力将把Novell带入崭新的境界。 相似文献
4.
计算机网络的安全技术 总被引:2,自引:0,他引:2
本文概要地说明了计算机网络安全所面临的威胁,重点阐述了网络的安全对策,网络中的数据加密技术和数据加密算法,以及Novell网的安全措施和Internet防火墙技术。 相似文献
5.
6.
7.
《通讯世界》2001,(4)
Novell 查询号203Novell推出电子商业软件Novell Portal Services 1.0。该软件能跨越内联网、外联网、互联网、有线网络及无线网络之间的障碍,为用户提供单一及统一化的网络接口。Novell Portal Services(Novell门户网站服务软件)提供个人化、单一的档案存取接口、协作工具、多种网上信息及应用方案,有助员工提高生产力及加强客户与伙伴之间的关系。Novell Portal Services只需客户登记一次,即可随时随地以基于浏览器的方案,轻易存取所需的应用软件及信息。这款软件不仅可加强系统安全能力,更可节省处理客户查询来电的工作,… 相似文献
8.
本文概要地说明了计算机网络安全所面临的威胁,重点阐述了网络的安全对策,网络中的数据加密技术和数据加密算法,以及Novell网的安全措施和Internet防火墙技术。 相似文献
9.
Novell,即使从未摸过网络的人,我想也一定不会对这个名字感到陌生。时下,各种Novell培训班,Novell网络讲座充斥耳际。据报道,Novell的支柱产品NetWare和UnixWare在全世界拥有7000万用户,占全球网络操作系统市场份额的67%,在中国市场,虽然还未有准确的统计数据,但据业内人士保守估计,94年Novell产品占网络市场的比例为80%。您一定会感到惊讶,但您可能不知道这样闻名遐迩的公司直到1994年10月,才在中国这诺大市场建立了北京办事处,以前都是由经销商代销产品。在网络蓬勃发展的今天,Novell这一网络巨头在中国这一市场将如何运筹,就此笔者近日采访了Novell中国地区总经理金明先生。 相似文献
10.
Z.E.N.works是不久前Novell推出的一个软件包,它由3个部分组成:NovellApplicationLauncherv2.50(Novell应用程序发布器)、NovellWork-stationManagerv1.10(Novell工作站管理器)和一个基于NDS(Novell目录服务)的远程控制工具。使用过Novell产品的人可能对前两个工具不会陌生,而远程控制则是Novell先前未曾发表过的。媒体将Z.E.N.works(ZeroEffertNet-works)称为“零努力的网络”或者“无负担网络”,意思是网络管理员的工作可以因此轻松到极点,不用整天忙着敲击键盘,更多的时候可以听着或看着数据在网络中静静地… 相似文献
11.
Virtual Internet broadcasting 总被引:1,自引:0,他引:1
This article describes the design and first implementation of a virtual broadcast system whereby a multimedia content program can be edited, produced, and streamed from different locations. Data are stored and distributed decentrally, allowing multiple combinations of program objects to new programs. The virtual broadcast station is the network. This concept additionally offers the clients the opportunity to obtain an individual (personalized) program, still using bandwidth-economic multicast technologies. This is achieved by dividing multimedia streams into temporal chunks (chunk streams), streamed over different multicast host groups (distributed multicasting), using existing Internet session control protocols (SDP) and Internet transport protocols (RTP). A client application assembles the transmitted chunks to form an individual program. This technique can also be used to insert personal/local advertisements into broadcast-like services 相似文献
12.
The Internet of things 总被引:3,自引:0,他引:3
《Communications Engineer》2006,4(6):20-25
This paper deals with the machine-to-machine (M2M) communications. M2M is telemetry that is accomplished using networks, especially public wireless networks, in which billions of electronic and electromechanical devices being connected to the Internet. The global economy is improved by the cost savings of M2M growth 相似文献
13.
The Global In-Flight Internet 总被引:1,自引:0,他引:1
《Selected Areas in Communications, IEEE Journal on》2006,24(9):1748-1757
In this paper, the concept of a new form of mobile network formed in the sky is introduced, where the mobile routers are simply the commercial aircraft. This implementation aims to eliminate two main problems arising from the current in-flight broadband implementation. The first problem is the resource management issue that may arise from the rapid increase of in-flight broadband Internet use in the near future. This could consequently limit current satellite resources, and bandwidth. The other issue is the inherent problem associated with Internet use over satellite, such as the degraded performance of delay sensitive applications due to the long propagation delay of a satellite link. A system model for data access, stable clustering of aircraft, and efficient routing schemes are introduced, which are suitable for the aeronautical mobility model. Link stability is predicted by a novel approach using Doppler shift subjected to control packets to dynamically form stable clustering and routing protocols. Another aim of this paper is to show that relative velocity between nodes is adequate as a stability metric, dominating relative distance, and this becomes evident in the simulations presented. An outline of how the new system could potentially interact with the traditional Internet using Mobile IP is also briefly discussed. 相似文献
14.
一种可演进的互联网体系结构 总被引:1,自引:0,他引:1
互联网端到湍属性使得运行于主机端的应用层协议易于修改和部署,从而促进互联网通过新应用的竞争不断发展;但是涉及到网络核心层和网络设备(交换机、路由器等)的新协议则在实现和应用上十分困难,阻碍了互联网核心技术的演进。文章提出一种可演进的网络体系结构(EIA)。网络可以通过EIA提供的接口在主机和网络设备上添加新的模块来得到试验和实际部署。不同的用户可以任意选择不同的体系结构,同时用户可以是一种或多种网络体系结构的使用者。人们可以多样化竞争的方式推动互联网的演进。 相似文献
15.
This paper describes the INRIA videoconferencing system (IVS), a low bandwidth tool for real-time video between workstations on the Internet using UDP datagrams and the IP multicast extension. The video coder-decoder (codec) is a software implementation of the ITU-T recommendation H.261 originally developed for the integrated services digital network (ISDN). Our focus is on adapting this codec for the Internet environment. We propose a packetization scheme, an error control scheme and an output rate control scheme that adapts the image coding process based on network conditions. This work shows that it is possible to maintain videoconferences with reasonable quality across packet-switched networks without requiring special support from the network such as resource reservation or admission control 相似文献
16.
This paper focuses on analyzing the relationship between Internet technologies and firm performance. This relationship is examined not only from the simple presence of Internet technologies, but also according to different e-business orientations: e-business orientation to customers and e-business orientation to internal processes. In addition, the relationship between Internet technologies and the proposed e-business orientations is examined. To achieve these objectives, a theoretical model is developed and tested by using structural equation modelling on a dataset of 1010 firms. The results show a positive relationship between e-business orientations and firm performance. In contrast, the results confirm that the merely presence of Internet technologies is not positively associated with firm performance. 相似文献
17.
18.
基于WinGate代理服务器访问Internet 总被引:2,自引:0,他引:2
论述了代理服务器(Proxy Server)在实现Internet访问中的特殊作用;探讨了利用代理服务器软件(WinGate等)组建局域网上的代理服务器,使得工作站通过代理服务器上网的方法;介绍了代理服务器软件(WinGate)的安装及配置等。 相似文献
19.
互联网与物联网 总被引:12,自引:0,他引:12
蒋林涛 《电信工程技术与标准化》2010,23(2):1-5
物联网是目前热议中的话题。本文详细讨论了互联网与物联网的网络结构,指出互联网与物联网发展将会是相辅相成的,在相互学习中前进,在发展中走向融合。 相似文献
20.
Geolocation of Internet hosts enables a new class of location-aware applications. Previous measurement-based approaches use reference hosts, called landmarks, with a well-known geographic location to provide the location estimation of a target host. This leads to a discrete space of answers, limiting the number of possible location estimates to the number of adopted landmarks. In contrast, we propose Constraint-Based Geolocation (CBG), which infers the geographic location of Internet hosts using multilateration with distance constraints to establish a continuous space of answers instead of a discrete one. However, to use multilateration in the Internet, the geographic distances from the landmarks to the target host have to be estimated based on delay measurements between these hosts. This is a challenging problem because the relationship between network delay and geographic distance in the Internet is perturbed by many factors, including queueing delays and the absence of great-circle paths between hosts. CBG accurately transforms delay measurements to geographic distance constraints, and then uses multilateration to infer the geolocation of the target host. Our experimental results show that CBG outperforms previous geolocation techniques. Moreover, in contrast to previous approaches, our method is able to assign a confidence region to each given location estimate. This allows a location-aware application to assess whether the location estimate is sufficiently accurate for its needs 相似文献