首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 341 毫秒
1.
《数码世界》2004,3(1):44-45
宽带接入运营中的关键问题就是如何提高接入率。根据网络应用的需求及技术现状,瑞斯康达公司专门针对宽带接入优化设计了逐流控制的ISCOM3500访问控制交换机,利用其强大的流管理能力,可以方便高效地实现宽带运营接入的用户认证、带宽管理、服务策略管理。ISCOM3500通过与计费系统相结合,可以对多种资费模式提供良好的支持。  相似文献   

2.
基于802.1X的以太网接入技术   总被引:10,自引:0,他引:10  
朱海龙  张国清 《计算机工程》2003,29(18):130-132
分析了宽带接入网中用户管理技术发展的现状、现有技术的不足,介绍了一种新的认证访问控制技术:IEEE802.1X,并提出了一个基于802.1X技术的以太网接入用户管理方案,最后对几种技术进行分析和比较并对802.1X技术的发展作了展望。  相似文献   

3.
基于RSN框架的宽带接入网关设计及其实现   总被引:1,自引:0,他引:1  
在宽带网接入中,对用户的认证、授权和计费是至关重要的。认证是授权与计费的基础,目前存在的DHCP认证、PPPOE认证和基于Web的认证等几种方式各有优缺点。随着网络接入技术得到发展,提出了802.1x协议及(RSN)安全认证体系结构。该文介绍了在RSN框架基础上实现的一个宽带接入网关,实现了用户的认证、授权和计费,并通过一个基于Wweb的管理平台,完整地解决了宽带接入的管理问题。  相似文献   

4.
随着网络技术的不断发展与应用,如今网络已成为人们生活中不可或缺的一部分,人们广泛使用网络技术进行网络办公、网络娱乐、网络购物等网络活动。但是,网络在为当代人们生活提供便利的同时,也带来许多隐形问题。其中,最为突出的问题在于如何应用合适的手段认证用户的身份,以保证用户计算机及网络使用安全以及网络账户中财产安全。笔者就对基于用户行为的身份认证方法进行研究。  相似文献   

5.
PKI系统在IPv6网络中的应用研究   总被引:2,自引:2,他引:2  
黄文专  郭巧 《计算机工程与设计》2004,25(11):1976-1978,2017
公钥基础设施(Public Key Infrastructure,PKI)是进行公钥管理和用户认证的机构。它通过X.509规范进行公钥管理,通过权威认证机构提供用户的身份认证,在网络中建立起用户的信任关系,提供数据源认证、访问控制和数据加密等安全服务。介绍了PKI认证系统的组成和功能,分析了在IPv6中构建PKI系统存在的问题并提出了解决方案。  相似文献   

6.
冯建和 《信息网络》2003,(11):19-22
实现宽带接入可以采用多种接入技术,章对ADSL和FTTx LAN两种宽带接入技术进行了重点讨论。光纤接入到用户是实现用户宽带接入的最终目标,光纤到大楼、光纤到小区和光纤到路边是中、近期比较现实的目标。巨大的铜线资源也是最重要的接入手段。由于目前尚无一种主导型技术可适用于任何场合和应用,接入技术的多元化将是一个长期的态势。新北京电信超级城域智能光网络的概念和目标告诉人们,新型光网络能够更好地支持宽带接入.为用户提供更好的宽带接入服务。  相似文献   

7.
动态VLAN和Guest VLAN技术在校园网中的应用   总被引:1,自引:0,他引:1  
介绍了VLAN技术及其在校园网用户认证中的应用.VLAN技术为解决网络配置和管理提供了良好的方法,随着网络的不断发展,VLAN技术将得到更加广泛的应用.  相似文献   

8.
宽带接入运营中的关键问题就是如何提高接入率.根据网络应用的需求及技术现状,瑞斯康达公司专门针对宽带接入优化设计了逐流控制的ISCOM3500访问控制交换机,利用其强大的流管理能力,可以方便高效地实现宽带运营接入的用户认证、带宽管理、服务策略管理,ISCOM3500通过与计费系统相结合,可以对多种资费模式提供良好的支持.……  相似文献   

9.
认证是宽带以太网实现可管理和网络信息安全的前提.本文通过对802.1x以及高层认证协议机理和相互关系的分析,实现了以太网环境下802.1x用户认证.  相似文献   

10.
在校园网中同时部署多套上网认证系统并使用统一的账号密码是常见的上网认证部署方案。多套上网认证系统并存时如何对在线用户进行统一管控、用户上线轨迹追踪和分析,以及如何对多套上网认证系统进行统一监控管理是当前校园网管理面临的共同问题。对此设计和实现了一种面向多认证系统的统一在线用户管控平台,并在真实校园网环境中测试使用,测试结果验证了平台的有效性。  相似文献   

11.
Printing devices are used to generate character, graphic, and image output at varying degrees of cost, price, resolution, output quality, and speed. A large number of different printing technologies have been developed to meet this spectrum of requirements. The following paper presents a summary of the various impact, non-impact, and special paper technologies. Next to the printing technology itself, additional design and functional characteristics influence the capabilities of the different printer products presently in use.  相似文献   

12.
The lack of well-defined information models in many XML technologies can generate compatibility problems and lower the odds of their long-term success. The author systematically examines the information and data models of several influential XML technologies. He defines information model and data model in keeping with the terms discussed in RFC 3444. The intention is that the clarification this RFC offers can both benefit XML technologies and help identify areas for future work.  相似文献   

13.
Problems arising in computational programming in connection with the approaching transition to using exaflop hardware are discussed. The discussion is focused on the lifecycle of mathematical modeling and related general problems that are being solved in the course of model development. This area is (and is going to be forever) one of the main consumers of computational resources. The study of its methods and approaches makes it possible to formulate basic directions of assumed progress caused by necessity of formation of computational programming technologies.  相似文献   

14.
《Micro, IEEE》1999,19(1):8-9
Two products converge in substitutes when users consider the products to be interchangeable. This happens when a product develops features increasingly similar those of other products. It also occurs when users put together common components to perform functions already performed by existing products. Two products converge in complements when they increasingly work together better than they worked alone. This occurs when different firms develop products or subsystems within a product that forms a larger system. The system's output can potentially exceed output from the sum of the parts. The article examines the technology convergence issue by looking at examples to do with the Internet, worldwide communications and broadcasting systems  相似文献   

15.
Abstract— The current state of the art of interactive displays, the main principles of their operation, and their functional characteristics are reviewed. Special attention is given to interactive displays with contactless control; in particular, to photo‐sensitive displays. A number of photo‐sensitive display cell designs are considered, as well as the problems related to the production of such cells. The results of the authors' research in this field are presented.  相似文献   

16.
This paper outlines the strategy and issues for the commercialisation of HARMST-LIGA process technologies. Part of this strategy is the setting up of an international HARMST-LIGA Commercialisation Group to identify and bring together people and organisations to advance industrial up-take and drive development and manufacturing of new product for the growing global markets.  相似文献   

17.
You may have heard a new term that started making rounds very recently – “cloud-based security”. In this paper we describe past and contemporary security technologies based on the knowledge provided from the servers in the Internet “cloud”. We discuss how cloud-based malware scanners can simbiotically coexist with traditional scanning technologies, what are the advantages and limitations of the new approach. We also touch on the privacy aspects and challenges related to testing (especially comparative testing) of the cloud security solutions.  相似文献   

18.
Narasimhan  P. 《Computer》2006,39(7):85-87
Embedded computing technologies are not only an integral part of traditional safety- critical applications such as jet engine and automotive brake control, they are also being used to improve people's quality of life. Trinetra integrates embedded devices to let blind users enjoy cost-effective, independent shopping. The day-to-day needs of a typical blind user greatly influenced our design and evaluation of the Trinetra system. From the beginning, the user of our system also proved instrumental in helping design and tests the system.  相似文献   

19.
Peacock  R. 《IT Professional》2000,2(3):58-60
Moving from a legacy architecture to one that uses distributed objects has both complexities and rewards. IT managers who are planning this move face several distribution issues that require them to make crucial choices involving a wide range of languages, operating systems, networking protocols, and applications. The paper presents a review of the various types of architectures  相似文献   

20.
Polymer microfabrication technologies   总被引:17,自引:1,他引:16  
 The need for low-cost microfabrication technologies in modern life-sciences is described. The article compares the replication technologies, hot embossing and micro-injection moulding and gives an overview over the technologies used for fabrication of the replication masters. The back-end processes transforming the replicated plastic part into a complete microsystem are described. Some manufacturing issues of mass production are discussed. Received: 22 June 2001/Accepted: 18 July 2001  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号