资源预览内容
第1页 / 共30页
第2页 / 共30页
第3页 / 共30页
第4页 / 共30页
第5页 / 共30页
第6页 / 共30页
第7页 / 共30页
第8页 / 共30页
第9页 / 共30页
第10页 / 共30页
亲,该文档总共30页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
东北电力大学计算机网络双语论文作 者: 学 号:院 系: 自动化工程学院 专 业: 自动化 题 目: 局域网的设计 指导教师: WANTechnologyAndVPNDesign Chapter1 Introduction.3Chapter 2 WAN.3Chapter 3 Routing7Chart 4 “infinite counting” question.14Chapter 5 Network Present Situation And Demand Survey.16Chapter 6 Realization of VPN Technology.18Chapter 7 Realizes The VPN Network Hardware Disposition.21Chapter 8 VPN Network Realization.23WAN Technology And VPN DesignAbstractIn recent years, the Internet with its rich internet applications can be spread in the community for its swift, internet technology, advanced, causing widespread concern in the enterprise. So the use of internet technology, the idea of the enterprise local area network (LAN), be applied to form an intranet Intranet become fashionable. So, to understand technology, wide area networks and wide area network to form a good network for our system is essential. Here, we compare the WAN and LAN, come to their differences and linkages. The same time, connect to the network of the most important type of equipment - routers in the network and address of the principle of the work of routing in-depth analysis.In the familiar with the wide-area network and wide area network technology, based on, we give an advantage of WAN, VPN technology, the words of a companys INTERNET Netcom had connected into a virtual local area network design. Through the hardware and software settings, use of IPsec security protocol of the VPN and encryption capabilities, to achieve between the two businesses across the Internet, internal network connections to achieve a secure internal data communications. The internal control system through the firewall policy on the VPN, the data can be an effective control and management of the enterprises internal network traffic has good scalability and manageability. Key words: WAN technology, routing algorithm, router, VPN design, IP addressChapter1 IntroductionThe role of local area network from the original host connectivity, file and print services, turning around the client / server model of the large data streaming applications, Intranet, WWW browsing, real-time audio / video transmission and other services has become increasingly large and growing data flow continues increase in network load. The same time, based on work group or department-level enterprise-class server solution has been replaced by the server to facilitate data flow to a fundamental change in the status of the network backbone and further improved. These have all contributed to local area network technology from the bridge technology, the backbone routing technology to LAN switching technology transition. The development of switching technology LAN switch provides an unprecedented opportunity for development, but also greatly contributed to the LAN switch technology and product upgrading.With the development and application of information technology, information security, content in the continuous extension of the confidentiality of information from the initial development of information integrity, availability, controllability and non-repudiation, which in turn developed into the attack (attack) , anti-(against), measured (test), control (control), tube (management), evaluation (assessment) and other aspects of the basic theory and implementation of technology. Modern information systems in the information security and its core issue is the password Theory and Its Applications, based on credible information system structure to make and evaluation. Overall, the current field of information security the focus of attention by people mainly the following aspects: 1) Password theory and technology; 2) security protocol theory and technology; 3) The security architecture theory and technology; 4) information against the theory and technology; 5) network security and security products.Chapter 2 WAN2.1 IntroductionA WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Figure 3-1 illustrates the relationship between the common WAN technologies and the OSI model.In general,a network technology is classified into one of three broad categories, depending on the size of networks that can be created LAN,MAN and WAN which can span sites in moltiple cities,countries or continents.2.2 The Difference Between LAN And WANTo appreciate the distinction,it is important to understand how the size of a network is measured.We have seen that although LAB thchnologies are designed to be used at a single site,techniques exist that can extend the distanc
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号