网络边界

  • 网络Network Boundary;Network Perimeter
网络边界网络边界
  1. 本文讲述了如何利用硬件防火墙和代理式软件防火墙ISASERVER各自的优点,相互结合,采用back-to-back结构构建网络边界的安全体系。

    This article describes how to make use of the advantages of hardware firewall and proxy type software firewall ISA Server . By using the back-to-back structure , the safety system of network boundary can be established .

  2. 为此,本文采用新的方法来计算平均每跳距离,使其更接近实际距离,并对估计坐标超出网络边界的节点进行坐标修正,MATLAB仿真表明,改进算法提高了定位精度。

    So this paper adopts a new method to calculate the average hop distance to close to the actual distance , and amends estimation coordinates of unknown node which go beyond the network boundary . MATLAB simulation shows that the improved algorithm can raise the localization accuracy .

  3. 但是无线局域网不存在一个网络边界的概念,任何攻击都是直接在WLAN的内部直接发起。

    But there is no network edge exists in WLAN , any attack is started interior directly .

  4. 当企业为了安全和治理已经在其网络边界成功部署SOA网关之后,那么基于相同的考虑将它转入内部网络就成了自然而然的事了。

    As enterprises successfully deployed SOA Gateways at the edge of their networks for security and governance , it was a natural transition into the intranet for the same purposes .

  5. 翻译网关架设在网络边界路由器上,对不同协议域的交互信息进行协议转换,包括IP、太原理工大学硕士研究生学位论文工CMP以及传输层与应用层。

    The translation gateways are placed on the border routers , and translate protocols between the different realms , including IP , ICMP , TCP and application layer .

  6. 分析了BP算法中假饱和存在的条件,给出了网络边界点的概念,提出了一种能令网络跳出假饱和提高训练速度的简单而实用的改进算法。

    This paper analyses the existing conditions of false saturation in BP algorithm , gives the concept of the boundary area of network , and then proposes a simple and effective improved algorithm which can get the network out of false saturation area and speed up learning rate .

  7. 提出了一种基于SIP协议的会话边界控制器(SBC)实现方案,它解决了跨越IP网络边界,提供端到端的多媒体通信时存在的NAT/FW穿透、安全接入等诸多问题。

    A solution of SIP-based session border controller ( SBC ) is proposed in the paper , in order to solve the border issues in delivering interactive communications across IP network borders , such as NAT / FW traversal , network security and so on .

  8. 对等(P2P)计算模型是一种相对于客户机/服务器(C/S)模型的新兴分布式计算模型,能够有效利用网络边界资源,具有自组织、大规模、可扩展、高效和低成本等技术优势。

    Compared with Client / Server ( C / S ) model , Peer-to-Peer ( P2P ) is an emerging computing model , which can exploit resource on the edge of network efficienty . P2P is characterized by self-organization , large scale , scalable , efficient , and low cost .

  9. DFWS在保留了传统网络边界防火墙优点同时,将防火墙功能嵌入到网络的终端。

    DFWS reserved the traditional network boundary firewalls ' advantages in the new design , and embeded the functions of firewall to the terminal of network .

  10. 利用背靠背结构加强网络边界的安全和管理

    Strengthening Security and Management of Network Boundary by Applying the Back-to-Back Structure

  11. 利用前馈人工神经网络边界判决实现分类

    Classification Using Boundary Judgment of Feed-forward Artificial Neural Networks

  12. TCP/IP网络边界路由技术研究

    Study on tcp / ip Network Border Routing

  13. 网络边界安全的动态防护模型

    Dynamic Defense Security Model for Network Perimeter

  14. 讨论利用侧抑制神经网络边界识别的方法。

    The paper proposes a method for edge detection based upon a lateral inhibition neural network .

  15. 与外界伙伴与承包商的合作也要求公司向外来者开放网络边界。

    Collaboration with external partners and contractors has also required companies to open their network borders to outsiders .

  16. 而策略服务器更新策略之后,可直接推到网络边界进行执行。

    The policy control center can push policy to the edge of network after it updates the policy .

  17. 当云是私有云时,企业和供应商都被包含在同一网络边界内。

    When the cloud is private , both the enterprise and the provider are encompassed by the same network boundary .

  18. 该系统目前已投入实际使用,运行稳定可靠,从理论和实践的层面对边界防护系统正确性和可实现性进行了证明,较好地实现了对专用网络边界安全的保护作用。

    The newly developed system has been put into practical use and it operates firmly , and functions the good border protection .

  19. 防火墙是位于网络边界防范网络攻击的屏障,是与不可信网络进行联络的唯一纽带。

    Firewall is a barrier at the network border to prevent network attacks , and is the only link to unauthentic network .

  20. 它也运行网络边界的一个重要的缓存功能缓存静态内容如,图像。

    It also performs an important caching function – caching static content-such as images , closer to the edge of the network .

  21. 在云端,没有防火墙的保护,即使对于二进制访问来说,也无法依靠网络边界来控制。

    In the cloud , outside the firewall , perimeter controls cannot be relied upon to con ­ trol even binary access .

  22. 论文从网络边界出口路由器防火墙核心交换机汇聚交换机用户接入的顺序分别部署安全策略。

    In the paper , the writer describes from border router firewall core router distribute switch user access in sequence to arrange the security ploy .

  23. 通过在本校的一卡通应用表明,采用这些安全设置大大提高了校园一卡通网络边界安全防护的有效性。

    Through the show in smart card application of Wuhan University , using these settings can greatly improve the effectiveness of the campus card network border security .

  24. 本文综合交易成本理论以及企业能力理论对影响企业网络边界的因素分别进行了阐释,对资产专用性、企业能力、不确定性等因素对企业边界的影响机制进行了分析。

    We shall utilize the theories of transaction cost and firm competence , and analysis how the asset specificity , firm competence , uncertainty influence the boundary of the firm .

  25. 在获得路由器节点、链路和可控网络边界节点数据的基础上提出并实现基于流量特征的网络安全量化评估模型。

    Under the condition of obtaining traffic information of router nodes 、 links and controllable network boundary nodes , this paper proposes and realizes the network security quantification evaluation based on traffic characteristics when security incidents happen .

  26. 该方法采用Ward&PV等值原理来确定外部网络边界节点的等值注入功率和等值阻抗,再应用考虑离散变量的预测-校正原对偶内点法来求解等值网络的无功优化子问题。

    This method applies Ward-PV equivalent principles to determine the injection power and equivalent impedance of external network boundary buses , and then predictor-corrector primal-dual interior point method of discrete control variables to address the sub-problem of reactive optimization of equivalent network .

  27. 2D地震小波变换和自组织网络联合边界检测

    Edge detection jointly with 2-D seismic wavelet transform and self organizing network

  28. 基于堆栈滤波器和Hopfield神经网络的边界检测法

    Edge Detection Based on Stack Filter and Hopfield Neural Network

  29. 传统的防火墙都是位于网络的边界,在内部企业网和外部互联网之间构成一个屏障,进行网络存取控制,因此也称为边界防火墙(PerimeterFirewall)。

    The traditional firewall relies on the topological structure of intranet , it lies between enterprise intranet and internet , controls the network access . We call it " Perimeter Firewall " therefore .

  30. 一般认为,哺乳动物(包括人在内)都是通过脊髓步行中枢模式发生器(CPG)控制步行运动,而CPG网络的边界是灵活的,脊髓损伤后脊髓步行CPG可实现网络重组。

    It is generally accepted that locomotion in mammals , including humans , is based on the activity of neuronal circuits within the spinal cord ( the central pattern generator , CPG ) .