边界路由器

  • 网络border router;AS Boundary Router;ASBR;ABR
边界路由器边界路由器
  1. 边界路由器多播机制及其在MPLS网络中的应用

    A Border Router Multicast Mechanism for MPLS Networks

  2. 介绍了MPLS网络以及在MPLS网络中提供多播业务的难点,讨论并分析了一种MPLS环境下的边界路由器多播机制。

    In this paper , we discuss and analyze a Border Router Multicast ( BRM ) mechanism for MPLS network .

  3. 边界路由器多播机制能有效地支持MPLS网络环境下的IP多播问题。

    This BRM mechanism can support IP Multicast in MPLS domain effectively .

  4. 基于网络处理器的DiffServ边界路由器研究与实现

    Research and Implementation of DiffServ Edge Router based on Network Processor

  5. 要在网络中提供QoS,必须在网络边界路由器上对进入服务提供商网络的通信流量进行控制,以确保通信速率限定在服务限制的范围内,防止网络拥塞。

    The traffic which accesses into the Internet should be controlled on the edge routers to ensure the flow rate below the processing limit of the network devices .

  6. 基于NAT异常自动检测和防范SYN攻击的边界路由器设计及实现

    Design and Realization of a Border Router Capable of Automatically Detecting and Defending SYN Flooding Based on NAT Abnormity

  7. 该框架在主机IPv6地址生成阶段增加了地址授权,使用边界路由器作为授权者对带有TPM的主机生成的地址进行授权。

    Our framework adds authorization to IPv6 address generation mechanism , and makes edge routers authorizers off addresses for hosts with TPM .

  8. 翻译网关架设在网络边界路由器上,对不同协议域的交互信息进行协议转换,包括IP、太原理工大学硕士研究生学位论文工CMP以及传输层与应用层。

    The translation gateways are placed on the border routers , and translate protocols between the different realms , including IP , ICMP , TCP and application layer .

  9. 针对常见的SYN攻击在边界路由器NAT转换中的表现出的异常特征,提出了一种实用价值很高的SYN攻击自动检测和防范策略,并在一款边界路由器中实现。

    A very useful SYN-flooding auto detecting and defending policy is presented based on abnormal characters of NAT transition when SYN-flooding occurs in a border router , and it is realized in a border router .

  10. 校园网边界路由器的安全性研究

    The observation of the security on the boundary router of the campus network

  11. 利用边界路由器实现校园网边界安全

    Application of the Border Router in Realizing the Security of Campus Network Border

  12. 区域边界路由器是两个或者多个区域的成员。

    So an ABR by definition is a member of two or more areas .

  13. 利用边界路由器构筑校园网络安全第一道防线

    Utilizing the border router to construct the first defence for security of campus network

  14. 在边界路由器不诚实或被攻陷的情况下,能够快速准确地追踪到信任域的边界。

    Under the circumstance were the routers compromised , the edge routers of the trust domain can be tracked .

  15. 确保服务的实现依赖于在边界路由器执行的数据包标记策略和在核心路由器执行的队列管理策略。

    The Assured Services architecture relies on packet marking mechanism at the edge router , and queue management mechanism at the core router .

  16. 据此适应性调整边界路由器的标记、资源分配等参数,使得语音数据在网络拥塞等状况下也能够获得有效服务,进一步提高网络的资源利用率。

    Thus , voice data can attain effective service even in the condition of network congestion , and network resources utilization level can be improved .

  17. 在该方案中,仅边界路由器需维持流状态,核心路由器追踪其出路流聚集速率并进行简单的本地接纳控制。

    In this schema , only edge routers maintain the flow state while core routers just check its output rate to perform local admission control .

  18. 提出了一种基于边界路由器的远程路由计算和查找方法,以边界路由器为核心计算远程路由信息,查找时通过路径长度比较实现最短路径的选择。

    A new method which computes remote routing based on the border routers , was presented and finds the appropriate route by comparing the length of routing .

  19. 定义了自治系统、边界路由器、路由和连接等这些域间路由中的基本对象,描述了它们之间的关系,形式化地定义了自治系统级网络拓扑图。

    The four types of the basic objects in inter domain routing , autonomous system , border gateway , route and connection are defined and the relations between them are discussed .

  20. 体系内部有边界路由器、接入路由器、防御服务器三类节点,通过三类节点间有效配合以及自治区域间的有效配合,可以高效率的防御现有各种洪泛攻击。

    There are edge router , access router and defense router in the system . It can defend effectively the current various flooding-style attacks by the collocation among the three nodes and autonomous region .

  21. 论文从网络边界出口路由器防火墙核心交换机汇聚交换机用户接入的顺序分别部署安全策略。

    In the paper , the writer describes from border router firewall core router distribute switch user access in sequence to arrange the security ploy .

  22. 由于普通PC机的工作性能日趋强大,对于网络流量不是很大的边界网络,软件路由器足以胜任网络的需求,加之软件路由器具有价格低廉、容易修改等显著优点,因此其具有范围很广的应用市场。

    As the performance of ordinary PC becomes ever more powerful , software routers can easily feed the demand in perimeter network with light network traffic . In addition , the software router has other obvious advantages including low price and easily modify feature .