。 They are both considered tunneling protocols –because they create a “virtual tunnel” by applying much needed encryption.
基于6个网页-相关网页
他们都认为隧道协议,因为他们创建一个“虚拟隧道”运用急需的加密技术。
They are both considered tunneling protocols –because they create a "virtual tunnel" by applying much needed encryption.
所包含的对 IPv6 到 IPv6 隧道的支持让两个端点之间可以进行安全无缝的通信,比如虚拟专用网络 (Virtual Private Networks, VPN) 之上的传输。
The inclusion of support for IPv6-to-IPv6 tunneling allows secure seamless communication to occur between two endpoints, such as transmissions over Virtual Private Networks, or VPNs.
并以其中电子经纬仪虚拟照片法观测隧道周边位移为例,分析了系统的原理、使用方法及其精度。
Using electron theodolite dummy photograph observing tunnel border displacement, as the example, the authors analyse the principle, means and precision of the system.
应用推荐