Font Size: a A A

Design And Research Of Virtual Private Network In XX Building Company

Posted on:2008-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2178360215458176Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
It is the characteristics of the building enterprise that its project is scattered, carrying is across the region, but the management needs concentration, so, building enterprise network development is much more difficult than that of other industries. On the basis of the fast development of Internet, the virtual private network technique generated, and it began being extensively used for enterprise network developments, it established a new direction in the network developments of this type of enterprise as building. Combining the actuality of XX building company, this paper reseached how to apply the virtual private network technique to set up an efficient, safe and vivid virtual private network.First, this paper deeply analysed the realization technique of virtual private network.Next, this paper analyzed the situation of the company network developments completely, made sure the object of current company network developments, and pointed out that the main problems of the company network developments is the vivid telecommunication network construction, the visitor's identification authentication and the perfect access control now. By analysing the advantage of virtual private network and comparing with other information technique , this paper points out that this technique is the best way to solve the above three problems, it realizes the network telecommunication through authorization based on identification authentication and provides the technique support from the bottom layer, having these advantages of good safety, high efficiency and transparency to customer.Finally, after above research and analysis, this paper reseached the concrete application of the virtual private network technique in telecommunication network construction of the company, then combining the application of the virtual private network technique, designed and developed the identification authentication system and access control system of the company with the technique of dynamic passwords based on a pair of factors and the technique of access control based on role authorization.
Keywords/Search Tags:virtual private network, identification authentication, Building enterprise, access control
PDF Full Text Request
Related items