Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (3): 74-76    DOI:
Current Issue | Archive | Adv Search |
Application of Policy Based Route in Multiple Outlet Network
Zhang Guangya (Ezhou Polytechnic,Ezhou 436000,Hubei
Ezhou Polytechnic
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Because of the shortage of IPV4 addresses and the limitation of data transmission between multiple operators, most colleges use more than one ISP to meet their needs. Using PBR based on source address to solve the problem of multiple outlet routes, not only makes good use of the more than one network links, improving network access speed, but also greatly increases network reliability and security.
Key wordsPBR      policy based route      NAT;ACL     
Published: 08 November 2017
ZTFLH:  TP393  

Cite this article:

Zhang Guangya. Application of Policy Based Route in Multiple Outlet Network. Computer & Telecommunication, 2015, 1(3): 74-76.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2015/V1/I3/74

[1] LI Jia-Qi SU Li-na. Research on Science and Technology Information Service platform of Comprehensive Sci-tech Journals based on Mobile Interconnection and its Architecture[J]. 电脑与电信, 2019, 1(6): 42-46.
[2] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] FANG Yong. Research on the IPv6 Remote Network Monitoring and Communication System[J]. 电脑与电信, 2019, 1(3): 62-65.
[6] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[7] Wang Gang. A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow[J]. 电脑与电信, 2018, 1(12): 70-73.
[8] CHEN Si-qi. Fine Grained Image Localization Based on Bilinear Convolutional Neural Network [J]. 电脑与电信, 2018, 1(11): 78-80.
[9] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[10] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
[11] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[12] ZHANG Yun. Design of Intelligent Supervision and Evaluation System Based on Cloudview[J]. 电脑与电信, 2018, 1(4): 43-46.
[13] FANG Zi-ling, KUANG Fang-jun. Data Analysis on NetEase Ballad Lyrics Based on Python[J]. 电脑与电信, 2018, 1(4): 53-56.
[14] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[15] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd