Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (8): 59-61    DOI:
Current Issue | Archive | Adv Search |
Research on the Application of Exchange Visits of Educational Training Institutions Based on VPN Technology
ZuoWentao,Zhao Xiaoping,Peng Yuling
Guangzhou Vocational College of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper describes the basic principle of VPN technology, related security technology and VPN implementation. Base on the current VPN technology commonly used methods and several typical applications, and combining with the specific circumstances of the education training institutions, it explores the problems of resource sharing of education training institutions and mobile office user remote access to the core digital resources of training institutions.
Key wordsVPN      educational training institution      resource sharin     
Published: 08 November 2017
:  TP393.08  

Cite this article:

ZuoWentao, Zhao Xiaoping, Peng Yuling. Research on the Application of Exchange Visits of Educational Training Institutions Based on VPN Technology. Computer & Telecommunication, 2015, 1(8): 59-61.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I8/59

[1] LIAO Feng.
Remote Disaster Recovery of Cloud Data Center Based on EVPN
[J]. 电脑与电信, 2021, 1(11): 60-64.
[2] LUO Gui-qiong. Research on Cloud Service Architecture for Education Informatization Resources Co-construction and Sharing[J]. 电脑与电信, 2019, 1(5): 21-23.
[3] Dong Jianfeng, Xiao Liyan. Research on Education Information Resources Sharing Mechanism Based on Mobile Cloud[J]. 电脑与电信, 2017, 1(1-2): 13-16.
[4] Wang Xiaohong. Application of Enterprise Virtual Private Network Technology Based on ADSL[J]. 电脑与电信, 2016, 1(9): 41-42.
[5] Liu Hui. Key Technologies of Web-based Learning Resources Sharing Based on Cloud[J]. 电脑与电信, 2015, 1(6): 19-30.
[6] Li Yingjie. The Application of VPN Technology in Computer Network Information Security[J]. 电脑与电信, 2015, 1(5): 27-28.
[7] Yin Zongping. Method of Server using the Remote IP Address[J]. 电脑与电信, 2015, 1(3): 68-70.
[8] Wang Yulin. Using Ipsec-tools to Build the Enterprise VPN[J]. , 2011, 1(08): 0-0.
[9] SHEN Xiao-Lin LIU Yan Zheping Xu. Plant information system design and application[J]. , 2011, 1(08): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd