期刊文献+

PXE启动技术在计算机管理中的应用 被引量:6

The Application of PXE Boot Technology in Computer Management
下载PDF
导出
摘要 将PXE启动功能与GhostSrv8.2和tftpd32相结合,可高效快速地对相同的计算机实现网络多播克隆,安装计算机软件系统。实践表明,该项技术应用在计算机管理中,能高效地实现计算机软件系统网络化维护,提高工作效率。 The combination of PXE boot technology with GhostSrv8.2 and tftpd32 can realize efficiently and quickly the network multicast clone of the same computer and install computer software system.Practice shows that the utilization of this technology can achieve the network maintenance of computer software system and improve work efficiency.
作者 梁启文
出处 《长春师范学院学报(自然科学版)》 2010年第3期33-35,共3页 Journal of Changchun Teachers College
关键词 PXE启动技术 多播克隆 TFTP PXE boot technology multicast clone TFTP
  • 相关文献

参考文献7

二级参考文献8

共引文献14

同被引文献28

  • 1李涛.基于PXE应用DHCP+GHOST快速实现机房维护[J].实验科学与技术,2006,4(2):39-42. 被引量:9
  • 2McCalTon C, Kurien V. Client authentication during network boot : U. S. Patent 8,990,902[P]. 2015-03-24.
  • 3David D B, Rajappa M, Karupuswamy T, et al. Secure Mutual Authen- tication and Key-Agreement Protocol for IP Multimedia Server-Client IJ]. Advanced Science Letters ,2014,20(10-12) : 1856-1863.
  • 4Farash M S. Cryptanalysis and improvement of an efficient mutual au- thentication RFID scheme based on elliptic curve cryptography [J]. The Journal of Supercomputing,2014,70(2) :987-1001.
  • 5Prajapati P, Patel N, Macwan R, et al. Comparative Analysis of DES, AES, RSA Encryption Algorithms [J]. International Journal of Engi- neering and Management Research, 2014,4( 1 ).
  • 6The MD5 message-digest algorithm [ EB/OL]. [2015-06-15 ]. http:// wenku.baidu.com/link?url=ZONmiHOPeMvmBb3nsZHck lsNVRWq T1DgGY 1Lw_FDIqSIgo661 uRTKmrqLxdak431PPZbPLx7J9kiTgsurB Br3eGFYxTBTJMSpYnbYRUTQQO.
  • 7Team N C. The netfilter, org iptables project [EB/OL]. [2015-06- 15]. http ://www. netfilter, org./projects/iptables/index, html.
  • 8Peter S, Li J, Woos D, et al. Towards high-performance application- level storage management [C ]. Proc. Workshop Hot Topics in Storage and File System (HotStorage), 2014.
  • 9雷燕,吕后坤.虚拟存储技术研究[J].漯河职业技术学院学报,2008,7(5):49-50. 被引量:3
  • 10王昌旭,周振柳,许榕生.网络接入安全控制研究[J].计算机应用与软件,2008,25(11):92-94. 被引量:5

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部