计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络(共13页).doc

上传人:飞****2 文档编号:8923431 上传时间:2022-03-26 格式:DOC 页数:13 大小:52KB
返回 下载 相关 举报
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络(共13页).doc_第1页
第1页 / 共13页
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络(共13页).doc_第2页
第2页 / 共13页
点击查看更多>>
资源描述

《计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络(共13页).doc》由会员分享,可在线阅读,更多相关《计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络(共13页).doc(13页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、精选优质文档-倾情为你奉上New technique of the computer networkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the peoples work, lif

2、e and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.keywordsInternet Network System Digital Certificates Grid Storage 1. ForewordInternet turns 36, still a work

3、in progressThirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers are experimenting with ways to increa

4、se its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of

5、innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other no

6、des joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second most popular application behind e-mail - in 1990. The Internet expanded beyond its initial mil

7、itary and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internets key oversight body, he is trying to defend the core addressing system from outside threats.He a

8、cknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only best efforts at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with vid

9、eo. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp.Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using s

10、poofed addresses. Many features being developed today wouldnt have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said. 2.Digital Certificates Digital certificates are data files used to establish the identity of people and electronic assets

11、on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificat

12、e to attest that it hasnt been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, Version Inc. announce

13、d its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning. Using Version software, hardware makers can generate cryptographic keys and corresponding digital c

14、ertificates those manufacturers or cable service providers can use to automatically identify individual modems. This ast-mileauthentication not only protects the value of existing content and services but also positions cable system operators to bring a broad new range of content, applications and v

15、alue-added services to market. When a CA digitally signs a certificate, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access. Identifying information embedded in the certificate includes the holder

16、s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When the CA verifies a users identity, the certificate uses the holders public encryption key to protect this data. Certificates that a Web server uses to confirm the authenticit

17、y of a Web site for a users browser also employ public keys. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the servers digital certificate to verify its identity. Role of Public-Ke

18、y Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical value thats used by an algorith

19、m to scramble information and make it readable only to users with the corresponding decryption key. Others to encrypt information meant only for that person use a persons public key. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A

20、 persons public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make sure that only it can decrypt confidential information sent to it over the Internet. The Web servers certificate is validated by a self-signed CA certific

21、ate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator. The CA certificate tells users whether they can trust the Web server certificate when its presented to the browser. If the validity of the We

22、b server certificate is affirmed, the certificates public key is used to secure information for the server using Secure Sockets Layer (SSL) technology. Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL i

23、s used in most major Web browsers and commercial Web servers. 3. Digital Wallets-A digital wallet is software that enables users to pay for goods on the Web It holds credit-card numbers and other personal information such as a shipping address Once entered,the data automatically populates order fiel

24、ds at merchant sites -When using a digital wallet,consumers dont need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatically updated and entered into the order fields across merchant sites Consumers also benefit when using

25、 digital wallets because their information is encrypted or protected by a private software code And merchants benefit by receiving protection against fraud -Digital wallets are available to consumers free of charge,and theyre fairly easy to obtain For example,when a consumer makes a purchase at a me

26、rchant site thats set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchants own form At the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases Users can

27、 also acquire wallets at a wallet vendors site -Although a wallet is free for consumers,vendors charge merchants for wallets -Digital wallets come in two main types: client-side and server- side Within those divisions are wallets that work only on specific merchant sites and those that are merchant

28、agnostic -Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and install software A user downloads the wallet application and inputs payment and mailing information At that point,the information is secured a

29、nd encrypted on the users hard drive The user retains control of his credit card and personal information locally -With a server-based wallet,a user fills out his personal information,and a cookie is automatically downloaded (A cookie is a text file that contains information about the user )In this

30、scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the users PC -Server-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties When a party makes a transaction

31、,it presents its certificate to the other parties involved A certificate is an attachment to an electronic message used to verify the identity of the party and to provide the receiver with the means to encode a reply -Furthermore,the cardholders sensitive data is typically housed at a financial inst

32、itution,so theres an extra sense of security because financial environments generally provide the highest degree of security -But even though wallets provide easy shopping online, adoption hasnt been widespread -Standards are pivotal to the success of digital wallets -Last month,major vendors,includ

33、ing Microsoft Corp , Sun Microsystems Inc and America Online Inc announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment 4. Grid Storage Definition: Grid storage, an

34、alogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system. A grid is, in fact, a meshed network in which no single centraliz

35、ed switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they arent constrained by the need for ever-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure. Applying the grid concept to a co

36、mputer network lets us harness available but unused resources by dynamically allocating and deal locating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collab

37、oration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes. After grid computing came into being, it was only a matter of time before a similar model would emerge for

38、making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases

39、and continue to deliver improved reliability and higher performance and connectivity. Based on current and proposed products, it appears that a grid storage system should include the following: Modular storage arrays: These systems are connected across a storage network using serial ATA disks. The s

40、ystems can be block-oriented storage arrays or network-attached storage gateways and servers. Common virtualization layer: Storage must be organized as a single logical pool of resources available to users. Data redundancy and availability: Multiple copies of data should exist across nodes in the gr

41、id, creating redundant data access and availability in case of a component failure. Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning. Simplified platform/management architecture: Bec

42、ause common management is so important, the tasks involved in administration should be organized in modular fashion, allowing the auto discovery of new nodes in the grid and automating volume and file management. Three Basic Benefits Applying grid topology to a storage network provides several benef

43、its, including the following: Reliability. A well-designed grid network is extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal

44、impact on system availability or downtime. Performance. The same factors that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available off

45、ers consistent performance for the entire network. Scalability. Its easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using

46、relatively inexpensive storage building blocks. 计算机网络摘要:21世纪是信息经济的时代,作为这个时代的代表技术,计算机网络技术将在非常快的速度发展很快,不断创造性地将进入人们的工作,学习和生活中深。因此,控制这种技术,然后似乎更提供的重视。现在,我主要介绍一些在现实的网络新技术现场应用。关键字:网络系统 互联网 数字证书 网格存储1.前言:互联网变成36,仍然在进行中的工作36年后在加州大学洛杉矶分校的计算机科学家相连两台笨重的计算机用一条15英尺长的灰色电缆,测试在网络上交换数据的新方法,最终产生了互联网仍然是一个正在进行的工作。大学的研究人

47、员正在试验方法,以增加其容量和速度。编程人员正在设法注入更多的智能网页。和工作正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦。所有的威胁一直是存在:批评人士警告说,商业,法律和政治压力可能会阻碍创新的类型,使互联网是今天。Stephen Crocker和Vinton Cerf同谁的研究生参加了对1969年9月2日工程实验室,加州大学洛杉矶分校教授Len克莱瑞克作为数据传输试验,静静地流过两台计算机之间。到1月,其他三个“节点”加入这个网络。接着出现了电子邮件,几年后,一个核心通信协议,TCP / IP协议在70年代末,80年代中的域名系统和万维网-现在第二个最受欢迎的背后电子邮件在1

48、990年-应用。在Interbetween两台计算机。到1月,其他三个“节点”加入这个网络。净扩大,超出了最初的军事和教育纳入企业和世界各地的家庭域。现在,Crocker还在从事互联网的工作,为网络协作设计更好的工具。作为互联网安全的关键监督机构的主席,他是为了捍卫核心处理来自外部的威胁系统。他承认,他帮助建立互联网还远远没有完成,在商店的变化,以满足多媒体日益增长的需求。网络供应商现在只是“最大努力”在提供数据包,克罗克说,需要更好的保障,以防止和结结巴巴跳过现在视频常见。 瑟夫,现在在MCI公司说,他希望他可以设计出具有内置安全性的互联网英寸微软,雅虎和美国在线等,目前正在努力改造的网络,电子邮件发送者可以验证-一种方法减少了发送垃圾邮件使用伪造的地址。 许多目前正在开发的功能在出生就没有可能发生,由于计算机速度很慢窄互联网管道,或带宽,瑟夫说。 2.Digital证书数字证书是数据文件,用于建立人民和因特网上的电子资产的身份。他们允许安全,加密的网络通信和经常被用来保护网上交易。数字证书颁发由信任的第三方作为认证机构(CA)已知的缔约国。 CA的验证证书持有人的“标志”证书的身份证明,它没有被伪造或以任何方式改变。 使用新数字证书 数字证书是目前用来提供安全和无线连接验证,和硬件制造商最新的群体之一来使用它们。不久前,VeriS

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 应用文书 > 教育教学

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁