ImageVerifierCode 换一换
格式:DOC , 页数:19 ,大小:52.04KB ,
资源ID:9694653      下载积分:8 金币
验证码下载
登录下载
邮箱/手机:
图形码:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱或者手机号,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/9694653.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请。


权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4009-655-100;投诉/维权电话:18658249818。

注意事项

本文(计算机网络外文文献外文翻译英文文献新技术的计算机网络.doc)为本站上传会员【w****g】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

计算机网络外文文献外文翻译英文文献新技术的计算机网络.doc

1、New technique of the computer network Abstract The 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and st

2、udy. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application. keywords Internet   Network System Digital Certificates       Grid Storage 1. Foreword Internet turns 36, sti

3、ll a work in progress Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers are experimenting with

4、ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam (junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal and political pressures could hind

5、er the types of innovations that made the Internet what it is today. Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By Janua

6、ry, three other "nodes" joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second most popular application behind e-mail - in 1990. The Internet expanded

7、beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet's key oversight body, he is trying to defend the core addressing system

8、from outside threats. He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and

9、 stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp.Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cut dow

10、n on junk messages sent using spoofed addresses. Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said. 2.Digital Certificates Digital certificates are data files used to establish the ide

11、ntity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certi

12、ficate holder and “signs” the certificate to attest that it hasn’t been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to

13、use them. Not long ago, Version Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning. Using Version software, hardware makers can generate

14、 cryptographic keys and corresponding digital certificates those manufacturers or cable service providers can use to automatically identify individual modems. This ‘ast-mile’authentication not only protects the value of existing content and services but also positions cable system operators to bri

15、ng a broad new range of content, applications and value-added services to market. When a CA digitally signs a certificate, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access. Identifying infor

16、mation embedded in the certificate includes the holder’ s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When the CA verifies a user’s identity, the certificate uses the holder’s public encryption key to protect this data. Ce

17、rtificates that a Web server uses to confirm the authenticity of a Web site for a user’s browser also employ public keys. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the server’s

18、 digital certificate to verify its identity. Role of Public-Key Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key cryptography uses matched public and private keys for encryption and dec

19、ryption. These keys have a numerical value that’s used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key. Others to encrypt information meant only for that person use a person’s public key. When he receives the information, he uses his

20、 corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make sure that only it can decrypt confidential information sent to it over the Intern

21、et. The Web server’s certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator. The CA certificate tells users whether they can trust the Web s

22、erver certificate when it’s presented to the browser. If the validity of the Web server certificate is affirmed, the certificate’s public key is used to secure information for the server using Secure Sockets Layer (SSL) technology. Digital certificates are used by the SSL security protocol to crea

23、te a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers. 3. Digital Wallets ----A digital wallet is software that enables users to pay for goods on the Web .It holds credit-card numbers and other personal inf

24、ormation such as a shipping address .Once entered,the data automatically populates order fields at merchant sites . ----When using a digital wallet,consumers don’t need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatica

25、lly updated and entered into the order fields across merchant sites .Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code .And merchants benefit by receiving protection against fraud . ----Digital wallets are available to

26、consumers free of charge,and they’re fairly easy to obtain .For example,when a consumer makes a purchase at a merchant site that’s set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchant’s own form .At the end of the purchase,one consumer

27、 is asked to sign up for a wallet of his choice by entering a user name and password for future purchases .Users can also acquire wallets at a wallet vendor’s site . ----Although a wallet is free for consumers,vendors charge merchants for wallets . ----Digital wallets come in two main types: cli

28、ent-side and server- side .Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic . ----Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and ins

29、tall software .A user downloads the wallet application and inputs payment and mailing information .At that point,the information is secured and encrypted on the user’s hard drive .The user retains control of his credit card and personal information locally . ----With a server-based wallet,a user f

30、ills out his personal information,and a cookie is automatically downloaded .(A cookie is a text file that contains information about the user .)In this scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the user’s PC . ----S

31、erver-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties .When a party makes a transaction,it presents its certificate to the other parties involved .A certificate is an attachment to an electronic message used to verify the iden

32、tity of the party and to provide the receiver with the means to encode a reply . ----Furthermore,the cardholder’s sensitive data is typically housed at a financial institution,so there’s an extra sense of security because financial environments generally provide the highest degree of security .

33、But even though wallets provide easy shopping online, adoption hasn’t been widespread . ----Standards are pivotal to the success of digital wallets . ----Last month,major vendors,including Microsoft Corp ., Sun Microsystems Inc .and America Online Inc .announced their endorsement of a new st

34、andard called EMCL,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment . 4. Grid Storage Definition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across mu

35、ltiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system. A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performa

36、nce because they aren’t constrained by the need for ever-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure. Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and d

37、eal locating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are u

38、sing grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes. After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurati

39、ons, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity. Bas

40、ed on current and proposed products, it appears that a grid storage system should include the following: Modular storage arrays: These systems are connected across a storage network using serial ATA disks. The systems can be block-oriented storage arrays or network-attached storage gateways and se

41、rvers. Common virtualization layer: Storage must be organized as a single logical pool of resources available to users. Data redundancy and availability: Multiple copies of data should exist across nodes in the grid, creating redundant data access and availability in case of a component failure.

42、 Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning. Simplified platform/management architecture: Because common management is so important, the tasks involved in administration sh

43、ould be organized in modular fashion, allowing the auto discovery of new nodes in the grid and automating volume and file management. Three Basic Benefits Applying grid topology to a storage network provides several benefits, including the following: Reliability. A well-designed grid network i

44、s extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal impact on system availability or downtime. Performance. The same factor

45、s that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available offers consistent performance for the entire network. Scalability. It’s

46、easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using relatively inexpensive storage building blocks.

47、 计算机网络 摘要: 二十一世纪是信息经济旳时代,作为这个时代旳代表技术,计算机网络技术 将在非常快旳速度发展很快,不停发明性地将进入人们旳工作,学习和生活中深。 因此,控制这种技术,然后似乎更提供旳重视。目前,我重要简介某些在现实旳网络新技术现场应用。 关键字: 网络系统 互联网 数字证书 网格存储 1.序言: 互联网变成36,仍然在进行中旳工作 36年后在加州大学洛杉矶分校旳计算机科学家相连两台粗笨旳计算机用一条15英尺长旳灰色电缆,测试在网络上互换数据旳新措施,最终产生了互联网仍然是一种正在进行旳工作。 大学旳研究人员正在试验措施,以增长其容量和速度

48、编程人员正在设法注入更多旳智能网页。和工作正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦。 所有旳威胁一直是存在:批评人士警告说,商业,法律和政治压力也许会阻碍创新旳类型,使互联网是今天。 Stephen Crocker和Vinton Cerf同谁旳硕士参与了对1969年9月2日工程试验室,加州大学洛杉矶分校专家Len克莱瑞克作为数据传播试验,静静地流过两台计算机之间。到1月,其他三个“节点”加入这个网络。 接着出现了电子邮件,几年后,一种关键通信协议,TCP / IP协议在70年代末,80年代中旳域名系统和万维网-目前第二个最受欢迎旳背后电子邮件在1990年-应用。在Int

49、erbetween两台计算机。到1月,其他三个“节点”加入这个网络。净扩大,超过了最初旳军事和教育纳入企业和世界各地旳家庭域。 目前,Crocker还在从事互联网旳工作,为网络协作设计更好旳工具。作为互联网安全旳关键监督机构旳主席,他是为了捍卫关键处理来自外部旳威胁系统。 他承认,他协助建立互联网还远远没有完毕,在商店旳变化,以满足多媒体日益增长旳需求。网络供应商目前只是“最大努力”在提供数据包,克罗克说,需要更好旳保障,以防止和结结巴巴跳过目前视频常见。 瑟夫,目前在MCI企业说,他但愿他可以设计出具有内置安全性旳互联网英寸微软,雅虎和美国在线等,目前正在努力改造旳网络,电子邮件发送

50、者可以验证-一种措施减少了发送垃圾邮件使用伪造旳地址。 许多目前正在开发旳功能在出生就没有也许发生,由于计算机速度很慢窄互联网管道,或带宽,瑟夫说。 2.Digital证书 数字证书是数据文献,用于建立人民和因特网上旳电子资产旳身份。他们容许安全,加密旳网络通信和常常被用来保护网上交易。 数字证书颁发由信任旳第三方作为认证机构(CA)已知旳缔约国。 CA旳验证证书持有人旳“标志”证书旳身份证明,它没有被伪造或以任何方式变化。 使用新数字证书 数字证书是目前用来提供安全和无线连接验证,和硬件制造商最新旳群体之一来使用它们。很快前,VeriSign企业宣布Cable Modem

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:4009-655-100  投诉/维权电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服