




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、计算机专业英语计算机专业英语Computer English中国水利水电出版社中国水利水电出版社 教学目标 教学内容Unit 4 Network Technique 中国水利水电出版社中国水利水电出版社教学目标教学目标 了解计算机网络的发展史 理解网络安全的相关理论 了解虚拟化技术 掌握电子商务的相关技术 了解目前已经广泛使用的局域网技术中国水利水电出版社中国水利水电出版社教学内容教学内容 Text 1 Evolution of computer networks Text 2 Network Security Text 3 Virtualization Technology Text 4 E
2、lectronic Commerce Text 5 LAN-Cruising中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer networks Main Contents Words and Expressions Exercises中国水利水电出版社中国水利水电出版社 The term network can mean many different things. It can imply an interconnection of railway tracks for the rail network; highways and streets
3、for transportation networks; telephone lines and switching centers for the phone network; coaxial lines for the cable television network; fiber lines for cable communications networks; or the interconnection of service centers, businesses, and so on to form a network. All of these configurations ref
4、er to the means to tie together various resources so that they may operate as a group, realizing the benefits of numbers, sharing, and communications in such a group.Text 1 Evolution of computer networks中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer networksIn computer systems terminology of a netwo
5、rk is a combination of interconnected computing equipment and programs used for moving information (and computations) between points (nodes) in the network where it may be generated, processed, stored, or used in whatever manner is deemed appropriate. The interconnection may take on many forms, such
6、 as dedicated links, shared links, telephone lines, microwave links, and satellite links. Networks in this sense form a loose coalition of devices that share information. This was one of the first uses of a network, although it was not the last. Users found that the network could offer more than jus
7、t information sharing; it could offer other services for remote job execution and ultimately distributed computing.中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer networksThe earliest concept of a network was of a loose binding together of devices or resources for sharing. An early computer network t
8、hat exhibited these traits was the ARPANET. ARPANET was first brought on-line in 1969 as a research tool to investigate long-haul network issues and to provide a tool for research and development solutions. It has evolved into the Internet, connecting millions of computers over local area networks,
9、metropolitan area networks, and other wide area networks. ARPANET provided the vehicle for early research into communications protocols dealing with congestion, control, routing, addressing, remote invocation, distributed computing, distributed operating systems and services, and many other areas.中国
10、水利水电出版社中国水利水电出版社The reasons for using networks such as ARPANET were to provide greater availability and access to a wider range of devices. Early applications of computers dealt with performing engineering tasks and major data processing functions. As the technology of computers changed, and as rese
11、archers and users alike added more and more applications, information access and manipulation took on greater emphasis.Earlier networks provided the necessary information exchange services but were limited to basically just this service. The information availability stimulated more imaginative uses
12、of this information. As this occurred and the technology of networks improved, new applications arose. These new applications not only used information exchange but also remote job execution. It began simply as sending a batch job down the link to a less busy host, having the job completed there, an
13、d then shipping the results back to the originator.Text 1 Evolution of computer networks中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer networksThis sufficed for a while, but it still did not provide the real-time or interactive environments that users were beginning to become accustomed to, includin
14、g more advanced protocols and network operating systems to provide further services for remote job invocation and synchronization. The era of the local area network was coming. The wide area networks biggest shortfall was in throughput or turnaround time for jobs and interprocessor communications. B
15、ecause of the wide distances, delays of seconds were commonplace and caused added overhead in performing otherwise simple tasks. Network designers saw the need to provide another link in the network: the local area network.中国水利水电出版社中国水利水电出版社 Local area networks began showing up on the networking lan
16、dscape in the early to mid 1970s as mostly research activities in universities and government laboratories. It was not until Ethernet was released in the mid 1970s that LANs became more widely available. Since that time, numerous LAN designs have been produced to fit an extremely wide spectrum of us
17、er requirements-for example, the fiber ring. Additionally, standards have evolved, providing basic LAN topologies and their services to a greater number of users.Text 1 Evolution of computer networks中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer networksLocal area networks are finding their way into
18、 all aspects of modern society. We find them in our homes through cable modems and phone modems, automobiles via wireless technologies, banking (e.g., ATMs), schools via Internet connections, businesses, government, and industry. There are not too many aspects of information exchange and data proces
19、sing in which a LAN cannot be found. Local area networks and their associated technologies represent one of the great growth areas of the 1990s and early 2000s. As more and more LANs become available, so will new products and uses for them. LANs are used to connect all personal computers in offices,
20、 classrooms, factory floors, retail establishments, and now even many homes. They are used in these environments to send memoranda, issue directives, schedule meetings, transmit documents, send e-mail, discover new information, and process large volumes of data concurrently at many sites.中国水利水电出版社中国
21、水利水电出版社Text 1 Evolution of computer networksLANs are used to link factory robots together with area and factory controllers. They provide sensor data, control data, and feedback to the control centers, while at the same time providing a vehicle to issue production changes and notices to users and ro
22、bots alike. A fine example of a local area network providing diverse services to the users is seen in Walt Disney World. Disney uses LANs and computers to monitor all aspects of services, including fire protection, scheduling, ride management, on-line information, security, personnel services, and a
23、 plethora of other park management functions. Large banks, such as the World Bank, have adopted LANs as the means to interconnect their various local sites into smaller networks linked together by wide area networks. However, the LAN is not for everyone.中国水利水电出版社中国水利水电出版社Text 1 Evolution of computer
24、 networks Network evolution has not stopped there. As wireless technology has improved, so has the interest in networking vendors to provide their services to users of these domains. Wireless networks began fairly quietly in the 1970s with the Aloha net as the foundation. Since then, wireless phone
25、network development has opened the door for computer networks. Today one of the great growth areas in networking will be in further developing wireless networks and integrating these into existing LAN and WAN networks to provide an even wider array of applications to the wireless cell phone communit
26、y.中国水利水电出版社中国水利水电出版社Words and Expressionsinterconnection intknekn n. 网络互连track trk n. 【计算机】数据磁道cable keibl n.电缆coaxial kuksl adj. 同轴传输线的transportation trnsp:tein n. 运输,运输系统,运输工具fiber faib n. 光纤configuration knfigjurein n. 【计算机】 配置terminology t:minldi n. 用辞,术语microwave maikruweiv n. 微波dedicated dedik
27、eitid adj. 【计算机】(装置、程序、系统等)专用的coalition kulin n. 结合,合并,联合distributed distribju:tid vt. 分布的,分布式的loose lu:s adj. 宽松的,不牢固的,不精确的中国水利水电出版社中国水利水电出版社Words and Expressionsbinding baindi n.1. 捆绑;束缚;粘合;连接2. 捆缚物;束缚物;连接物3. (滑雪屐上的)扣栓,(滑雪板上的)皮靴固定装置4. (如桌布、毯子等的)镶边,滚带5. (书籍的)装订;装帧;活页封面和封底、封皮ARPANET阿帕网investigate in
28、vestigeit v. 【计算机】 研究long-haul lh:l; l:- adj.长远距的metropolitan metrplit()n n. 大都市的居民,大主教,母国的居民adj. 大都市的vehicle vi:ikl n. 传播媒介,工具,手段,交通工具,车辆congestion kndestn n. 【计算机】 拥挤routing ru:ti; rau- n路由选择,路径选择invocation invukein 【计算机】调用availability veilbiliti n. 有效,有用,有益. 中国水利水电出版社中国水利水电出版社Words and Expression
29、smanipulation m,nipjulein n. 处理emphasi emfsis n. 强调,重点stimulate stimjuleit vt. 刺激,激励,鼓舞batch bt n.批, 成批, 分批originator ridneit(r) n. 创始人,发起人sufficed sfais v. 足够,使.满足,合格synchronization sikrnaizein 同步化shortfall :tf:l n. 不足之量,差额throughput ru:put n.【计算机】(计算机输入输出信息的)吞吐量,通过量,总处理能力turnaround t:nrand n.转变,突然
30、好转中国水利水电出版社中国水利水电出版社Words and Expressionslandscape lndskeip n. 风景,山水,风景画LANs abbr.局域网 (local area networks)spectrum spektrm n. 光谱,(比喻)范围, 系列fiber faib n. 纤维memoranda memrnd n. 备忘录(便条)21世纪大英汉词典concurrently knkrntli adv. 同时(兼)plethora pler n. 过量,过剩vendor vend: n. 厂商Aloha :luh: int. 哈罗,欢迎,再见21世纪大英汉词典WA
31、N wn (wide area network)广域网中国水利水电出版社中国水利水电出版社ExercisesI. True or false? If correct, write T in parentheses; Otherwise, write F.( )1. The term network can mean a same thing. ( )2. Users found that the network could offer information sharing only. ( )3. The earliest concept of a network was of a loose
32、 binding together of devices or resources for sharing.( )4. An early computer network that exhibited these traits was the Internet. ( )5. Because of the wide distances, delays of minutes were commonplace and caused added overhead in performing otherwise simple tasks. ( )6. Local area networks began
33、showing up on the networking landscape in the early to mid 1960s as mostly research activities in universities and government laboratories. ( )7. We find wide area networks in our homes through cable modems and phone modems, automobiles via wireless technologies, banking (e.g., ATMs), schools via In
34、ternet connections, businesses, government, and industry. ( )8. There are too many aspects of information exchange and data processing in which a LAN cannot be found. ( ) 9. LANs are used to connect all personal computers in offices, classrooms, factory floors, retail establishments, and now even ma
35、ny homes.( )10. Large banks, such as the World Bank, have adopted LANs as the means to interconnect their various local sites into smaller networks linked together by wide area networks.中国水利水电出版社中国水利水电出版社ExercisesII. Fill in the blanks with proper words.1. _was first brought on-line in 1969 as a res
36、earch tool to investigate long-haul network issues and to provide a tool for research and development solutions.2. _ has evolved into the Internet, connecting millions of computers over local area networks, metropolitan area networks, and other wide area networks.3. _are finding their way into all a
37、spects of modern society.4. Large banks, such as the World Bank, have adopted _ as the means to interconnect their various local sites into smaller networks linked together by wide area networks.中国水利水电出版社中国水利水电出版社Text 2 Network Security Main Contents Words and Expressions Exercises中国水利水电出版社中国水利水电出版社
38、 Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authori
39、zed to use. It also deals with ways to tell whether that message purportedly from the IRS saying: Pay by Friday or else is really from the IRS and not from the Mafia. Security also deals with the problems of legitimate messages being captured and replayed, and with people trying to deny that they se
40、nt certain messages.Text 2 Network Security中国水利水电出版社中国水利水电出版社Text 2 Network SecurityNetwork security problems can be divided roughly into four closely intertwined areas: secrecy, authentication, nonrepudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping infor
41、mation out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. Nonrepudiation deals with signatures: How
42、 do you prove that your customer really placed an electronic order for ten million left-handed doohickeys at 89 cents each when he later claims the price was 69 cents? Or maybe he claims he never placed any order. Finally, how can you be sure that a message you received was really the one sent and n
43、ot something that a malicious adversary modified in transit or concocted?中国水利水电出版社中国水利水电出版社In the data link layer, packets on a point-to-point line can be encrypted as they leave one machine and decrypted as they enter another. All the details can be handled in the data link layer, with higher layer
44、s oblivious to what is going on. This solution breaks down when packets have to traverse multiple routers, however, because packets have to be decrypted at each router, leaving them vulnerable to attacks from within the router. Also, it does not allow some sessions to be protected (e.g., those invol
45、ving on-line purchases by credit card) and others not. Nevertheless, link encryption, as this method is called, can be added to any network easily and is often useful.Text 2 Network Security中国水利水电出版社中国水利水电出版社Text 2 Network SecurityIn the network layer, firewalls can be installed to keep good packets
46、 and bad packets out. IP security also functions in this layer.In the transport layer, entire connections can be encrypted, end to end, that is, process to process. For maximum security, end-to-end security is required.Finally, issues such as user authentication and nonrepudiation can only be handle
47、d in the application layer.Since security does not fit neatly into any layer, it does not fit into any chapter of this book. For this reason, it rates its own chapter.中国水利水电出版社中国水利水电出版社Text 2 Network SecurityIt is well documented that most security failures at banks, for example, are due to incompet
48、ent employees, lax security procedures, or insider fraud, rather than clever criminals tapping phone lines and then decoding encrypted messages. If a person can walk into a random branch of a bank with an ATM slip he found on the street claiming to have forgotten his PIN and get a new one on the spo
49、t (in the name of good customer relations), all the cryptography in the world will not prevent abuse. In this respect, Ross Andersons book is a real eye-opener, as it documents hundreds of examples of security failures in numerous industries, nearly all of them due to what might politely be called s
50、loppy business practices or inattention to security. Nevertheless, we are optimistic that as e-commerce becomes more widespread, companies will eventually debug their operational procedures, eliminating this loophole and bringing the technical aspects of security to center stage again. Except for ph
51、ysical layer security, nearly all security is based on cryptographic principles.中国水利水电出版社中国水利水电出版社Words and ExpressionsRoss Anderson安德森,剑桥大学资讯安全工程讲师loom lu:m n. 织布机v. 朦胧地出现,隐约可见horizon hraizn n. 地平线;视野;眼界. pitfall pitf:l n. 陷阱,诱惑,阴谋algorithm lgrim 算法sin sin n. 罪,罪孽v. 犯罪nosy nuzi adj. 鼻子大的,好管闲事的,爱追问的
52、recipient risipint n. 接受者authorized :raizd adj. 经认可的,审定的,经授权的21世纪大英汉词典purportedly p:p:tidli,p:p-,p:pt- ad. 据称IRS abbr. Internal Revenue Service 美国国税局Mafia m:fi n. 黑手党,秘密政党legitimate l iditimit a. 合法的,正当的v. 使合法malicious mlis a. 怀恶意的,恶毒的中国水利水电出版社中国水利水电出版社Words and Expressionsperpetrator p:pitreit n. 犯
53、人,作恶之人outsmart autsm:t v. 比.更聪明,打败adversary dvsri n. 敌手,对手well-funded资金充足的thwart w:t a. 横坐板v. 反对,阻碍ad. 横过perpetrate p:pitreit v. 做,犯tapping tpi n. 开孔(导出液体,放液,流出口,浇铸,抽头)insider insaid(r) n. 内部的人,会员,知道内情的人grudge grd n. 怨恨,恶意v. 怀恨,嫉妒,吝惜intertwined int:waind a. 互相缠结的,缠绕在一起的secrecy si:krisi n. 秘密(保密,隐蔽)a
54、uthentication:,entikein n. 证明,鉴定. nonrepudiation认可confidentiality knfi,denilti n. 秘而不宣,保密中国水利水电出版社中国水利水电出版社Words and Expressionsunauthorized n:raizd 非法的,越权的doohickey du:,hiki n. 小玩意,装置,窍门malicious mlis a. 怀恶意的,恶毒的adversary dvsri n. 敌手,对手transit trnsit n. 经过,运输v. 横越concoct knkkt vt.调制,配制photocopy fut
55、u,kpi n. 影印v. 影印tampering tmpri a. 干预的,干涉的sealed si:ld a. 封口的,密封的wiretapping wai,tpi vt.wiretap的变形n.搭线窃听adj.搭线窃听的tube tju:b n. 地铁,电子管,显像管,管,软管中国水利水电出版社中国水利水电出版社Words and Expressionspacke pkt adj.挤满的;塞满的压结实的;压紧的encrypt inkript vt. 把编码decrypt di:kript v. 译,解释oblivious blivis a. 没注意到,或不知道vulnerable vln
56、rb()l a. 易受伤害的,有弱点的lax lks a. 松的,松懈的,不严的slip slip n. 滑,错误,下跌v. 滑倒,犯错,减退cryptography kriptgrfi 密码术,密码系统sloppy slpi a. 被泼水弄湿的,泥泞的,多阴雨的inattention intenn n. 不注意,粗心,疏忽debug di:b vt. 【计算机】调试;排除(程序)中的错误,排除故障loophole lu:phl n. 枪眼,小窗,换气孔中国水利水电出版社中国水利水电出版社ExercisesI. True or false? If correct, write T in par
57、entheses; Otherwise, write F.( )1. Network security problems can be divided roughly into three closely intertwined areas: secrecy, authentication, and integrity control. ( )2. All these issues (secrecy, authentication, nonrepudiation, and integrity control) do not occur in traditional systems. ( )3.
58、 Integrity and secrecy are achieved by using registered mail and locking documents up.( )4. With electronic checks, the original and the copy are distinguishable. ( )5. Tampering can usually be detected by handwriting, ink, and paper experts. None of these options are available electronically.( )6.I
59、n the transport layer, firewalls can be installed to keep good packets and bad packets out. ( )7.Issues such as user authentication and nonrepudiation can not be handled in the application layer. 中国水利水电出版社中国水利水电出版社Exercises II. Fill in the blanks with proper words.1. For the first few decades of the
60、ir existence, _ were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers.2. _, also called confidentiality, has to do with keeping information out of the hands of unauthorized users.3. _ deals with determining whom you are talking to before rev
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 桥基础专项施工方案
- 小区墙绘施工方案
- 电信施工方案应急预案
- 水泥花砖施工方案
- 水下灌注桩施工方案
- 换热站安装施工方案
- 二零二五年度诊所执业医师医疗质量控制聘用合同
- 2025年度高端美容院股权合作框架协议
- 二零二五年度停车场租赁与停车场设施维护协议
- 2025年度酒店与慈善机构住宿协议价合同
- 新疆省新疆生产建设兵团2025届小升初数学高频考点检测卷含解析
- 专题46:地理意义类综合题之产业集聚的意义(原卷版)-备战2021届高考地理二轮复习题型专练
- 2025年安徽省合肥热电集团招聘50人历年高频重点模拟试卷提升(共500题附带答案详解)
- GB/T 36548-2024电化学储能电站接入电网测试规程
- 土力学与地基基础(课件)
- 城市供水计划统计指标解释
- 塑胶原料检验规范
- 建筑公司内部管理流程-课件PPT
- 中国古典舞PPT课件
- ()数字描红(可直接打印)
- 国家义务教育质量监测方案(2021年修订版)全文解读PPT课件
评论
0/150
提交评论