计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络_第1页
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络_第2页
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络_第3页
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络_第4页
计算机网络-外文文献-外文翻译-英文文献-新技术的计算机网络_第5页
已阅读5页,还剩8页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、文档编码 : CP2I6R6P3S3 HR4C6A9C6H7 ZM8L10Q4H9V1New technique of the computer network Abstract The 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go

2、 deep into the peoples work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application. keywords Internet Network System 1. Foreword Digital Certificates Grid Stora

3、ge Internet turns 36, still a work in progress Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers a

4、re experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce Spam junk mail and security troubles. All the while threats loom: Critics warn that commercial, legal and political pr

5、essures could hinder the types of innovations that made the Internet what it is today. Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Klein rock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two co

6、mputers. By January, three other nodes joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second most popular application behind e-mail - in 1990. The Inter

7、net expanded beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internets key oversight body, he is trying to defend the core addressi

8、ng system from outside threats. He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only best efforts at delivering data packets, and Crocker said better guarantees are needed to prevent the sk

9、ips and stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp.Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cu

10、t down on junk messages sent using spoofed addresses. Many features being developed today wouldnt have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said. 2.Digital Certificates Digital certificates are data files used to establish the ident

11、ity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party known as a certification authority CA. The CA validates the identity of a certificate

12、 holder and “ signs certificate to attest that it hasnt been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not l

13、ong ago, Version Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning. Using Version software, hardware makers can generate cryptographic ke

14、ys and corresponding digital certificates those manufacturers or cable service providers can use to automatically identify individual modems. This ast-mile authentication not only protects the value of existing content and services but also positions cable system operators to bring a broad new range

15、 of content, applications and value-added services to market. When a CA digitally signs a certificate, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access. Identifying information embedded in the c

16、ertificate includes the holder s name e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When the CA verifies a users identity, the certificate uses the holder s public encryption key to protect this data. Certificates that a Web server use

17、s to confirm the authenticity of a Web site for a user browser also employ public keys. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the servers digital certificate to verify its

18、identity. Role of Public-Key Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical valu

19、e that used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key. Others to encrypt information meant only for that person use a persons public key. When he receives the information, he uses his corresponding private key, which is kept secr

20、et, to decrypt the data. A persons public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make sure that only it can decrypt confidential information sent to it over the Internet. The Web server s certificate is validated b

21、y a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator. The CA certificate tells users whether they can trust the Web server certificate when it s presented to the browse

22、r. If the validity of the Web server certificate is affirmed, the certificate public key is used to secure information for the server using Secure Sockets Layer SSL technology. Digital certificates are used by the SSL security protocol to create a secure “ pipe ” between two parties that seek confid

23、ential communication. SSL is used in most major Web browsers and commercial Web servers. 3. Digital Wallets A digital wallet is software that enables users to pay for goods on the Web It holds credit-card numbers and other personal information such as a shipping address Once entered,the data automat

24、ically populates order fields at merchant sites When using a digital wallet ,consumers don t need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatically updated and entered into the order fields across merchant sites Consu

25、mers also benefit when using digital wallets because their information is encrypted or protected by a private software code And merchants benefit by receiving protection against fraud Digital wallets are available to consumers free of charge,and they re fairly easy to s set obtain For example,when a

26、 consumer makes a purchase at a merchant site thatup to handle server-side digital wallets,he types his name and payment and shipping information into the merchants own form At the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password fo

27、r future purchases Users can also acquire wallets at a wallet vendors site Although a wallet is free for consumers,vendors charge merchants for wallets Digital wallets come in two main types: client-side and server- side Within those divisions are wallets that work only on specific merchant sites an

28、d those that are merchant agnostic Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and install software A user downloads the wallet application and inputs payment and mailing information At that point ,th

29、e information is secured and encrypted on the users hard drive The user retains control of his credit card and personal information locally With a server-based wallet,a user fills out his personal information,and a cookie is automatically downloaded A cookie is a text contains information about the

30、user )In this scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the users PC Server-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties When a party makes

31、a transaction,it presents its certificate to the other parties involved A certificate is an attachment to an electronic message used to verify the identity of the party and to provide the receiver with the means to encode a reply Furthermore,the cardholdersensitive data is typically housed at a fina

32、ncial institution ,so there an extra sense of security because financial environments generally provide the highest degree of security But even though wallets provide easy shopping online, adoption hasnt been widespread Standards are pivotal to the success of digital wallets Last month,major vendors

33、,including Microsoft Corp , Sun Microsystems Inc and America Online Inc announced their endorsement of a new standard called EMCL ,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment 4. Grid Storage Definition: Grid sto

34、rage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system. A grid is, in fact, a meshed network in which no single c

35、entralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they aren constrained by the need for ever-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure. Applying the grid concept

36、to a computer network lets us harness available but unused resources by dynamically allocating and deal locating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power,

37、 collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes. After grid computing came into being, it was only a matter of time before a similar model would emer

38、ge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth inc

39、reases and continue to deliver improved reliability and higher performance and connectivity. Based on current and proposed products, it appears that a grid storage system should include the following: Modular storage arrays: These systems are connected across a storage network using serial ATA disks

40、. The systems can be block-oriented storage arrays or network-attached storage gateways and servers. Common virtualization layer: Storage must be organized as a single logical pool of resources available to users. Data redundancy and availability: Multiple copies of data should exist across nodes in

41、 the grid, creating redundant data access and availability in case of a component failure. Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning. Simplified platform/management architectu

42、re: Because common management is so important, the tasks involved in administration should be organized in modular fashion, allowing the auto discovery of new nodes in the grid and automating volume and . Three Basic Benefits Applying grid topology to a storage network provides several benefits, inc

43、luding the following: Reliability. A well-designed grid network is extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal impact o

44、n system availability or downtime. Performance. The same factors that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available offers cons

45、istent performance for the entire network. Scalability. Its easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using relative

46、ly inexpensive storage building blocks. 运算机网络 摘要:21 世纪是信息经济的时代,作为这个时代的代表技术,运算机网络技术 将在特殊快的速度进展很快, 不断制造性地将进入人们的工作,学习和生活 中深;因此,把握这种技术,然后似乎更供应的重视;现在,我主要介绍一些在现 实的网络新技术现场应用;关键字:网络系统互联网数字证书网格储备1.前言:互联网变成 36,仍然在进行中的工作 36 年后在加州高校洛杉矶分校的运算机科学家相连两台笨重的运算机用一 条 15 英尺长的灰色电缆,测试在网络上交换数据的新方法,最终产生了互联网 仍然是一个正在进行的工作;高校的争

47、论人员正在试验方法, 以增加其容量和速度; 编程人员正在设法注 入更多的智能网页;和工作正在进行重新设计网络以削减垃圾邮件(垃圾邮件)和安全麻烦;全部的威逼始终是存在: 批判人士警告说, 商业,法律和政治压力可能会阻 碍创新的类型,使互联网是今日;Stephen Crocker和 Vinton Cerf 同谁的争论生参加了对 1969 年 9 月 2 日工程试验室,加州高校洛杉矶分校教授Len 克莱瑞克作为数据传输试验, 静静地流过两台运算机之间;到 1 月,其他三个 “节点”加入这个网络;接着显现了电子邮件,几年后,一个核心通信协议,TCP / IP 协议在 70 年代末, 80 岁月中的域

48、名系统和万维网-现在其次个最受欢迎的背后电子邮件在1990 年-应用;在 Interbetween两台运算机;到1 月,其他三个 “节点 ”加入这个网络;净扩大,超出了最初的军事和训练纳入企业和世界各地的家庭域;现在, Crocker 仍在从事互联网的工作,为网络协作设计更好的工具;作为 互联网安全的关键监督机构的主席,他是为了捍卫核心处理来自外部的威逼系统;他承认,他帮忙建立互联网仍远远没有完成,在商店的变化, 以中意多媒体日益增长的需求;网络供应商现在只是“最大努力 ”在供应数据包,克罗克说,需 要更好的保证,以防止和结结巴巴跳过现在视频常见;瑟夫,现在在 MCI 公司说,他期望他可以设计

49、出具有内置安全性的互联网 英寸微软, 雅虎和美国在线等, 目前正在努力改造的网络, 电子邮件发送者可以 验证 -一种方法削减了发送垃圾邮件使用伪造的地址;许多目前正在开发的功能在产生就没有可能发生,联网管道,或带宽,瑟夫说;2.Digital 证书由于运算机速度很慢窄互数字证书是数据文件, 用于建立人民和因特网上的电子资产的身份;他们允许安全,加密的网络通信和经常被用来爱惜网上交易;数字证书颁发由信任的第三方作为认证机构(CA)已知的缔约国;CA 的验证证书持有人的 “标志 ”证书的身份证明,它没有被伪造或以任何方式转变;使用新数字证书数字证书是目前用来供应安全和无线连接验证,和硬件制造商最新

50、的群体之一来使用它们;不久前, VeriSign 公司宣布 Cable Modem 的认证服务,它答应嵌入数字证书到电缆调制解调器硬件制造商,服务;以帮忙防止通过设备克隆盗版的宽带使用 VeriSign 的软件,硬件制造商可以生成密钥和相应的数字证书,制造 商或有线电视服务供应商可以使用自动识别个人调制解调器;这同工酶 mileauthentication 不仅爱惜了现有的内容和服务,而且位置有线 电视系统业者的价值带来广泛的内容,应用和价值的各种增值服务推向市场;当数字证书是由 CA 签署的,其全部者可以使用电子护照, 以证明他的身份;它可以提交给网站,网络或个人,需要安全的拜望;识别信息嵌

51、入在证书中包括持有人姓名和电子邮件地址, CA 的,序列号和激活或到期的任何名称的凭证资料;当用户的身份是由CA 验证,使用证书持有人的公开加密密钥,以爱惜这些数据;公共密钥仍聘请证书, Web 服务器用来确认了用户的浏览器网站的真实性;当用户想发送,如信用卡号码隐秘信息的Web 服务器,网上交易,浏览器将访问服务器的数字证书的公钥来验证其身份;角色的公钥加密 公共密钥是一个公共钥匙加密, 它供应了基础,接受数字证书密钥对的一半;公开密钥加密使用匹配的加密和解密公钥和私钥;这些键有一个数字值的使用对加密信息的算法,使其只对用户可读与相应的解密密钥;一个人的公共密钥用于加密他人的信息只能用于人的

52、意思;当他收到的信 息,他仍是用相应的私钥,这是保密的,对数据进行解密;一个人的公钥可以分 布不损坏私钥;Web 服务器使用数字证书可以使用它的私钥,以确保只有它才 能解密的隐秘资料通过互联网传送给它;Web 服务器的证书验证了自签名的CA 证书,标识颁发 CA; CA 证书是预装在大多数主要的 Web 浏览器,包括 Microsoft Internet Explorer 和 Netscape Navigator;CA 证书告知用户他们是否可以信任的Web 服务器证书时,它在浏览器里;假如 Web 服务器证书是确定的有效性,该证书的公钥是用来确保为使用安全套 接字层( SSL)技术的服务器信息

53、;使用数字证书的 SSL 安全协议,以制造一个安全的“,双方之间的管道 ”,寻求保密通信;使用 SSL 在大多数主要的 Web 浏览器和商业 Web 服务器;3;数字钱包一个数字钱包软件,使用户支付的货物在网络上;它拥有如送货地址,信用卡号码和其他个人资料;一旦输入后,数据自动填充在商业网站秩序领域;在使用电子钱包,消费者并不需要填写在每个网站上订购表格,当他们购买,由于这些信息已经储备的项目,并自动更新, 并成为全国的商业网站字段中输入的次序; 消费者也有利于使用, 由于他们的信息被加密或由私人软件代码 爱惜的数字钱包;和商人的利益,接受爱惜,防止欺诈;数码钱包,可向消费者免费的,而且他们很简洁获得;例如,当消费者

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论