版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Unit4UbiquitousNetworkandVPNs[58]TextAHowUbiquitousNetworking
WillWork?[65]TextBVPNs[74]参考译文泛在网是如何工作的?
1.IntroductiontoHowUbiquitousNetworkingWillWork
Mobilecomputingdeviceshavechangedthewaywelookatcomputing.LaptopsandPersonalDigitalAssistants(PDAs)(SeeFigure4.1)haveunchainedusfromourdesktopcomputers.AgroupofresearchersatAT&TLaboratoriesCambridgearepreparingtoputanewspinonmobilecomputing.Inadditiontotakingthehardwarewithyou,HowUbiquitousNetworkingWillWork?theyaredesigningaubiquitousnetworkingsystemthatallowsyourprogramapplicationstofollowyouwhereveryougo.
Figure4.1PDA'smodelInsidethebatultrasonictransmittershowstwo-coppercoilantennae,aradiotransmittermodule,thebatteryandtwoultrasonictransmitters.
Byusingasmallradiotransmitterandabuildingfullofspecialsensors,yourdesktopcanbeanywhereyouare,notjustatyourworkstation.Atthepressofabutton,thecomputerclosesttoyouinanyroombecomesyourcomputerforaslongasyouneedit.Inadditiontocomputers,theCambridgeresearchershavedesignedthesystemtoworkforotherdevices,includingphonesanddigitalcameras.
2.SendouttheBatSignal
Inorderforacomputerprogramtotrackitsuser,researchershadtodevelopasystemthatcouldlocatebothpeopleanddevices.TheAT&Tresearcherscameupwiththeultrasoniclocationsystem.Thislocationtrackingsystemhasthreebasicparts:
·Bats—smallultrasonictransmitterswornbyusers;
·Receivers—ultrasonicsignaldetectorsembeddedinceiling;
·Centralcontroller—coordinatesthebatsandreceiverchains.
Userswithinthesystemwillwearabat,asmalldevicethattransmitsa48-bitcodetothereceiversintheceiling.Batsalsohaveanimbeddedtransmitterwhichallowsittocommunicatewiththecentralcontrollerusingabidirectional433-MHzradiolink.
Batsare3incheslong(7.5cm)by1.4incheswide(3.5cm)by0.6inchesthick(1.5cm),oraboutthesizeofapager.Thesesmalldevicesarepoweredbyasingle3.6-voltlithiumthionylchloridebattery,whichhasalifetimeofsixmonths.Thedevicesalsocontaintwobuttons,twoLight-EmittingDiodes(LEDs)andapiezoelectricspeaker,allowingthemtobeusedasubiquitousinputandoutputdevices,andavoltagemonitortocheckthebatterystatus.(SeeFigure4.2)
Figure4.2Smartposter
Asmartposterwillhavebuttonsprintedontoitthatcanbetriggeredbyabat.
Abatwilltransmitanultrasonicsignal,whichwillbedetectedbyreceiverslocatedintheceilingapproximately4feet(1.2m)apartinasquaregrid.Thereareabout720ofthesereceiversinthe10,000-square-footbuilding(929m2)attheAT&TLabsinCambridge.Anobject'slocationisfoundusingtrilateration,aposition-findingtechniquethatmeasurestheobjectsdistanceinrelationtothreereferencepoints.
Ifabatneedstobelocated,thecentralcontrollersendsthebat'sIDoveraradiolinktothebat.ThebatwilldetectitsIDandsendoutanultrasonicpulse.Thecentralcontrollermeasuresthetimeittookforthatpulsetoreachthereceiver.Sincethespeedofsoundthroughairisknown,thepositionofthebatiscalculatedbymeasuringthespeedatwhichtheultrasonicpulsereachedthreeothersensors.Thissystemprovidesalocationaccuracyof1.18inches(3cm)throughouttheCambridgebuilding.
Byfindingthepositionoftwoormorebats,thesystemcandeterminetheorientationofabat.Thecentralcontrollercanalsodeterminewhichwayapersonisfacingbyanalyzingthepatternofreceiversthatdetectedtheultrasonicsignalandthestrengthofthesignal.
3.IntheZone
Withanultrasoniclocationsysteminplace,it'spossibleforanydevicefittedwithabattobecomeyoursatthepushofabutton.Let'ssaytheuserleaveshisworkstationandentersanotherroom.There'saphoneinthisroomsittingonanunoccupieddesk.Thatphoneisnowtheuser'sphoneandalloftheuser'sphonecallsareimmediatelyredirectedtothatphone.Ifthereisalreadysomeoneusingthatphone,thecentralcontrollerrecognizesthatandthepersonusingthephonemaintainspossessionofthephone.
Thecentralcontrollercreatesazonearoundeverypersonandobjectwithinthelocationsystem.Forexample,ifseveralcamerasareplacedinaroomforvideoconferences,thelocationsystemwouldactivatetheappropriatecamerasothattheusercouldbeseenandmovefreelyaroundtheroom.
Whenallthesensorsandbatsareinplace,theyareincludedinavirtualmapofthebuilding.Thecomputerusesaspatialmonitortodetectifauser'szoneoverlapswiththezoneofadevice.Ifthezonesdooverlap,thentheusercanbecomethetemporaryownerofthedevice.
IftheultrasoniclocationsystemisworkingwithVirtualNetworkComputing(VNC)software,therearesomeadditionalcapabilities.Computerdesktopscanbecreatedthatactuallyfollowtheirownersanywherewithinthesystem.Justbyapproachinganycomputerdisplayinthebuilding,thebatcanenabletheVNCdesktoptoappearonthatdisplay.Thisishandyifyouwanttoleaveyourcomputertoshowacoworkerwhatyou'vebeenworkingon.Yourdesktopissimplyteleportedfromyourcomputertoyourcoworker'scomputer.
4.InformationHoppersandSmartPosters
Oncethesezonesaresetup,computersonthenetworkwillhavesomeinterestingcapabilities.Thesystemwillhelpusstoreandretrievedatainan"informationhopper".Thisisatimelineofinformationthatkeepstrackofwhendataiscreated.Thehopperknowswhocreatedit,wheretheywereandwhotheywerewith.
Thinkofthehopperasaubiquitousfilingclerk.Itwillchangehowwethinkofourcomputerfilingsystems.Byusingadigitalcamerathatisconnectedtothenetwork,auser'sphotographsareimmediatelystoredinhisorhertimeline.Taperecorderscouldalsosendaudiomemostotheinformationhopper.
Twoitemsofinformationcreatedatthesametimewillbefoundatthesameplaceonthetimeline.Thesystemknowswhotheuserwaswithwhenhecreatedthedata,andthevarioustimelinesoftheusersworkingtogether.Thiswayanothertimelinecanbecreatedtokeeptrackofparticularprojects.
Anotherapplicationthatwillcomeoutofthisultrasoniclocationsystemisthesmartposter.Aconventionalcomputerinterfacerequiresustoclickonabuttononourcomputerscreen.Inthisnewsystem,abuttoncanbeplacedanywhereinyourworkplace,notjustonthecomputerdisplay.Theideabehindsmartpostersisthatabuttoncanbeapieceofpaperthatisprintedoutandstuckonawall.
Smartposterswillbeusedtocontrolanydevicethatispluggedintothenetwork.Theposterwillknowwheretosendafileandauser'spreferences.Smartposterscouldalsobeusedinadvertisingnewservices.Topressabuttononasmartposter,auserwillsimplyplacehisorherbatonthesmartposterbuttonandclickthebat.Thesystemautomaticallyknowswhoispressingtheposter'sbutton.Posterscanbecreatedwithseveralbuttonsonit.
Ultrasoniclocationsystemswillrequireustothinkoutsideofthebox.Traditionally,wehaveusedourcomputeratworktostoreallofourfiles,andwemaybackupthesefilesonanetworkserver.Thisnewubiquitousnetworkwillenableallcomputersinabuildingtotransferownershipandstoreallofourfilesinacentraltimeline.
Asabusinessgrows,itmightexpandtomultipleshopsorofficesacrossthecountryandaroundtheworld.Tokeepthingsrunningefficiently,thepeopleworkinginthoselocationsneedafast,secureandreliablewaytoshareinformationacrosscomputernetworks.Inaddition,TextBVPNstravelingemployeeslikesalespeopleneedanequallysecureandreliablewaytoconnecttotheirbusiness'scomputernetworkfromremotelocations.
OnepopulartechnologytoaccomplishthesegoalsisaVPN(VirtualPrivateNetwork).AVPNisaprivatenetworkthatusesapublicnetwork(usuallytheInternet)toconnectremotesitesoruserstogether.TheVPNuses"virtual"connectionsroutedthroughtheInternetfromthebusiness'sprivatenetworktotheremotesiteoremployee.ByusingaVPN,businessesensuresecurity—anyoneinterceptingtheencrypteddatacan'treadit.
VPNwasnotthefirsttechnologytomakeremoteconnections.Severalyearsago,themostcommonwaytoconnectcomputersbetweenmultipleofficeswasbyusingaleasedline.Leasedlines,suchasISDN(IntegratedServicesDigitalNetwork,128Kbps),areprivatenetworkconnectionsthatatelecommunicationscompanycouldleasetoitscustomers.Leasedlinesprovidedacompanywithawaytoexpanditsprivatenetworkbeyonditsimmediategeographicarea.TheseconnectionsformasingleWideAreaNetwork(WAN)forthebusiness.Thoughleasedlinesarereliableandsecure,theleasesareexpensive,withcostsrisingasthedistancebetweenofficesincreases.
Today,theInternetismoreaccessiblethaneverbefore,andInternetServiceProviders(ISPs)continuetodevelopfasterandmorereliableservicesatlowercoststhanleasedlines.Totakeadvantageofthis,mostbusinesseshavereplacedleasedlineswithnewtechnologiesthatuseInternetconnectionswithoutsacrificingperformanceandsecurity.Businessesstartedbyestablishingintranets,whichareprivateinternalnetworksdesignedforuseonlybycompanyemployees.Intranetsenableddistantcolleaguestoworktogetherthroughtechnologiessuchasdesktopsharing.ByaddingaVPN,abusinesscanextendallitsintranet'sresourcestoemployeesworkingfromremoteofficesortheirhomes.
1.
Analogy:EachLANisanIsland
Imaginethatyouliveonanislandinahugeocean.Therearethousandsofotherislandsallaroundyou,someverycloseandothersfartheraway.Thecommonmeansoftravelbetweenislandsisviaferry.Travelingontheferrymeansthatyouhavealmostnoprivacy:Otherpeoplecanseeeverythingyoudo.
Let'ssaythateachislandrepresentsaprivateLocalAreaNetwork(LAN)andtheoceanistheInternet.TravelingbyferryislikeconnectingtoaWebserverorotherdevicethroughtheInternet.YouhavenocontroloverthewiresandroutersthatmakeuptheInternet,justlikeyouhavenocontrolovertheotherpeopleontheferry.Thisleavesyoususceptibletosecurityissuesifyou'retryingtoconnecttwoprivatenetworksusingapublicresource.
Continuingwithouranalogy,yourislanddecidestobuildabridgetoanotherislandsothatpeoplehaveaneasier,moresecureanddirectwaytotravelbetweenthetwoislands.Itisexpensivetobuildandmaintainthebridge,eveniftheislandsareclosetogether.However,theneedforareliable,securepathissogreatthatyoudoitanyway.Yourislandwouldliketoconnecttoyetanotherislandthatismuchfartheraway,butdecidesthatthecostsaresimplytoomuchtobear.
Thisscenariorepresentshavingaleasedline.Thebridges(leasedlines)areseparatefromtheocean(Internet),yetareabletoconnecttheislands(LANs).Companieswhochoosethisoptiondosobecauseoftheneedforsecurityandreliabilityinconnectingtheirremoteoffices.However,iftheofficesareveryfarapart,thecostcanbeprohibitivelyhigh—justliketryingtobuildabridgethatspansagreatdistance.
SohowdoesaVPNfitin?Usingouranalogy,supposeeachinhabitantonyourislandhasasmallsubmarine.Let'sassumethateachsubmarinehastheseamazingproperties:
·It'sfast.
·It'seasytotakewithyouwhereveryougo.
·It'sabletocompletelyhideyoufromanyotherboatsorsubmarines.
·It'sdependable.
·Itcostslittletoaddadditionalsubmarinestoyourfleetonceyou'vepurchasedthefirstone.
Althoughthey'retravelingintheoceanalongwithothertraffic,thepeoplecouldtravelbetweenislandswhenevertheywantedtowithprivacyandsecurity.That'sessentiallyhowaVPNworks.EachremotememberofyournetworkcancommunicateinasecureandreliablemannerusingtheInternetasthemediumtoconnecttotheprivateLAN.AVPNcangrowtoaccommodatemoreusersanddifferentlocationsmuchmoreeasilythanaleasedline.Infact,scalabilityisamajoradvantagethatVPNshaveoverleasedlines.Moreover,thedistancedoesn'tmatter,becauseVPNscaneasilyconnectmultiplegeographiclocationsworldwide.
2.
WhatMakesaVPN?
AVPN'spurposeisprovidingasecureandreliableprivateconnectionbetweencomputernetworksoveranexistingpublicnetwork,typicallytheInternet.BeforelookingatthetechnologythatmakesaVPNpossible,let'sconsiderallthebenefitsandfeaturesabusinessshouldexpectinaVPN.
Awell-designedVPNprovidesabusinesswiththefollowingbenefits:
·Extendedconnectionsacrossmultiplegeographiclocationswithoutusingaleasedline;
·Improvedsecurityforexchangingdata;
·FlexibilityforremoteofficesandemployeestousethebusinessintranetoveranexistingInternetconnectionasifthey'redirectlyconnectedtothenetwork;
·Savingsintimeandexpenseforemployeestocommuteiftheyworkfromvirtualworkplaces;
·Improvedproductivityforremoteemployees.
AbusinessmightnotrequireallthesebenefitsfromitsVPN,butitshoulddemandthefollowingessentialVPNfeatures:
·Security—TheVPNshouldprotectdatawhileit'stravelingonthepublicnetwork.Ifintrudersattempttocapturethedata,theyshouldbeunabletoreadoruseit.
·Reliability—EmployeesandremoteofficesshouldbeabletoconnecttotheVPNwithnotroubleatanytime(unlesshoursarerestricted),andtheVPNshouldprovidethesamequalityofconnectionforeachuserevenwhenitishandlingitsmaximumnumberofsimultaneousconnections.
·Scalability—Asabusinessgrows,itshouldbeabletoextenditsVPNservicestohandlethatgrowthwithoutreplacingtheVPNtechnologyaltogether.
OneinterestingthingtonoteaboutVPNsisthattherearenostandardsabouthowtosetthemup.Thisarticlecoversnetwork,authenticationandsecurityprotocolsthatprovidethefeaturesandbenefitslistedabove.ItalsodescribeshowaVPN'scomponentsworktogether.Ifyou'reestablishingyourownVPN,though,it'suptoyoutodecidewhichprotocolsandcomponentstouseandtounderstandhowtheyworktogether.
3.TwocommontypeofVPN
3.1Remote-accessVPN
Aremote-accessVPNallowsindividualuserstoestablishsecureconnectionswitharemotecomputernetwork.Thoseuserscanaccessthesecureresourcesonthatnetworkasiftheyweredirectlypluggedintothenetwork'sservers.Anexampleofacompanythatneedsaremote-accessVPNisalargefirmwithhundredsofsalespeopleinthefield.AnothernameforthistypeofVPNisVirtualPrivateDial-upNetwork(VPDN),acknowledgingthatinitsearliestform,aremote-accessVPNrequireddialingintoaserverusingananalogtelephonesystem.
Therearetwocomponentsrequiredinaremote-accessVPN.ThefirstisaNetworkAccessServer(NAS,usuallypronounced"nazz"conversationally),alsocalledamediagatewayoraRemote-AccessServer(RAS).ANASmightbeadedicatedserver,oritmightbeoneofmultiplesoftwareapplicationsrunningonasharedserver.It'saNASthatauserconnectstofromtheInternetinordertouseaVPN.TheNASrequiresthatusertoprovidevalidcredentialstosignintotheVPN.Toauthenticatetheuser'scredentials,theNASuseseitheritsownauthenticationprocessoraseparateauthenticationserverrunningonthenetwork.
Theotherrequiredcomponentofremote-accessVPNs(SeeFigure4.3)isclientsoftware.Inotherwords,employeeswhowanttousetheVPNfromtheircomputersrequiresoftwareonthosecomputersthatcanestablishandmaintainaconnectiontotheVPN.Mostoperatingsystemstodayhavebuilt-insoftwarethatcanconnecttoremote-accessVPNs,thoughsomeVPNsmightrequireuserstoinstallaspecificapplicationinstead.TheclientsoftwaresetsupthetunneledconnectiontoaNAS,whichtheuserindicatesbyitsInternetaddress.Thesoftwarealsomanagestheencryptionrequiredtokeeptheconnectionsecure.
LargecorporationsorbusinesseswithknowledgeableITstafftypicallypurchase,deployandmaintaintheirownremote-accessVPNs.Businessescanalsochoosetooutsourcetheirremote-accessVPNservicesthroughanEnterpriseServiceProvider(ESP).TheESPsetsupaNASforthebusinessandkeepsthatNASrunningsmoothly.
Aremote-accessVPNisgreatforindividualemployees,butwhataboutentirebranchofficeswithdozensorevenhundredsofemployees?Next,we'lllookatanothertypeofVPNusedtokeepbusinessesconnectedLAN-to-LAN.
Figure4.3Remote-accessVPN
Aremote-accessVPNconnectionallowsanindividualusertoconnecttoaprivatebusinessnetworkfromaremotelocationusingalaptopordesktopcomputerconnectedtotheInternet.
3.2Site-to-siteVPN
Asite-to-siteVPNallowsofficesinmultiplefixedlocationstoestablishsecureconnectionswitheachotheroverapublicnetworksuchastheInternet.Site-to-siteVPNextendsthecompany'snetwork,makingcomputerresourcesfromonelocationavailabletoemployeesatotherlocations.Anexampleofacompanythatneedsasite-to-siteVPNisagrowingcorporationwithdozensofbranchofficesaroundtheworld.(SeeFigure4.4)
Figure4.4Site-to-siteVPNAsite-to-siteVPNconnectionletsbranchofficesusetheInternetasaconduitforaccessingthemainoffice'sintranet.
Therearetwotypesofsite-to-siteVPNs:
·Intranet-based—Ifacompanyhasoneormoreremotelocationsthattheywishtojoininasingleprivatenetwork,theycancreateanintranetVPNtoconnecteachseparateLANtoasingleWAN.
·Extranet-based—Whenacompanyhasacloserelationshipwithanothercompany(suchasapartner,supplierorcustomer),itcanbuildanextranetVPNthatconnectsthosecompanies'LANs.ThisextranetVPNallowsthecompaniestoworktogetherinasecure,sharednetworkenvironmentwhilepreventingaccesstotheirseparateintranets.
Eventhoughthepurposeofasite-to-siteVPNisdifferentfromthatofaremote-accessVPN,itcouldusesomeofthesamesoftwareandequipment.Ideally,though,asite-to-siteVPNshouldeliminatetheneedforeachcomputertorunVPNclientsoftwareasifitwereonaremote-accessVPN.DedicatedVPNclientequipmentcanaccomplishthisgoalinasite-to-siteVPN.
NowthatyouknowthetwotypesofVPNs,let'slookathowyourdataiskeptsecureasittravelsacrossaVPN.
4.KeepingVPNTrafficintheTunnel
MostVPNsrelyontunnelingtocreateaprivatenetworkthatreachesacrosstheInternet.Tunnelingistheprocessofplacinganentirepacketofdatafilewithinanotherpacketbeforeit'stransportedovertheInternet.Thatouterpacketprotectsthecontentsfrompublicviewandensuresthatthepacketmoveswithinavirtualtunnel.
Thislayeringofpacketsiscalledencapsulation.Computersorothernetworkdevicesatbothendsofthetunnel,calledtunnelinterfaces,canencapsulateoutgoingpacketsandreopenincomingpackets.Users(atoneendofthetunnel)andITpersonnel(atoneorbothendsofthetunnel)configurethetunnelinterfacesthey'reresponsiblefortouseatunnelingprotocol.Alsocalledanencapsulationprotocol,atunnelingprotocolisastandardizedwaytoencapsulatepackets.
ThepurposeofthetunnelingprotocolistoaddalayerofsecuritythatprotectseachpacketonitsjourneyovertheInternet.Thepacketistravelingwiththesametransportprotocolitwouldhaveusedwithoutthetunnel;thisprotocoldefineshoweachcomputersendsandreceivesdataoveritsISP.Eachinnerpacketstillmaintainsthepassengerprotocol,suchasInternetProtocol(IP)orAppleTalk,whichdefineshowittravelsontheLANsateachendofthetunnel.ThetunnelingprotocolusedforencapsulationaddsalayerofsecuritytoprotectthepacketonitsjourneyovertheInternet.
Tobetterunderstandtherelationshipsbetweenprotocols,thinkoftunnelingashavingacomputerdeliveredtoyoubyashippingcompany.Thevendorwhoissendingyouthecomputerpacksthecomputer(passengerprotocol)inabox(tunnelingprotocol).Shippersthenplacethatboxonashippingtruck(transportprotocol)atthevendor'swarehouse(onetunnelinterface).Thetruck(transportprotocol)travelsoverthehighways(Internet)toyourhome(theothertunnelinterface)anddeliversthecomputer.Youopenthebox(tunnelingprotocol)andremovethecomputer(passengerprotocol).
1.
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 注射模具保养培训课件
- 向家长介绍区域活动
- 华为交换机培训详解
- 左肺癌病人护理查房
- 2.1大气的组成和垂直分层(教学设计)高一地理同步高效课堂(人教版2019必修一)
- 北京市大兴区2024-2025学年八年级上学期期中考试英语试题(含答案)
- 大单元视域下的单元整体教学与实施
- 信息技术(第2版)(拓展模块)教案4-模块3 3.4 大数据分析算法
- 2024年内蒙古包头市中考英语试题含解析
- 新版人教版一年级下册思想品德全册教案
- 安徽省亳州市黉学英才中学2024-2025学年七年级上学期期中生物学试题(含答案)
- 沪粤版初中物理八上八年级上学期物理期中试卷(解析版)
- 江苏省苏州市苏州工业园区苏州工业园区景城学校2023-2024学年八年级上学期期中数学试题(解析版)
- 高中挺身式跳远-教案
- 2024年下半年事业单位公开考试招聘工作人员报考信息表
- 湖北省“腾•云”联盟2024-2025学年度上学期10月联考试卷+物理答案
- 抽水蓄能电站课件
- 北京市西城区某中学2023-2024学年八年级上学期期中考试语文试题(含答案)
- 2024年新人教版七年级上册数学课件 4.2 第2课时 去括号
- (人教PEP2024版)英语一年级上册Unit 4 教学课件(新教材)
- 职业技术学院大数据与会计专业调研报告
评论
0/150
提交评论