




免费预览已结束,剩余3页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
计算机英语论文Newtechniqueofthecomputer networkNewtechniqueofthecomputernetworkAbstractThe21centuryisanagesoftheinformationeconomy,beingthecomputernetworktechniqueofrepresentativetechniquesthisages,willbeatveryfastspeeddevelopsoonincontinuouslycreatively,andwillgodeepintothepeople#39;swork,lifeandstudy.Therefore,controlthistechniqueandthenseemtobemoretodelivertheimportance.NowImainlyintroducethenewtechniqueofafewnetworksinactualityliveofapplication.keywordsInternetDigitalCertificatesDigitalWalletsGridStorage1.ForewordInternetturns36,stillaworkinprogressThirty-sixyearsaftercomputerscientistsatUCLAlinkedtwobulkycomputersusinga15-footgraycable,testinganewwayforexchangingdataovernetworks,whatwouldultimatelybecometheInternetremainsaworkinprogress.Universityresearchersareexperimentingwithwaystoincreaseitscapacityandspeed.ProgrammersaretryingtoimbueWebpageswithintelligence.Andworkisunderwaytore-engineerthenetworktoreducespam(junkmail)andsecuritytroubles.Allthewhilethreatsloom:Criticswarnthatcommercial,legalandpoliticalpressurescouldhinderthetypesofinnovationsthatmadetheInternetwhatitistoday.StephenCrockerandVintonCerfwereamongthegraduatestudentswhojoinedUCLAprofessorLenKleinrockinanengineeringlabonSept.2,1969,asbitsofmeaninglesstestdataflowedsilentlybetweenthetwocomputers.ByJanuary,threeothernodesjoinedthefledglingnetwork.Thencamee-mailafewyearslater,acorecommunicationsprotocolcalledTCP/IPinthelate70s,thedomainnamesysteminthe80sandtheWorldWideWeb-nowthesecondmostpopularapplicationbehinde-mail-in1990.TheInternetexpandedbeyonditsinitialmilitaryandeducationaldomainintobusinessesandhomesaroundtheworld.Today,CrockercontinuesworkontheInternet,designingbettertoolsforcollaboration.AndassecuritychairmanfortheInternet#39;skeyoversightbody,heistryingtodefendthecoreaddressingsystemfromoutsidethreats.HeacknowledgestheInternethehelpedbuildisfarfromfinished,andchangesareinstoretomeetgrowingdemandsformultimedia.Networkprovidersnowmakeonlybesteffortsatdeliveringdatapackets,andCrockersaidbetterguaranteesareneededtopreventtheskipsandstuttersnowcommonwithvideo.Cerf,nowatMCIInc.,saidhewishedhecouldhavedesignedtheInternetwithsecuritybuilt-in.MicrosoftCorp.,YahooInc.andAmericaOnlineInc.,amongothers,arecurrentlytryingtoretrofitthenetworksoe-mailsenderscanbeauthenticated-awaytocutdownonjunkmessagessentusingspoofedaddresses.Manyfeaturesbeingdevelopedtodaywouldn#39;thavebeenpossibleatbirthgiventheslower2.DigitalCertificates DigitalcertificatesaredatafilesusedtoestablishtheidentityofpeopleandelectronicassetsontheInternet.Theyallowforsecure,encryptedonlinecommunicationandareoftenusedtoprotectonlinetransactions.Digitalcertificatesareissuedbyatrustedthirdpartyknownasacertificationauthority(CA).TheCAvalidatestheidentityofacertificateholderand“signs”thecertificatetoattestthatithasntbeenforgedoralteredinanyway.NewUsesForDigitalCertificatesDigitalcertificatesarenowbeingusedtoprovidesecurityandvalidationforwirelessconnections,andhardwaremanufacturersareoneofthelatestgroupstousethem.Notlongago,VeriSignInc.announceditsCableModemAuthenticationServices,whichallowhardwaremanufacturerstoembeddigitalcertificatesintocablemodemstohelppreventthepiratingofbroadbandservicesthroughdevicecloning.UsingVeriSignsoftware,hardwaremakerscangeneratecryptographickeysandcorrespondingdigitalcertificatesthatmanufacturersorcableserviceproviderscanusetoautomaticallyidentifyindividualmodems.Thisast-mileauthenticationnotonlyprotectsthevalueofexistingcontentandservicesbutalsopositionscablesystemoperatorstobringabroadnewrangeofcontent,applicationsandvalue-addedservicestomarket.WhenacertificateisdigitallysignedbyaCA,itsownercanuseitasanelectronicpassporttoprovehisidentity.ItcanbepresentedtoWebsites,networksorindividualsthatrequiresecureaccess.Identifyinginformationembeddedinthecertificateincludestheholdersnameande-mailaddress,thenameoftheCA,aserialnumberandanyactivationorexpirationdataforthecertificate.WhenausersidentityisverifiedbytheCA,thecertificateusestheholderspublicencryptionkeytoprotectthisdata.PublickeysarealsoemployedbycertificatesthataWebserverusestoconfirmtheauthenticityofaWebsiteforausersbrowser.WhenauserwantstosendconfidentialinformationtoaWebserver,suchasacredit-cardnumberforanonlinetransaction,thebrowserwillaccessthepublickeyintheserversdigitalcertificatetoverifyitsidentity.RoleofPublic-KeyCryptographyThepublickeyisonehalfofapairofkeysusedinpublic-keycryptography,whichprovidesthefoundationfordigitalcertificates.Public-keycryptographyusesmatchedpublicandprivatekeysforencryptionanddecryption.Thesekeyshaveanumericalvaluethatsusedbyanalgorithmtoscrambleinformationandmakeitreadableonlytouserswiththecorrespondingdecryptionkey.Apersonspublickeyisusedbyotherstoencryptinformationmeantonlyforthatperson.Whenhereceivestheinformation,heuseshiscorrespondingprivatekey,whichiskeptsecret,todecryptthedata.Aperson#39;spublickeycanbedistributedwithoutdamagingtheprivatekey.AWebserverusingadigitalcertificatecanuseitsprivatekeytomakesurethatonlyitcandecryptconfidentialinformationsenttoitovertheInternet.TheWebserverscertificateisvalidatedbyaself-signedCAcertificatethatidentifiestheissuingCA.CAcertificatesarepreinstalledonmostmajorWebbrowsers,includingMicrosoftInternetExplorerandNetscapeNavigator.TheCAcertificatetellsuserswhethertheycantrusttheWebservercertificatewhenitspresentedtothebrowser.IfthevalidityoftheWebservercertificateisaffirmed,thecertificatespublickeyisusedtosecureinformationfortheserverusingSecureSocketsLayer(SSL)technology.DigitalcertificatesareusedbytheSSLsecurityprotocoltocreateasecure“pipe”betweentwopartiesthatseekconfidentialcommunication.SSLisusedinmostmajorWebbrowsersandcommercialWebservers.3.DigitalWallets-AdigitalwalletissoftwarethatenablesuserstopayforgoodsontheWebItholdscredit-cardnumbersandotherpersonalinformationsuchasashippingaddressOnceentered,thedataautomaticallypopulatesorderfieldsatmerchantsites-Whenusingadigitalwallet,consumersdontneedtofilloutorderformsoneachsitewhentheypurchaseanitembecausetheinformationhasalreadybeenstoredandisautomaticallyupdatedandenteredintotheorderfieldsacrossmerchantsitesConsumersalsobenefitwhenusingdigitalwalletsbecausetheirinformationisencryptedorprotectedbyaprivatesoftwarecodeAndmerchantsbenefitbyreceivingprotectionagainstfraud-Digitalwalletsareavailabletoconsumersfreeofcharge,andtheyrefairlyeasytoobtainForexample,whenaconsumermakesapurchaseatamerchantsitethatssetuptohandleserver-sidedigitalwallets,hetypeshisnameandpaymentandshippinginformationintothemerchantsownformAttheendofthepurchase,oneconsumerisaskedtosignupforawalletofhischoicebyenteringausernameandpasswordforfuturepurchasesUserscanalsoacquirewalletsatawalletvendorssite-Althoughawalletisfreeforconsumers,vendorschargemerchantsforwallets-Digitalwalletscomeintwomaintypes:client-sideandserver-sideWithinthosedivisionsarewalletsthatworkonlyonspecificmerchantsitesandthosethataremerchantagnostic-Client-baseddigitalwallets,theolderofthetwotypes,arefallingbythewayside,accordingtoanalysts,becausetheyrequireuserstodownloadandinstallsoftwareAuserdownloadsthewalletapplicationandinputspaymentandmailinginformationAtthatpoint,theinformationissecuredandencryptedontheusersharddriveTheuserretainscontrolofhiscreditcardandpersonalinformationlocally-Withaserver-basedwallet,auserfillsouthispersonalinformation,andacookieisautomaticallydownloaded(Acookieisatextfilethatcontainsinformationabouttheuser)Inthisscenario,theconsumerinformationresidesontheserverofafinancialinstitutionoradigitalwalletvendorratherthanontheusersPC-Server-sidewalletsprovideassuranceagainstmerchantfraudbecausetheyusecertificatestoverifytheidentityofallpartiesWhenapartymakesatransaction,itpresentsitscertificatetotheotherpartiesinvolvedAcertificateisanattachmenttoanelectronicmessageusedtoverifytheidentityofthepartyandtoprovidethereceiverwiththemeanstoencodeareply-Furthermore,thecardholderssensitivedataistypicallyhousedatafinancialinstitution,sotheresanextrasenseofsecuritybecausefinancialenvironmentsgenerallyprovidethehighestdegreeofsecurity-Buteventhoughwalletsprovideeasyshoppingonline,adoptionhasntbeenwidespread-Standardsarepivotaltothesuccessofdigitalwallets-Lastmonth,majorvendors,includingMicrosoftCorp,SunMicrosystemsIncandAmericaOnlineIncannouncedtheirendorsementofanewstandardcalledEMCL,orE-CommerceModelingLanguage,togiveWebmerchantsastandardizedwaytocollectelectronicdataforshipping,billingandpayment4.GridStorageDefinition:Gridstorage,analogoustogridcomputing,isanewmodelfordeployingandmanagingstoragedistributedacrossmultiplesystemsandnetworks,makingefficientuseofavailablestoragecapacitywithoutrequiringalarge,centralizedswitchingsystem.Agridis,infact,ameshednetworkinwhichnosinglecentralizedswitchorhubcontrolsrouting.Gridsofferalmostunlimitedscalabilityinsizeandperformancebecausetheyarentconstrainedbytheneedforever-largercentralswitches.Gridnetworksthusreducecomponentcostsandproduceareliableandresilientstructure.Applyingthegridconcepttoacomputernetworkletsusharnessavailablebutunusedresourcesbydynamicallyallocatinganddeallocatingcapacity,bandwidthandprocessingamongnumerousdistributedcomputers.Acomputinggridcanspanlocations,organizations,machinearchitecturesandsoftwareboundaries,offeringpower,collaborationandinformationaccesstoconnectedusers.UniversitiesandresearchfacilitiesareusinggridstobuildwhatamountstosupercomputercapabilityfromPCs,MacintoshesandLinuxboxes.Aftergridcomputingcameintobeing,itwasonlyamatteroftimebeforeasimilarmodelwouldWhatIsGridStorage? Basedoncurrentandproposedproducts,itappearsthatagridstoragesystemshouldincludethefollowing:Modularstoragearrays:ThesesystemsareconnectedacrossastoragenetworkusingserialATAdisks.Thesystemscanbeblock-orientedstoragearraysornetwork-attachedstoragegatewaysandservers.Commonvirtualizationlayer:Storagemustbeorganizedasasinglelogicalpoolofresourcesavailabletousers.Dataredundancyandavailability:Multiplecopiesofdatashouldexistacrossnodesinthegrid,creatingredundantdataaccessandavailabilityincaseofacomponentfa
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026届四川省绵阳市重点初中化学高三第一学期期中质量检测模拟试题含解析
- 2026届安徽省六安市青山中学化学高三第一学期期末教学质量检测模拟试题含解析
- 2018地理环境助力高考导学案(29)含答案
- 化妆师初步知识培训课件
- 新解读《GB-T 35874-2018甘蔗黑穗病抗性鉴定技术规程》
- 湘潭护理面试题目及答案
- 线上医疗面试题目及答案
- 西天取经面试题目及答案
- 新解读《GB-T 36448-2018集装箱式数据中心机房通 用规范》
- 新解读《GB-T 36675-2018节能评估技术导则 公共建筑项目》
- 大学校园绿化养护保洁卫生服务方案
- 呼兰河传完整版课件
- 医院保密培训课件
- 医疗器械监管实务
- 《工业上楼建筑设计通则》
- 旅游景区反恐防爆应急预案
- 无人机项目建设规划投资计划书
- 粮油生产保障资金管理办法
- 浪潮iqt在线测评题及答案
- 中外运社招在线测评题
- GB/T 18802.331-2024低压电涌保护器元件第331部分:金属氧化物压敏电阻(MOV)的性能要求和试验方法
评论
0/150
提交评论