




免费预览已结束,剩余3页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
计算机英语论文Newtechniqueofthecomputer networkNewtechniqueofthecomputernetworkAbstractThe21centuryisanagesoftheinformationeconomy,beingthecomputernetworktechniqueofrepresentativetechniquesthisages,willbeatveryfastspeeddevelopsoonincontinuouslycreatively,andwillgodeepintothepeople#39;swork,lifeandstudy.Therefore,controlthistechniqueandthenseemtobemoretodelivertheimportance.NowImainlyintroducethenewtechniqueofafewnetworksinactualityliveofapplication.keywordsInternetDigitalCertificatesDigitalWalletsGridStorage1.ForewordInternetturns36,stillaworkinprogressThirty-sixyearsaftercomputerscientistsatUCLAlinkedtwobulkycomputersusinga15-footgraycable,testinganewwayforexchangingdataovernetworks,whatwouldultimatelybecometheInternetremainsaworkinprogress.Universityresearchersareexperimentingwithwaystoincreaseitscapacityandspeed.ProgrammersaretryingtoimbueWebpageswithintelligence.Andworkisunderwaytore-engineerthenetworktoreducespam(junkmail)andsecuritytroubles.Allthewhilethreatsloom:Criticswarnthatcommercial,legalandpoliticalpressurescouldhinderthetypesofinnovationsthatmadetheInternetwhatitistoday.StephenCrockerandVintonCerfwereamongthegraduatestudentswhojoinedUCLAprofessorLenKleinrockinanengineeringlabonSept.2,1969,asbitsofmeaninglesstestdataflowedsilentlybetweenthetwocomputers.ByJanuary,threeothernodesjoinedthefledglingnetwork.Thencamee-mailafewyearslater,acorecommunicationsprotocolcalledTCP/IPinthelate70s,thedomainnamesysteminthe80sandtheWorldWideWeb-nowthesecondmostpopularapplicationbehinde-mail-in1990.TheInternetexpandedbeyonditsinitialmilitaryandeducationaldomainintobusinessesandhomesaroundtheworld.Today,CrockercontinuesworkontheInternet,designingbettertoolsforcollaboration.AndassecuritychairmanfortheInternet#39;skeyoversightbody,heistryingtodefendthecoreaddressingsystemfromoutsidethreats.HeacknowledgestheInternethehelpedbuildisfarfromfinished,andchangesareinstoretomeetgrowingdemandsformultimedia.Networkprovidersnowmakeonlybesteffortsatdeliveringdatapackets,andCrockersaidbetterguaranteesareneededtopreventtheskipsandstuttersnowcommonwithvideo.Cerf,nowatMCIInc.,saidhewishedhecouldhavedesignedtheInternetwithsecuritybuilt-in.MicrosoftCorp.,YahooInc.andAmericaOnlineInc.,amongothers,arecurrentlytryingtoretrofitthenetworksoe-mailsenderscanbeauthenticated-awaytocutdownonjunkmessagessentusingspoofedaddresses.Manyfeaturesbeingdevelopedtodaywouldn#39;thavebeenpossibleatbirthgiventheslower2.DigitalCertificates DigitalcertificatesaredatafilesusedtoestablishtheidentityofpeopleandelectronicassetsontheInternet.Theyallowforsecure,encryptedonlinecommunicationandareoftenusedtoprotectonlinetransactions.Digitalcertificatesareissuedbyatrustedthirdpartyknownasacertificationauthority(CA).TheCAvalidatestheidentityofacertificateholderand“signs”thecertificatetoattestthatithasntbeenforgedoralteredinanyway.NewUsesForDigitalCertificatesDigitalcertificatesarenowbeingusedtoprovidesecurityandvalidationforwirelessconnections,andhardwaremanufacturersareoneofthelatestgroupstousethem.Notlongago,VeriSignInc.announceditsCableModemAuthenticationServices,whichallowhardwaremanufacturerstoembeddigitalcertificatesintocablemodemstohelppreventthepiratingofbroadbandservicesthroughdevicecloning.UsingVeriSignsoftware,hardwaremakerscangeneratecryptographickeysandcorrespondingdigitalcertificatesthatmanufacturersorcableserviceproviderscanusetoautomaticallyidentifyindividualmodems.Thisast-mileauthenticationnotonlyprotectsthevalueofexistingcontentandservicesbutalsopositionscablesystemoperatorstobringabroadnewrangeofcontent,applicationsandvalue-addedservicestomarket.WhenacertificateisdigitallysignedbyaCA,itsownercanuseitasanelectronicpassporttoprovehisidentity.ItcanbepresentedtoWebsites,networksorindividualsthatrequiresecureaccess.Identifyinginformationembeddedinthecertificateincludestheholdersnameande-mailaddress,thenameoftheCA,aserialnumberandanyactivationorexpirationdataforthecertificate.WhenausersidentityisverifiedbytheCA,thecertificateusestheholderspublicencryptionkeytoprotectthisdata.PublickeysarealsoemployedbycertificatesthataWebserverusestoconfirmtheauthenticityofaWebsiteforausersbrowser.WhenauserwantstosendconfidentialinformationtoaWebserver,suchasacredit-cardnumberforanonlinetransaction,thebrowserwillaccessthepublickeyintheserversdigitalcertificatetoverifyitsidentity.RoleofPublic-KeyCryptographyThepublickeyisonehalfofapairofkeysusedinpublic-keycryptography,whichprovidesthefoundationfordigitalcertificates.Public-keycryptographyusesmatchedpublicandprivatekeysforencryptionanddecryption.Thesekeyshaveanumericalvaluethatsusedbyanalgorithmtoscrambleinformationandmakeitreadableonlytouserswiththecorrespondingdecryptionkey.Apersonspublickeyisusedbyotherstoencryptinformationmeantonlyforthatperson.Whenhereceivestheinformation,heuseshiscorrespondingprivatekey,whichiskeptsecret,todecryptthedata.Aperson#39;spublickeycanbedistributedwithoutdamagingtheprivatekey.AWebserverusingadigitalcertificatecanuseitsprivatekeytomakesurethatonlyitcandecryptconfidentialinformationsenttoitovertheInternet.TheWebserverscertificateisvalidatedbyaself-signedCAcertificatethatidentifiestheissuingCA.CAcertificatesarepreinstalledonmostmajorWebbrowsers,includingMicrosoftInternetExplorerandNetscapeNavigator.TheCAcertificatetellsuserswhethertheycantrusttheWebservercertificatewhenitspresentedtothebrowser.IfthevalidityoftheWebservercertificateisaffirmed,thecertificatespublickeyisusedtosecureinformationfortheserverusingSecureSocketsLayer(SSL)technology.DigitalcertificatesareusedbytheSSLsecurityprotocoltocreateasecure“pipe”betweentwopartiesthatseekconfidentialcommunication.SSLisusedinmostmajorWebbrowsersandcommercialWebservers.3.DigitalWallets-AdigitalwalletissoftwarethatenablesuserstopayforgoodsontheWebItholdscredit-cardnumbersandotherpersonalinformationsuchasashippingaddressOnceentered,thedataautomaticallypopulatesorderfieldsatmerchantsites-Whenusingadigitalwallet,consumersdontneedtofilloutorderformsoneachsitewhentheypurchaseanitembecausetheinformationhasalreadybeenstoredandisautomaticallyupdatedandenteredintotheorderfieldsacrossmerchantsitesConsumersalsobenefitwhenusingdigitalwalletsbecausetheirinformationisencryptedorprotectedbyaprivatesoftwarecodeAndmerchantsbenefitbyreceivingprotectionagainstfraud-Digitalwalletsareavailabletoconsumersfreeofcharge,andtheyrefairlyeasytoobtainForexample,whenaconsumermakesapurchaseatamerchantsitethatssetuptohandleserver-sidedigitalwallets,hetypeshisnameandpaymentandshippinginformationintothemerchantsownformAttheendofthepurchase,oneconsumerisaskedtosignupforawalletofhischoicebyenteringausernameandpasswordforfuturepurchasesUserscanalsoacquirewalletsatawalletvendorssite-Althoughawalletisfreeforconsumers,vendorschargemerchantsforwallets-Digitalwalletscomeintwomaintypes:client-sideandserver-sideWithinthosedivisionsarewalletsthatworkonlyonspecificmerchantsitesandthosethataremerchantagnostic-Client-baseddigitalwallets,theolderofthetwotypes,arefallingbythewayside,accordingtoanalysts,becausetheyrequireuserstodownloadandinstallsoftwareAuserdownloadsthewalletapplicationandinputspaymentandmailinginformationAtthatpoint,theinformationissecuredandencryptedontheusersharddriveTheuserretainscontrolofhiscreditcardandpersonalinformationlocally-Withaserver-basedwallet,auserfillsouthispersonalinformation,andacookieisautomaticallydownloaded(Acookieisatextfilethatcontainsinformationabouttheuser)Inthisscenario,theconsumerinformationresidesontheserverofafinancialinstitutionoradigitalwalletvendorratherthanontheusersPC-Server-sidewalletsprovideassuranceagainstmerchantfraudbecausetheyusecertificatestoverifytheidentityofallpartiesWhenapartymakesatransaction,itpresentsitscertificatetotheotherpartiesinvolvedAcertificateisanattachmenttoanelectronicmessageusedtoverifytheidentityofthepartyandtoprovidethereceiverwiththemeanstoencodeareply-Furthermore,thecardholderssensitivedataistypicallyhousedatafinancialinstitution,sotheresanextrasenseofsecuritybecausefinancialenvironmentsgenerallyprovidethehighestdegreeofsecurity-Buteventhoughwalletsprovideeasyshoppingonline,adoptionhasntbeenwidespread-Standardsarepivotaltothesuccessofdigitalwallets-Lastmonth,majorvendors,includingMicrosoftCorp,SunMicrosystemsIncandAmericaOnlineIncannouncedtheirendorsementofanewstandardcalledEMCL,orE-CommerceModelingLanguage,togiveWebmerchantsastandardizedwaytocollectelectronicdataforshipping,billingandpayment4.GridStorageDefinition:Gridstorage,analogoustogridcomputing,isanewmodelfordeployingandmanagingstoragedistributedacrossmultiplesystemsandnetworks,makingefficientuseofavailablestoragecapacitywithoutrequiringalarge,centralizedswitchingsystem.Agridis,infact,ameshednetworkinwhichnosinglecentralizedswitchorhubcontrolsrouting.Gridsofferalmostunlimitedscalabilityinsizeandperformancebecausetheyarentconstrainedbytheneedforever-largercentralswitches.Gridnetworksthusreducecomponentcostsandproduceareliableandresilientstructure.Applyingthegridconcepttoacomputernetworkletsusharnessavailablebutunusedresourcesbydynamicallyallocatinganddeallocatingcapacity,bandwidthandprocessingamongnumerousdistributedcomputers.Acomputinggridcanspanlocations,organizations,machinearchitecturesandsoftwareboundaries,offeringpower,collaborationandinformationaccesstoconnectedusers.UniversitiesandresearchfacilitiesareusinggridstobuildwhatamountstosupercomputercapabilityfromPCs,MacintoshesandLinuxboxes.Aftergridcomputingcameintobeing,itwasonlyamatteroftimebeforeasimilarmodelwouldWhatIsGridStorage? Basedoncurrentandproposedproducts,itappearsthatagridstoragesystemshouldincludethefollowing:Modularstoragearrays:ThesesystemsareconnectedacrossastoragenetworkusingserialATAdisks.Thesystemscanbeblock-orientedstoragearraysornetwork-attachedstoragegatewaysandservers.Commonvirtualizationlayer:Storagemustbeorganizedasasinglelogicalpoolofresourcesavailabletousers.Dataredundancyandavailability:Multiplecopiesofdatashouldexistacrossnodesinthegrid,creatingredundantdataaccessandavailabilityincaseofacomponentfa
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025-2030中国植物提取物国际标准对接与出口壁垒报告
- 2025-2030中国术后镇痛药物行业供需格局及战略规划报告
- 2025-2030中国智能中医脉诊仪信号采集标准建立与临床有效性验证报告
- 2025-2030中国数据中心能效优化与绿色技术应用报告
- 2025-2030中国微生物肥料在有机农业中的推广阻力与对策分析报告
- 2025年征信行业自律规范模拟试题及答案解析
- 2025年健身教练职业技能考核试卷:健身教练职业素养与团队管理试题
- 2025年征信行业自律管理模拟试题及答案
- 企业名称ESG报告2021-2025年发展报告治疗类器械
- 运输合同范本
- 墩柱安全教育培训课件
- 新版中华民族共同体概论课件第十五讲新时代与中华民族共同体建设(2012- )-2025年版
- 2025年全国《家庭教育指导师》考试模拟试题(附答案)
- 2026届房山区高三开学考试语文试题及参考答案
- 桡骨骨折复位内固定术
- 2025至2030年中国办公设备租赁行业市场深度分析及发展前景预测报告
- 急性呼吸衰竭患者的急救与护理
- 造白渣原则及渣况判断
- 23秋国家开放大学《液压气动技术》形考任务1-3参考答案
- 反应釜清洗操作规程
- 大班健康《贪吃的大嘴鱼》
评论
0/150
提交评论