




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、 大学通达学院毕业设计(论文)外文资料翻译学院(系): 学院 专业: 计算机科学与技术 学生姓名: 班级学号: 外文出处:internetworking with tcp/ip voll: principles,protocols,and architecture fourth edition附件:1.外文资料翻译译文;2.外文原文指导教师评语:指导教师签名:年月日internet introduction and managementinternet communication has become a fundamental part of life. the world wid web
2、conditions information about such diverse subjects as atmospheric conditions, crop production, stock prices, and airline traffic. groups establish electronic mailing lists shey can share information of common interest. professional colleagues exchange business correspondence electronically, and rela
3、tives exchange personal greetings. unfortunately, most network technologies are designed for a specific purpose. each enterprise chooses hardware technology appropriate for specific communication needs and budget. more important, it is impossible to engineer a universal network from a single network
4、 technology because no single network suffices for all uses. som groups need high-speed networks to connect computers in a single building. low-cos technologies that fill the need cannot span large geographic distances. other groups settle for a slower speed network that connects machines thousands
5、of miles apart. for over two decades, a new technology has evolved that makes it possible to in terconnect many disparate physical networks and make them function as a coordinate unit. the technology, called internetworking, accommodates multiple, diverse underlying hardware technologies by providin
6、g a way to interconnect heterogeneous networksand a set of communication conventions that makes them interoperate. the internet technology hides the details of network hardware, and permits computers to communicate independent of their physical network connections. to appreciate internet technology,
7、 think of how it has changed business. in addition to high-speed communication among employees in the office environment, networking technologies provide instant feedback among the production side of the business, sales and marketing, and customers. as a result, the speed with which business can pla
8、n, implement, assess, and retool has increased; the change is dramatic.the term server applies to any program that offers a service that can be reached a network . a server accepts a request over the network, performs its service, and returns the result to the requester. for the simplest services, e
9、ach request arrives in a ip datagram and the server returns a response in another datagram. an executing program becomes a client when it sends a request to a server and waits for a response. because the client-server model is a convenient and natural extension of interprocess communication on a sin
10、gle machine, it is easy to build programs that use the model to interact. servers can perform simple or complex tasks. for example, a time-of-day server merely returns the current time whenever a client sends the server a packet. a web server receives requests from a browser to fetch a copy of a web
11、 page; the server obtains a copy of the file for the page and returns it to the browser. usually, servers are implemented as application programst. the advantage of implementing servers as application programs is that they can execute on any computing system that supports tcp/ip communication. thus,
12、 the server for a particular service can execute on a timesharing system along with other programs, or it can execute on a personal computer. multiple servers can offer the same service, and can execute on the in fact, managers commonly replicate copies of same machine or on multiple machines. a giv
13、en server onto physically independent machines to increase reliability or improve performance. if a computers primary purpose is support of a particular server program, the term server may be applied to the computer as well as to the server program. thus, one hears statements such as machine a is ou
14、r file server.other groups around the world continue to connect to the internet as well. the most significant change comes not from added network connections, however, but from additional traffic. as new users connect to the internet and new applications appear, traffic patterns change. when physici
15、sts, chemists, and biologists began to use the internet, they exchanged files of data collected from experiments. files of scientific data were large compared to electronic mail messages. as the internet became popular and users began to browse information using services like the world wide web, tra
16、ffic patterns increased again. to accommodate growth in traffic,the capacity of the nsfnet backbone was increased three times.the final version, known as ansnet after the company that supplied it, had a capacity approximately 840 times larger than the original.since 1995,companies known as internet
17、service providers (isps) have each built their own backbone network, many of which have significantly more capacity than the last government-funded backbone. at the current time, it is difficult to foresee an end to the need for more capacity.growth in demands for networking is not unexpected. the c
18、omputer industry has enjoyed a continual demand for increased processing power and larger data storage for many years. users have only begun to understand how to use networks. in the future we can expect continual increases in the demand for communications. soon, for example, tcp/ip technologies wil
19、l be used for telephone and video services.as well as data be needed to accom modate the growth services. thus, higher-capacity communication technologies will be needed to accommodate the growth.properties of the internetthe notion of universal service is important, but it alone does not capture al
20、l the ideas we have in mind for a unified internet because there can be many implementations of universal services. in our design, we want to hide the underlying internet architecture from the user. that is, we do not want to require users or application programs to understand the details of hardwar
21、e interconnections to use the internet. we also do not want to mandate a network interconnection topology. in particular, adding a new network to the internet should not mean connecting to a centralized switching point, nor should it mean adding direct physical connections between the new network an
22、d all existing networks. we want to be able to send data across intermediate networks even though they are not directly connected to the source or destination computers. we want all computers in the internet to share a universal set of machine identifiers (which can be thought of as names or address
23、es). our notion of a unified internet also includes the idea of network independence in the user interface. that is, we want the set of operations used to establish cornrnunication or to transfer data to remain independent of the underlying network technologies and the destination computer. certainl
24、y, a user should not have to understand the network interconnection topology when creating or using application programs that communicate.internet architecturewe have seen how computers connect to individual networks. the question arises, how are networks interconnected to form an internetwork? the
25、answer has two parts. physically, two networks can only be connected by a computer that attaches to both of them. a physical attachment does not provide the interconnection we have in mind, however, because such a connection does not guarantee that the computer will cooperate with other machines tha
26、t wish to communicate. to have a viable internet, we need special computers that are willing to transfer packets from one network to another. computers that interconnect two networks and pass packets from one to the other are called internet gateways or internet routersf. from the users point of vie
27、w, the internet appears to consist of a set of application programs that use the underlying network to carry out useful communication tasks. we use the tern1 interoperability to refer to the ability of diverse computing systems to cooperate in solving computational problems. internet application pro
28、grams exhibit a high degree of interoperability. most users that access the internet do so merely by running application programs without understanding the types of computers being accessed, the tcp/ip technology, the structure of the underlying internet, or even the path the data travels to its des
29、tination; they rely on the application programs and the underlying network software to handle such details. only programmers who write network applica tion programs need to view a tcp/ip internet as a network and need to understand some of the technology. the most popular and widespread internet app
30、lication services include:l world wide web. the web allows users to view documents that contain text and graphics, and to follow hypermedia links from one document to another. the web grew to become the largest source of traffic on the global internet between 1994 and 1995, and continues to dominate
31、. some service providers estimate that the web now accounts for 80% of their internet traffic. l electronic mail (e-mail). electronic mail allows a user to compose a memo and send a copy to individuals or groups. another part of the mail application allows users to read memos that they have received
32、. a recent innovation allows users to include attachments with a mail message that consist of arbitrary files. electronic mail has been so successful that many internet users depend on it for most correspondence. one reason for the popularity of internet e-mail arises from a careful design: the prot
33、ocol makes delivery reliable. not only does the mail system on the senders computer contact the mail system on the receivers computer directly, but the protocol specifies that a message cannot be deleted by the sender until the receiver has successfully placed a copy on permanent storage. l file tra
34、nsfer. the file transfer application allows users to send or receive a copy of a data file. file transfer is one of the oldest, and still among the most heavily used application services in the internet. although small files can now be attached to an e-mail message, the file transfer service is stil
35、l needed to handle arbitrarily large files. the system provides a way to check for authorized users, or even to prevent all access. like mail, file transfer across a tcpap internet is reliable because the two machines involved communicate directly, without relying on intermediate machines to make co
36、pies of the file along the way. l remote login. remote login allows a user sitting at one computer to connect to a remote machine and establish an interactive login session. the remote login makes it appear that a window on the users screen connects directly to the remote machine by sending each key
37、stroke from the users keyboard to the remote machine and displaying each character the remote computer prints in the users window. when the remote login session terminates, the application returns the user to the local system.network-level internet servicesa programmer who creates application progra
38、ms that use tcp/ip protocols has an entirely different view of an internet than a user who merely executes applications like electronic mail.at the network level, an internet provides two broad types of service that all application programs use. while it is unimportant at this time to understand the
39、 details of these services, they cannot be omitted from any overview of tcp/ip: l connectionless packet delivery service. this service, explained in detail throughout the text, forms the basis for all other internet services. connectionless delivery is an abstraction of the service that most packet-
40、switching networks offer. it means simply that a tcpap internet routes small messages from one computer to another based on address information camed in the message. because the connectionless service routes each packet separately, it does not guarantee reliable, in-order delivery. because it usuall
41、y maps directly onto the underlying hardware, the connectionless service is extremely efficient. more important, having connectionless packet delivery as the basis for all internet services makes the tcp/ip protocols adaptable to a wide range of network hardware.l reliable stream transport service.
42、most applications need much more than packet delivery because they require the communication software to recover automatically from transmission errors, lost packets, or failures of intermediate switches along the path between sender and receiver. the reliable transport service handles such problems
43、. it allows an application on one computer to establish a connection with an application on another computer, and then to send a large volume of data across the connection as if it were a permanent, direct hardware connection. underneath, of course, the communication protocols divide the stream of d
44、ata into small messages and send them, one at a time, waiting for the receiver to acknowledge reception. many networks provide basic services similar to those outlined above, so one might wonder what distinguishes tcp/ip services from others. the primary distinuishing features are: l network technol
45、ogy independence. although tcp/ip is based on conventional packet switching technology, it is independent of any particular vendors hardware. the global internet includes a variety of network technologies ranging from networks designed to operate within a single building to those designed to span la
46、rge distances.tcp/ip protocols define the unit of data transmission, called a datagram, and specify how to transmit datagrams on a particular network. l universal interconnection. a tcp/ip internet allows any pair of computers to which it attaches to communicate. each computer is assigned an address
47、 that is universally recognized throughout the internet. every datagram carries the addresses of its source and destination. intermediate switching computers use the destination address to make routing decisions.l end-to-end acknowledgements. the tcp/ip internet protocols provide acknowledgements be
48、tween the original source and ultimate destination instead of between successive machines along the path, even if the source and destination do not connect to a common physical network. l application protocol standarch. in addition to the basic transport-level services (like reliable stream connecti
49、ons), the tcp/ip protocols include standards for many common applications including electronic mail, file transfer, and remote login. thus, when designing application programs that use tcp/ip, programmers often find that existing software provides the communication services they need.in addition to
50、protocols that provide network level services and application programs that use those services, an internet needs software that allows managers to debug problems, control routing, and find computers that violate protocol standards. we refer to such activities as internet management.the level of mana
51、gement protocolsoriginally, many wide area networks included management protocols as part of their link level protocols. if a packet switch began misbehaving, the network manager could instruct a neighboring packet switch to send it a special control packet. control packets caused the receiver to su
52、spend normal operation and respond to commands from the manager. the manager could interrogate the packet switch to identify problems, examine or change routes, test one of the communication interfaces, or reboot the switch. once managers repaired the problem, they could instruct the switch to resum
53、e normal operations. because management tools were part of the lowest level protocol, managers were often able to control switches even if higher level protocols failed. unlike a homogeneous wide area network, a tcpm intemet does not have a single link level protocol. instead, the internet consists
54、of multiple physical networks in tercoected by ip routers. as a result, intemet management differs from network management. first, a single manager can control heterogeneous devices, including ip routers, bridges, modems, workstations, and printers. second, the controlled entities may not share a co
55、mmon link level protocol. third, the set of machines a manager controls may lie at arbitrary points in an internet.in particular, a manager may need to control one or more machines that do not attach to the same physical network as the managers computer. thus, it may not be possible for a manager to
56、 communicate with machines being controlled unless the management software uses protocols that provide end-to-end connectivity across an internet. as a consequence, the internet management protocol used with tcp/ip operates above the transport level: in a tcp/ip internet, a manager needs to examine
57、and control routers and other network devices. because such devices attach to arbitrary networks, protocols for internet management operate at the applica- tion level and communicate using tcp/ip transport-level protocols.designing internet management software to operate at the application level has
58、 several advantages. because the protocols can be designed without regard to the underlying network hardware, one set of protocols can be used for all networks. because the protocols can be designed without regard to the hardware on the managed machine, the same protocols can be used for all managed devices. from a managers point of view, having a single set of management protocols means uniformity - all routers respond to exactly the same set of commands. furthermore, because the manag
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 森林防火救护知识培训课件
- 梯子使用培训课件
- 2025年音乐辅导员招聘考试高频考题分析与解答技巧
- 2025年艺术品经纪人职业能力考试模拟题及答案
- 2025年食品安全监管食品兑奖流程中财务审核笔试题目
- 2025年AI领域职位人工智能公司招聘笔试模拟题及答案
- 2025年注册验船师资格考试(C级船舶检验专业能力)复习题及答案一
- 2025年无人机行业入门指南初级装调检修工程师面试要点与模拟题
- 2025年注册验船师资格考试(B级船舶检验专业基础安全)全真冲刺试题及答案一
- 2025年监理工程师《案例分析(交通工程)》考试真题及答案(完整版)
- 2025年安徽省中考历史试卷真题(含答案)
- 初中教师教学基本功培训内容课件
- 《无线网规网优概述》课件
- 事业单位工作人员转正定级审批表
- 《中央企业合规管理办法》解读与启示
- 王洪图黄帝内经80课时讲稿
- 2023年山西日报社招聘笔试模拟试题及答案解析
- 国土空间生态修复规划与全域土地综合整治的衔接
- 糖皮质激素性骨质疏松症及其治疗
- 2022年省直辖行政单位政务中心综合窗口人员招聘笔试试题及答案解析
- YY/T 0127.11-2014口腔医疗器械生物学评价第11部分:盖髓试验
评论
0/150
提交评论