《物联网专业英语教程》课件第4章_第1页
《物联网专业英语教程》课件第4章_第2页
《物联网专业英语教程》课件第4章_第3页
《物联网专业英语教程》课件第4章_第4页
《物联网专业英语教程》课件第4章_第5页
已阅读5页,还剩58页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Unit4UbiquitousNetworkandVPNs[58]TextAHowUbiquitousNetworking

WillWork?[65]TextBVPNs[74]参考译文泛在网是如何工作的?

1.IntroductiontoHowUbiquitousNetworkingWillWork

Mobilecomputingdeviceshavechangedthewaywelookatcomputing.LaptopsandPersonalDigitalAssistants(PDAs)(SeeFigure4.1)haveunchainedusfromourdesktopcomputers.AgroupofresearchersatAT&TLaboratoriesCambridgearepreparingtoputanewspinonmobilecomputing.Inadditiontotakingthehardwarewithyou,HowUbiquitousNetworkingWillWork?theyaredesigningaubiquitousnetworkingsystemthatallowsyourprogramapplicationstofollowyouwhereveryougo.

Figure4.1PDA'smodelInsidethebatultrasonictransmittershowstwo-coppercoilantennae,aradiotransmittermodule,thebatteryandtwoultrasonictransmitters.

Byusingasmallradiotransmitterandabuildingfullofspecialsensors,yourdesktopcanbeanywhereyouare,notjustatyourworkstation.Atthepressofabutton,thecomputerclosesttoyouinanyroombecomesyourcomputerforaslongasyouneedit.Inadditiontocomputers,theCambridgeresearchershavedesignedthesystemtoworkforotherdevices,includingphonesanddigitalcameras.

2.SendouttheBatSignal

Inorderforacomputerprogramtotrackitsuser,researchershadtodevelopasystemthatcouldlocatebothpeopleanddevices.TheAT&Tresearcherscameupwiththeultrasoniclocationsystem.Thislocationtrackingsystemhasthreebasicparts:

·Bats—smallultrasonictransmitterswornbyusers;

·Receivers—ultrasonicsignaldetectorsembeddedinceiling;

·Centralcontroller—coordinatesthebatsandreceiverchains.

Userswithinthesystemwillwearabat,asmalldevicethattransmitsa48-bitcodetothereceiversintheceiling.Batsalsohaveanimbeddedtransmitterwhichallowsittocommunicatewiththecentralcontrollerusingabidirectional433-MHzradiolink.

Batsare3incheslong(7.5cm)by1.4incheswide(3.5cm)by0.6inchesthick(1.5cm),oraboutthesizeofapager.Thesesmalldevicesarepoweredbyasingle3.6-voltlithiumthionylchloridebattery,whichhasalifetimeofsixmonths.Thedevicesalsocontaintwobuttons,twoLight-EmittingDiodes(LEDs)andapiezoelectricspeaker,allowingthemtobeusedasubiquitousinputandoutputdevices,andavoltagemonitortocheckthebatterystatus.(SeeFigure4.2)

Figure4.2Smartposter

Asmartposterwillhavebuttonsprintedontoitthatcanbetriggeredbyabat.

Abatwilltransmitanultrasonicsignal,whichwillbedetectedbyreceiverslocatedintheceilingapproximately4feet(1.2m)apartinasquaregrid.Thereareabout720ofthesereceiversinthe10,000-square-footbuilding(929m2)attheAT&TLabsinCambridge.Anobject'slocationisfoundusingtrilateration,aposition-findingtechniquethatmeasurestheobjectsdistanceinrelationtothreereferencepoints.

Ifabatneedstobelocated,thecentralcontrollersendsthebat'sIDoveraradiolinktothebat.ThebatwilldetectitsIDandsendoutanultrasonicpulse.Thecentralcontrollermeasuresthetimeittookforthatpulsetoreachthereceiver.Sincethespeedofsoundthroughairisknown,thepositionofthebatiscalculatedbymeasuringthespeedatwhichtheultrasonicpulsereachedthreeothersensors.Thissystemprovidesalocationaccuracyof1.18inches(3cm)throughouttheCambridgebuilding.

Byfindingthepositionoftwoormorebats,thesystemcandeterminetheorientationofabat.Thecentralcontrollercanalsodeterminewhichwayapersonisfacingbyanalyzingthepatternofreceiversthatdetectedtheultrasonicsignalandthestrengthofthesignal.

3.IntheZone

Withanultrasoniclocationsysteminplace,it'spossibleforanydevicefittedwithabattobecomeyoursatthepushofabutton.Let'ssaytheuserleaveshisworkstationandentersanotherroom.There'saphoneinthisroomsittingonanunoccupieddesk.Thatphoneisnowtheuser'sphoneandalloftheuser'sphonecallsareimmediatelyredirectedtothatphone.Ifthereisalreadysomeoneusingthatphone,thecentralcontrollerrecognizesthatandthepersonusingthephonemaintainspossessionofthephone.

Thecentralcontrollercreatesazonearoundeverypersonandobjectwithinthelocationsystem.Forexample,ifseveralcamerasareplacedinaroomforvideoconferences,thelocationsystemwouldactivatetheappropriatecamerasothattheusercouldbeseenandmovefreelyaroundtheroom.

Whenallthesensorsandbatsareinplace,theyareincludedinavirtualmapofthebuilding.Thecomputerusesaspatialmonitortodetectifauser'szoneoverlapswiththezoneofadevice.Ifthezonesdooverlap,thentheusercanbecomethetemporaryownerofthedevice.

IftheultrasoniclocationsystemisworkingwithVirtualNetworkComputing(VNC)software,therearesomeadditionalcapabilities.Computerdesktopscanbecreatedthatactuallyfollowtheirownersanywherewithinthesystem.Justbyapproachinganycomputerdisplayinthebuilding,thebatcanenabletheVNCdesktoptoappearonthatdisplay.Thisishandyifyouwanttoleaveyourcomputertoshowacoworkerwhatyou'vebeenworkingon.Yourdesktopissimplyteleportedfromyourcomputertoyourcoworker'scomputer.

4.InformationHoppersandSmartPosters

Oncethesezonesaresetup,computersonthenetworkwillhavesomeinterestingcapabilities.Thesystemwillhelpusstoreandretrievedatainan"informationhopper".Thisisatimelineofinformationthatkeepstrackofwhendataiscreated.Thehopperknowswhocreatedit,wheretheywereandwhotheywerewith.

Thinkofthehopperasaubiquitousfilingclerk.Itwillchangehowwethinkofourcomputerfilingsystems.Byusingadigitalcamerathatisconnectedtothenetwork,auser'sphotographsareimmediatelystoredinhisorhertimeline.Taperecorderscouldalsosendaudiomemostotheinformationhopper.

Twoitemsofinformationcreatedatthesametimewillbefoundatthesameplaceonthetimeline.Thesystemknowswhotheuserwaswithwhenhecreatedthedata,andthevarioustimelinesoftheusersworkingtogether.Thiswayanothertimelinecanbecreatedtokeeptrackofparticularprojects.

Anotherapplicationthatwillcomeoutofthisultrasoniclocationsystemisthesmartposter.Aconventionalcomputerinterfacerequiresustoclickonabuttononourcomputerscreen.Inthisnewsystem,abuttoncanbeplacedanywhereinyourworkplace,notjustonthecomputerdisplay.Theideabehindsmartpostersisthatabuttoncanbeapieceofpaperthatisprintedoutandstuckonawall.

Smartposterswillbeusedtocontrolanydevicethatispluggedintothenetwork.Theposterwillknowwheretosendafileandauser'spreferences.Smartposterscouldalsobeusedinadvertisingnewservices.Topressabuttononasmartposter,auserwillsimplyplacehisorherbatonthesmartposterbuttonandclickthebat.Thesystemautomaticallyknowswhoispressingtheposter'sbutton.Posterscanbecreatedwithseveralbuttonsonit.

Ultrasoniclocationsystemswillrequireustothinkoutsideofthebox.Traditionally,wehaveusedourcomputeratworktostoreallofourfiles,andwemaybackupthesefilesonanetworkserver.Thisnewubiquitousnetworkwillenableallcomputersinabuildingtotransferownershipandstoreallofourfilesinacentraltimeline.

Asabusinessgrows,itmightexpandtomultipleshopsorofficesacrossthecountryandaroundtheworld.Tokeepthingsrunningefficiently,thepeopleworkinginthoselocationsneedafast,secureandreliablewaytoshareinformationacrosscomputernetworks.Inaddition,TextBVPNstravelingemployeeslikesalespeopleneedanequallysecureandreliablewaytoconnecttotheirbusiness'scomputernetworkfromremotelocations.

OnepopulartechnologytoaccomplishthesegoalsisaVPN(VirtualPrivateNetwork).AVPNisaprivatenetworkthatusesapublicnetwork(usuallytheInternet)toconnectremotesitesoruserstogether.TheVPNuses"virtual"connectionsroutedthroughtheInternetfromthebusiness'sprivatenetworktotheremotesiteoremployee.ByusingaVPN,businessesensuresecurity—anyoneinterceptingtheencrypteddatacan'treadit.

VPNwasnotthefirsttechnologytomakeremoteconnections.Severalyearsago,themostcommonwaytoconnectcomputersbetweenmultipleofficeswasbyusingaleasedline.Leasedlines,suchasISDN(IntegratedServicesDigitalNetwork,128Kbps),areprivatenetworkconnectionsthatatelecommunicationscompanycouldleasetoitscustomers.Leasedlinesprovidedacompanywithawaytoexpanditsprivatenetworkbeyonditsimmediategeographicarea.TheseconnectionsformasingleWideAreaNetwork(WAN)forthebusiness.Thoughleasedlinesarereliableandsecure,theleasesareexpensive,withcostsrisingasthedistancebetweenofficesincreases.

Today,theInternetismoreaccessiblethaneverbefore,andInternetServiceProviders(ISPs)continuetodevelopfasterandmorereliableservicesatlowercoststhanleasedlines.Totakeadvantageofthis,mostbusinesseshavereplacedleasedlineswithnewtechnologiesthatuseInternetconnectionswithoutsacrificingperformanceandsecurity.Businessesstartedbyestablishingintranets,whichareprivateinternalnetworksdesignedforuseonlybycompanyemployees.Intranetsenableddistantcolleaguestoworktogetherthroughtechnologiessuchasdesktopsharing.ByaddingaVPN,abusinesscanextendallitsintranet'sresourcestoemployeesworkingfromremoteofficesortheirhomes.

1.

Analogy:EachLANisanIsland

Imaginethatyouliveonanislandinahugeocean.Therearethousandsofotherislandsallaroundyou,someverycloseandothersfartheraway.Thecommonmeansoftravelbetweenislandsisviaferry.Travelingontheferrymeansthatyouhavealmostnoprivacy:Otherpeoplecanseeeverythingyoudo.

Let'ssaythateachislandrepresentsaprivateLocalAreaNetwork(LAN)andtheoceanistheInternet.TravelingbyferryislikeconnectingtoaWebserverorotherdevicethroughtheInternet.YouhavenocontroloverthewiresandroutersthatmakeuptheInternet,justlikeyouhavenocontrolovertheotherpeopleontheferry.Thisleavesyoususceptibletosecurityissuesifyou'retryingtoconnecttwoprivatenetworksusingapublicresource.

Continuingwithouranalogy,yourislanddecidestobuildabridgetoanotherislandsothatpeoplehaveaneasier,moresecureanddirectwaytotravelbetweenthetwoislands.Itisexpensivetobuildandmaintainthebridge,eveniftheislandsareclosetogether.However,theneedforareliable,securepathissogreatthatyoudoitanyway.Yourislandwouldliketoconnecttoyetanotherislandthatismuchfartheraway,butdecidesthatthecostsaresimplytoomuchtobear.

Thisscenariorepresentshavingaleasedline.Thebridges(leasedlines)areseparatefromtheocean(Internet),yetareabletoconnecttheislands(LANs).Companieswhochoosethisoptiondosobecauseoftheneedforsecurityandreliabilityinconnectingtheirremoteoffices.However,iftheofficesareveryfarapart,thecostcanbeprohibitivelyhigh—justliketryingtobuildabridgethatspansagreatdistance.

SohowdoesaVPNfitin?Usingouranalogy,supposeeachinhabitantonyourislandhasasmallsubmarine.Let'sassumethateachsubmarinehastheseamazingproperties:

·It'sfast.

·It'seasytotakewithyouwhereveryougo.

·It'sabletocompletelyhideyoufromanyotherboatsorsubmarines.

·It'sdependable.

·Itcostslittletoaddadditionalsubmarinestoyourfleetonceyou'vepurchasedthefirstone.

Althoughthey'retravelingintheoceanalongwithothertraffic,thepeoplecouldtravelbetweenislandswhenevertheywantedtowithprivacyandsecurity.That'sessentiallyhowaVPNworks.EachremotememberofyournetworkcancommunicateinasecureandreliablemannerusingtheInternetasthemediumtoconnecttotheprivateLAN.AVPNcangrowtoaccommodatemoreusersanddifferentlocationsmuchmoreeasilythanaleasedline.Infact,scalabilityisamajoradvantagethatVPNshaveoverleasedlines.Moreover,thedistancedoesn'tmatter,becauseVPNscaneasilyconnectmultiplegeographiclocationsworldwide.

2.

WhatMakesaVPN?

AVPN'spurposeisprovidingasecureandreliableprivateconnectionbetweencomputernetworksoveranexistingpublicnetwork,typicallytheInternet.BeforelookingatthetechnologythatmakesaVPNpossible,let'sconsiderallthebenefitsandfeaturesabusinessshouldexpectinaVPN.

Awell-designedVPNprovidesabusinesswiththefollowingbenefits:

·Extendedconnectionsacrossmultiplegeographiclocationswithoutusingaleasedline;

·Improvedsecurityforexchangingdata;

·FlexibilityforremoteofficesandemployeestousethebusinessintranetoveranexistingInternetconnectionasifthey'redirectlyconnectedtothenetwork;

·Savingsintimeandexpenseforemployeestocommuteiftheyworkfromvirtualworkplaces;

·Improvedproductivityforremoteemployees.

AbusinessmightnotrequireallthesebenefitsfromitsVPN,butitshoulddemandthefollowingessentialVPNfeatures:

·Security—TheVPNshouldprotectdatawhileit'stravelingonthepublicnetwork.Ifintrudersattempttocapturethedata,theyshouldbeunabletoreadoruseit.

·Reliability—EmployeesandremoteofficesshouldbeabletoconnecttotheVPNwithnotroubleatanytime(unlesshoursarerestricted),andtheVPNshouldprovidethesamequalityofconnectionforeachuserevenwhenitishandlingitsmaximumnumberofsimultaneousconnections.

·Scalability—Asabusinessgrows,itshouldbeabletoextenditsVPNservicestohandlethatgrowthwithoutreplacingtheVPNtechnologyaltogether.

OneinterestingthingtonoteaboutVPNsisthattherearenostandardsabouthowtosetthemup.Thisarticlecoversnetwork,authenticationandsecurityprotocolsthatprovidethefeaturesandbenefitslistedabove.ItalsodescribeshowaVPN'scomponentsworktogether.Ifyou'reestablishingyourownVPN,though,it'suptoyoutodecidewhichprotocolsandcomponentstouseandtounderstandhowtheyworktogether.

3.TwocommontypeofVPN

3.1Remote-accessVPN

Aremote-accessVPNallowsindividualuserstoestablishsecureconnectionswitharemotecomputernetwork.Thoseuserscanaccessthesecureresourcesonthatnetworkasiftheyweredirectlypluggedintothenetwork'sservers.Anexampleofacompanythatneedsaremote-accessVPNisalargefirmwithhundredsofsalespeopleinthefield.AnothernameforthistypeofVPNisVirtualPrivateDial-upNetwork(VPDN),acknowledgingthatinitsearliestform,aremote-accessVPNrequireddialingintoaserverusingananalogtelephonesystem.

Therearetwocomponentsrequiredinaremote-accessVPN.ThefirstisaNetworkAccessServer(NAS,usuallypronounced"nazz"conversationally),alsocalledamediagatewayoraRemote-AccessServer(RAS).ANASmightbeadedicatedserver,oritmightbeoneofmultiplesoftwareapplicationsrunningonasharedserver.It'saNASthatauserconnectstofromtheInternetinordertouseaVPN.TheNASrequiresthatusertoprovidevalidcredentialstosignintotheVPN.Toauthenticatetheuser'scredentials,theNASuseseitheritsownauthenticationprocessoraseparateauthenticationserverrunningonthenetwork.

Theotherrequiredcomponentofremote-accessVPNs(SeeFigure4.3)isclientsoftware.Inotherwords,employeeswhowanttousetheVPNfromtheircomputersrequiresoftwareonthosecomputersthatcanestablishandmaintainaconnectiontotheVPN.Mostoperatingsystemstodayhavebuilt-insoftwarethatcanconnecttoremote-accessVPNs,thoughsomeVPNsmightrequireuserstoinstallaspecificapplicationinstead.TheclientsoftwaresetsupthetunneledconnectiontoaNAS,whichtheuserindicatesbyitsInternetaddress.Thesoftwarealsomanagestheencryptionrequiredtokeeptheconnectionsecure.

LargecorporationsorbusinesseswithknowledgeableITstafftypicallypurchase,deployandmaintaintheirownremote-accessVPNs.Businessescanalsochoosetooutsourcetheirremote-accessVPNservicesthroughanEnterpriseServiceProvider(ESP).TheESPsetsupaNASforthebusinessandkeepsthatNASrunningsmoothly.

Aremote-accessVPNisgreatforindividualemployees,butwhataboutentirebranchofficeswithdozensorevenhundredsofemployees?Next,we'lllookatanothertypeofVPNusedtokeepbusinessesconnectedLAN-to-LAN.

Figure4.3Remote-accessVPN

Aremote-accessVPNconnectionallowsanindividualusertoconnecttoaprivatebusinessnetworkfromaremotelocationusingalaptopordesktopcomputerconnectedtotheInternet.

3.2Site-to-siteVPN

Asite-to-siteVPNallowsofficesinmultiplefixedlocationstoestablishsecureconnectionswitheachotheroverapublicnetworksuchastheInternet.Site-to-siteVPNextendsthecompany'snetwork,makingcomputerresourcesfromonelocationavailabletoemployeesatotherlocations.Anexampleofacompanythatneedsasite-to-siteVPNisagrowingcorporationwithdozensofbranchofficesaroundtheworld.(SeeFigure4.4)

Figure4.4Site-to-siteVPNAsite-to-siteVPNconnectionletsbranchofficesusetheInternetasaconduitforaccessingthemainoffice'sintranet.

Therearetwotypesofsite-to-siteVPNs:

·Intranet-based—Ifacompanyhasoneormoreremotelocationsthattheywishtojoininasingleprivatenetwork,theycancreateanintranetVPNtoconnecteachseparateLANtoasingleWAN.

·Extranet-based—Whenacompanyhasacloserelationshipwithanothercompany(suchasapartner,supplierorcustomer),itcanbuildanextranetVPNthatconnectsthosecompanies'LANs.ThisextranetVPNallowsthecompaniestoworktogetherinasecure,sharednetworkenvironmentwhilepreventingaccesstotheirseparateintranets.

Eventhoughthepurposeofasite-to-siteVPNisdifferentfromthatofaremote-accessVPN,itcouldusesomeofthesamesoftwareandequipment.Ideally,though,asite-to-siteVPNshouldeliminatetheneedforeachcomputertorunVPNclientsoftwareasifitwereonaremote-accessVPN.DedicatedVPNclientequipmentcanaccomplishthisgoalinasite-to-siteVPN.

NowthatyouknowthetwotypesofVPNs,let'slookathowyourdataiskeptsecureasittravelsacrossaVPN.

4.KeepingVPNTrafficintheTunnel

MostVPNsrelyontunnelingtocreateaprivatenetworkthatreachesacrosstheInternet.Tunnelingistheprocessofplacinganentirepacketofdatafilewithinanotherpacketbeforeit'stransportedovertheInternet.Thatouterpacketprotectsthecontentsfrompublicviewandensuresthatthepacketmoveswithinavirtualtunnel.

Thislayeringofpacketsiscalledencapsulation.Computersorothernetworkdevicesatbothendsofthetunnel,calledtunnelinterfaces,canencapsulateoutgoingpacketsandreopenincomingpackets.Users(atoneendofthetunnel)andITpersonnel(atoneorbothendsofthetunnel)configurethetunnelinterfacesthey'reresponsiblefortouseatunnelingprotocol.Alsocalledanencapsulationprotocol,atunnelingprotocolisastandardizedwaytoencapsulatepackets.

ThepurposeofthetunnelingprotocolistoaddalayerofsecuritythatprotectseachpacketonitsjourneyovertheInternet.Thepacketistravelingwiththesametransportprotocolitwouldhaveusedwithoutthetunnel;thisprotocoldefineshoweachcomputersendsandreceivesdataoveritsISP.Eachinnerpacketstillmaintainsthepassengerprotocol,suchasInternetProtocol(IP)orAppleTalk,whichdefineshowittravelsontheLANsateachendofthetunnel.ThetunnelingprotocolusedforencapsulationaddsalayerofsecuritytoprotectthepacketonitsjourneyovertheInternet.

Tobetterunderstandtherelationshipsbetweenprotocols,thinkoftunnelingashavingacomputerdeliveredtoyoubyashippingcompany.Thevendorwhoissendingyouthecomputerpacksthecomputer(passengerprotocol)inabox(tunnelingprotocol).Shippersthenplacethatboxonashippingtruck(transportprotocol)atthevendor'swarehouse(onetunnelinterface).Thetruck(transportprotocol)travelsoverthehighways(Internet)toyourhome(theothertunnelinterface)anddeliversthecomputer.Youopenthebox(tunnelingprotocol)andremovethecomputer(passengerprotocol).

1.

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论