外文文獻(xiàn)翻譯作業(yè)_第1頁(yè)
外文文獻(xiàn)翻譯作業(yè)_第2頁(yè)
外文文獻(xiàn)翻譯作業(yè)_第3頁(yè)
外文文獻(xiàn)翻譯作業(yè)_第4頁(yè)
外文文獻(xiàn)翻譯作業(yè)_第5頁(yè)
已閱讀5頁(yè),還剩19頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、常熟理工學(xué)院畢業(yè)設(shè)計(jì)(論文)常熟理工學(xué)院計(jì)算機(jī)科學(xué)與工程學(xué)院畢業(yè)設(shè)計(jì)(論文)外文文獻(xiàn)翻譯作業(yè)專(zhuān) 業(yè): 姓 名: 學(xué) 號(hào): 外文出處: 附 件: 1.外文資料翻譯譯文;2.外文原文。附件1:外文資料翻譯譯文計(jì)算機(jī)網(wǎng)絡(luò)新技術(shù)摘要21世紀(jì)是一個(gè)信息時(shí)代的經(jīng)濟(jì),計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)是這個(gè)時(shí)期的代表技術(shù),以非常快的、具創(chuàng)造性得不斷地發(fā)展,并將深入到人民群眾的工作,生活和學(xué)習(xí)中。因此,控制這種技術(shù)看起來(lái)似乎具有很重要的意義?,F(xiàn)在,我主要是采用新技術(shù)的幾種網(wǎng)絡(luò)技術(shù)在現(xiàn)實(shí)生活的應(yīng)用。關(guān)鍵字因特網(wǎng) 數(shù)字證書(shū) 數(shù)字銀包 網(wǎng)格存儲(chǔ) 3G1. 前言互聯(lián)網(wǎng)滿36歲,仍然是一個(gè)進(jìn)展中的工作。36年后在加州大學(xué)洛杉磯分校的計(jì)算機(jī)

2、科學(xué)家使用15英尺的灰色電纜連接兩臺(tái)笨重的電腦,測(cè)試了一種在網(wǎng)絡(luò)上新的數(shù)據(jù)交換的方式,這將最終成為互聯(lián)網(wǎng)依然是一個(gè)在取得進(jìn)展的工作。大學(xué)的研究人員正在試驗(yàn)如何提高網(wǎng)絡(luò)容量和速度。編程人員正在設(shè)法為網(wǎng)頁(yè)注入更多的智能。并正在進(jìn)行重新設(shè)計(jì)網(wǎng)絡(luò)以減少垃圾郵件(垃圾郵件)和安全麻煩的工作。與此同時(shí)威脅織機(jī):批評(píng)人士警告說(shuō),商業(yè),法律和政治壓力可能會(huì)阻礙一些使互聯(lián)網(wǎng)發(fā)展到今天的創(chuàng)新的類(lèi)型。斯蒂芬克羅克和溫頓瑟夫?qū)儆?969年9月2日研究生加入的加州大學(xué)洛杉磯分校斯萊昂蘭羅克教授工程實(shí)驗(yàn)室的團(tuán)體,作為位無(wú)意義的測(cè)試數(shù)據(jù)兩臺(tái)計(jì)算機(jī)之間默默流動(dòng)。到第二年的1月,其他三個(gè)“節(jié)點(diǎn)”加入到了這個(gè)網(wǎng)絡(luò)。然后是電子郵箱

3、,幾年之后,在七十年代后期一個(gè)所謂的核心通信協(xié)議即TCP / IP協(xié)議,在80年代域名系統(tǒng)和在1990年萬(wàn)維網(wǎng)-現(xiàn)在的第二個(gè)最流行的應(yīng)用背后電子郵件出現(xiàn)了?;ヂ?lián)網(wǎng)的擴(kuò)大,超出其最初的軍事和教育領(lǐng)域延伸到了企業(yè)和全球的家庭中。今天,克羅克仍然為互聯(lián)網(wǎng)工作,為協(xié)作設(shè)計(jì)更好的工具。作為互聯(lián)網(wǎng)管理機(jī)構(gòu)的安全委員會(huì)主席,他正試圖保衛(wèi)系統(tǒng)的核心處理免受來(lái)自外部的威脅。他認(rèn)識(shí)到,他幫助建立的互聯(lián)網(wǎng)工作遠(yuǎn)未完成,而這些改變是在商店,以滿足多媒體日益增長(zhǎng)的需求。網(wǎng)絡(luò)供應(yīng)商現(xiàn)唯一的“最佳努力”是在提供的數(shù)據(jù)包上??肆_克說(shuō),需要有更好的保障,以防止跳過(guò)和過(guò)濾現(xiàn)在常見(jiàn)的視頻。瑟夫,現(xiàn)在在MCI公司說(shuō),他希望他建立了有

4、內(nèi)置安全的互聯(lián)網(wǎng)。微軟,雅虎和美國(guó)在線公司,和其他的一些,目前正在努力改進(jìn)網(wǎng)絡(luò),使郵件發(fā)送者可以驗(yàn)證的方式發(fā)送以降低使用虛假地址發(fā)送垃圾郵件。瑟夫說(shuō),現(xiàn)在正在制定許多功能,是不可能立即解決計(jì)算速度慢和互聯(lián)網(wǎng)管道窄,或帶寬問(wèn)題。2. 數(shù)字證書(shū)數(shù)字證書(shū)是數(shù)據(jù)文件用于在互聯(lián)網(wǎng)上確定人的身份及電子資產(chǎn)。它們可以進(jìn)行安全地,加密地在線交流,并經(jīng)常用于保護(hù)網(wǎng)上交易。數(shù)字證書(shū)是由可信任的第三方稱(chēng)為證書(shū)頒發(fā)機(jī)構(gòu)( CA )驗(yàn)證的 。該CA的身份驗(yàn)證是證書(shū)持有人與“標(biāo)志”證書(shū),以證明它沒(méi)有被偽造或以任何方式變?cè)?。?shù)字證書(shū)的新用途數(shù)字證書(shū)是目前用來(lái)為無(wú)線連接提供安全和驗(yàn)證,最新的團(tuán)體之一硬件制造商也使用它們。不久

5、前, VeriSign公司宣布它的Cable Modem認(rèn)證服務(wù),使硬件制造商將數(shù)字證書(shū)嵌入到電纜調(diào)制解調(diào)器中,以幫助防止通過(guò)設(shè)備的克隆的盜版寬帶服務(wù)。使用VeriSign的軟件,硬件制造商可以產(chǎn)生相應(yīng)的密鑰和數(shù)字證書(shū),制造商或有線電視服務(wù)供應(yīng)商可以使用自動(dòng)識(shí)別個(gè)人調(diào)制解調(diào)器。這種驗(yàn)證不僅保護(hù)了現(xiàn)有內(nèi)容和服務(wù)的價(jià)值,而且還定位了有線電視系統(tǒng)運(yùn)營(yíng)商將廣泛地提供一系列新的內(nèi)容,應(yīng)用和增值服務(wù)到市場(chǎng)中。當(dāng)數(shù)字證書(shū)被CA簽署,其所有者可以使用它作為電子護(hù)照,以證明自己的身份。它可以將提交給需要安全訪問(wèn)的網(wǎng)站,網(wǎng)絡(luò)或個(gè)人。身份信息嵌入在證書(shū)中包括持有人的姓名和電子郵件地址,姓名的CA ,序號(hào)和,任何激活

6、碼和到期數(shù)據(jù)證書(shū)或證書(shū)的期望數(shù)據(jù)。當(dāng)一個(gè)用戶(hù)的身份由CA 驗(yàn)證,證書(shū)持有人就可以使用公共的密鑰來(lái)保護(hù)這些數(shù)據(jù)。公共密鑰也聘用證書(shū), Web服務(wù)器使用它確認(rèn)用戶(hù)瀏覽器的一個(gè)網(wǎng)站的真實(shí)性。當(dāng)用戶(hù)想發(fā)送機(jī)密信息到Web服務(wù)器,如在網(wǎng)上交易時(shí)的信用卡號(hào)碼,瀏覽器會(huì)使用公共密鑰在服務(wù)器的數(shù)字證書(shū)上,以驗(yàn)證其身份。公鑰密碼角色公共密鑰是其中二分之一市民加密的一對(duì)密鑰用于密碼,它提供了基礎(chǔ)數(shù)字證書(shū)。 公共密鑰加密使用匹配原則為公共和私人密鑰進(jìn)行加密和解密。這些鑰匙有一個(gè)數(shù)值,被一個(gè)爭(zhēng)奪資訊算法使用,讓用戶(hù)用相應(yīng)的解密密鑰只進(jìn)行只讀操作。一個(gè)人的公共密鑰被其他人用來(lái)加密信息就只是這個(gè)人。當(dāng)他收到的信息的時(shí)候,

7、他可以使用他相應(yīng)的保密的來(lái)解密數(shù)據(jù)。一個(gè)人的公共密鑰可以分散但卻不會(huì)損壞私人鑰匙。 使用數(shù)字證書(shū)的Web服務(wù)器可以使用它的私鑰,以確保只有它可以解密機(jī)密信息然后把它發(fā)送到互聯(lián)網(wǎng)上。Web服務(wù)器的證書(shū)由自簽發(fā)CA證書(shū)驗(yàn)證,用來(lái)確認(rèn)發(fā)行的CA 。 CA證書(shū)是預(yù)先安裝在大多數(shù)主流的Web瀏覽器上,包括Microsoft Internet Explorer和Netscape Navigator。CA證書(shū)告訴用戶(hù),他們?cè)谔峤恍畔⒔o瀏覽器時(shí)是否可以信任Web服務(wù)器證書(shū)。如果Web服務(wù)器證書(shū)的確認(rèn)是有效的,該證書(shū)的公鑰是用來(lái)保證使用安全套接字層( SSL )技術(shù)的服務(wù)器信息。數(shù)字證書(shū)被SSL安全協(xié)議使用,以

8、創(chuàng)造一個(gè)安全的“管”在兩方之間進(jìn)行機(jī)密地溝通。 SSL被用于大多數(shù)主流Web瀏覽器和商業(yè)Web服務(wù)器。3. 數(shù)字銀包-數(shù)字錢(qián)包軟件,使用戶(hù)能夠在網(wǎng)絡(luò)上支付貨物。它擁有信用卡號(hào)碼和其他個(gè)人信息,如送貨地址。一旦輸入后,數(shù)據(jù)自動(dòng)商業(yè)網(wǎng)站填充表單。-當(dāng)使用電子錢(qián)包購(gòu)買(mǎi)物品時(shí),消費(fèi)者不必在每個(gè)站點(diǎn)上都填寫(xiě)訂單表格,因?yàn)樾畔⒁呀?jīng)被存儲(chǔ)和自動(dòng)更新了,并跨越商業(yè)網(wǎng)站進(jìn)入命令領(lǐng)域。消費(fèi)者在使用數(shù)字錢(qián)包時(shí)也有很有利處的,因?yàn)樗麄兊男畔⒂梢患宜綘I(yíng)軟件代碼進(jìn)行加密或保護(hù)。商家處理防止欺詐行為來(lái)獲益。-數(shù)字錢(qián)包是免費(fèi)提供給消費(fèi)者的,他們也比較容易獲得。例如,當(dāng)一個(gè)消費(fèi)者在商家網(wǎng)站作出購(gòu)買(mǎi)時(shí)以處理服務(wù)器端數(shù)字錢(qián)包時(shí),他

9、的類(lèi)型、名稱(chēng)和付款和運(yùn)貨信息就被寫(xiě)入商家自己的表單中。一個(gè)消費(fèi)者年底購(gòu)買(mǎi)時(shí),會(huì)被要求注冊(cè)一個(gè)為今后方便采購(gòu)的他選擇進(jìn)入的一個(gè)用戶(hù)名和密碼的錢(qián)包。用戶(hù)還可以在錢(qián)包供應(yīng)商的網(wǎng)站上收購(gòu)錢(qián)包。-雖然錢(qián)包是免費(fèi)供應(yīng)給消費(fèi)者的,供應(yīng)商會(huì)向商戶(hù)收取錢(qián)包。-數(shù)字錢(qián)包有兩種主要類(lèi)型:客戶(hù)端和服務(wù)器端。在這些地方的錢(qián)包,工作僅在特定的商家網(wǎng)站而和那些商人無(wú)關(guān)。-據(jù)分析家分析,基于客戶(hù)端的數(shù)字錢(qián)包,兩種類(lèi)型的舊錢(qián)包是被廢棄的,因?yàn)樗鼈冃枰脩?hù)下載和安裝軟件。用戶(hù)需要下載應(yīng)用、投入付款和郵寄資料信息。在這一點(diǎn)上,是在用戶(hù)的硬盤(pán)驅(qū)動(dòng)器上進(jìn)行信息的安全保護(hù)和加密。用戶(hù)可以在當(dāng)?shù)乇A艨刂扑男庞每ê蛡€(gè)人信息。 -隨著基于服

10、務(wù)器的錢(qián)包,用戶(hù)填寫(xiě)自己的個(gè)人信息,以及自動(dòng)下載Cookie。 (Cookie是一個(gè)文本文件,其中包含相關(guān)用戶(hù)。)在這種情況下,消費(fèi)者信息駐留在服務(wù)器的一個(gè)金融機(jī)構(gòu)或數(shù)字錢(qián)包供應(yīng)商中,而不是在用戶(hù)的個(gè)人電腦中。-服務(wù)器端錢(qián)包對(duì)商家提供了保證不被欺詐,因?yàn)樗鼈兪褂米C書(shū)來(lái)驗(yàn)證所有締約方的身份。當(dāng)一方當(dāng)事人進(jìn)行交易時(shí),它向其他有關(guān)各方提出證書(shū)。證書(shū)是電子信息的附件用于核實(shí)當(dāng)事人的身份,并提供答復(fù)接收手段的編碼。-此外,持卡人的敏感數(shù)據(jù)通常是存放在一家金融機(jī)構(gòu)中的,因此具有額外的安全感,因?yàn)榻鹑诃h(huán)境中普遍提供最高程度的安全性。-即使提供了方便的網(wǎng)上購(gòu)物錢(qián)包,但尚未普遍使用。-標(biāo)準(zhǔn)是數(shù)字錢(qián)包成敗的關(guān)鍵。

11、-上個(gè)月,一些主要廠商,包括微軟,Sun微系統(tǒng)公司和美國(guó)在線宣布認(rèn)可了新的EMCL要求標(biāo)準(zhǔn),或者說(shuō)是電子商務(wù)建模語(yǔ)言,給網(wǎng)絡(luò)商戶(hù)提供的標(biāo)準(zhǔn)化方式收集電子數(shù)據(jù)的航運(yùn),結(jié)算和付款。4. 網(wǎng)格存儲(chǔ)定義:網(wǎng)格存儲(chǔ),類(lèi)似于網(wǎng)格計(jì)算,是一種新部署和管理分布在多個(gè)存儲(chǔ)系統(tǒng)和網(wǎng)絡(luò)的模式,從而可以有效地利用現(xiàn)有的存儲(chǔ)容量,而不需要一個(gè)大的,集中的交換系統(tǒng)。事實(shí)上,網(wǎng)格是一種網(wǎng)狀網(wǎng)絡(luò),在其中沒(méi)有一個(gè)單一的集中式交換機(jī)或集線器控制路由。網(wǎng)格在尺寸和性能上提供了幾乎無(wú)限的可擴(kuò)展性,因?yàn)樗鼈儧](méi)有受到需要越來(lái)越大的中央交換機(jī)的限制。網(wǎng)格網(wǎng)絡(luò)可以降低生產(chǎn)成本和提高生產(chǎn)可靠行和靈活的結(jié)構(gòu)性。計(jì)算機(jī)網(wǎng)絡(luò)應(yīng)用網(wǎng)格的概念,可以讓我

12、們充分利用現(xiàn)有資源,但在眾多分布式計(jì)算機(jī)中不使用動(dòng)態(tài)分配和釋放的能力的資源,帶寬和處理。一個(gè)計(jì)算網(wǎng)格可以跨地點(diǎn),組織,機(jī)器結(jié)構(gòu)和軟件的界限,提供電力,協(xié)作和信息獲取連接用戶(hù)。大學(xué)和研究設(shè)施使用的是相當(dāng)于從PC , Macintosh電腦和Linux盒中的超級(jí)計(jì)算機(jī)能力的電網(wǎng)建設(shè)。在網(wǎng)格計(jì)算應(yīng)運(yùn)而生之后,在出現(xiàn)有利于分布式數(shù)據(jù)存儲(chǔ)的類(lèi)似模式之前它只是一個(gè)時(shí)間問(wèn)題。大部分企業(yè)的存儲(chǔ)網(wǎng)絡(luò)是建立在核心配置上的,所有的服務(wù)器和存儲(chǔ)設(shè)備連接到一個(gè)單一的中央交換機(jī)。相比之下,網(wǎng)格拓?fù)浣Y(jié)構(gòu),建立與網(wǎng)絡(luò)相互關(guān)聯(lián)的小開(kāi)關(guān),可以大規(guī)模的增加帶寬,并繼續(xù)提供更好的可靠性和更高的性能和連通性。什么是網(wǎng)格存儲(chǔ)?基于現(xiàn)有的

13、和擬議的產(chǎn)品,網(wǎng)格存儲(chǔ)系統(tǒng)應(yīng)包括以下內(nèi)容:模塊化存儲(chǔ)陣列:這些系統(tǒng)使用串行ATA磁盤(pán)連接整個(gè)存儲(chǔ)網(wǎng)絡(luò)。該系統(tǒng)可阻止面向存儲(chǔ)的陣列或網(wǎng)絡(luò)附加存儲(chǔ)網(wǎng)關(guān)和服務(wù)器。通用虛擬層:存儲(chǔ)必須以一個(gè)單一的邏輯資源組織提供給用戶(hù)。數(shù)據(jù)冗余和可用性:數(shù)據(jù)的多個(gè)副本之間應(yīng)該在網(wǎng)格上存在節(jié)點(diǎn),建立冗余的數(shù)據(jù)訪問(wèn)和可用性防止部分的失敗。共同管理:一個(gè)在所有節(jié)點(diǎn)單一的管理水平應(yīng)該涵蓋數(shù)據(jù)的安全性,流動(dòng)和移民,需求的能力和供應(yīng)。簡(jiǎn)體平臺(tái)/管理架構(gòu):由于普通的管理是非常重要的,這些任務(wù)涉及到行政部門(mén)應(yīng)當(dāng)以模塊化的方式組織,允許在網(wǎng)格自動(dòng)發(fā)現(xiàn)新節(jié)點(diǎn),自動(dòng)化卷和文件管理。三個(gè)基本的優(yōu)點(diǎn)應(yīng)用網(wǎng)格拓?fù)浣Y(jié)構(gòu),以存儲(chǔ)網(wǎng)絡(luò)提供了若干好處,

14、包括下列內(nèi)容:可靠性。一個(gè)設(shè)計(jì)良好的網(wǎng)格網(wǎng)絡(luò)是非常堅(jiān)韌的。而不是僅僅在兩個(gè)節(jié)點(diǎn)之間提供兩個(gè)路徑,網(wǎng)格在彼此存儲(chǔ)節(jié)點(diǎn)之間提供了多種途徑。這使得您能夠輕松地服務(wù)和替換發(fā)生故障部件的,對(duì)系統(tǒng)的可用性或宕機(jī)的情況下影響極小。性能。同樣的因素導(dǎo)致的可靠性還可以提高性能。不需要集中開(kāi)關(guān)與許多港口消除潛在的性能瓶頸,并應(yīng)用負(fù)載平衡技術(shù)的多個(gè)路徑為整個(gè)網(wǎng)絡(luò)提供一致的性能??蓴U(kuò)展性。這很容易擴(kuò)大網(wǎng)格網(wǎng)絡(luò),利用廉價(jià)的開(kāi)關(guān),低端口數(shù),以適應(yīng)更多的服務(wù)器,從而提高性能,帶寬和容量。從本質(zhì)上講,網(wǎng)格存儲(chǔ)是一種尺度,而不是行動(dòng),利用相對(duì)廉價(jià)的存儲(chǔ)構(gòu)建模塊。5. 淺談3G3G (第三代)是一個(gè)規(guī)范由國(guó)際電訊聯(lián)盟制定的第三代

15、移動(dòng)通信技術(shù), (模擬蜂窩是第一代,第二個(gè)數(shù)字PCS )。第三代數(shù)字蜂窩技術(shù)增加帶寬承諾:高達(dá)384K比特/秒時(shí),設(shè)備是靜止或以行人速度移動(dòng), 128K的比特/秒的汽車(chē),以及2M比特/秒的固定應(yīng)用。GSM(全球移動(dòng)通信系統(tǒng))是一個(gè)開(kāi)放的,非專(zhuān)有系統(tǒng),是目前在世界各地占主導(dǎo)地位的手機(jī)技術(shù)。采用GSM變化的時(shí)分多址( TDMA )協(xié)議。數(shù)據(jù)是數(shù)字化的,壓縮的,然后用其他兩個(gè)用戶(hù)數(shù)據(jù)流發(fā)出一個(gè)頻道,在其各自時(shí)隙。它可以工作在900 MHz或1800 MHz和1900 - MHz頻率的波段。另一個(gè)是所謂的第二代無(wú)線空中接口的CDMA (碼分多址)。 CDMA是一種形式的復(fù)用,這使得許多信號(hào)占用一個(gè)單一

16、的傳輸通道,優(yōu)化利用現(xiàn)有的帶寬。該技術(shù)用于移動(dòng)電話系統(tǒng)中的800 - MHz和1.9 - GHz的頻帶。目前電路交換的GSM網(wǎng)絡(luò)數(shù)據(jù)以9.6K位/秒或多達(dá)43.2K比特/秒傳輸,使用微分插槽使高速電路交換數(shù)據(jù)( HSCSD )升級(jí)。 GSM的第三代外長(zhǎng),寬帶碼分多址( WCDMA )的使用,提供更高的數(shù)據(jù)傳輸速度??梢灾С指哌_(dá)200比特/秒(局域網(wǎng)接入)或384K比特/秒(廣域接入)WCDMA的移動(dòng)語(yǔ)音,圖像,數(shù)據(jù)和視頻通訊。輸入數(shù)字化的信號(hào),并轉(zhuǎn)交編碼,擴(kuò)頻模式多的頻率范圍。相比于200千赫茲全承運(yùn)人窄帶CDMA技術(shù),運(yùn)營(yíng)商可以在5 MHz的范圍內(nèi)使用。事實(shí)上, 3G技術(shù)同樣適用于所有的標(biāo)準(zhǔn)

17、,目前正在審議,包括美國(guó)的CDMA2000。CDMA2000能夠支持速度為144K比特/秒至200位/秒的移動(dòng)數(shù)據(jù)通信。部署還是處于規(guī)劃階段?;贕SM的分組無(wú)線服務(wù)( GPRS的),在歐洲已經(jīng)非常的受歡迎,現(xiàn)在正在美國(guó)推出。與GPRS ,數(shù)據(jù)流是分為數(shù)據(jù)包的數(shù)據(jù),而不是源源不斷的GSM電路交換網(wǎng)絡(luò)。分組的GPRS提供“永遠(yuǎn)在線”連接,如果他們占據(jù)了通道但不傳輸數(shù)據(jù)或語(yǔ)音則需自付費(fèi)用。GPRS承諾中央移動(dòng)互聯(lián)網(wǎng)的能力,在高達(dá)115K比特/秒提供語(yǔ)音,視頻和用戶(hù)數(shù)據(jù)。在歐洲, GPRS的手機(jī)配備,預(yù)計(jì)在2002年初為大眾市場(chǎng)退出。語(yǔ)音應(yīng)用程序設(shè)計(jì),包括介紹數(shù)據(jù)提供了電話,建設(shè)一個(gè)呼叫流程以及有利

18、的提示和語(yǔ)法。VoiceXML提供一套共同的規(guī)則,作為一個(gè)靈活的基礎(chǔ),但已超出它的設(shè)計(jì)人員創(chuàng)造的適當(dāng)流量和個(gè)性語(yǔ)音的系統(tǒng)。正如對(duì)HTML內(nèi)容進(jìn)行解釋的瀏覽器,并在網(wǎng)上提出,所以VoiceXML必須被介紹所的電話講話,或語(yǔ)音,瀏覽器所理解或解釋。瀏覽器的講話充當(dāng)網(wǎng)關(guān)之間的呼叫和互聯(lián)網(wǎng)連接。它解釋的VoiceXML代碼和管理之間的對(duì)話和語(yǔ)音通話的內(nèi)容位于一個(gè)網(wǎng)站。語(yǔ)音瀏覽器軟件還包括一些呼吁,提出實(shí)時(shí)語(yǔ)音,等同于URL和下載網(wǎng)頁(yè)的音頻互動(dòng)。一個(gè)VoiceXML應(yīng)用程序使用的語(yǔ)音瀏覽器提供了靈活性,有利于使用者和一些模仿者的內(nèi)容提供商。來(lái)電可以使用電話或扶輪社的最新無(wú)線模型獲得相同的服務(wù)。內(nèi)容提供商

19、可以在其設(shè)施或外包選擇定位的講話瀏覽器給應(yīng)用服務(wù)提供商,運(yùn)營(yíng)商或服務(wù)局。作為當(dāng)前的視覺(jué)網(wǎng)絡(luò)模型,權(quán)衡必須權(quán)衡易于實(shí)施,靈活性,成本和其他因素之間的影響。如今,公司正在為基礎(chǔ)的網(wǎng)頁(yè)內(nèi)容建設(shè)的企業(yè)語(yǔ)音,提供電話訪問(wèn)和演講中的數(shù)據(jù)互動(dòng)音頻格式。這些企業(yè)所在國(guó)語(yǔ)音應(yīng)用提供更大的可擴(kuò)展性,可維護(hù)和可支持性,同時(shí)讓內(nèi)容供應(yīng)商專(zhuān)注于核心業(yè)務(wù)。一些明顯的和微妙的因素融合,使網(wǎng)絡(luò)模型的VoiceXML更為突出。許多人認(rèn)為是業(yè)界所廣泛支持的VoiceXML的力量最為明顯。其他因素,如最近在文本語(yǔ)音轉(zhuǎn)換質(zhì)量上的提高意味著信息可以立即在音頻格式上無(wú)時(shí)間和費(fèi)用地記錄聲音。觀察發(fā)展中的網(wǎng)站,很明顯通過(guò)一種內(nèi)容介紹的共同的

20、格式- HTML -推動(dòng)網(wǎng)絡(luò)的增長(zhǎng)。VoiceXML標(biāo)準(zhǔn)秉持類(lèi)似承諾的講話。13附件2:外文原文New Technique of The Computer NetworkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will

21、 go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.keywordsInternet  Digital Certificates   Dig

22、ital Wallets   Grid Storage 3G1. ForewordInternet turns 36, still a work in progress.Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet rema

23、ins a work in progress. University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and security troubles. All the while threats loom: Cri

24、tics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningle

25、ss test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second

26、most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet

27、9;s key oversight body, he is trying to defend the core addressing system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering da

28、ta packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying

29、 to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using spoofed addresses. Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.2.Dig

30、ital Certificates Digital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party know

31、n as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasnt been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless

32、connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services throu

33、gh device cloning. Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers or cable service providers can use to automatically identify individual modems. This ast-mileauthentication not only protects the value of existing co

34、ntent and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market. When a certificate is digitally signed by a CA, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites,

35、 networks or individuals that require secure access. Identifying information embedded in the certificate includes the holder s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When a users identity is verified by the CA, the cert

36、ificate uses the holders public encryption key to protect this data. Public keys are also employed by certificates that a Web server uses to confirm the authenticity of a Web site for a users browser. When a user wants to send confidential information to a Web server, such as a credit-card number fo

37、r an online transaction, the browser will access the public key in the servers digital certificate to verify its identity. Role of Public-Key Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key

38、cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical value thats used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key. A persons public key is used by others to encrypt informatio

39、n meant only for that person. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make su

40、re that only it can decrypt confidential information sent to it over the Internet. The Web servers certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape

41、Navigator. The CA certificate tells users whether they can trust the Web server certificate when its presented to the browser. If the validity of the Web server certificate is affirmed, the certificates public key is used to secure information for the server using Secure Sockets Layer (SSL) technolo

42、gy. Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers. 3. Digital Wallets-A digital wallet is software that enables users to pay for goods on

43、 the Web It holds credit-card numbers and other personal information such as a shipping address Once entered,the data automatically populates order fields at merchant sites -When using a digital wallet,consumers dont need to fill out order forms on each site when they purchase an item because the in

44、formation has already been stored and is automatically updated and entered into the order fields across merchant sites Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code And merchants benefit by receiving protection agains

45、t fraud -Digital wallets are available to consumers free of charge,and theyre fairly easy to obtain For example,when a consumer makes a purchase at a merchant site thats set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchants own form At

46、 the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases Users can also acquire wallets at a wallet vendors site -Although a wallet is free for consumers,vendors charge merchants for wallets -Digital wallets come i

47、n two main types:client-side and server- side Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic -Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to down

48、load and install software A user downloads the wallet application and inputs payment and mailing information At that point,the information is secured and encrypted on the users hard drive The user retains control of his credit card and personal information locally -With a server-based wallet,a user

49、fills out his personal information,and a cookie is automatically downloaded (A cookie is a text file that contains information about the user )In this scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the users PC -Server-sid

50、e wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties When a party makes a transaction,it presents its certificate to the other parties involved A certificate is an attachment to an electronic message used to verify the identity of the

51、 party and to provide the receiver with the means to encode a reply -Furthermore,the cardholders sensitive data is typically housed at a financial institution,so theres an extra sense of security because financial environments generally provide the highest degree of security -But even though wallets

52、 provide easy shopping online, adoption hasnt been widespread -Standards are pivotal to the success of digital wallets -Last month,major vendors,including Microsoft Corp , Sun Microsystems Inc and America Online Inc announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Lan

53、guage,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment.4. Grid Storage Definition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use o

54、f available storage capacity without requiring a large, centralized switching system. A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they arent constrained by the need for ev

55、er-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure. Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and deallocating capacity, bandwidth and processing among num

56、erous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capabil

57、ity from PCs, Macintoshes and Linux boxes. After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to

58、 a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity. What Is Grid Storage? Based on current and proposed products, it appears that a grid storage system should include the following: Modular storage

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論