![2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第1頁](http://file2.renrendoc.com/fileroot_temp3/2021-6/19/87f679d3-5d16-4dbe-95ab-34b91a75629d/87f679d3-5d16-4dbe-95ab-34b91a75629d1.gif)
![2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第2頁](http://file2.renrendoc.com/fileroot_temp3/2021-6/19/87f679d3-5d16-4dbe-95ab-34b91a75629d/87f679d3-5d16-4dbe-95ab-34b91a75629d2.gif)
![2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第3頁](http://file2.renrendoc.com/fileroot_temp3/2021-6/19/87f679d3-5d16-4dbe-95ab-34b91a75629d/87f679d3-5d16-4dbe-95ab-34b91a75629d3.gif)
![2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第4頁](http://file2.renrendoc.com/fileroot_temp3/2021-6/19/87f679d3-5d16-4dbe-95ab-34b91a75629d/87f679d3-5d16-4dbe-95ab-34b91a75629d4.gif)
![2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第5頁](http://file2.renrendoc.com/fileroot_temp3/2021-6/19/87f679d3-5d16-4dbe-95ab-34b91a75629d/87f679d3-5d16-4dbe-95ab-34b91a75629d5.gif)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、 大學(xué)通達(dá)學(xué)院畢業(yè)設(shè)計(論文)外文資料翻譯學(xué)院(系): 學(xué)院 專業(yè): 計算機科學(xué)與技術(shù) 學(xué)生姓名: 班級學(xué)號: 外文出處:internetworking with tcp/ip voll: principles,protocols,and architecture fourth edition附件:1.外文資料翻譯譯文;2.外文原文指導(dǎo)教師評語:指導(dǎo)教師簽名:年月日internet introduction and managementinternet communication has become a fundamental part of life. the world wid web
2、conditions information about such diverse subjects as atmospheric conditions, crop production, stock prices, and airline traffic. groups establish electronic mailing lists shey can share information of common interest. professional colleagues exchange business correspondence electronically, and rela
3、tives exchange personal greetings. unfortunately, most network technologies are designed for a specific purpose. each enterprise chooses hardware technology appropriate for specific communication needs and budget. more important, it is impossible to engineer a universal network from a single network
4、 technology because no single network suffices for all uses. som groups need high-speed networks to connect computers in a single building. low-cos technologies that fill the need cannot span large geographic distances. other groups settle for a slower speed network that connects machines thousands
5、of miles apart. for over two decades, a new technology has evolved that makes it possible to in terconnect many disparate physical networks and make them function as a coordinate unit. the technology, called internetworking, accommodates multiple, diverse underlying hardware technologies by providin
6、g a way to interconnect heterogeneous networksand a set of communication conventions that makes them interoperate. the internet technology hides the details of network hardware, and permits computers to communicate independent of their physical network connections. to appreciate internet technology,
7、 think of how it has changed business. in addition to high-speed communication among employees in the office environment, networking technologies provide instant feedback among the production side of the business, sales and marketing, and customers. as a result, the speed with which business can pla
8、n, implement, assess, and retool has increased; the change is dramatic.the term server applies to any program that offers a service that can be reached a network . a server accepts a request over the network, performs its service, and returns the result to the requester. for the simplest services, e
9、ach request arrives in a ip datagram and the server returns a response in another datagram. an executing program becomes a client when it sends a request to a server and waits for a response. because the client-server model is a convenient and natural extension of interprocess communication on a sin
10、gle machine, it is easy to build programs that use the model to interact. servers can perform simple or complex tasks. for example, a time-of-day server merely returns the current time whenever a client sends the server a packet. a web server receives requests from a browser to fetch a copy of a web
11、 page; the server obtains a copy of the file for the page and returns it to the browser. usually, servers are implemented as application programst. the advantage of implementing servers as application programs is that they can execute on any computing system that supports tcp/ip communication. thus,
12、 the server for a particular service can execute on a timesharing system along with other programs, or it can execute on a personal computer. multiple servers can offer the same service, and can execute on the in fact, managers commonly replicate copies of same machine or on multiple machines. a giv
13、en server onto physically independent machines to increase reliability or improve performance. if a computers primary purpose is support of a particular server program, the term server may be applied to the computer as well as to the server program. thus, one hears statements such as machine a is ou
14、r file server.other groups around the world continue to connect to the internet as well. the most significant change comes not from added network connections, however, but from additional traffic. as new users connect to the internet and new applications appear, traffic patterns change. when physici
15、sts, chemists, and biologists began to use the internet, they exchanged files of data collected from experiments. files of scientific data were large compared to electronic mail messages. as the internet became popular and users began to browse information using services like the world wide web, tra
16、ffic patterns increased again. to accommodate growth in traffic,the capacity of the nsfnet backbone was increased three times.the final version, known as ansnet after the company that supplied it, had a capacity approximately 840 times larger than the original.since 1995,companies known as internet
17、service providers (isps) have each built their own backbone network, many of which have significantly more capacity than the last government-funded backbone. at the current time, it is difficult to foresee an end to the need for more capacity.growth in demands for networking is not unexpected. the c
18、omputer industry has enjoyed a continual demand for increased processing power and larger data storage for many years. users have only begun to understand how to use networks. in the future we can expect continual increases in the demand for communications. soon, for example, tcp/ip technologies wil
19、l be used for telephone and video services.as well as data be needed to accom modate the growth services. thus, higher-capacity communication technologies will be needed to accommodate the growth.properties of the internetthe notion of universal service is important, but it alone does not capture al
20、l the ideas we have in mind for a unified internet because there can be many implementations of universal services. in our design, we want to hide the underlying internet architecture from the user. that is, we do not want to require users or application programs to understand the details of hardwar
21、e interconnections to use the internet. we also do not want to mandate a network interconnection topology. in particular, adding a new network to the internet should not mean connecting to a centralized switching point, nor should it mean adding direct physical connections between the new network an
22、d all existing networks. we want to be able to send data across intermediate networks even though they are not directly connected to the source or destination computers. we want all computers in the internet to share a universal set of machine identifiers (which can be thought of as names or address
23、es). our notion of a unified internet also includes the idea of network independence in the user interface. that is, we want the set of operations used to establish cornrnunication or to transfer data to remain independent of the underlying network technologies and the destination computer. certainl
24、y, a user should not have to understand the network interconnection topology when creating or using application programs that communicate.internet architecturewe have seen how computers connect to individual networks. the question arises, how are networks interconnected to form an internetwork? the
25、answer has two parts. physically, two networks can only be connected by a computer that attaches to both of them. a physical attachment does not provide the interconnection we have in mind, however, because such a connection does not guarantee that the computer will cooperate with other machines tha
26、t wish to communicate. to have a viable internet, we need special computers that are willing to transfer packets from one network to another. computers that interconnect two networks and pass packets from one to the other are called internet gateways or internet routersf. from the users point of vie
27、w, the internet appears to consist of a set of application programs that use the underlying network to carry out useful communication tasks. we use the tern1 interoperability to refer to the ability of diverse computing systems to cooperate in solving computational problems. internet application pro
28、grams exhibit a high degree of interoperability. most users that access the internet do so merely by running application programs without understanding the types of computers being accessed, the tcp/ip technology, the structure of the underlying internet, or even the path the data travels to its des
29、tination; they rely on the application programs and the underlying network software to handle such details. only programmers who write network applica tion programs need to view a tcp/ip internet as a network and need to understand some of the technology. the most popular and widespread internet app
30、lication services include:l world wide web. the web allows users to view documents that contain text and graphics, and to follow hypermedia links from one document to another. the web grew to become the largest source of traffic on the global internet between 1994 and 1995, and continues to dominate
31、. some service providers estimate that the web now accounts for 80% of their internet traffic. l electronic mail (e-mail). electronic mail allows a user to compose a memo and send a copy to individuals or groups. another part of the mail application allows users to read memos that they have received
32、. a recent innovation allows users to include attachments with a mail message that consist of arbitrary files. electronic mail has been so successful that many internet users depend on it for most correspondence. one reason for the popularity of internet e-mail arises from a careful design: the prot
33、ocol makes delivery reliable. not only does the mail system on the senders computer contact the mail system on the receivers computer directly, but the protocol specifies that a message cannot be deleted by the sender until the receiver has successfully placed a copy on permanent storage. l file tra
34、nsfer. the file transfer application allows users to send or receive a copy of a data file. file transfer is one of the oldest, and still among the most heavily used application services in the internet. although small files can now be attached to an e-mail message, the file transfer service is stil
35、l needed to handle arbitrarily large files. the system provides a way to check for authorized users, or even to prevent all access. like mail, file transfer across a tcpap internet is reliable because the two machines involved communicate directly, without relying on intermediate machines to make co
36、pies of the file along the way. l remote login. remote login allows a user sitting at one computer to connect to a remote machine and establish an interactive login session. the remote login makes it appear that a window on the users screen connects directly to the remote machine by sending each key
37、stroke from the users keyboard to the remote machine and displaying each character the remote computer prints in the users window. when the remote login session terminates, the application returns the user to the local system.network-level internet servicesa programmer who creates application progra
38、ms that use tcp/ip protocols has an entirely different view of an internet than a user who merely executes applications like electronic mail.at the network level, an internet provides two broad types of service that all application programs use. while it is unimportant at this time to understand the
39、 details of these services, they cannot be omitted from any overview of tcp/ip: l connectionless packet delivery service. this service, explained in detail throughout the text, forms the basis for all other internet services. connectionless delivery is an abstraction of the service that most packet-
40、switching networks offer. it means simply that a tcpap internet routes small messages from one computer to another based on address information camed in the message. because the connectionless service routes each packet separately, it does not guarantee reliable, in-order delivery. because it usuall
41、y maps directly onto the underlying hardware, the connectionless service is extremely efficient. more important, having connectionless packet delivery as the basis for all internet services makes the tcp/ip protocols adaptable to a wide range of network hardware.l reliable stream transport service.
42、most applications need much more than packet delivery because they require the communication software to recover automatically from transmission errors, lost packets, or failures of intermediate switches along the path between sender and receiver. the reliable transport service handles such problems
43、. it allows an application on one computer to establish a connection with an application on another computer, and then to send a large volume of data across the connection as if it were a permanent, direct hardware connection. underneath, of course, the communication protocols divide the stream of d
44、ata into small messages and send them, one at a time, waiting for the receiver to acknowledge reception. many networks provide basic services similar to those outlined above, so one might wonder what distinguishes tcp/ip services from others. the primary distinuishing features are: l network technol
45、ogy independence. although tcp/ip is based on conventional packet switching technology, it is independent of any particular vendors hardware. the global internet includes a variety of network technologies ranging from networks designed to operate within a single building to those designed to span la
46、rge distances.tcp/ip protocols define the unit of data transmission, called a datagram, and specify how to transmit datagrams on a particular network. l universal interconnection. a tcp/ip internet allows any pair of computers to which it attaches to communicate. each computer is assigned an address
47、 that is universally recognized throughout the internet. every datagram carries the addresses of its source and destination. intermediate switching computers use the destination address to make routing decisions.l end-to-end acknowledgements. the tcp/ip internet protocols provide acknowledgements be
48、tween the original source and ultimate destination instead of between successive machines along the path, even if the source and destination do not connect to a common physical network. l application protocol standarch. in addition to the basic transport-level services (like reliable stream connecti
49、ons), the tcp/ip protocols include standards for many common applications including electronic mail, file transfer, and remote login. thus, when designing application programs that use tcp/ip, programmers often find that existing software provides the communication services they need.in addition to
50、protocols that provide network level services and application programs that use those services, an internet needs software that allows managers to debug problems, control routing, and find computers that violate protocol standards. we refer to such activities as internet management.the level of mana
51、gement protocolsoriginally, many wide area networks included management protocols as part of their link level protocols. if a packet switch began misbehaving, the network manager could instruct a neighboring packet switch to send it a special control packet. control packets caused the receiver to su
52、spend normal operation and respond to commands from the manager. the manager could interrogate the packet switch to identify problems, examine or change routes, test one of the communication interfaces, or reboot the switch. once managers repaired the problem, they could instruct the switch to resum
53、e normal operations. because management tools were part of the lowest level protocol, managers were often able to control switches even if higher level protocols failed. unlike a homogeneous wide area network, a tcpm intemet does not have a single link level protocol. instead, the internet consists
54、of multiple physical networks in tercoected by ip routers. as a result, intemet management differs from network management. first, a single manager can control heterogeneous devices, including ip routers, bridges, modems, workstations, and printers. second, the controlled entities may not share a co
55、mmon link level protocol. third, the set of machines a manager controls may lie at arbitrary points in an internet.in particular, a manager may need to control one or more machines that do not attach to the same physical network as the managers computer. thus, it may not be possible for a manager to
56、 communicate with machines being controlled unless the management software uses protocols that provide end-to-end connectivity across an internet. as a consequence, the internet management protocol used with tcp/ip operates above the transport level: in a tcp/ip internet, a manager needs to examine
57、and control routers and other network devices. because such devices attach to arbitrary networks, protocols for internet management operate at the applica- tion level and communicate using tcp/ip transport-level protocols.designing internet management software to operate at the application level has
58、 several advantages. because the protocols can be designed without regard to the underlying network hardware, one set of protocols can be used for all networks. because the protocols can be designed without regard to the hardware on the managed machine, the same protocols can be used for all managed devices. from a managers point of view, having a single set of management protocols means uniformity - all routers respond to exactly the same set of commands. furthermore, because the manag
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 展覽館裝修終止合同協(xié)議書
- 游輪衛(wèi)生間裝修合同標(biāo)準(zhǔn)
- 工程項目材料運輸合同
- 廣告?zhèn)髅骄娱g服務(wù)協(xié)議
- 無人機領(lǐng)域股權(quán)居間合同
- 達(dá)州市聯(lián)考高一數(shù)學(xué)試卷
- 西藏邊坡綠墻施工方案
- 綠化噴灌系統(tǒng)施工方案
- 蔬菜配送服務(wù)投標(biāo)方案
- ??h民豐渠施工方案
- 傳統(tǒng)運動療法易筋經(jīng)教案5
- GB/T 8014.1-2005鋁及鋁合金陽極氧化氧化膜厚度的測量方法第1部分:測量原則
- 股票基礎(chǔ)知識(入市必讀)-PPT
- eNSP簡介及操作課件
- 公文與公文寫作課件
- 運動技能學(xué)習(xí)與控制課件第七章運動技能的協(xié)調(diào)控制
- 節(jié)后復(fù)工吊籃驗收表格
- 醫(yī)療器械分類目錄2002版
- DB11_T1713-2020 城市綜合管廊工程資料管理規(guī)程
- 氣管套管滑脫急救知識分享
- 壓縮空氣系統(tǒng)管道阻力計算
評論
0/150
提交評論