2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第1頁
2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第2頁
2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第3頁
2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第4頁
2895.D游程編碼的設(shè)計及性能研究 外文翻譯_第5頁
已閱讀5頁,還剩5頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、 大學(xué)通達(dá)學(xué)院畢業(yè)設(shè)計(論文)外文資料翻譯學(xué)院(系): 學(xué)院 專業(yè): 計算機科學(xué)與技術(shù) 學(xué)生姓名: 班級學(xué)號: 外文出處:internetworking with tcp/ip voll: principles,protocols,and architecture fourth edition附件:1.外文資料翻譯譯文;2.外文原文指導(dǎo)教師評語:指導(dǎo)教師簽名:年月日internet introduction and managementinternet communication has become a fundamental part of life. the world wid web

2、conditions information about such diverse subjects as atmospheric conditions, crop production, stock prices, and airline traffic. groups establish electronic mailing lists shey can share information of common interest. professional colleagues exchange business correspondence electronically, and rela

3、tives exchange personal greetings. unfortunately, most network technologies are designed for a specific purpose. each enterprise chooses hardware technology appropriate for specific communication needs and budget. more important, it is impossible to engineer a universal network from a single network

4、 technology because no single network suffices for all uses. som groups need high-speed networks to connect computers in a single building. low-cos technologies that fill the need cannot span large geographic distances. other groups settle for a slower speed network that connects machines thousands

5、of miles apart. for over two decades, a new technology has evolved that makes it possible to in terconnect many disparate physical networks and make them function as a coordinate unit. the technology, called internetworking, accommodates multiple, diverse underlying hardware technologies by providin

6、g a way to interconnect heterogeneous networksand a set of communication conventions that makes them interoperate. the internet technology hides the details of network hardware, and permits computers to communicate independent of their physical network connections. to appreciate internet technology,

7、 think of how it has changed business. in addition to high-speed communication among employees in the office environment, networking technologies provide instant feedback among the production side of the business, sales and marketing, and customers. as a result, the speed with which business can pla

8、n, implement, assess, and retool has increased; the change is dramatic.the term server applies to any program that offers a service that can be reached a network . a server accepts a request over the network, performs its service, and returns the result to the requester. for the simplest services, e

9、ach request arrives in a ip datagram and the server returns a response in another datagram. an executing program becomes a client when it sends a request to a server and waits for a response. because the client-server model is a convenient and natural extension of interprocess communication on a sin

10、gle machine, it is easy to build programs that use the model to interact. servers can perform simple or complex tasks. for example, a time-of-day server merely returns the current time whenever a client sends the server a packet. a web server receives requests from a browser to fetch a copy of a web

11、 page; the server obtains a copy of the file for the page and returns it to the browser. usually, servers are implemented as application programst. the advantage of implementing servers as application programs is that they can execute on any computing system that supports tcp/ip communication. thus,

12、 the server for a particular service can execute on a timesharing system along with other programs, or it can execute on a personal computer. multiple servers can offer the same service, and can execute on the in fact, managers commonly replicate copies of same machine or on multiple machines. a giv

13、en server onto physically independent machines to increase reliability or improve performance. if a computers primary purpose is support of a particular server program, the term server may be applied to the computer as well as to the server program. thus, one hears statements such as machine a is ou

14、r file server.other groups around the world continue to connect to the internet as well. the most significant change comes not from added network connections, however, but from additional traffic. as new users connect to the internet and new applications appear, traffic patterns change. when physici

15、sts, chemists, and biologists began to use the internet, they exchanged files of data collected from experiments. files of scientific data were large compared to electronic mail messages. as the internet became popular and users began to browse information using services like the world wide web, tra

16、ffic patterns increased again. to accommodate growth in traffic,the capacity of the nsfnet backbone was increased three times.the final version, known as ansnet after the company that supplied it, had a capacity approximately 840 times larger than the original.since 1995,companies known as internet

17、service providers (isps) have each built their own backbone network, many of which have significantly more capacity than the last government-funded backbone. at the current time, it is difficult to foresee an end to the need for more capacity.growth in demands for networking is not unexpected. the c

18、omputer industry has enjoyed a continual demand for increased processing power and larger data storage for many years. users have only begun to understand how to use networks. in the future we can expect continual increases in the demand for communications. soon, for example, tcp/ip technologies wil

19、l be used for telephone and video services.as well as data be needed to accom modate the growth services. thus, higher-capacity communication technologies will be needed to accommodate the growth.properties of the internetthe notion of universal service is important, but it alone does not capture al

20、l the ideas we have in mind for a unified internet because there can be many implementations of universal services. in our design, we want to hide the underlying internet architecture from the user. that is, we do not want to require users or application programs to understand the details of hardwar

21、e interconnections to use the internet. we also do not want to mandate a network interconnection topology. in particular, adding a new network to the internet should not mean connecting to a centralized switching point, nor should it mean adding direct physical connections between the new network an

22、d all existing networks. we want to be able to send data across intermediate networks even though they are not directly connected to the source or destination computers. we want all computers in the internet to share a universal set of machine identifiers (which can be thought of as names or address

23、es). our notion of a unified internet also includes the idea of network independence in the user interface. that is, we want the set of operations used to establish cornrnunication or to transfer data to remain independent of the underlying network technologies and the destination computer. certainl

24、y, a user should not have to understand the network interconnection topology when creating or using application programs that communicate.internet architecturewe have seen how computers connect to individual networks. the question arises, how are networks interconnected to form an internetwork? the

25、answer has two parts. physically, two networks can only be connected by a computer that attaches to both of them. a physical attachment does not provide the interconnection we have in mind, however, because such a connection does not guarantee that the computer will cooperate with other machines tha

26、t wish to communicate. to have a viable internet, we need special computers that are willing to transfer packets from one network to another. computers that interconnect two networks and pass packets from one to the other are called internet gateways or internet routersf. from the users point of vie

27、w, the internet appears to consist of a set of application programs that use the underlying network to carry out useful communication tasks. we use the tern1 interoperability to refer to the ability of diverse computing systems to cooperate in solving computational problems. internet application pro

28、grams exhibit a high degree of interoperability. most users that access the internet do so merely by running application programs without understanding the types of computers being accessed, the tcp/ip technology, the structure of the underlying internet, or even the path the data travels to its des

29、tination; they rely on the application programs and the underlying network software to handle such details. only programmers who write network applica tion programs need to view a tcp/ip internet as a network and need to understand some of the technology. the most popular and widespread internet app

30、lication services include:l world wide web. the web allows users to view documents that contain text and graphics, and to follow hypermedia links from one document to another. the web grew to become the largest source of traffic on the global internet between 1994 and 1995, and continues to dominate

31、. some service providers estimate that the web now accounts for 80% of their internet traffic. l electronic mail (e-mail). electronic mail allows a user to compose a memo and send a copy to individuals or groups. another part of the mail application allows users to read memos that they have received

32、. a recent innovation allows users to include attachments with a mail message that consist of arbitrary files. electronic mail has been so successful that many internet users depend on it for most correspondence. one reason for the popularity of internet e-mail arises from a careful design: the prot

33、ocol makes delivery reliable. not only does the mail system on the senders computer contact the mail system on the receivers computer directly, but the protocol specifies that a message cannot be deleted by the sender until the receiver has successfully placed a copy on permanent storage. l file tra

34、nsfer. the file transfer application allows users to send or receive a copy of a data file. file transfer is one of the oldest, and still among the most heavily used application services in the internet. although small files can now be attached to an e-mail message, the file transfer service is stil

35、l needed to handle arbitrarily large files. the system provides a way to check for authorized users, or even to prevent all access. like mail, file transfer across a tcpap internet is reliable because the two machines involved communicate directly, without relying on intermediate machines to make co

36、pies of the file along the way. l remote login. remote login allows a user sitting at one computer to connect to a remote machine and establish an interactive login session. the remote login makes it appear that a window on the users screen connects directly to the remote machine by sending each key

37、stroke from the users keyboard to the remote machine and displaying each character the remote computer prints in the users window. when the remote login session terminates, the application returns the user to the local system.network-level internet servicesa programmer who creates application progra

38、ms that use tcp/ip protocols has an entirely different view of an internet than a user who merely executes applications like electronic mail.at the network level, an internet provides two broad types of service that all application programs use. while it is unimportant at this time to understand the

39、 details of these services, they cannot be omitted from any overview of tcp/ip: l connectionless packet delivery service. this service, explained in detail throughout the text, forms the basis for all other internet services. connectionless delivery is an abstraction of the service that most packet-

40、switching networks offer. it means simply that a tcpap internet routes small messages from one computer to another based on address information camed in the message. because the connectionless service routes each packet separately, it does not guarantee reliable, in-order delivery. because it usuall

41、y maps directly onto the underlying hardware, the connectionless service is extremely efficient. more important, having connectionless packet delivery as the basis for all internet services makes the tcp/ip protocols adaptable to a wide range of network hardware.l reliable stream transport service.

42、most applications need much more than packet delivery because they require the communication software to recover automatically from transmission errors, lost packets, or failures of intermediate switches along the path between sender and receiver. the reliable transport service handles such problems

43、. it allows an application on one computer to establish a connection with an application on another computer, and then to send a large volume of data across the connection as if it were a permanent, direct hardware connection. underneath, of course, the communication protocols divide the stream of d

44、ata into small messages and send them, one at a time, waiting for the receiver to acknowledge reception. many networks provide basic services similar to those outlined above, so one might wonder what distinguishes tcp/ip services from others. the primary distinuishing features are: l network technol

45、ogy independence. although tcp/ip is based on conventional packet switching technology, it is independent of any particular vendors hardware. the global internet includes a variety of network technologies ranging from networks designed to operate within a single building to those designed to span la

46、rge distances.tcp/ip protocols define the unit of data transmission, called a datagram, and specify how to transmit datagrams on a particular network. l universal interconnection. a tcp/ip internet allows any pair of computers to which it attaches to communicate. each computer is assigned an address

47、 that is universally recognized throughout the internet. every datagram carries the addresses of its source and destination. intermediate switching computers use the destination address to make routing decisions.l end-to-end acknowledgements. the tcp/ip internet protocols provide acknowledgements be

48、tween the original source and ultimate destination instead of between successive machines along the path, even if the source and destination do not connect to a common physical network. l application protocol standarch. in addition to the basic transport-level services (like reliable stream connecti

49、ons), the tcp/ip protocols include standards for many common applications including electronic mail, file transfer, and remote login. thus, when designing application programs that use tcp/ip, programmers often find that existing software provides the communication services they need.in addition to

50、protocols that provide network level services and application programs that use those services, an internet needs software that allows managers to debug problems, control routing, and find computers that violate protocol standards. we refer to such activities as internet management.the level of mana

51、gement protocolsoriginally, many wide area networks included management protocols as part of their link level protocols. if a packet switch began misbehaving, the network manager could instruct a neighboring packet switch to send it a special control packet. control packets caused the receiver to su

52、spend normal operation and respond to commands from the manager. the manager could interrogate the packet switch to identify problems, examine or change routes, test one of the communication interfaces, or reboot the switch. once managers repaired the problem, they could instruct the switch to resum

53、e normal operations. because management tools were part of the lowest level protocol, managers were often able to control switches even if higher level protocols failed. unlike a homogeneous wide area network, a tcpm intemet does not have a single link level protocol. instead, the internet consists

54、of multiple physical networks in tercoected by ip routers. as a result, intemet management differs from network management. first, a single manager can control heterogeneous devices, including ip routers, bridges, modems, workstations, and printers. second, the controlled entities may not share a co

55、mmon link level protocol. third, the set of machines a manager controls may lie at arbitrary points in an internet.in particular, a manager may need to control one or more machines that do not attach to the same physical network as the managers computer. thus, it may not be possible for a manager to

56、 communicate with machines being controlled unless the management software uses protocols that provide end-to-end connectivity across an internet. as a consequence, the internet management protocol used with tcp/ip operates above the transport level: in a tcp/ip internet, a manager needs to examine

57、and control routers and other network devices. because such devices attach to arbitrary networks, protocols for internet management operate at the applica- tion level and communicate using tcp/ip transport-level protocols.designing internet management software to operate at the application level has

58、 several advantages. because the protocols can be designed without regard to the underlying network hardware, one set of protocols can be used for all networks. because the protocols can be designed without regard to the hardware on the managed machine, the same protocols can be used for all managed devices. from a managers point of view, having a single set of management protocols means uniformity - all routers respond to exactly the same set of commands. furthermore, because the manag

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論