版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、常熟理工學院畢業(yè)設計(論文)常熟理工學院計算機科學與工程學院畢業(yè)設計(論文)外文文獻翻譯作業(yè)專 業(yè): 姓 名: 學 號: 外文出處: 附 件: 1.外文資料翻譯譯文;2.外文原文。附件1:外文資料翻譯譯文計算機網(wǎng)絡新技術摘要21世紀是一個信息時代的經(jīng)濟,計算機網(wǎng)絡技術是這個時期的代表技術,以非常快的、具創(chuàng)造性得不斷地發(fā)展,并將深入到人民群眾的工作,生活和學習中。因此,控制這種技術看起來似乎具有很重要的意義?,F(xiàn)在,我主要是采用新技術的幾種網(wǎng)絡技術在現(xiàn)實生活的應用。關鍵字因特網(wǎng) 數(shù)字證書 數(shù)字銀包 網(wǎng)格存儲 3G1. 前言互聯(lián)網(wǎng)滿36歲,仍然是一個進展中的工作。36年后在加州大學洛杉磯分校的計算機
2、科學家使用15英尺的灰色電纜連接兩臺笨重的電腦,測試了一種在網(wǎng)絡上新的數(shù)據(jù)交換的方式,這將最終成為互聯(lián)網(wǎng)依然是一個在取得進展的工作。大學的研究人員正在試驗如何提高網(wǎng)絡容量和速度。編程人員正在設法為網(wǎng)頁注入更多的智能。并正在進行重新設計網(wǎng)絡以減少垃圾郵件(垃圾郵件)和安全麻煩的工作。與此同時威脅織機:批評人士警告說,商業(yè),法律和政治壓力可能會阻礙一些使互聯(lián)網(wǎng)發(fā)展到今天的創(chuàng)新的類型。斯蒂芬克羅克和溫頓瑟夫屬于1969年9月2日研究生加入的加州大學洛杉磯分校斯萊昂蘭羅克教授工程實驗室的團體,作為位無意義的測試數(shù)據(jù)兩臺計算機之間默默流動。到第二年的1月,其他三個“節(jié)點”加入到了這個網(wǎng)絡。然后是電子郵箱
3、,幾年之后,在七十年代后期一個所謂的核心通信協(xié)議即TCP / IP協(xié)議,在80年代域名系統(tǒng)和在1990年萬維網(wǎng)-現(xiàn)在的第二個最流行的應用背后電子郵件出現(xiàn)了。互聯(lián)網(wǎng)的擴大,超出其最初的軍事和教育領域延伸到了企業(yè)和全球的家庭中。今天,克羅克仍然為互聯(lián)網(wǎng)工作,為協(xié)作設計更好的工具。作為互聯(lián)網(wǎng)管理機構的安全委員會主席,他正試圖保衛(wèi)系統(tǒng)的核心處理免受來自外部的威脅。他認識到,他幫助建立的互聯(lián)網(wǎng)工作遠未完成,而這些改變是在商店,以滿足多媒體日益增長的需求。網(wǎng)絡供應商現(xiàn)唯一的“最佳努力”是在提供的數(shù)據(jù)包上??肆_克說,需要有更好的保障,以防止跳過和過濾現(xiàn)在常見的視頻。瑟夫,現(xiàn)在在MCI公司說,他希望他建立了有
4、內(nèi)置安全的互聯(lián)網(wǎng)。微軟,雅虎和美國在線公司,和其他的一些,目前正在努力改進網(wǎng)絡,使郵件發(fā)送者可以驗證的方式發(fā)送以降低使用虛假地址發(fā)送垃圾郵件。瑟夫說,現(xiàn)在正在制定許多功能,是不可能立即解決計算速度慢和互聯(lián)網(wǎng)管道窄,或帶寬問題。2. 數(shù)字證書數(shù)字證書是數(shù)據(jù)文件用于在互聯(lián)網(wǎng)上確定人的身份及電子資產(chǎn)。它們可以進行安全地,加密地在線交流,并經(jīng)常用于保護網(wǎng)上交易。數(shù)字證書是由可信任的第三方稱為證書頒發(fā)機構( CA )驗證的 。該CA的身份驗證是證書持有人與“標志”證書,以證明它沒有被偽造或以任何方式變造。數(shù)字證書的新用途數(shù)字證書是目前用來為無線連接提供安全和驗證,最新的團體之一硬件制造商也使用它們。不久
5、前, VeriSign公司宣布它的Cable Modem認證服務,使硬件制造商將數(shù)字證書嵌入到電纜調(diào)制解調(diào)器中,以幫助防止通過設備的克隆的盜版寬帶服務。使用VeriSign的軟件,硬件制造商可以產(chǎn)生相應的密鑰和數(shù)字證書,制造商或有線電視服務供應商可以使用自動識別個人調(diào)制解調(diào)器。這種驗證不僅保護了現(xiàn)有內(nèi)容和服務的價值,而且還定位了有線電視系統(tǒng)運營商將廣泛地提供一系列新的內(nèi)容,應用和增值服務到市場中。當數(shù)字證書被CA簽署,其所有者可以使用它作為電子護照,以證明自己的身份。它可以將提交給需要安全訪問的網(wǎng)站,網(wǎng)絡或個人。身份信息嵌入在證書中包括持有人的姓名和電子郵件地址,姓名的CA ,序號和,任何激活
6、碼和到期數(shù)據(jù)證書或證書的期望數(shù)據(jù)。當一個用戶的身份由CA 驗證,證書持有人就可以使用公共的密鑰來保護這些數(shù)據(jù)。公共密鑰也聘用證書, Web服務器使用它確認用戶瀏覽器的一個網(wǎng)站的真實性。當用戶想發(fā)送機密信息到Web服務器,如在網(wǎng)上交易時的信用卡號碼,瀏覽器會使用公共密鑰在服務器的數(shù)字證書上,以驗證其身份。公鑰密碼角色公共密鑰是其中二分之一市民加密的一對密鑰用于密碼,它提供了基礎數(shù)字證書。 公共密鑰加密使用匹配原則為公共和私人密鑰進行加密和解密。這些鑰匙有一個數(shù)值,被一個爭奪資訊算法使用,讓用戶用相應的解密密鑰只進行只讀操作。一個人的公共密鑰被其他人用來加密信息就只是這個人。當他收到的信息的時候,
7、他可以使用他相應的保密的來解密數(shù)據(jù)。一個人的公共密鑰可以分散但卻不會損壞私人鑰匙。 使用數(shù)字證書的Web服務器可以使用它的私鑰,以確保只有它可以解密機密信息然后把它發(fā)送到互聯(lián)網(wǎng)上。Web服務器的證書由自簽發(fā)CA證書驗證,用來確認發(fā)行的CA 。 CA證書是預先安裝在大多數(shù)主流的Web瀏覽器上,包括Microsoft Internet Explorer和Netscape Navigator。CA證書告訴用戶,他們在提交信息給瀏覽器時是否可以信任Web服務器證書。如果Web服務器證書的確認是有效的,該證書的公鑰是用來保證使用安全套接字層( SSL )技術的服務器信息。數(shù)字證書被SSL安全協(xié)議使用,以
8、創(chuàng)造一個安全的“管”在兩方之間進行機密地溝通。 SSL被用于大多數(shù)主流Web瀏覽器和商業(yè)Web服務器。3. 數(shù)字銀包-數(shù)字錢包軟件,使用戶能夠在網(wǎng)絡上支付貨物。它擁有信用卡號碼和其他個人信息,如送貨地址。一旦輸入后,數(shù)據(jù)自動商業(yè)網(wǎng)站填充表單。-當使用電子錢包購買物品時,消費者不必在每個站點上都填寫訂單表格,因為信息已經(jīng)被存儲和自動更新了,并跨越商業(yè)網(wǎng)站進入命令領域。消費者在使用數(shù)字錢包時也有很有利處的,因為他們的信息由一家私營軟件代碼進行加密或保護。商家處理防止欺詐行為來獲益。-數(shù)字錢包是免費提供給消費者的,他們也比較容易獲得。例如,當一個消費者在商家網(wǎng)站作出購買時以處理服務器端數(shù)字錢包時,他
9、的類型、名稱和付款和運貨信息就被寫入商家自己的表單中。一個消費者年底購買時,會被要求注冊一個為今后方便采購的他選擇進入的一個用戶名和密碼的錢包。用戶還可以在錢包供應商的網(wǎng)站上收購錢包。-雖然錢包是免費供應給消費者的,供應商會向商戶收取錢包。-數(shù)字錢包有兩種主要類型:客戶端和服務器端。在這些地方的錢包,工作僅在特定的商家網(wǎng)站而和那些商人無關。-據(jù)分析家分析,基于客戶端的數(shù)字錢包,兩種類型的舊錢包是被廢棄的,因為它們需要用戶下載和安裝軟件。用戶需要下載應用、投入付款和郵寄資料信息。在這一點上,是在用戶的硬盤驅動器上進行信息的安全保護和加密。用戶可以在當?shù)乇A艨刂扑男庞每ê蛡€人信息。 -隨著基于服
10、務器的錢包,用戶填寫自己的個人信息,以及自動下載Cookie。 (Cookie是一個文本文件,其中包含相關用戶。)在這種情況下,消費者信息駐留在服務器的一個金融機構或數(shù)字錢包供應商中,而不是在用戶的個人電腦中。-服務器端錢包對商家提供了保證不被欺詐,因為它們使用證書來驗證所有締約方的身份。當一方當事人進行交易時,它向其他有關各方提出證書。證書是電子信息的附件用于核實當事人的身份,并提供答復接收手段的編碼。-此外,持卡人的敏感數(shù)據(jù)通常是存放在一家金融機構中的,因此具有額外的安全感,因為金融環(huán)境中普遍提供最高程度的安全性。-即使提供了方便的網(wǎng)上購物錢包,但尚未普遍使用。-標準是數(shù)字錢包成敗的關鍵。
11、-上個月,一些主要廠商,包括微軟,Sun微系統(tǒng)公司和美國在線宣布認可了新的EMCL要求標準,或者說是電子商務建模語言,給網(wǎng)絡商戶提供的標準化方式收集電子數(shù)據(jù)的航運,結算和付款。4. 網(wǎng)格存儲定義:網(wǎng)格存儲,類似于網(wǎng)格計算,是一種新部署和管理分布在多個存儲系統(tǒng)和網(wǎng)絡的模式,從而可以有效地利用現(xiàn)有的存儲容量,而不需要一個大的,集中的交換系統(tǒng)。事實上,網(wǎng)格是一種網(wǎng)狀網(wǎng)絡,在其中沒有一個單一的集中式交換機或集線器控制路由。網(wǎng)格在尺寸和性能上提供了幾乎無限的可擴展性,因為它們沒有受到需要越來越大的中央交換機的限制。網(wǎng)格網(wǎng)絡可以降低生產(chǎn)成本和提高生產(chǎn)可靠行和靈活的結構性。計算機網(wǎng)絡應用網(wǎng)格的概念,可以讓我
12、們充分利用現(xiàn)有資源,但在眾多分布式計算機中不使用動態(tài)分配和釋放的能力的資源,帶寬和處理。一個計算網(wǎng)格可以跨地點,組織,機器結構和軟件的界限,提供電力,協(xié)作和信息獲取連接用戶。大學和研究設施使用的是相當于從PC , Macintosh電腦和Linux盒中的超級計算機能力的電網(wǎng)建設。在網(wǎng)格計算應運而生之后,在出現(xiàn)有利于分布式數(shù)據(jù)存儲的類似模式之前它只是一個時間問題。大部分企業(yè)的存儲網(wǎng)絡是建立在核心配置上的,所有的服務器和存儲設備連接到一個單一的中央交換機。相比之下,網(wǎng)格拓撲結構,建立與網(wǎng)絡相互關聯(lián)的小開關,可以大規(guī)模的增加帶寬,并繼續(xù)提供更好的可靠性和更高的性能和連通性。什么是網(wǎng)格存儲?基于現(xiàn)有的
13、和擬議的產(chǎn)品,網(wǎng)格存儲系統(tǒng)應包括以下內(nèi)容:模塊化存儲陣列:這些系統(tǒng)使用串行ATA磁盤連接整個存儲網(wǎng)絡。該系統(tǒng)可阻止面向存儲的陣列或網(wǎng)絡附加存儲網(wǎng)關和服務器。通用虛擬層:存儲必須以一個單一的邏輯資源組織提供給用戶。數(shù)據(jù)冗余和可用性:數(shù)據(jù)的多個副本之間應該在網(wǎng)格上存在節(jié)點,建立冗余的數(shù)據(jù)訪問和可用性防止部分的失敗。共同管理:一個在所有節(jié)點單一的管理水平應該涵蓋數(shù)據(jù)的安全性,流動和移民,需求的能力和供應。簡體平臺/管理架構:由于普通的管理是非常重要的,這些任務涉及到行政部門應當以模塊化的方式組織,允許在網(wǎng)格自動發(fā)現(xiàn)新節(jié)點,自動化卷和文件管理。三個基本的優(yōu)點應用網(wǎng)格拓撲結構,以存儲網(wǎng)絡提供了若干好處,
14、包括下列內(nèi)容:可靠性。一個設計良好的網(wǎng)格網(wǎng)絡是非常堅韌的。而不是僅僅在兩個節(jié)點之間提供兩個路徑,網(wǎng)格在彼此存儲節(jié)點之間提供了多種途徑。這使得您能夠輕松地服務和替換發(fā)生故障部件的,對系統(tǒng)的可用性或宕機的情況下影響極小。性能。同樣的因素導致的可靠性還可以提高性能。不需要集中開關與許多港口消除潛在的性能瓶頸,并應用負載平衡技術的多個路徑為整個網(wǎng)絡提供一致的性能??蓴U展性。這很容易擴大網(wǎng)格網(wǎng)絡,利用廉價的開關,低端口數(shù),以適應更多的服務器,從而提高性能,帶寬和容量。從本質(zhì)上講,網(wǎng)格存儲是一種尺度,而不是行動,利用相對廉價的存儲構建模塊。5. 淺談3G3G (第三代)是一個規(guī)范由國際電訊聯(lián)盟制定的第三代
15、移動通信技術, (模擬蜂窩是第一代,第二個數(shù)字PCS )。第三代數(shù)字蜂窩技術增加帶寬承諾:高達384K比特/秒時,設備是靜止或以行人速度移動, 128K的比特/秒的汽車,以及2M比特/秒的固定應用。GSM(全球移動通信系統(tǒng))是一個開放的,非專有系統(tǒng),是目前在世界各地占主導地位的手機技術。采用GSM變化的時分多址( TDMA )協(xié)議。數(shù)據(jù)是數(shù)字化的,壓縮的,然后用其他兩個用戶數(shù)據(jù)流發(fā)出一個頻道,在其各自時隙。它可以工作在900 MHz或1800 MHz和1900 - MHz頻率的波段。另一個是所謂的第二代無線空中接口的CDMA (碼分多址)。 CDMA是一種形式的復用,這使得許多信號占用一個單一
16、的傳輸通道,優(yōu)化利用現(xiàn)有的帶寬。該技術用于移動電話系統(tǒng)中的800 - MHz和1.9 - GHz的頻帶。目前電路交換的GSM網(wǎng)絡數(shù)據(jù)以9.6K位/秒或多達43.2K比特/秒傳輸,使用微分插槽使高速電路交換數(shù)據(jù)( HSCSD )升級。 GSM的第三代外長,寬帶碼分多址( WCDMA )的使用,提供更高的數(shù)據(jù)傳輸速度。可以支持高達200比特/秒(局域網(wǎng)接入)或384K比特/秒(廣域接入)WCDMA的移動語音,圖像,數(shù)據(jù)和視頻通訊。輸入數(shù)字化的信號,并轉交編碼,擴頻模式多的頻率范圍。相比于200千赫茲全承運人窄帶CDMA技術,運營商可以在5 MHz的范圍內(nèi)使用。事實上, 3G技術同樣適用于所有的標準
17、,目前正在審議,包括美國的CDMA2000。CDMA2000能夠支持速度為144K比特/秒至200位/秒的移動數(shù)據(jù)通信。部署還是處于規(guī)劃階段。基于GSM的分組無線服務( GPRS的),在歐洲已經(jīng)非常的受歡迎,現(xiàn)在正在美國推出。與GPRS ,數(shù)據(jù)流是分為數(shù)據(jù)包的數(shù)據(jù),而不是源源不斷的GSM電路交換網(wǎng)絡。分組的GPRS提供“永遠在線”連接,如果他們占據(jù)了通道但不傳輸數(shù)據(jù)或語音則需自付費用。GPRS承諾中央移動互聯(lián)網(wǎng)的能力,在高達115K比特/秒提供語音,視頻和用戶數(shù)據(jù)。在歐洲, GPRS的手機配備,預計在2002年初為大眾市場退出。語音應用程序設計,包括介紹數(shù)據(jù)提供了電話,建設一個呼叫流程以及有利
18、的提示和語法。VoiceXML提供一套共同的規(guī)則,作為一個靈活的基礎,但已超出它的設計人員創(chuàng)造的適當流量和個性語音的系統(tǒng)。正如對HTML內(nèi)容進行解釋的瀏覽器,并在網(wǎng)上提出,所以VoiceXML必須被介紹所的電話講話,或語音,瀏覽器所理解或解釋。瀏覽器的講話充當網(wǎng)關之間的呼叫和互聯(lián)網(wǎng)連接。它解釋的VoiceXML代碼和管理之間的對話和語音通話的內(nèi)容位于一個網(wǎng)站。語音瀏覽器軟件還包括一些呼吁,提出實時語音,等同于URL和下載網(wǎng)頁的音頻互動。一個VoiceXML應用程序使用的語音瀏覽器提供了靈活性,有利于使用者和一些模仿者的內(nèi)容提供商。來電可以使用電話或扶輪社的最新無線模型獲得相同的服務。內(nèi)容提供商
19、可以在其設施或外包選擇定位的講話瀏覽器給應用服務提供商,運營商或服務局。作為當前的視覺網(wǎng)絡模型,權衡必須權衡易于實施,靈活性,成本和其他因素之間的影響。如今,公司正在為基礎的網(wǎng)頁內(nèi)容建設的企業(yè)語音,提供電話訪問和演講中的數(shù)據(jù)互動音頻格式。這些企業(yè)所在國語音應用提供更大的可擴展性,可維護和可支持性,同時讓內(nèi)容供應商專注于核心業(yè)務。一些明顯的和微妙的因素融合,使網(wǎng)絡模型的VoiceXML更為突出。許多人認為是業(yè)界所廣泛支持的VoiceXML的力量最為明顯。其他因素,如最近在文本語音轉換質(zhì)量上的提高意味著信息可以立即在音頻格式上無時間和費用地記錄聲音。觀察發(fā)展中的網(wǎng)站,很明顯通過一種內(nèi)容介紹的共同的
20、格式- HTML -推動網(wǎng)絡的增長。VoiceXML標準秉持類似承諾的講話。13附件2:外文原文New Technique of The Computer NetworkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will
21、 go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.keywordsInternet Digital Certificates Dig
22、ital Wallets Grid Storage 3G1. ForewordInternet turns 36, still a work in progress.Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet rema
23、ins a work in progress. University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and security troubles. All the while threats loom: Cri
24、tics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningle
25、ss test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the second
26、most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet
27、9;s key oversight body, he is trying to defend the core addressing system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering da
28、ta packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying
29、 to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using spoofed addresses. Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.2.Dig
30、ital Certificates Digital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party know
31、n as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasnt been forged or altered in any way. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless
32、connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services throu
33、gh device cloning. Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers or cable service providers can use to automatically identify individual modems. This ast-mileauthentication not only protects the value of existing co
34、ntent and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market. When a certificate is digitally signed by a CA, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites,
35、 networks or individuals that require secure access. Identifying information embedded in the certificate includes the holder s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When a users identity is verified by the CA, the cert
36、ificate uses the holders public encryption key to protect this data. Public keys are also employed by certificates that a Web server uses to confirm the authenticity of a Web site for a users browser. When a user wants to send confidential information to a Web server, such as a credit-card number fo
37、r an online transaction, the browser will access the public key in the servers digital certificate to verify its identity. Role of Public-Key Cryptography The public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates. Public-key
38、cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical value thats used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key. A persons public key is used by others to encrypt informatio
39、n meant only for that person. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use its private key to make su
40、re that only it can decrypt confidential information sent to it over the Internet. The Web servers certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape
41、Navigator. The CA certificate tells users whether they can trust the Web server certificate when its presented to the browser. If the validity of the Web server certificate is affirmed, the certificates public key is used to secure information for the server using Secure Sockets Layer (SSL) technolo
42、gy. Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers. 3. Digital Wallets-A digital wallet is software that enables users to pay for goods on
43、 the Web It holds credit-card numbers and other personal information such as a shipping address Once entered,the data automatically populates order fields at merchant sites -When using a digital wallet,consumers dont need to fill out order forms on each site when they purchase an item because the in
44、formation has already been stored and is automatically updated and entered into the order fields across merchant sites Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code And merchants benefit by receiving protection agains
45、t fraud -Digital wallets are available to consumers free of charge,and theyre fairly easy to obtain For example,when a consumer makes a purchase at a merchant site thats set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchants own form At
46、 the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases Users can also acquire wallets at a wallet vendors site -Although a wallet is free for consumers,vendors charge merchants for wallets -Digital wallets come i
47、n two main types:client-side and server- side Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic -Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to down
48、load and install software A user downloads the wallet application and inputs payment and mailing information At that point,the information is secured and encrypted on the users hard drive The user retains control of his credit card and personal information locally -With a server-based wallet,a user
49、fills out his personal information,and a cookie is automatically downloaded (A cookie is a text file that contains information about the user )In this scenario,the consumer information resides on the server of a financial institution or a digital wallet vendor rather than on the users PC -Server-sid
50、e wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties When a party makes a transaction,it presents its certificate to the other parties involved A certificate is an attachment to an electronic message used to verify the identity of the
51、 party and to provide the receiver with the means to encode a reply -Furthermore,the cardholders sensitive data is typically housed at a financial institution,so theres an extra sense of security because financial environments generally provide the highest degree of security -But even though wallets
52、 provide easy shopping online, adoption hasnt been widespread -Standards are pivotal to the success of digital wallets -Last month,major vendors,including Microsoft Corp , Sun Microsystems Inc and America Online Inc announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Lan
53、guage,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment.4. Grid Storage Definition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use o
54、f available storage capacity without requiring a large, centralized switching system. A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they arent constrained by the need for ev
55、er-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure. Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and deallocating capacity, bandwidth and processing among num
56、erous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capabil
57、ity from PCs, Macintoshes and Linux boxes. After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to
58、 a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity. What Is Grid Storage? Based on current and proposed products, it appears that a grid storage system should include the following: Modular storage
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度汽車零部件技術交易與許可證協(xié)議3篇
- 環(huán)保與經(jīng)濟雙贏農(nóng)村住房墻材的可持續(xù)發(fā)展路徑
- 二零二五年度餐飲店食品安全監(jiān)督協(xié)議3篇
- 2025年度個人借款借條設計及法律風險防控合同3篇
- 2025年度個人股權代持解除條件及補償協(xié)議3篇
- 二零二五年度新能源汽車零部件銷售協(xié)議3篇
- 智能制造技術助力醫(yī)療設備升級換代
- 2025年度漁船買賣合同(含漁港租賃權)3篇
- 二零二五年度彩鋼板生產(chǎn)廢棄物處理合同3篇
- 跨領域合作如何有效探索學生個性化學習路徑
- 音樂劇好看智慧樹知到期末考試答案2024年
- 辦公設備(電腦、一體機、投影機等)采購 投標方案(技術方案)
- 查干淖爾一號井環(huán)評
- 案卷評查培訓課件模板
- 體檢中心分析報告
- 2024年江蘇省樣卷五年級數(shù)學上冊期末試卷及答案
- 波浪理論要點圖解完美版
- 金融交易數(shù)據(jù)分析與風險評估項目環(huán)境敏感性分析
- 牛頓環(huán)與劈尖實驗論文
- 移動商務內(nèi)容運營(吳洪貴)任務四 其他平臺載體的運營方式
- 浙教版科學八年級下冊全冊課件
評論
0/150
提交評論