计算机英语毕业论文

上传人:飞*** 文档编号:30715443 上传时间:2018-01-31 格式:DOC 页数:8 大小:41KB
返回 下载 相关 举报
计算机英语毕业论文_第1页
第1页 / 共8页
计算机英语毕业论文_第2页
第2页 / 共8页
计算机英语毕业论文_第3页
第3页 / 共8页
计算机英语毕业论文_第4页
第4页 / 共8页
计算机英语毕业论文_第5页
第5页 / 共8页
点击查看更多>>
资源描述

《计算机英语毕业论文》由会员分享,可在线阅读,更多相关《计算机英语毕业论文(8页珍藏版)》请在金锄头文库上搜索。

1、计算机英语论文New technique of the computer networkNew technique of the computer networkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go

2、deep into the people#39;s work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.keywordsInternet Digital Certificates Digital Wallets Grid Storage 1. Fore

3、wordInternet turns 36, still a work in progressThirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress. University researchers a

4、re experimenting with ways to increase its capacity andspeed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and security troubles. All the while threats loom: Critics warn that commercial, legal and political pr

5、essures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two comp

6、uters. By January, three other nodes joined the fledgling network. Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web -now the second most popular application behind e-mail -in 1990. The Internet

7、expanded beyond its initial military and educational domain into businesses and homes around the world. Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet#39;s key oversight body, heis trying to defend the core addressin

8、g system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now makeonly best efforts at delivering data packets, and Crocker said better guarantees are needed to prevent the skips

9、 and stutters now common with video. Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated -a way to cut

10、down on junk messages sent using spoofed addresses. Many features being developed today wouldn#39;t have been possible at birth given the slower 2.Digital Certificates Digital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for s

11、ecure, encrypted online communication and are often used to protect online transactions. Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasnt been fo

12、rged or altered in anyway. New Uses For Digital Certificates Digital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication

13、Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning. Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers o

14、r cable service providers can use to automatically identify individual modems. This ast-mileauthentication not only protects the value of existing content and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market. Wh

15、en a certificate is digitally signed by a CA, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access. Identifying information embedded in the certificate includes the holder s name and e-mail address,

16、 the name of the CA, a serial number and any activation or expiration data for the certificate. When a users identity is verified by the CA, the certificate uses the holders public encryption key to protect this data. Public keys are also employed by certificates that a Web server uses to confirmthe authenticity of a Web site for a users browser. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transactio

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 其它办公文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号