局域网毕业论文文献翻译中英文对照.doc
《局域网毕业论文文献翻译中英文对照.doc》由会员分享,可在线阅读,更多相关《局域网毕业论文文献翻译中英文对照.doc(11页珍藏版)》请在三一办公上搜索。
1、 外文资料及中文译文院系名称 信息科学与技术学院 学生姓名 学生学号 _ 200503013098 专业班级 _ 计科03- 7 指导教师 外文资料出处:计算机世界报 第03期 C20A LAN may be created based on a peering or a client-server. Small LANs are of ten created based on a simple peering relationship. Users may share resources and communicate with one another on a peer network,
2、but no single computer controls a peer network, and peer network users do not typically centralize files on one machine. As a rule, peer networks tend to lack organization and adequate security controls.The client-server architecture is usually used for sever controls network access and network reso
3、urces. Clients request resources from the server, and the server provides resources to clients. Servers may range in complexity from mainframes to PCs. Clients may range in complexity from PCs to display to terminals (DTS). Client-Server networks provide strong central security, centralized file org
4、anization and storage, and centralized data preservation. Compared to a peer network, a client-server network requires more centralized and specialized administration.Along with the rapid scientific and technological development, computer use in production as a proportion growing, increasingly play
5、a decisive role in the ministry, the office has computers, greatly facilitate the departments work, another demand gradually reveal themselves. That is the single transmission of information between. Computer networks should be established as soon as possible on the agenda. Establish computer networ
6、ks main purpose is to realize a resource sharing that all network users can enjoy the computer systems of all or part of the resources.LAN are currently used to broadcast the technical basis for Ethernet, any two nodes of communication between the data packet is not only these two nodes by the card
7、receipt, were also at the same Ethernet to the nodes of a network card by the interception, As long as hackers access to the Ethernet nodes for an interception, can capture the Ethernet in the data packet and all its packet analysis solution, thereby stealing critical information, This is the Ethern
8、et inherent security risks. In fact, many on the Internet free of the hacking tools are put Ethernet interception as the most fundamental means. A firewall is a network device that enforces security policy for network traffic. The term originates from firewall, a fireproof wall used as a barrier to
9、prevent the spread of fire. An Internet firewall creates a barrier between separate networks by imposing a point of control that traffic needs to pass before it can reach a different network. A firewall may limit the exposure of hosts to malicious network traffic, e.g., remote adversaries attempting
10、 to exploit security holes in vulnerable applications, by preventing certain packets from entering networks protected by the firewall.When inspecting a network packet, a firewall decides if it should drop or forward the packet. The decision is based on a firewalls security policy and its internal st
11、ate. Before forwarding a packet, a firewall may modify the packets content. Packet inspection may occur at several different layers: (1)The link layer provides physical addressing of devices on the same network. Firewalls operating on the link layer usually drop packets based on the media access con
12、trol (MAC) addresses of communicating hosts. (2)The network layer contains the Internet protocol (IP) headers that support addressing across networks so that hosts not on the same physical network can communicate with each other. (3)The transport layer provides data flows between hosts. On the Inter
13、net, the transmission control protocol (TCP) and the user datagram protocol (UDP) are used for this purpose. Most firewalls operate at the network and transport layer. TCP provides reliable data flow between hosts. UDP is a much simpler but unreliable transport protocol. (4)The application layer con
14、tains application specific protocols like the hypertext transfer protocol (HTTP). Inspection of application specific protocols can be computationally expensive because more data needs to be inspected and more states are required. A firewall is a piece of software or hardware that helps screen out ha
15、ckers, viruses, and worms that try to reach your computer over the Internet. If you are a home user or small-business user, using a firewall is the most effective and important first step you can take to help protect your computer. It is important to have a firewall and antivirus software turned on
16、before you connect to the Internet. If your computer is not protected when you connect to the Internet, hackers can gain access to personal information on your computer. They can install code on your computer that destroys files or causes malfunctions. They can also use your computer to cause proble
17、ms on other home and business computers connected to the Internet. A firewall helps to screen out many kinds of malicious Internet traffic before it reaches your system. Some firewalls can also help to prevent other people from using your computer to attack other computers without your knowledge. Us
18、ing a firewall is important no matter how you connect to the Internet dial-up modem, cable modem, or digital subscriber line (DSL or ADSL). The firewall product main bastion of the mainframe, packet-filtering router, Application Layer Gateway (Proxy), and Circuit Gateway, shielding mainframe firewal
19、ls, and other mainframe-type places. Although the firewall is to protect the network from hacker attacks effective means, but there are clearly inadequate: unable to prevent outside the firewall through other means of attack, not prevent defection from within and not attentive to the customers who b
20、rought the threat, able to completely prevent transmission of the virus has infected software or documents, and can not prevent data-driven attacks. Since 1986 digital companies in the United States to install the Internet world, a commercial fire Wall system, the concept of a firewall after firewal
21、l technology has made rapid development. Dozens of domestic and foreign companies launched the function of the firewall is not the same product range. 5 firewall at the network layer security system at the bottom of belonging to the network layer security technology areas. In this layer, the busines
22、s-to-security system raised of the question: whether all the IP can visit to the enterprises internal network? If the answer is yes, is illustrated in internal network has no network layer take preventive measures. As the internal network and external public network between the first barrier Firewal
23、l is the first by the peoples attention to the network security products in one. Although theoretically, firewall network security at the bottom, the network responsible for the security authentication and transmission, But with network security technology development and application of the network
24、changes, Modern technology has gradually firewall to the network layer other than the safety level, not only to complete the traditional firewall filtering tasks, but also for the various networks to provide the corresponding security services. In addition there is many other firewall products are m
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 局域网 毕业论文 文献 翻译 中英文 对照
链接地址:https://www.31ppt.com/p-4023669.html