计算机外文翻译--Internet(完整)
- 格式:pdf
- 大小:231.97 KB
- 文档页数:15
外文原文InternetThe Internet also known as the Net is the world's largest computer network . “ And what is a network”? You may ask. A computer network is basically a bunch of computers booked together somehow. In concept, it's sort of like a radio or TV network that connect a bunch of radio or TV stations.Some computer networks consist of a central computer and a bunch of remote stations that report to it-a central airlinereservation computer, for example, with thousands of terminals at airports and travel agencies. Other, including the Internet, permit any computer on the network to communicate with any other.The Internet is probably the most open network in the world. Thousands of computers provide facilities that are available to anyone who has Net access. This situation is unusual-most networks are very restrictive in what they allow users to do and require a pecific arrangements and passwords for each service. Although a few pay services exist, the vast majority of Internet services are free for the taking , once you connected. If you don't already have access to the Internet through your company, your school, you'll probably have to pay for access to the Internet by using Internet access provider.“How do I get to the Internet?” Well depend ing on your lifestyle, including your job or your school, checking out the Internet can be trivially easy or moderately difficult.(1) ModemA modem is a little device that enables data from one computer to travel to another computer by using ordinary telephone lines. This cute little box goes between your and your phone line and between the phone line and the computer on the other end. modem are built-in to some computer, so if you've not sure whether one is in your computer, ask.If you need to buy a modem, find the cheapest fax modem that runs at 14400hps. You can pay more for things that go faster, but that speed isn't really passed on to you by using your ordinary phone line just now. Make sure that your modem comes with some communications software that's appropriate for the computer and version of operating system you're using .The Internet is out there with tons of exciting things to do, but you have to it through your school or work. The folks who provide access to the Internet (generally for a fee) are called Internet Service Providers.(2) On-lineOn-line service are services provided to you by a computer or computersinteractively. They include but are not limited to computerized banking, shopping, dating, entertainment, and study. They may or may not have anything to do with the Internet, such as CompuServe, existed independently of the Internet. They allowed users to exchange electronic mail among other CompuServe users butfailed to reach out to touch anyone else. Now most of these servicesdo provide e-mail access beyond their insulated client has. This is a far cry, however, from real Internet access and capability.(3) Bulletin boards (BBS)Electronic bulletin board systems (abbreviated as BBS) provide on-line services generally on a smaller scale. Bulletin board system is often local, often very cheap, and sometimes even free to callers. They might provide e-mail, cheating (on-line conversations with other users), forums about special interests, games, ads, and lots, lots more.GatewayThe first question is whether your PC has a native connection to the Internet or whether it goes through some other type of network. If it has a native connection, your PC runs network software that handles the TCP/IP network protocols the Internet uses.The alternative is that your PC is running another kind of network software (most often Novell’s Netware) and is attached to a gateway system that speaks Netware on one side and TCP/IP on the other. It’s also possible to load up both TCP/IP and some other kind of network software on the same PC and run them on the same physical network cables at the same time.If you already have a large Network, your system manager can load up a single Netware gateway that all the other PCs on the network can see. If each PC is to run TCP/IP itself, your network manager has to load TCP/IP on each PC, which is a great deal more work.TCP/IP works better in heterogeneous networks-that is, networks made up of lots of different kinds of computers. Novell Netware is great on networks of PCs and less great on other kinds of computers because Netware at this point works on far fewer kinds of computers than TCP/IP does.Ethernet TokenAssume that your PC runs TCP/IP by itself and not by way of anther kind of network. How is it connect to the rest of the Net? The three major choices are Ethernet, Token Ring, and serial lines. The most common way to hook up PCs to networks is with Ethernet, a kind of network that is fast and cheap but limited to a total distance of less than a mile. (for larger network, a person can hook together several Ethernet network by using devices called bridges and routers.Token RingA few years back, IBM decided that because every other computer manufacturer in the world was using Ethernet, it would avoid the heartache of excessive compatibility by coming up with its own network called Token Ring. Furioustechnical debates raged on about the relative merits of Ethernet and Token Ring, which we can summarize by saying that the differences are 95 percent political. Token Ring uses a clever rectangular connector that has the advantage over many version of Ethernet in that it comes unplugged only when you want it to.The Internet has more than a million computers attached to it. How do you find the one you want? Each machine on the net is identified by a number and a name.Each machine on the net (call a host) has a number assigned to identify it to other hosts, sort of like a phone number. The numbers are in four parts, such as 123.45.67.89.Most hosts also have names, which are much easier to remember than numbers are. The names have multiple parts separated by dots (, for example). Some hosts have more than one name, but it doesn’t matter which of them you use. Each network in the Internet has rules about what kinds of network traffic (e-mail, terminal sessions, and other connections) it allows. You should know the rules that apply to the network (or networks) you use to avoid getting the network managers mail at you.Any computer of any kind, from the smallest to the largest, attached to the Internet is called a host. Some hosts are giant mainframes or supercomputers that provide services to thousands of users; some are little workstations or PCs with one user; and some are specialized computers, like routers, which connect one network to another, or terminal servers. But from the Internet’s point of view, they’re all hosts.Each machine is assigned a host number, which is sort of like a phone number. Being computers, the kind of numbers hosts like are 32-bit binary numbers. For example,10001100101110100101000100000001That’s not very memorable. To make the number slightly easier to remember, it’s broken up into four 8-bit groups, and then each group is translated into a decimal equivalent. So our number turns into140.186.81.1Internet host numbers are also divided into two parts: The first part is the network number, and the second part, the local part, is a host number on that particular network. In the case of our computer, 140.186.81.1 means network number 140.186, and local host number (on that network) 81.1.Because some networks have many more hosts on them than other do, networks are divided into three sizes. In large networks (Class A), the first of the four numbers is the network number, and the last three are the local part. In medium networks (Class B), the first two numbers are the network number, and the last two are the local part. In small networks (Class C), the first three numbers are the network number, and the last is the local part.The first of the four numbers tells you in which class the network is.Frequently, an organization that has a single network number wants to set up its computersinternally on multiple networks. All the computers in a single department, for example, are usually attached together on a single network, with some sort of connection linking together department networks. But adhering to the way the Internet was originally set up would mean that an outfit with 25 internal networks would have to get 25 different network numbers for them.It meant that every time a company set up a new internal network, it had to apply for a new network number. The rest of the Internet world had to put that network number in their tables so that they knew how to route messages to it.Clearly, something had to be done. That something is called a subnet. All that means is that one network can be divided into pieces called subnets. On a subnet, part of what would normally be the host number becomes part of the network number. In network 140.186, for example, the third number in the host number is the subnet number, so for machine 140.186.81.1, the subnet number is 140.186.81, and the host number is 1. This enables plenty of local networks to be installed (we use only 90 of the 254 possible subnets), and as far as the outside world is concerned, there’s still only the single network 140.186 to worry about.In practice, all but the smallest networks are subnet Ted.A few organizations have an opposite problem. They have too many computers for a Class C network, more than 254, but nowhere near enough to justify a Class B. In this case, the organization can get a block of adjacent network numbers and treat part of the network number as a host number, a process called supernetting.Normal people use names, not numbers, so Internet host and usually referred to by name, not by number. To avoid a crisis of naming creativity, the solution was to go to multipart names; a scheme grandly known as the Domain Name system or DNS. Host names are a string of words separated by dots.The rightmost part of a name is called its zone. The three letter zones are set upTwo-letter zone names are organized geographically. Each zone corresponds to a country or Other Political Entity. For example, the country for Canada is CA, so a site at York University in Canada is called nexus, yorku, ca. If you have one or two machines, it’s easier to get a geographic name. If you have more than that, it’s easierto get an organizational name, which lets you administer names within your organization yourself.What the Internet does, basically, is transmit data from one computer to anther. If you want to mail a package to so meone, you write the recipient’s address and your return address on it and mail it. The package is routed from your local post office to a central post office, where it’s then loaded on a truck or a train headed in the right general direction and passed repeatedly from office to office until it gets to the recipient’s post office, at which point the letter carrier delivers it to your door along with the rest of the day’s mail.The Internet work is much closer to how the post office does. Each time a host wants to send a message to another host, the sender sends the message to a host that can forward it. It’s quite common for a pass through a dozen or more forwarders on its way from one part the net to another.The main complaints people have about the post o ffice are that it’s slow and that it loses stuff. The Internet occasionally has both of these problems. In the middle of a busy day, the net can indeed slow down, although the time a message takes to be delivered is still measured in seconds.The various networks on the Internet work in pretty much the same way; They pass data around in chunks called packets, each of which carries the addresses of its sender and its receiver (those host number we talked about earlier). The maximum size of a packet varies from network to network, but it is usually between 200 and 2000 octets.The set of conventions used to pass packets from one host to another is known as the Internet Protocol, or IP.The two best known are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is so widely used that many people refer to TCP/IP, the combination of TCP and IP used by most Internet applications.Three kinds of things pass packets from one network to another: bridges, routers, and gateways.A bridge connects two Network in a way that makes them appear to be a larger network. Bridges are used most commonly to connect two Ethernet local area networks. The bridge looks at all the packets flying by on each of the network is to build a large table listing which hosts are on each network, based on the return addresses on all the packets flying by on each network.A router connects two or more IP (that’s the Internet Protocol) network. The hosts on networks have to be aware that a router is involved, but that’s no probl em for IP networks because one of the rules of is that all host have to be able to talk to routers.A good thing about routers is that they can attach physically different networks, such as a fast, local Ethernet to a slower, long-haul phone line.A bad thing about routers is that they move packets slower than bridges dobecause it requires more calculation to figure out route packets.A gateway splices together two different kinds of protocol. If your network talks IP, for example, and someone else’s netwo rk talks Novell or DECnet or SNA or one of the other dozen Leading Brands of Network, a gateway converts traffic from one set of protocols to another. Gateways are not only specific to particular protocols but also are application-specific.On a time-shared system, users access a computer through terminals. Some terminals are local, lined directly to a computer by cables, while others are remote, communicating with distant computers over telephone lines or other transmission media. Remote computing involves a number of special problems. Let’s investigate.Within a computer, data are represented as discrete electrical pulses-0s and 1s. Since the system’s components are normally within a few feet of each other, these bits can easily bi moved from component to component. However, when we attempt to transmit electrical pulses over a distance, several things happen. First, the signal loses intensity or “dies down” because of the resistance of the wire. At the same time, it picks up interference or noise; the static in the background of a distant radio station is a good example. The signal grows weaker and weaker as it moves away from its source, and the noise becomes more intense until eventually the signal is overwhelmed. If data are to be sent over a distance, the noise must be filtered out and the signal boosted occasionally.Data are often transmitted in context of a carrier signal such as sine wave. One complete “S-on-its-side” pattern is called a cycle. The height of the wave from the lowest to the highest point is its amplitude. The number of cycles per second is the wave’s frequency. Because the carrier signal is transmitted with a known frequency and amplitude, it is possible to design equipment to filter and boost it.How can these wave properties be used to encode and transmit binary data? Simple,Start with a standard wave of known amplitude and frequency, and let each cycle represent a single bit. To transmit a 1-bit, leave the wave alone; to transmit a 0-bit, vary the frequency of one cycle. In other words, a normal cycle represents a 1-bit, and “something else”, a 0-bit. The result is a continuous signal representing a pattern of bits. The data are discrete electrical pulses. The wave is an analog representing the data. We use analogs every day. The height of a column of mercury in a thermometer isn’t the actual-temperature; it represents temperature. The position of a needle on your automobile’s control panel isn’t speed, but represents speed, but represents speed. A continuous wave passing over a comm unication line isn’t the data, but it is analogous to the data.Computers, however, do not store data as continuous waves; they store and manipulate discrete pulses. Because of this electronic incompatibility, whenever data are transmitted between a computer and a remote terminal, they must be converted from pulse form to wave form, and back again. Converting to wave form is called modulation; converting back is called demodulation; the task is performed by ahardware device called a data set or modem (modulator/demodulator). Normally, there is one at each end of a communication line.Many communication lines transmit analog signals because, until recently, we could not economically build equipment to deal with digital signals. Advances in electronics have made digital data transmission not only possible, but common; in fact most new communication facilities are digital. With digital communication, there is no continuous carrier wave. Instead, bits are transmitted as brief, discrete pulses. These digital signals are less affected by noise, so data can be transmitted with greater accuracy.The telephone network is probably the best known data communication medium.A typical voice-grade line is at roughly 2400 bits per second, or 2400 baud. High-speed, wide-band channels can transmit at rates approaching 1 million baud; and several baud rates between these two extremes are available. Microwave data transmission is restricted to a “line of sight”. The earth, as we all known, is round; it curves. This curvature limits the range of microwaves, making expensive relay stations or communication satellites necessary.We could spend considerable time discussing various communication media, but that would be needlessly confusing. Instead, we’ll use a general term, line, to describe any data communication medium.I imagine several terminals linked to a central computer. At the computer’s end, data can be manipulated at speeds approaching several million characters per second.A typical 2400-baud line can transmit roughly 300 characters per second. What about the terminal? Given most people’s typing speed, 10 characters per second is probably an exaggeration. We have a 10-character per second keyboard attached to a 300-character-per second line which, in turn, is linked to a several million-character-per second computer. That’s a quite a range!A butter big enough to hold a transaction or a full data can help to synchronize the terminal and its communication line. As the user types, the characters are stored in the buffer. When typing is completed, the user presses the enter key. In response to this signal, the contents of the buffer are transmitted over the line at the line’s rated speed. On output, data move over the line and enter the buffer. From there they are displayed or printed at the terminal’s rated speed. With a buffer in the middle, the speed disparity between the terminal and the line is bridged.What happens at the other end of the line? A modern transmission control unit, often call a front-end device, is composed of ports and associated buffers. A port is a connection point for a communication line, and usually contains the electronics needed to modulate and demodulate the signal. Data enter the transmission control unit at a rate determined by the communication line, and move into the buffer associated with the “port of entry”. Once all the data are in the buffer, the transmission control unit signals the channel which, in turn, signals the computer are transmitted over a bus line at the computer’s internal process ing speed. On output, data move tothe control unit at computer speed, and are parceled out to the communication lines at much lower speeds.A typical time-shared system involves numerous terminals and communication lines linked to a computer through one or more front-end devices. Just coordinating all that hardware is difficult. Additionally, each terminal may support an independent user accessing an independent program. Data intended for program A are useless to program B; input and output must be routed to specific programs. Often, the operating system controls this hardware/software/data linkage through a process known as polling.Start with a terminal. As data are typed, they enter the terminal’s buffer. Finally, after the last character, the user presses enter. This turns on an electronic switch, marking the terminal “ready”.Now, move inside the computer. The operating system is in control, and has a table listing every active program and its associated terminal. Referring to this table, a polling s ignal is sent to the first program’s terminal. In effect, the signal asks the terminal if it is ready to transmit data. We’ll assume this user is still typing. Since the enter button has not yet been pressed, the ready switch is not on. Thus the operating system moves to the second program’s terminal and issues another polling signal. This one is our terminal, and it’s ready. Thus the transaction is accepted and routed our program.A computer can do nothing without a program, and generating polling signals is no exception that rule. Often , the polling routine is part of the operating system, but having the operating system, but having the operating system generate the signals wastes a great deal of the main processor’s valuable time. An option is giving t he front-end device its own independent processor and assigning it responsibility for polling. On such systems, the front-end processor communicates is not ready, it is ignored until the next polling cycle; if a terminal is ready, its data are transferred into the front-end processor’s buffer.Inside the computer, the operating system (or anther software module called a data communication monitor) must decide which program will get control next. Each program, remember, is associated with a particular will get control next. Each program, remember, is associated with a particular front-end port. If a program’s data have not yet reached its front-end buffer, there is no point giving that program control. Thus the data communication monitor sends its own polling signal to the front-end processor asking, in effect, if data are in a given port’s buffer. If the data have arrived, they are input , and the appropriate application program gets control; If not, the front-end device’s next port is polled. Note that the m ainframe communicates only with the front-end processor, and always at computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the less expensive front-end processor that waits for the slower system components to respond.中文译文InternetInternet,也叫做Net,是世界上最大的计算机网络。
描述计算机因特网的学习英语计算机英语INTERNETThe Internet is a worldwide network of networks which interconnects computers ranging from the simplest personal computers to the mostsophisticated mainframes and supercomputers. Thisnetwork of networks is used for an extraordinary range of purposes -long distance collaborations, retrieving free software and documents,accessing library catalogs, logging in tosupercomputers - the list of current Internet activities and services is large and the range of possible future applications is as unlimited as our imagination.The Internet is huge. No one is exactly sure just how huge, but there are over two million connected computers[1]. Because it is in direct communication with satellites far above us, it couldeven be said that the Internet is already bigger than the Earth. And because the Internet is incredibly complex, there probably isn't a single person who understands everything about it.Remember this if you get confused and you'll probably feel better!WHAT IS AN "INTERNET"An internet note the lower case "i" is a computer network which allows computers with distinctive software and hardware to communicate, or "internetwork"[2]. Many kinds of computers can beconnected to an internet, and each computer can serve a specialized role, allowing an internet to offer a wide variety of services to its users. For example, you could use one internet computerdesigned to perform complex calculations and then send the output to another internet computer designed to display colorful graphs.WHAT IS "THE INTERNET"The Internet is specific kind of internet. In The Internet Passport, the Internet will be defined as the network of networks which follow a set ofrules known as the "Internet Protocol IPsuite".But what does this mean to you? It means that any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP, and that a messagesent from one Internet computer to another will get to the intended destination[3]. From the user's perspective, this works much the way the telephone system works. You can dial from your phoneto any other phone on the system no matter what kind of telephone you have; you only need to know the phone number of the person you want to reach.WHAT IS THE INTERNET USED FORThe Internet contains the electronic equivalents of conference rooms and cafes, libraries and bookstores, post offices and telephones, radio and television stations, newspaper and magazines,and a growing variety of services that have no counterparts in "the real world"[4].Accessing Computer ResourcesNo matter how humble your own computer might be, if it is connected to the Internet you can access the resources of thousands of computers throughout the world. With an Internet connectionyou can:access online library catalogs, w copy computer files or software from archives[5],access databases for teaching or research, w obtain free electronic books,use educational and information services,use directory services to find Internet users, andaccess supercomputer sites.Although the Internet is made up of many diverse computers, together they work like one world-wide computer system.Communicating with Other PeoplePeople communicating with people is the essence of the Internet. Using the Internet you can:exchange electronic mail,find people throughout the world who share your interests, andengage in discussions and collaborations with other Internet users.These services have created a truly global village where people communicate with each other not because they happen to live in the same place, but because they share the same interests. Thissimple fact has profound consequences for everyone no matter where they live.NOTES[1] 这是1996年的数字。
internet基础知识Internet,中文正式译名为因特网,又叫做国际互联网。
它是由那些使用公用语言互相通信的计算机连接而成的全球网络。
以下是由店铺整理关于internet知识的内容,希望大家喜欢!Internet网络起源Internet是在美国早期的军用计算机网ARPANET(阿帕网)的基础上经过不断发展变化而形成的。
Internet的起源主要可分为一下几个阶段。
1、Internet的雏形阶段1969年,美国国防部高级研究计划局(Advance Research Projects Agency,ARPA)开始建立一个命名为ARPANET的网络。
当时建立这个网络的目的是出于军事需要,计划建立一个计算机网络,当网络中的一部分被破坏时,其余网络部分会很快建立起新的联系。
人们普遍认为这就是Internet的雏形。
2、Internet的发展阶段美国国家科学基金会(National Science Foundation,NSF)在1985开始建立计算机网络NSFNET。
NSF规划建立了15个超级计算机中心及国家教育科研网,用于支持科研和教育的全国性规模的NSFNET,并以此作为基础,实现同其他网络的连接。
NSFNET成为Internet上主要用于科研和教育的主干部分,代替了ARPANET的骨干地位。
1989年MILNET(由ARPANET分离出来)实现和NSFNET连接后,就开始采用Internet这个名称。
自此以后,其他部门的计算机网络相继并入Internet,ARPANET就宣告解散了。
3、Internet的商业化阶段20世纪90年代初,商业机构开始进入Internet,使Internet开始了商业化的新进程,成为Internet大发展的强大推动力。
1995年,NSFNET停止运作,Internet已彻底商业化了。
Internet网络原理因特网(Internet)是一组全球信息资源的总汇。
有一种粗略的说法,认为Internet是由于许多小的网络(子网)互联而成的一个逻辑网,每个子网中连接着若干台计算机(主机)。
计算机网络词汇翻译浅析计算机网络已经成为现代社会中不可或缺的一部分,它使得人们可以在世界各地进行信息交流和数据传输。
在进行计算机网络翻译时,我们需要深入理解各种网络术语的含义和用法。
在本文中,我将就一些常见的计算机网络词汇进行浅析,并提供它们的翻译建议。
1. Internet英文原意:a global computer network providing a variety of information and communication facilities翻译建议:互联网解析:互联网是指连接在一起的全球计算机网络系统,提供各种信息和通信服务。
2. Network英文原意:a group or system of interconnected people or things 翻译建议:网络解析:网络是指相互连接在一起的一组或系统,可以包括计算机、设备和人。
3. Router英文原意:a device that forwards data packets between computer networks翻译建议:路由器解析:路由器是一种设备,用于在不同的计算机网络之间转发数据包。
它通常用于将数据从一个网络发送到另一个网络。
4. Ethernet英文原意:a system for connecting a number of computer systems to form a local area network翻译建议:以太网解析:以太网是一种将多台计算机系统连接在一起形成局域网的系统。
5. Firewall英文原意:a network security system that monitors and controls incoming and outgoing network traffic翻译建议:防火墙解析:防火墙是一种网络安全系统,用于监控和控制进出网络的流量。
6. Server英文原意:a computer or computer program that manages access to a centralized resource or service翻译建议:服务器解析:服务器是一台计算机或计算机程序,用于管理对集中资源或服务的访问。
中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。
网络可以根据其多种特点来分类。
计算机网络允许资源和信息在互联设备中共享。
一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。
1957年俄罗斯向太空发射人造卫星。
十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。
然后用阿帕网上的另外一台计算机分享了这个信息。
这一切的负责者是美国博士莱德里尔克。
阿帕网于来于自印度,1969年印度将其名字改为因特网。
上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。
因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。
二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。
共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。
共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。
提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。
共享软件:用户可以连接到远程计算机的网络应用程序。
信息保存。
安全保证。
三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。
以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。
经常部署的设备包括网络集线器、交换机、网桥、路由器。
无线局域网技术是使用无线设备进行连接的。
第一章Internet简介一、何为InternetInternet,中文意思为“因特网”或“国际互联网”。
它将全球成千上万的网络与计算机连接在一起,使人们能够共享这些网络和计算机上的资源。
Internet是目前世界上最大的计算机数字通信网络,是世界最开放的网络系统。
Internet覆盖了全球,只要设备符合要求,遵从共同的通信协议,任何计算机和网络都可以联入Internet。
Internet 是世界范围的信息、资源库。
连接在Internet上的网络和计算机中存储着各式各样的信息,只要通过计算机和通信线路接入Internet,就可以共享Internet上可以共享的软件资源、信息资源,甚至硬件资源。
1.Internet起源Internet起源于1969年美国国防部高级研究项目管理局(ARPA)的一个试验性的网络ARPANET。
这个网络最初由4台计算机连接而成,是美国国防部为完善其通信指挥系统而开发的一个军用网络。
三年之后,全美相继有40个不同的网点连接到ARPANET,为了保证各种网络之间、计算机之间能够互相连通,诞生了TCP/IP协议。
同年在华盛顿召开了第一届国际计算机通信会议,在这次会议上为达成不同计算机网络间的通信协议而成立了一个Internet 网络工作组,负责制定网络通信协议。
1978年,美国军方将Internet的管理权转让给了大学和社会组织,并且将计算机网络通信的核心技术TCP/IP协议公布于世,让任何个人或组织都可以无偿地使用该技术,这一举措极大地促进了Internet在全球范围内的迅速推广和发展。
1989年与Internet相连的主机突破10万台,1992年突破了100万台,短短的五年间主机数量增长了100倍。
目前连接到Internet上的国家和地区已超过150多个,我国于1994年正式加入Internet。
2.Internet的组成Internet是由通信线路、路由器、计算机等硬资源和通信协议、操作系统、应用软件、数据信息等软件源组成。
互联网基础知识手册词一、互联网中文名:互联网,外文名:Internet,定义:电脑相互连接并沟通而成的网络。
起源:美国的阿帕网(ARPANET),开创时间:1969年,互联网域名:.com、 .top、.cn、.cx、.cc等。
释义:互联网(英语:Internet),又称网际网络,或音译因特网(Internet)、英特网,互联网始于1969年美国的阿帕网。
是网络与网络之间所串连成的庞大网络,这些网络以一组通用的协议相连,形成逻辑上的单一巨大国际网络。
通常internet泛指互联网,而Internet则特指因特网。
这种将计算机网络互相联接在一起的方法可称作“网络互联”,在这基础上发展出覆盖全世界的全球性互联网络称互联网,即是互相连接一起的网络结构。
互联网并不等同万维网,万维网只是一建基于超文本相互链接而成的全球性系统,且是互联网所能提供的服务其中之一。
运行原理:计算机网络是由许多计算机组成的,要实现网络的计算机之间传输数据,必须要做两件事,数据传输目的地址和保证数据迅速可靠传输的措施,这是因为数据在传输过程中很容易丢失或传错,Internet使用一种专门的计算机语言(协议),以保证数据安全、可靠地到达指定的目的地,这种语言分两部TCP(Transmission Control Protocol传输控制协议)和IP (Internet Protocol网间协议)sure网络营销理论。
TCP/IP协议的数据传输过程:TCP/IP协议所采用的通信方式是分组交换方式。
所谓分组交换,简单说就是数据在传输时分成若干段,每个数据段称为一个数据包,TCP/IP协议的基本传输单位是数据包,TCP/IP协议主要包括两个主要的协议,即TCP协议和IP 协议,这两个协议可以联合使用,也可以与其他协议联合使用,它们在数据传输过程中主要完成以下功能:1)首先由TCP协议把数据分成若干数据包,给每个数据包写上序号,以便接收端把数据还原成原来的格式。
计算机外⽂翻译(完整)毕业设计(论⽂)外⽂资料翻译专业:计算机科学与技术姓名:王成明学号:06120186外⽂出处:The History of the Internet附件: 1.外⽂原⽂ 2.外⽂资料翻译译⽂;附件1:外⽂原⽂The History of the InternetThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet had no idea of the possibilities of an "Internet."By definition, an 'Internet' is four or more computers connected by a network.ARPAnet achieved its network by using a protocol called TCP/IP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh.By the 80's ARPAnet, just years away from becoming the more well known Internet, had 200 computers. The Defense Department, satisfied with ARPAnets results, decided to fully adopt it into service, and connected many military computers and resources into the network. ARPAnet then had 562 computers on its network. By the year 1984, it had over 1000 computers on its network.In 1986 ARPAnet (supposedly) shut down, but only the organization shut down, and the existing networks still existed between the more than 1000 computers. It shut down due to a failied link up with NSF, who wanted to connect its 5 countywide super computers into ARPAnet.With the funding of NSF, new high speed lines were successfully installed at line speeds of 56k (a normal modem nowadays) through telephone lines in 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were290,000.Another network was built to support the incredible number of people joining. It was constructed in 1992.Today - The InternetToday, the Internet has become one of the most important technological advancements in the history of humanity. Everyone wants to get 'on line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will have Internet access. The Internet has truly become a way of life in our time and era, and is evolving so quickly its hard to determine where it will go next, as computer and network technology improve every day.HOW IT WORKS:It's a standard thing. People using the Internet. Shopping, playing games,conversing in virtual Internet environments.The Internet is not a 'thing' itself. The Internet cannot just "crash." It functions the same way as the telephone system, only there is no Internet company that runs the Internet.The Internet is a collection of millioins of computers that are all connected to each other, or have the means to connect to each other. The Internet is just like an office network, only it has millions of computers connected to it.The main thing about how the Internet works is communication. How does a computer in Houston know how to access data on a computer in Tokyo to view a webpage?Internet communication, communication among computers connected to the Internet, is based on a language. This language is called TCP/IP. TCP/IP establishes a language for a computer to access and transmit data over the Internet system.But TCP/IP assumes that there is a physical connecetion between onecomputer and another. This is not usually the case. There would have to be a network wire that went to every computer connected to the Internet, but that would make the Internet impossible to access.The physical connection that is requireed is established by way of modems,phonelines, and other modem cable connections (like cable modems or DSL). Modems on computers read and transmit data over established lines,which could be phonelines or data lines. The actual hard core connections are established among computers called routers.A router is a computer that serves as a traffic controller for information.To explain this better, let's look at how a standard computer might viewa webpage.1. The user's computer dials into an Internet Service Provider (ISP). The ISP might in turn be connected to another ISP, or a straight connection into the Internet backbone.2. The user launches a web browser like Netscape or Internet Explorer and types in an internet location to go to.3. Here's where the tricky part comes in. First, the computer sends data about it's data request to a router. A router is a very high speed powerful computer running special software. The collection of routers in the world make what is called a "backbone," on which all the data on the Internet is transferred. The backbone presently operates at a speed of several gigabytes per-second. Such a speed compared to a normal modem is like comparing the heat of the sun to the heat of an ice-cube.Routers handle data that is going back and forth. A router puts small chunks of data into packages called packets, which function similarly to envelopes. So, when the request for the webpage goes through, it uses TCP/IP protocols to tell the router what to do with the data, where it's going, and overall where the user wants to go.4. The router sends these packets to other routers, eventually leadingto the target computer. It's like whisper down the lane (only the information remains intact).5. When the information reaches the target web server, the webserver then begins to send the web page back. A webserver is the computer where the webpage is stored that is running a program that handles requests for the webpage and sends the webpage to whoever wants to see it.6. The webpage is put in packets, sent through routers, and arrive at the users computer where the user can view the webpage once it is assembled.The packets which contain the data also contain special information that lets routers and other computers know how to reassemble the data in the right order.With millions of web pages, and millions of users, using the Internet is not always easy for a beginning user, especially for someone who is not entirely comfortale with using computers. Below you can find tips tricks and help on how to use main services of the Internet.Before you access webpages, you must have a web browser to actually be able to view the webpages. Most Internet Access Providers provide you with a web browser in the software they usually give to customers; you. The fact that you are viewing this page means that you have a web browser. The top two use browsers are Netscape Communicator and Microsoft Internet Explorer. Netscape can be found at /doc/bedc387343323968011c9268.html and MSIE can be found at /doc/bedc387343323968011c9268.html /ie.The fact that you're reading this right now means that you have a web browser.Next you must be familiar with actually using webpages. A webpage is a collection of hyperlinks, images, text, forms, menus, and multimedia. To "navigate" a webpage, simply click the links it provides or follow it's own instructions (like if it has a form you need to use, it will probably instruct you how to use it). Basically, everything about a webpage is made to be self-explanetory. That is the nature of a webpage, to be easily navigatable."Oh no! a 404 error! 'Cannot find web page?'" is a common remark made by new web-users.Sometimes websites have errors. But an error on a website is not the user's fault, of course.A 404 error means that the page you tried to go to does not exist. This could be because the site is still being constructed and the page hasn't been created yet, or because the site author made a typo in the page. There's nothing much to do about a 404 error except for e-mailing the site administrator (of the page you wanted to go to) an telling him/her about the error.A Javascript error is the result of a programming error in the Javascript code of a website. Not all websites utilize Javascript, but many do. Javascript is different from Java, and most browsers now support Javascript. If you are using an old version of a web browser (Netscape 3.0 for example), you might get Javascript errors because sites utilize Javascript versions that your browser does not support. So, you can try getting a newer version of your web browser.E-mail stands for Electronic Mail, and that's what it is. E-mail enables people to send letters, and even files and pictures to each other.To use e-mail, you must have an e-mail client, which is just like a personal post office, since it retrieves and stores e-mail. Secondly, you must have an e-mail account. Most Internet Service Providers provide free e-mail account(s) for free. Some services offer free e-mail, like Hotmail, and Geocities.After configuring your e-mail client with your POP3 and SMTP server address (your e-mail provider will give you that information), you are ready to receive mail.An attachment is a file sent in a letter. If someone sends you an attachment and you don't know who it is, don't run the file, ever. It could be a virus or some other kind of nasty programs. You can't get a virus justby reading e-mail, you'll have to physically execute some form of program for a virus to strike.A signature is a feature of many e-mail programs. A signature is added to the end of every e-mail you send out. You can put a text graphic, your business information, anything you want.Imagine that a computer on the Internet is an island in the sea. The sea is filled with millions of islands. This is the Internet. Imagine an island communicates with other island by sending ships to other islands and receiving ships. The island has ports to accept and send out ships.A computer on the Internet has access nodes called ports. A port is just a symbolic object that allows the computer to operate on a network (or the Internet). This method is similar to the island/ocean symbolism above.Telnet refers to accessing ports on a server directly with a text connection. Almost every kind of Internet function, like accessing web pages,"chatting," and e-mailing is done over a Telnet connection.Telnetting requires a Telnet client. A telnet program comes with the Windows system, so Windows users can access telnet by typing in "telnet" (without the "'s) in the run dialog. Linux has it built into the command line; telnet. A popular telnet program for Macintosh is NCSA telnet.Any server software (web page daemon, chat daemon) can be accessed via telnet, although they are not usually meant to be accessed in such a manner. For instance, it is possible to connect directly to a mail server and check your mail by interfacing with the e-mail server software, but it's easier to use an e-mail client (of course).There are millions of WebPages that come from all over the world, yet how will you know what the address of a page you want is?Search engines save the day. A search engine is a very large website that allows you to search it's own database of websites. For instance, if you wanted to find a website on dogs, you'd search for "dog" or "dogs" or "dog information." Here are a few search-engines.1. Altavista (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed2. Yahoo (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed Collection3. Excite (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed4. Lycos (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed5. Metasearch (/doc/bedc387343323968011c9268.html ) - Multiple searchA web spider is a program used by search engines that goes from page to page, following any link it can possibly find. This means that a search engine can literally map out as much of the Internet as it's own time and speed allows for.An indexed collection uses hand-added links. For instance, on Yahoo's site. You can click on Computers & the Internet. Then you can click on Hardware. Then you can click on Modems, etc., and along the way through sections, there are sites available which relate to what section you're in.Metasearch searches many search engines at the same time, finding the top choices from about 10 search engines, making searching a lot more effective.Once you are able to use search engines, you can effectively find the pages you want.With the arrival of networking and multi user systems, security has always been on the mind of system developers and system operators. Since the dawn of AT&T and its phone network, hackers have been known by many, hackers who find ways all the time of breaking into systems. It used to not be that big of a problem, since networking was limited to big corporate companies or government computers who could afford the necessary computer security.The biggest problem now-a-days is personal information. Why should you be careful while making purchases via a website? Let's look at how the internet works, quickly.The user is transferring credit card information to a webpage. Looks safe, right? Not necessarily. As the user submits the information, it is being streamed through a series of computers that make up the Internet backbone.The information is in little chunks, in packages called packets. Here's the problem: While the information is being transferred through this big backbone, what is preventing a "hacker" from intercepting this data stream at one of the backbone points?Big-brother is not watching you if you access a web site, but users should be aware of potential threats while transmitting private information. There are methods of enforcing security, like password protection, an most importantly, encryption.Encryption means scrambling data into a code that can only be unscrambled on the "other end." Browser's like Netscape Communicator and Internet Explorer feature encryption support for making on-line transfers. Some encryptions work better than others. The most advanced encryption system is called DES (Data Encryption Standard), and it was adopted by the US Defense Department because it was deemed so difficult to 'crack' that they considered it a security risk if it would fall into another countries hands.A DES uses a single key of information to unlock an entire document. The problem is, there are 75 trillion possible keys to use, so it is a highly difficult system to break. One document was cracked and decoded, but it was a combined effort of14,000 computers networked over the Internet that took a while to do it, so most hackers don't have that many resources available.附件2:外⽂资料翻译译⽂Internet的历史起源——ARPAnetInternet是被美国政府作为⼀项⼯程进⾏开发的。
简单概述因特⽹(Internet)学习⽬的了解 Internet 的概念,区别因特⽹与互联⽹。
了解 Internet 的基本结构。
了解 Internet 的发展历史。
Internet 概念因特⽹(Internet)是全球性的最具有影响⼒的⼤型,也是世界范围内的信息资源库。
因特⽹本⾝不是⼀种具体的物理⽹络技术,这是为了便于理解⽽加上的⼀种“虚拟”的概念。
因特⽹是把全世界各个地⽅已有的各种⽹络,⽐如计算机⽹络、数据通信⽹以及公⽤电话交换⽹等互连起来,组成⼀个跨越国界范围的庞⼤的互联⽹。
因特⽹是⼀个开放的、互联的、遍及全世界的计算机⽹络系统,Internet 所采⽤的就是,是⼀个使世界上不同类型的计算机交换各类数据的通信媒介。
Internet 结构Internet 是⼀个利⽤路由器将分布在世界各地数以万计的规模不⼀样的计算机⽹络以及计算机互连起来的⽹际⽹。
接⼊ Internet 的主机(计算机)既可以是信息资源以及服务的提供者,也可以是信息资源以及服务的使⽤者。
Internet 发展Internet 的前⾝是美国国防⾼级计划研究署在 1969 年作为军事实验⽹络⽽建⽴的 ARPNet,建⽴的最初只有 4 台主机,采⽤⽹络控制程序(Network Control Program,NCP)作为主机之间的通信协议。
20 世纪 80 年代初期,TCP/IP 协议研制成功并投⼊使⽤。
1985 年,美国国家科学基⾦会(National Science Foundation,NSF)⽤⾼速通信线路把分布在全国的 6 个超级计算机中⼼连接起来构成 NSFNet 并与 ARPNet 相连,形成了⼀个⽀持科研、教育、⾦融等各⽅⾯应⽤的⼴域⽹。
之后,NSFNet 逐步取代APARNet 成为了 Internet 的主⼲⽹。
随着计算机⽹络技术的不断发展,⽹络速度不断提⾼,接⼊的结点不断增多,从⽽形成了现在的 Internet。
Unit 8 puter NetworkingText 1 Data municationsThe end equipmentcan be puters, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission oruses the received digital data. This equipment generally operates digital information internally in word units.DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the munications equipment. The munication equipment is owned and maintained by Telco. Data munications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter.参考译文数据通信终端设备可以是计算机、打印机、键盘、CRT等。
Internet简介Internet(互联网)是指全球范围内相互连通的计算机网络系统的简称。
它是由许多计算机网络互联而成,通过标准化的通信协议来实现数据的传输和信息的交流。
Internet的出现和普及改变了人们的生活方式和社会发展,成为了现代社会信息化的基础。
Internet的历史可以追溯到20世纪60年代初。
当时,美国国防部的高级研究计划局(ARPA)开始了一个名为“阿帕网”的计划,旨在建立一个分散的网络系统,以提高计算机之间的通信能力和抗击核战争的能力。
这个项目奠定了Internet的基础。
它的核心技术之一是分组交换,也就是将数据分成小块进行传输,这种传输方式比较灵活和高效。
随着时间的推移,Internet从一个军事研究项目逐步向学术界和商业领域扩展。
1980年代末,世界各地的大学和研究机构纷纷加入到Internet的网络中。
1990年代,随着Web浏览器的发明和互联网服务提供商(ISP)的兴起,Internet得到了更大范围的普及。
人们可以通过一台连接到Internet的计算机,发送电子邮件、浏览网页、参与在线聊天和进行在线购物等活动。
Internet的结构是分层的,最底层是物理层,即网络的硬件设备,如光纤、无线网络设备等。
其上是数据链路层,负责将数据打包成适合传输的格式。
再上一层是网络层,负责控制数据的传输路线和地址分配。
接下来是传输层,负责确保数据的可靠传输,常用的协议有TCP (传输控制协议)和UDP(用户数据报协议)。
最上层是应用层,包括电子邮件、HTTP(超文本传输协议)、FTP(文件传输协议)等应用程序。
Internet的应用十分广泛。
人们可以通过搜索引擎获得各种信息,如新闻、学术论文、视频等。
社交媒体的兴起使得人们可以方便地与朋友和家人保持联系,并分享照片和生活状态。
网络购物的普及不仅方便了消费者,也促进了电子商务的繁荣。
在线教育和远程办公的模式也得到了广泛应用。
此外,云计算、大数据等技术在Internet的基础上不断发展,推动了数字经济的发展。
THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE(互联网、万维网和电子商务)INTERNET AND WEB(互联网和万维网)Internet(互联网)Launched in 1969 with ARPANET, the Internet consists of the actual physical network made up of wires, cables, and satellites. Being con-nected to this network is often described as be-ing online. 译文:ARPANET在1969年推出,互联网由实际的物理网络包含有无线、电缆和卫星构成的。
被连接到这个网络通常被描述为在线。
Web(万维网)Introduced in 1992 at CERN, the Web provides a multimedia interface to Internet resources.译文:介绍了1992年在欧洲核子研究中心,万维网提供了一个多媒体网络接口资源。
Common Uses(普遍的用途)The most common uses of the Internet and Web include译文:互联网和万维网最普遍的用途包含以下几点●Communication------the most popular Internet activity.译文:通信(交流)——最流行的互联网活动。
●Shopping------one of the fastest-growing Inter-net activities.译文:购物——增长最快的互联网活动之一。
●Searching------access libraries and local, na-tional, and , international news.译文:搜索——访问图书馆和当地、国家及国际的新闻。
毕业设计(论文)外文资料翻译专业:计算机科学与技术姓名:周喜民学号:06120132外文出处:The History of the Internet附件: 1.外文资料翻译译文;2.外文原文。
指导教师评语:签名:2008年4月3日附件1:外文资料翻译译文Internet的历史起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。
这项工程的目的,是为了建立远距离之间点与点的通信,以便处理国家军事范围内的紧急事件,例如核战争。
这项工程被命名为ARPAnet,它就是Internet的前身。
建立此工程的主要应用对象就是军事通讯,那些负责ARPAnet的工程师们当时也没有想到它将成为“Internet”。
根据定义,一个“Internet”应该由四或者更多的计算机连接起来的网络。
ARPAnet是通过一种叫TCP/IP的协议实现连网工作的。
此协议最基础的工作原理是:如果信息在网络中的一条路径发送失败,那么它将找到其他路径进行发送,就好象建立一种语言以便一台计算机与其他计算机“交谈”一样,但不注意它是PC,或是Macintosh。
到了20世纪80年代,ARPAnet已经开始变成目前更为有名的Internet了,它拥有200台在线主机。
国防部很满意ARPAnets的成果,于是决定全力将它培养为能够联系很多军事主机,资源共享的服务网络。
到了1984年,它就已经超过1000台主机在线了。
在1986年ARPAnet关闭了,但仅仅是建立它的机构关闭了,而网络继续存在与超过1000台的主机之间。
由于使用NSF连接失败,ARPAnet才被关闭。
NSF是将5个国家范围内的超级计算机连入ARPAnet。
随着NSF的建立,新的高速的传输介质被成功的使用,在1988年,用户能通过56k的电话线上网。
在那个时候有28,174台主机连入Internet。
到了1989年有80,000台主机连入Internet。
到1989年末,就有290,000台主机连入了。
另外还有其他网络被建立,并支持用户以惊人的数量接入。
于1992年正式建立。
现状——Internet如今,Internet已经成为人类历史上最先进技术的一种。
每个人都想“上网”去体验一下Internet中的信息财富。
成千上百的人都用Internet。
预计,到了2003年世界上的每个人,都将拥有Internet接入。
Internet已经真正成为我们这个年代生活的一部分。
由于计算机技术和网络技术每天都在改变,我们很难想象Internet下一步将发展成什么样子。
工作原理:现在,人们用Internet是一件很平常的事。
他们通过Internet进行购物、玩游戏、聊天等娱乐活动。
Internet不仅仅是一件事物。
Internet也会崩溃。
它的工作原理如同电话通信系统,只不过没有专门的Internet公司来经营Internet。
Internet是成千上万台计算机互相连接的集合。
Internet就像是办公网络一样,不同的是,它有成千上万台计算机相连接。
其中最主要的是Internet是如何进行通信的。
位于Houston的一台计算机是如何通过浏览网页而能与位于Tokyo的计算机进行数据通信的呢?Internet信息,拥有信息的计算机连接到Internet,是基于语言。
这种语言叫做TCP/IP。
TCP/IP建立了一种语言,能使计算机在Internet系统中传送数据。
但是TCP/IP的取得也必须具备两台电脑之间的物理连接。
当然也未必都是这样。
但也必须存在一根网络线将主机与Internet连接起来,但做到这样,还是不可能与Internet连接的。
物理连接要求通过MODEM,电话线和其他类似MODEM的连接(如DSL)来建立。
计算机上的MODEM通过已建立的通信线进行收发数据,通信线可以是电话线或是数据线。
事实上计算机之间建立连接的硬核被成为路由器。
路由器就是计算机中进行信息交互的管理器。
为了更好的对它说明,让我们来看看一台标准的计算机是怎样浏览网页的?1、用户计算机拨号进入ISP。
而此ISP可能还要连接入其他ISP,或是直接进入Internet主干。
2、用户打开网页浏览器如NETSCAPE或是IE。
3、接下来是进入Internet的棘手部分。
首先,用户计算机相路由器发出请求。
路由器是一种高速高效的计算机运行的专门软件。
世界上所有路由的连接便形成了Internet的主干,在这里传送Internet上的所有数据。
目前主干网上的处理速度为每秒几千兆字节。
这样的速度分配到一只MODEM上,就好比太阳光的热量分配到一块冰上的热量一样。
4、路由器发送或接受数据。
它将一小段数据分别打包,形成数据报,就像包裹一样。
因此,当请求网页浏览是,就用TCP/IP协议告诉路由器如何处理这些数据,将这些数据发送去哪里,用户主要想去哪里。
5、路由器将这些数据报发送给其他的路由器,最终转到目标主机上。
就像传耳语的游戏一样(当然,只有完整的信息才能被传送)。
6、当信息到达目标网页的服务器是,服务器就开始将网页信息发送回去。
一台网页服务器,就是网页存储所在的计算机,它能对网页进行编辑,并将它发送给用户。
网页被分成数据报,通过路由器,最终到达用户计算机,这样,用户就能浏览网页了。
数据报中含有相关的数据以及一些必须的信息让路由器或其他计算机知道如何将数据报按正确的顺序重新组装成原始的数据段。
有了成千上万的网页和成千上万的用户,对于初学者来说使用Internet将不再那么容易,尤其是那些不太精通电脑的人。
接下来,你将能找到一些上网的小技巧和使用Internet主要服务的帮助。
在你打开网页之前,你必须有一个网页浏览器用于浏览网页。
大部分网络服务商都会给用户提供一个网络浏览器。
当你在浏览网页时,其实就是在使用浏览器。
目前使用最广泛的网页浏览器是Netscape和MSIE。
Netscape能自动连接到,MSIE能自动连接。
接下来你就必须熟悉如何使用网页。
网页是超链接、图片、文本、表格、按钮以及多媒体的集合。
只需点击网页提供的连接或是按照网页的步骤(比如,如果你需要用网页中的一张表,旁边就会有使用这张表的帮助)做,你就可以进行网上冲浪了。
基本上,网页中的每个元素都可以自我移植。
“哦,不!又是404出错!‘不能找到相关网页’”这是上网初学者中很普通的言论。
有时网站也会出错。
当然网站的错误跟用户的操作没有关系。
404出错意思是你想找的那个网页不存在。
这有可能是因为网站仍在建设中,页面还没有被创建,或者是因为网站的制作者正在对页面进行修改。
当出现404出错时,除了对网站管理发电子邮件,告诉他/她关于出错的问题,就别无他法了。
Javascript出错是由于网站中的Javascript的程序代码出错造成的。
并非所有的网页都使用Javascript,但有很多是用Javascript的。
Javascript不同于JAVA,目前大部分浏览器都支持Javascript。
如果你现在用的是旧版的网页浏览器,那么就有可能出现Javascript出错,那是因为你的浏览器的版本低于站点使用的Javascript版本。
所以,你应该为你的浏览器升级到新的版本。
电子邮件即电子方式的邮件。
电子邮件能使人们互相收发信件,甚至是文件和图片。
要使用电子邮件,那你就必须拥有一个电子邮件客户端,它就像是邮递员,为你收发电子邮件。
其次,你必须有一个电子邮件帐户。
大部分网络服务供应商都会提供给用户一个免费的电子邮件帐户。
有的网站也提供免费的电子邮箱,如Hotmail和Geocities。
配置好电子邮件客户端,包括POP3和SMTP服务器地址(电子邮件供应商会给你相关信息)之后,你就可以准备收邮件了。
附件是与信一起发过来的文件,如果有人发给你带有附件的邮件,但你不知道他是谁,就不要打开那个附件。
它有可能是病毒或是其他恶意的程序。
用户不会通过阅读邮件而被传染病毒,你不得不运行杀毒软件来防止病毒感染。
签名是很多电子邮件程序的一个特征。
签名加在邮件的末尾。
你可以将生动的文本,你职业信息或是其他你喜欢的东西作为签名。
设想在国际互联网中的电脑就像海中的岛屿。
那么海洋中就充满了数百万的岛屿。
这就是国际互联网。
设想岛与岛之间是通过发送和接收船只来联络的。
那么岛屿就有接收和发送船只的港口。
在国际互联网中的电脑有被叫做“港口”的端口。
端口只是一个象征性的对象,它使得电脑能在网络(或是国际互联网)上运转。
这种方法与上面提到的“岛屿、海洋”形象论类似。
远程登陆涉及到在服务器上直接用文本连接来使用端口。
几乎每种互联网活动,如访问网页、聊天、以及发电子邮件都是依托远程登陆来实现的。
远程登陆需要一个远程登陆客户服务器。
远程登陆程序兼容于Windows系统,所以Windows用户可以通过在对话窗口键入telnet(不加's)来接入远程登陆软件。
Linux系统则将它创建在命令行里:键入telnet。
用于Macintosh的普通远程登陆程序是NCSA远程登陆软件。
任何一个服务软件(网页端口监督程序,聊天端口监督程序)都可以通过远程登陆被接入,即使这些软件不经常以这种方法被接入。
举例来说,直接与邮件服务器连接并通过与邮件服务软件交流来校对你的邮件是可能的,但用电子邮件客户服务器却更简单(当然如此)。
世界各地有数百万的网页,那么你如何知道哪个网页的地址是你需要的呢?搜索工具能节约时间。
搜索工具是一个非常庞大的网站,它使你能够搜寻它自有的网站数据库。
举例来说,如果你要找关于“狗”的网站,你可以搜索“狗”或“狗的信息”。
这里有一些搜索引擎:1.Altavista()-Web spider&Indexed2.Yahoo()-Web spider&Indexed Collection3.Excite()-Web spider&Indexed4.Lycos()-Web spider&Indexed5.Metasearch()-Multiple search网络蜘蛛是一种搜索引擎使用的程序,它随着可能找到的任何链接从一个网页到另一个网页。
这意味着只要它自己的时间和速度允许,搜索引擎就能尽可能多地在网络上逐字搜寻信息。
编入索引的收集使用手动附加链接。
比如雅虎网站。
你可以点击“电脑和网络”,再点击“硬件”,然后点击“猫”(调制解调器)等等。
那么通过分类的过程,与你要的类别相关的网站就找到了。
Metasearch同时搜索许多搜索引擎,从十个引擎中找出最上面的搜索结果,使得搜索变得有效很多。
一旦你能够使用搜索引擎,你就能有效的找到你要的网页。
伴随着网络系统和多用户系统时代的来临,安全总是系统开发和系统操作人员考虑的问题。
从美国电报电话公司和它的电话网组建开始,黑客已为许多人所知。