网络工程专业外文翻译--计算机网络
- 格式:doc
- 大小:53.50 KB
- 文档页数:15
计算机网络-局域网(中英文对照)[Local area data networks,normally referred to simply as local area networks or LANs,are used to interconnect distributed communities of computer-based DTEs located within a single building or localized group of buildings.For example,a LAN may be used to interconnect workstations distributed around offices within a single building or a group of buildings such as a university campus.Alternatively,it may be used to interconnect computer-based equipment distributed around a factory or hospital complex[1].Since all the equipment is located within a single establishment,however,LANs are normally installed and maintained by the organization.Hence they are also referred to as private data networks.The main difference between a communication path established using a LAN and a connection made through a public data network is that a LAN normally offers much higher data transmission rates because of the relatively short physical separations involved[2].In the context of the ISO Reference Model for OSI,however,this difference manifests itself only at the lower network dependent layers.In many instances the higher protocol layers in the reference model are the same for both types of network.Before describing the structure and operation of the different types of LAN,it is perhaps helpful to first identify some of the selection issues that must be considered.A summary of some of the these issues is given in Fig. 14-5.It should be stressed that this is only a summary;there are also many possible links between the tips of the branches associated with the figure[3].1.TopologyMost wide area networks,such as the PSTN,use a mesh(sometimes referred to as anetwork)topology.With LANs,however,the limited physical separation of the subscriber DTEs allows simpler topologies to be used.The four topologies in common use are star,bus,ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology, which is a variation of the bus and ring[4].This is shown in Fig. 14-6,sometimes it is called hub/tree topology.2.Transmission mediaTwisted pair,coaxial cable and optical fiber are the three main types of transmission medium used for LANs.3.Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs.They arecarrier-sense-multiple-access with collision detection(CSMA/CD),for bus network topologies,and control token,for use with either bus or ring networks[5].CSMA / CD is used to control multiple-access networks.Each on the network“listens” before attempting to send a message,waiting for the“traffic”to clear[6].If two stations try to send their messages at exactly the same time,a“collision”is detected,an both stations are required to“step back”and try later.Control token is another way of controlling access to a shared transmission medium that is by the use of a control(pertnission)token.This token is passed from one DTE to another according to a defined set of rules understood and adhered to by all DTEs connected to the medium.A DTE may only transmit a frame when it is in possession of the token and,after it has transmined the frame,it passes the token on to allow another DTE to access the tranamission medium.NOTES[1] computer-based是指由计算机控制的,或装有微处理器的。
附录一、英文原文:The NetWorksBirth of the NetThe Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet.In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service.NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business.NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF.How the Web WorksThe World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video.So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information.The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works: Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your webbrowser interprets the data, displaying it on your computer screen.The Louvre's website also has links to the sites of other museums, such as the VaticanMuseum. When you click your mouse on a link, you access the web server for the VaticanMuseum.The "glue" that holds the Web together is called hypertext and hyperlinks. This feature allow electronic files on the Web to be linked so you can easily jump between them. On the Web, you navigate through pages of information based on what interests you at that particular moment, commonly known as browsing or surfing the Net.To access the Web you need web browser software, such as Netscape Navigator or Microsoft Internet Explorer. How does your web browser distinguish between web pages and other files on the Internet? Web pages are written in a computer language called Hypertext Markup Language or HTML.Some Web HistoryThe World Wide Web (WWW) was originally developed in 1990 at CERN, the European Laboratory for Particle Physics. It is now managed by The World Wide Web Consortium, also known as the World Wide Web Initiative.The WWW Consortium is funded by a large number of corporate members, including AT&T, Adobe Systems, Inc., Microsoft Corporation and Sun Microsystems, Inc. Its purpose is to promote the growth of the Web by developing technical specifications and reference software that will be freely available to everyone. The Consortium is run by MIT with INRIA (The French National Institute for Research in Computer Science) acting as European host, in collaboration with CERN.The NationalCenter for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, was instrumental in the development of early graphical software utilizing the World Wide Web features created by CERN. NCSA focuses on improving the productivity of researchers by providing software for scientific modeling, analysis, and visualization. The World Wide Web was an obvious way to fulfill that mission. NCSA Mosaic, one of the earliest web browsers, was distributed free to the public. It led directly to the phenomenal growth of the World Wide Web.Understanding Web AddressesYou can think of the World Wide Web as a network of electronic files stored on computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate these files. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type a URL into your browser or click on a hypertext link, your browser is sending a request to a remote computer to download a file.What does a typical URL look like? Here are some examples:/The home page for study english.ftp:///pub/A directory of files at MIT* available for downloading.news:rec.gardens.rosesA newsgroup on rose gardening.The first part of a URL (before the two slashes* tells you the type of resource or method of access at that address. For example:·http - a hypertext document or directory·gopher - a gopher document or menu·ftp - a file available for downloading or a directory of such files·news - a newsgroup·telnet - a computer system that you can log into over the Internet·WAIS* - a database or document in a Wide Area Information Search database ·file - a file located on a local drive (your hard drive)The second part is typically the address of the computer where the data or service is located. Additional parts may specify the names of files, the port to connect to, or the text to search for in a database.You can enter the URL of a site by typing it into the Location bar of your web browser, just under the toolbar.Most browsers record URLs that you want to use again, by adding them to a special menu. In Netscape Navigator, it's called Bookmarks. In Microsoft Explorer, it's called Favorites. Once you add a URL to your list, you can return to that web page simply by clicking on the name in your list, instead of retyping the entire URL.Most of the URLs you will be using start with http which stands for Hypertext Transfer Protocol*. http is the method by which HTML files are transferred over the Web. Here are some other important things to know about URLs:· A URL usually has no spaces.· A URL always uses forward slashes (//).If you enter a URL incorrectly, your browser will not be able to locate the site or resource you want. Should you get an error message or the wrong site, make sure you typed the address correctly.You can find the URL behind any link by passing your mouse cursor over the link. The pointer will turn into a hand and the URL will appear in the browser's status bar, usually located at the bottom of your screen.Domain NamesWhen you think of the Internet, you probably think of ".com." Just what do those three letters at the end of a World Wide Web address mean?Every computer that hosts data on the Internet has a unique numerical address. For example, the numerical address for the White House is 198.137.240.100. But since few people want to remember long strings of numbers, the Domain Name System (DNS)* was developed. DNS, a critical part of the Internet's technical infrastructure*, correlates* a numerical address to a word. To access the White House website, you could type its number into the address box of your web browser. But most people prefer to use "." In this case, the domain name is .In general, the three-letter domain name suffix* is known as a generic top-level domain and describes the type of organization. In the last few years, the lines have somewhat blurred* between these categories..com - business (commercial).edu - educational.org - non-profit.mil - military.net - network provider.gov - governmentA domain name always has two or more parts separated by dots and typically consists of some form of an organization's name and the three-letter suffix. For example, the domain name for IBM is ""; the United Nations is "."If a domain name is available, and provided it does not infringe* on an existing trademark, anyone can register the name for $35 a year through Network Solutions, Inc., which is authorized to register .com, .net and .org domains. You can use the box below to see if a name is a available. Don't be surprised if the .com name you want is already taken, however. Of the over 8 million domain names, 85% are .com domains.ICANN, the Internet Corporation for Assigned Names and Numbers, manages the Domain Name System. As of this writing, there are plans to add additional top-level domains, such as .web and .store. When that will actually happen is anybody's guess.To check for, or register a domain name, type it into the search box.It should take this form: In addition to the generic top-level domains, 244 national top-level domains were established for countries and territories*, for example:.au - Australia.ca - Canada.fr - France.de - Germany.uk - United KingdomFor US $275 per name, you can also register an international domain name with Net Names. Be aware that some countries have restrictions for registering names.If you plan to register your own domain name, whether it's a .com or not, keep these tips in mind:The shorter the name, the better. (But it should reflect your family name, interest or business.)The name should be easy to remember.It should be easy to type without making mistakes.Remember, the Internet is global. Ideally, a domain name will "read" in a language other than English.Decoding Error MessagesAs you surf the Net, you will undoubtedly find that at times you can't access certain websites. Why, you make wonder? Error messages attempt to explain thereason. Unfortunately, these cryptic* messages baffle* most people. We've deciphered* the most common ones you may encounter.400 - Bad RequestProblem: There's something wrong with the address you entered. You may not be authorized* to access the web page, or maybe it no longer exists.Solution: Check the address carefully, especially if the address is long. Make sure that the slashes are correct (they should be forward slashes) and that all the names are properly spelled. Web addresses are case sensitive, so check that the names are capitalized in your entry as they are in the original reference to the website.401 - UnauthorizedProblem: You can't access a website, because you're not on the guest list, your password is invalid or you have entered your password incorrectly.Solution: If you think you have authorization, try typing your password again. Remember that passwords are case sensitive.403 - ForbiddenProblem: Essentially the same as a 401.Solution: Try entering your password again or move on to another site.404 - Not FoundProblem: Either the web page no longer exists on the server or it is nowhere to be found.Solution: Check the address carefully and try entering it again. You might also see if the site has a search engine and if so, use it to hunt for the document. (It's not uncommon for pages to change their addresses when a website is redesigned.) To get to the home page of the site, delete everything after the domain name and hit the Enter or Return key.503 - Service unavailableProblem: Your Internet service provider (ISP) or your company's Internet connection may be down.Solution: Take a stretch, wait a few minutes and try again. If you still have no luck, phone your ISP or system administrator.Bad file requestProblem: Your web browser may not be able to decipher the online form you want to access. There may also be a technical error in the form.Solution: Consider sending a message to the site's webmaster, providing any technical information you can, such as the browser and version you use.Connection refused by hostProblem: You don't have permission to access the page or your password is incorrect.Solution: Try typing your password again if you think you should have access.Failed DNS lookupProblem: DNS stands for the Domain Name System, which is the system that looks up the name of a website, finds a corresponding number (similar to a phone number), then directs your request to the appropriate web server on the Internet. When the lookup fails, the host server can't be located.Solution: Try clicking on the Reload or Refresh button on your browser toolbar. If this doesn't work, check the address and enter it again. If all else fails, try again later.File contains no dataProblem: The site has no web pages on it.Solution: Check the address and enter it again. If you get the same error message, try again later.Host unavailableProblem: The web server is down.Solution: Try clicking on the Reload or Refresh button. If this doesn't work, try again later.Host unknownProblem: The web server is down, the site may have moved, or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online. If this fails, try using a search engine to find the site. It may have a new address.Network connection refused by the serverProblem: The web server is busy.Solution: Try again in a while.Unable to locate hostProblem: The web server is down or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online.Unable to locate serverProblem: The web server is out-of-business or you may have entered the addressincorrectly.Solution: Check the address and try typing it again.二、英文翻译:网络网络的诞生迄今为止,因特网的历史虽比较简短,但仍然是突破性的。
计算机网络介绍中英文计算机网络基础介绍(英文)AD:Introduction to Computer NetworkComputer network is a system connecting two or more computers. A computer network allows user to exchange data quickly, access and share resources including equipments, application software, and information.Data communications systems are the electronic systems that transmit data over communications lines from one location to another. You might use data communications through your microcomputer to send information to a friend using another computer. You might work for an organization whose computer system is spread throughout a building, or even throughout the country or world. That is, all the parts—input and output units, processor, and storage devices—are in different places and linked by communications. Or you might use telecommunications lines—telephone lines—to tap into information located in an outside data bank. You could then transmit it to your microcomputer for your own reworking and analysis.To attach to a network, a special-purpose hardware component is used to handle all the transmission. The hardware is called a network adapter card or network interface card (NIC), it is a printed circuit board plugged into a computer's bus, and a cable connects it to a network medium.Communications networks differ in geographical size. There are three important types: LANs, MANs, and WANs.Local Area Networks Networks with computers andperipheral devices in close physical proximity—within the same building, for instance—are called local area networks (LANs). Linked by cable-telephone, coaxial, or fiber optic. LANs often use a bus form organization. In a LAN, people can share different equipments, which lower the cost of equipments. LAN may be linked to other LANs or to larger networks by using a network gateway. With the gateway, one LAN may be connected to the LAN of another LAN of another office group. It may also be connected to others in the wide world, even if their configurations are different. Alternatively, a network bridge would be used to connect networks with the same configurations.There is a newly development for LANs: WLAN. A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air, minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs.Over the recent several years, WLANs have gained strong popularity in a number of vertical markets, including the health-care, retail, manufacturing, warehousing, and academic arenas.These industries have profited from the productivity gains of using hand-held terminals and notebook computers to transmit real-time information to centralized hosts for processing. Today WLANs are becoming more widely recognized as a general-purpose connectivity alternative for a broad range of business customers.Applications for Wireless LANs Wireless LANs frequently augment rather than replace wired LAN networks—oftenproviding the final few meters of connectivity between a backbone network and the mobile user. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:●Doctors and nurses in hospitals are more productive because hand-held or notebook computers with wireless LAN capability deliver patient information instantly.●Consulting or accounting audit engagement teams or small workgroups increase productivity with quick network setup.●Network managers in dynamic environments minimize the overhead of moves, adds, and changes with wireless LANs, thereby reducing the cost of LAN ownership.●Training sites at corporations and students at universities use wireless connectivity to facilitate access to information, information exchanges, and learning.●Network managers installing networked computers in older buildings find that wireless LANs are a cost-effective network infrastructure solution.●Retail store owners use wireless networks to simply frequent network reconfiguration.●Trade show and branch office workers minimize setup requirements by installing preconfigured wireless LANs needing no local MIS support.●Warehouse workers use wireless LANs to exchange information with central databases and increase their productivity.●Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks.●Senior executives in conference rooms make quickerdecisions because they have real-time information at their fingertips.The increasingly mobile user also becomes a clear candidate for a wireless LAN. Portable access to wireless networks can be achieved using laptop computers and wireless NICs. This enables the user to travel to various locations–meeting rooms, hallways, lobbies, cafeterias, classrooms, etc.–and still have access to their networked data. Without wireless access, the user would have to carry clumsy cabling and find a network tap to plug into.Metropolitan Area Networks These networks are used as links between office buildings in a city. Cellular phone systems expand the flexibility of MAN by allowing links to car phones and portable phones.Wide Area Networks Wide area networks are countrywide and worldwide networks. Among other kinds of channels, they use microwave relays and satellites to reach users over long distances. One of the most widely used WANs is Internet, which allows users to connect to other users and facilities worldwide.计算机网络基础介绍(译文)计算机网络是连接两个或多个计算机的系统,它允许用户快速地交换数据,访问和共享包括设备、应用软件和信息在内的资源。
计算机网络词汇翻译浅析计算机网络已经成为现代社会中不可或缺的一部分,它使得人们可以在世界各地进行信息交流和数据传输。
在进行计算机网络翻译时,我们需要深入理解各种网络术语的含义和用法。
在本文中,我将就一些常见的计算机网络词汇进行浅析,并提供它们的翻译建议。
1. Internet英文原意:a global computer network providing a variety of information and communication facilities翻译建议:互联网解析:互联网是指连接在一起的全球计算机网络系统,提供各种信息和通信服务。
2. Network英文原意:a group or system of interconnected people or things 翻译建议:网络解析:网络是指相互连接在一起的一组或系统,可以包括计算机、设备和人。
3. Router英文原意:a device that forwards data packets between computer networks翻译建议:路由器解析:路由器是一种设备,用于在不同的计算机网络之间转发数据包。
它通常用于将数据从一个网络发送到另一个网络。
4. Ethernet英文原意:a system for connecting a number of computer systems to form a local area network翻译建议:以太网解析:以太网是一种将多台计算机系统连接在一起形成局域网的系统。
5. Firewall英文原意:a network security system that monitors and controls incoming and outgoing network traffic翻译建议:防火墙解析:防火墙是一种网络安全系统,用于监控和控制进出网络的流量。
6. Server英文原意:a computer or computer program that manages access to a centralized resource or service翻译建议:服务器解析:服务器是一台计算机或计算机程序,用于管理对集中资源或服务的访问。
Computer network计算机网络A computer network is a group of more computers connected to each electronically. This means that the computers can "talk" to each other and that every computer in the network can send information to the others. Usually, this means that the speed of the connection is fast - faster than a normal connection to the Internet.计算机网络是一组多台计算机连接到每个电子。
这意味着计算机可以“讲”给对方,并且每一个在网络上的计算机可以将信息发送到其他。
通常情况下,这意味着连接速度快 - 速度比正常的连接到互联网。
Some basic types of computer networks include:▪ A local area network (often called a LAN) connects two or more computers, and may be called a corporate network in an office or business setting.▪An "internetwork", sometimes called a Wide Area Network (because of the wide distance between networks) connects two or more smaller networks together. The largest internetwork is called the Internet.计算机网络的一些基本类型包括:局域网络(通常被称为一个LAN)连接两个或更多的计算机,并可能被称为一个企业网络,在办公室或业务设置。
ARPARNET(Internet) :阿帕网ICCC :国际计算机通信会议CCITT :国际电报电话咨询委员会SNA :系统网络体系结构(IBM)DNA :数字网络体系结构(DEC)CSMA/CD :载波监听多路访问/冲突检测(Xerox) NGI :下一代INTERNETInternet2 :第二代INTERNETTCP/IP SNA SPX/IPX AppleTalk :网络协议NII :国家信息基础设施(信息高速公路)GII :全球信息基础设施MIPS :PC的处理能力Petabit :10^15BIT/SCu芯片: :铜OC48 :光缆通信SDH :同步数字复用WDH :波分复用ADSL :不对称数字用户服务线HFE/HFC:结构和Cable-modem 机顶盒PCS :便携式智能终端CODEC :编码解码器ASK(amplitude shift keying) :幅移键控法FSK(frequency shift keying) :频移键控法PSK(phase shift keying) :相移键控法NRZ (Non return to zero) :不归零制PCM(pulse code modulation) :脉冲代码调制nonlinear encoding :非线性编程FDM :频分多路复用TDM :时分多路复用STDM :统计时分多路复用DS0 :64kb/sDS1 :24DS0DS1C :48DS0DS2 :96DS0DS3 :762DS0DS4 :4032DS0CSU(channel service unit) :信道服务部件SONET/SDH :同步光纤网络接口LRC :纵向冗余校验CRC :循环冗余校验ARQ :自动重发请求ACK :确认NAK :不确认preamble :前文postamble :后文ITU :国际电信联合会character-oriented :面向字符bit-oriented :面向位SYNC :同步字符HDLC :面向位的方案SDLC :面向位的方案bit-stuffing :位插入STP :屏蔽双绞线UTP :非屏蔽双绞线RG-58A/U :标准RG-11 :用于10BASE5RG-59U :75欧0.25INCH CATVRG-62U :9欧0.25INCH ARCnet10BASE5 :IEEE802.3RG-59U :0.25inch CATVRG-62U :0.25inch ARCnetLED(light emitting diobe) :发光二级管ILD(injection laster diobe) :注入型激光二级管PIN :检波器APD :检波器intensity modulation :亮度调制line of sight :可视通路CCITT V.28(EIA RS232C) :非平衡型CCITT V.10/X.26(EIA RS423A) :新的非平衡型CCITT V.11/X.27(EIA RS422A) :新的平衡型TD :发送数据RD :接收数据XON/XOFF :流控制Automatic Repeat Request Protocol :自动重发请求Send and wait ARQ:continuous :ARQ停等ARQ Ward Christensen :人名Kermit :协议circuit switching :线路交换packet switching :分组交换virtual circuit :虚电路ATM(asynchronous transfer mode) :异步传输模式ATDM :异步时分多路复用packetizer :打包器VPI(vritual path identifier) :虚路径标识VCI(virtual channel identifier) :虚通道标识syntax :语法semantics :语义timing :定时OSI(open system interconnection) :开放系统session :会话synchronization :同步activity management :活动管理AE :应用实体UE :用户元素CASE :公共应用服务元素SASE :特定应用服务元素VT :虚拟终端JIM :作业传送和操作reverved :保留echo :回送discard :丢弃active users :活动用户daytime :白天netstat(who is up of NETSTAT)qotd(quote of the day)日期引用chargen(character generator)字符发送器nameserver(domani name server)域名服务器bootps(bootstrap protocol server/client)引导协议服务器/客户机tftp(trivial file transfer)简单文件传送sunrpc(sun microsystems RPC)SUN公司NTP:network time protocol网络时间协议SNMP(SNMP net monitor)SNMP网络监控器SNMP traps陷井biffunix comsatdaemone.g timed daemonsyslogsystem logURG紧急字段可用ACK确认字段可用请求急迫操作RST连接复位SYN同步序号FIN发送方字节流结束Manchester曼彻斯特编码FDDI(fiber distributed data interface)光纤分布数据接口TTRT目标标记循环时间aggregation of multiple link segments多重链接分段聚合协议MAN(metropolitan area network plus)城域网CSMA/CD(carrier sense multiple access/collision detection) 载波监听Token bus令牌总线Token ring令牌环SAP服务访问点request indictaion response confirmationLLC PDULLC协议数据单元DSAP address目地服务访问点地址字段SSAP address源服务访问点地址字段XID交换标识SABME置扩充的异步平衡方式DISC断开连接DM断开FRMR帧拒收solt timeAUI连接单元接口MAU介质连接接口MDI介质相关接口PMA物理介质接口SFD起始定界符PAD填充字段FCS帧校验序列PLS物理层收发信号slot time时间Inter Frame Gap 帧attempt limit最大重传次数back off limit避免算法参数Jam size阻塞参数max frame size最大帧address size地址collaspsed backone 折叠式主干网BSS基本服务集ESS扩展服务集DFW-MAC分布式基础无线MAC IFS帧间空隙SIFS:短PIFSDIFS分布协调CTS发送清除DQDB(IEEE802.6)分布式队列双总线TDM时分复用TMS多时分交换TSI时间片互换TST网络机构TSSST STS SSTSS TSTST网络机构PSTN公用交换电话网public switched telephone network详细PBX:private branch exchange专用交换网PABX;private automatic branch exchange自动交换机CBX:computerized branch exchange程控交换SLIP:serial line IP串行IPLCP(link control protocol)链路控制协议NCP:network control protocol网络控制协议BRI基本速率接口PRI群速率接口LAPB:line access protocol balanced链路访问协议平衡registration登录interrupt中断LAP F link access procedure for frame-mode bearer serivesrotate不知道recovery恢复discard丢弃retransmission重传switched access交换访问intergated access集成访问alerting警告progress进展AALATM适配层GFC总流控cell rate decoupling信元率去耦SDH同步数字级PDH准国步数字级GSM:group special mobile移动通讯NSS网络子系统OMC-R操作维护中心BSS基站子系统BSC基站控制器BTS基站收发信机MS移动站SIM:subscriber identity module 标识模块MSCHLR归属位置寄存器VLR访问位置寄存器AUC鉴权中心EIR设备识别寄存器OMC-S操作维护中心SC短消息中心WAP无线应用协议WAE无线应用层WSP会话层WTP事务层WTLS安全层WDP传输层MAP移动应用部分WML无线标记语言SSL:secure sockets layer安全套接层PCS个人通信业务PCN个人通信网GEO对地静止轨道NON-GE0(MEO,LEO)不清楚ITU国际电信联盟VSAT:very small aperture -terminal 甚小天线终端LEOS低轨道卫星通信系统中继器bridge网桥router路由器gateway网关ONsemble stackable 10BASE可叠加组合型集线器transparent bridge传输桥source routing bridge源路径桥broadcast storm广播风暴encapsulation封装translation bridging转换桥接方式SRT源地址选择透明桥offset偏移more flag标识ICMPINTERNET控制报文协议SPF:shortest path first最短路径IGP:interior gateway protocol核心网关协议EGP:exterior gateway protocol 扩展网关协议RIP:routing information protocol 路由信息协议OSPF开放最短径优先协议acquisition request获取请求acquisition confirm获取确认cease中止poll轮询IPX/SPX internetwork packet exchange/sequented packet exchange NOVELLinterpreter解释器redirector重定向器SFT system fault tolerant系统容错ELS entry level solution不认识ODI开放数据链路接口NDIS network device interface specification网络设备接口...DDCS数据库管理和分布数据库连接服务DCE:distributed computing environment分布计算环境OSF:open software foundation开放软件基金PWS:peer web serviceWEB服务器OEM原始设备制造商RAS远程访问服务IIS:Internet Information serverINTERNET信息服务WINS:windows internet name systemWINDOWS命名服务NTDS:windows NT directory serverNT目录服务TDI传输驱动程序接口schedule++应用程序,预约本COSE:common open software environment普通开放软件环境RPC远程过程调用SNMP:simple network management protocol简单网管协议SMI:structer of management information管理信息结构SMT:station management管理站SMTP:simple mail transfer protocol简单邮件传输协议SNA:system network architectureIBM网络SNR:signal noise ratio信噪比SONENT:synchronous optical network同步光纤网络SPE:synchronous payload envelope同步PAYLOAD信CMIS/CMIP公共管理信息服务/协议CMISE公共管理信息服务agent代理IMT:inductive modeling technology不知道plaintext明文ciphertext脱密encryption加密decryption解密symmetric key cryptography对称加密asymmetric key cryptography不对称加密public key公钥private key私钥DES:data encryption standard数据加密标准IDEA:international data encryption algorithm 国际加密算法PIN:personal identification number个人标识符session key会话层密钥KDC:key distribuetion center密钥分发中心sign签名seal封装certificate证书certificate authority CA证书权威机构OSF开放软件中心AFS:andrew file system分布式文件系统ticket凭证authenticatior身份认证timestamp时间标记reply attack检测重放攻击realm域PKI公钥基础设施certificate hierarchy证书层次结构across certificate交叉证书security domain安全领域cerfificate revoke list(CRL)证书层次结构LDAP:light weight directory access protocol 协议access matrix访问矩阵ACL:access control list访问列表reference monitor引用监控器course grained粗粒度访问控制medium grained中粒度访问控制fine grained细粒度访问控制CORBA面向对象的分布系统应用MQ报文队列VPN虚拟专网IPSEC:IP security安全IPSA:security association安全??encopulation security payload封装安全负载AH:authentication header鉴别报头IKE:Internet key exchange交换rogue programs捣乱程序IPSP:IP security protocol安全IKMP:internet key managemetn protocol 协议IESGInternet工程领导小组SHA安全散列算法MAC:message authentication code代码CBC密码块链接SSL安全套接层协议cerfificate verify证书检验报文PEM私用强化邮件PGP:pretty good privacy好的private保密authenticated已认证SEPP安全电子付费协议SET安全电子交易middleware中间件GSS-API通用安全服务SNP安全网络编程BWD:browser web database浏览WEBplugin插入件basic authentication scheme不知道digest authentication scheme摘要认证方法open group:the open group research institute研究所DCE:distributed computing environment分布式计算机环境SLP:secure local proxy安全局部代理SDG:secure domain proxy安全域代理OMG:object management group目标管理组CORBS:common object request broker architecture 不清楚authentication鉴别access control访问控制data confidnetiality保密data integrity数据完整性non-reputation防止否认enciphermant加密机制digital signature mechanisms数据完整性authentication mechanisms路由控制机制notarization mechanisms公证trusted function可信security labels安全标记event dectection事件检测security audit trail安全审计跟踪security recovery安全恢复TCSEC:trusted computer system evaluation criteria标准TCSEC TNI:trusted network interpretation of the TCSEC 标准TCSEC TDI:trusted database interpretation of the TCSEC 标准ITSEC:information technology security evaluation标准CC:command criteria for IT security evaluation安全classified criteria for secruity protection中国安全of computer information system中国安全GB17859-1999国标TCB:trusted computing baseSNMP:simple network management protocol网管ICMP:internet control message protocol互联网控制信息协议ARP:address resolution protocol地址解析协议TCP:transmission control protocol传输控制协议UDP:user datagram protocol用户数据报协议SMTP:simple mail transfer protocol简单邮件传输DNS:domain name service服务器NSP:name service protocol服务器TElnet:telcommunication networkTELEGP:exterior gateway protocol外部网关连接器协议IGP:inter gateway protocol内部网关连接器协议SLIP串行接口协议PPP点对点协议UNICAST单播地址cluster群集地址multicast组播地址scable model可伸缩模型integrated model集成模型OLAP联机分析工具NAS:network applications supportDEC公司的工具NWC:newwave computingHP工具OCCA:open cooperative computing architecture 开放合作计算体系结构DAA:distributed application architectureDG的分布应用体系结构COSE:common opensystem enviroment通用开放系统环境CDE:common desktop enviroment通用桌面环境DCE分布式计算环境RPC远程过程调用DME分布管理环境OSE/APP开放系统环境应用可移植框架ODA开放文件体系结构ODL开放文件语言。
中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。
网络可以根据其多种特点来分类。
计算机网络允许资源和信息在互联设备中共享。
一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。
1957年俄罗斯向太空发射人造卫星。
十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。
然后用阿帕网上的另外一台计算机分享了这个信息。
这一切的负责者是美国博士莱德里尔克。
阿帕网于来于自印度,1969年印度将其名字改为因特网。
上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。
因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。
二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。
共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。
共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。
提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。
共享软件:用户可以连接到远程计算机的网络应用程序。
信息保存。
安全保证。
三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。
以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。
经常部署的设备包括网络集线器、交换机、网桥、路由器。
无线局域网技术是使用无线设备进行连接的。
专业外语英汉对照A ccess Control List(ACL)访问控制列表access token 访问令牌account lockout 帐号封锁account policies 记帐策略accounts 帐号adapter 适配器adaptive speed leveling 自适应速率等级调整Address Resolution Protocol(ARP) 地址解析协议Administrator account 管理员帐号algorithm 算法alias 别名alias 小应用程序allocation layer 应用层allocation 分配、定位anlpasswd 一种与Passwd+相似的代理密码检查器API 应用程序编程接口applications 应用程序ARPANET 阿帕网(internet的前身)ATM 异步传递模式attack 攻击audio policy 审记策略auditing 审记、监察authentication 认证、鉴别authorization 授权Back Office Microsoft公司的一种软件包Back up 备份back-end 后端backup browser 后备浏览器baseline 基线BDC 备份域控制器BGP 引导网关协议Binding 联编、汇集BIOS 基本输入/输出系统bit 比特、二进制位BOOTP 引导协议borde gateway 边界网关borde 边界Bottleneck 瓶径breach 攻破、违反breakabie 可破密的bridge 网桥、桥接器browser 浏览器browsing 浏览CAlass A domain A类域CAlass B domain B类域CAlass C domain C类域CD-ROM 只读型光盘CGI 公共网关接口 CGI(Common Gateway Interface公用网关接口是一个可以产生相同结果或结果随用户输入而变化的程序。
外文原文:The NetWorksBirth of the NetThe Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet.In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service.NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business.NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF.How the Web WorksThe World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video.So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information.The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works:Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browserrequests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web browser interprets the data, displaying it on your computer screen.The Louvre's website also has links to the sites of other museums, such as the Vatican Museum. When you click your mouse on a link, you access the web server for the Vatican Museum.The "glue" that holds the Web together is called hypertext and hyperlinks. This feature allow electronic files on the Web to be linked so you can easily jump between them. On the Web, you navigate through pages of information based on what interests you at that particular moment, commonly known as browsing or surfing the Net.To access the Web you need web browser software, such as Netscape Navigator or Microsoft Internet Explorer. How does your web browser distinguish between web pages and other files on the Internet? Web pages are written in a computer language called Hypertext Markup Language or HTML.Some Web HistoryThe World Wide Web (WWW) was originally developed in 1990 at CERN, the European Laboratory for Particle Physics. It is now managed by The World Wide Web Consortium, also known as the World Wide Web Initiative.The WWW Consortium is funded by a large number of corporate members, including AT&T, Adobe Systems, Inc., Microsoft Corporation and Sun Microsystems, Inc. Its purpose is to promote the growth of the Web by developing technical specifications and reference software that will be freely available to everyone. The Consortium is run by MIT with INRIA (The French National Institute for Research in Computer Science) acting as European host, in collaboration with CERN.The National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, was instrumental in the development of early graphical software utilizing the World Wide Web features created by CERN. NCSA focuses on improving the productivity of researchers by providing software for scientific modeling, analysis, and visualization. The World Wide Web was an obvious way to fulfill that mission. NCSA Mosaic, one of the earliest web browsers, was distributed free to the public. It led directly to the phenomenal growth of the World Wide Web.Understanding Web AddressesYou can think of the World Wide Web as a network of electronic files stored on computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate these files. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type aURL into your browser or click on a hypertext link, your browser is sending a request to a remote computer to download a file.What does a typical URL look like? Here are some examples:/The home page for study english.ftp:///pub/A directory of files at MIT* available for downloading.news:rec.gardens.rosesA newsgroup on rose gardening.The first part of a URL (before the two slashes* tells you the type of resource or method of access at that address. For example:·http - a hypertext document or directory·gopher - a gopher document or menu·ftp - a file available for downloading or a directory of such files·news - a newsgroup·telnet - a computer system that you can log into over the Internet·WAIS* - a database or document in a Wide Area Information Search database·file - a file located on a local drive (your hard drive)The second part is typically the address of the computer where the data or service is located. Additional parts may specify the names of files, the port to connect to, or the text to search for in a database.You can enter the URL of a site by typing it into the Location bar of your web browser, just under the toolbar.Most browsers record URLs that you want to use again, by adding them to a special menu. In Netscape Navigator, it's called Bookmarks. In Microsoft Explorer, it's called Favorites. Once you add a URL to your list, you can return to that web page simply by clicking on the name in your list, instead of retyping the entire URL.Most of the URLs you will be using start with http which stands for Hypertext Transfer Protocol*. http is the method by which HTML files are transferred over the Web. Here are some other important things to know about URLs:· A URL usually has no spaces.· A URL always uses forward slashes (//).If you enter a URL incorrectly, your browser will not be able to locate the site or resource you want. Should you get an error message or the wrong site, make sure you typed the address correctly.You can find the URL behind any link by passing your mouse cursor over the link. The pointer will turn into a hand and the URL will appear in the browser's status bar, usually located at the bottom of your screen.Domain NamesWhen you think of the Internet, you probably think of ".com." Just what do those three letters at the end of a World Wide Web address mean?Every computer that hosts data on the Internet has a unique numerical address. For example, the numerical address for the White House is 198.137.240.100. But since few people want to remember long strings of numbers, the Domain Name System (DNS)* was developed. DNS, a critical part of the Internet's technical infrastructure*, correlates* a numerical address to a word. To access the White House website, you could type its number into the address box of your web browser. But most people prefer to use "." In this case, the domain name is .In general, the three-letter domain name suffix* is known as a generic top-level domain and describes the type of organization. In the last few years, the lines have somewhat blurred* between these categories..com - business (commercial).edu - educational.org - non-profit.mil - military.net - network provider.gov - governmentA domain name always has two or more parts separated by dots and typically consists of some form of an organization's name and the three-letter suffix. For example, the domain name for IBM is ""; the United Nations is "."If a domain name is available, and provided it does not infringe* on an existing trademark, anyone can register the name for $35 a year through Network Solutions, Inc., which is authorized to register .com, .net and .org domains. You can use the box below to see if a name is a available. Don't be surprised if the .com name you want is already taken, however. Of the over 8 million domain names, 85% are .com domains.ICANN, the Internet Corporation for Assigned Names and Numbers, manages the Domain Name System. As of this writing, there are plans to add additional top-level domains, such as .web and .store. When that will actually happen is anybody's guess.To check for, or register a domain name, type it into the search box.It should take this form: In addition to the generic top-level domains, 244 national top-level domains were established for countries and territories*, for example:.au - Australia.ca - Canada.fr - France.de - Germany.uk - United KingdomFor US $275 per name, you can also register an international domain name with Net Names. Be aware that some countries have restrictions for registering names.If you plan to register your own domain name, whether it's a .com or not, keep these tips in mind: The shorter the name, the better. (But it should reflect your family name, interest or business.) The name should be easy to remember.It should be easy to type without making mistakes.Remember, the Internet is global. Ideally, a domain name will "read" in a language other than English.About ModemTelephone lines were designed to carry the human voice, not electronic data from a computer. Modems were invented to convert digital computer signals into a form that allows them to travel over the phone lines. Those are the scratchy sounds you hear from a modem's speaker. A modem on the other end of the line can understand it and convert the sounds back into digital information that the computer can understand. By the way, the word modem stands for MOdulator/DEModulator.Buying and using a modem used to be relatively easy. Not too long ago, almost all modems transferred data at a rate of 2400 Bps (bits per second). Today, modems not only run faster, they are also loaded with features like error control and data compression. So, in addition to converting and interpreting signals, modems also act like traffic cops, monitoring and regulating the flow of information. That way, one computer doesn't send information until the receiving computer is ready for it. Each of these features, modulation, error control, and data compression, requires a separate kind of protocol and that's what some of those terms you see like V.32, V.32bis, V.42bis and MNP5 refer to.If your computer didn't come with an internal modem, consider buying an external one, because it is much easier to install and operate. For example, when your modem gets stuck (not an unusual occurrence), you need to turn it off and on to get it working properly. With an internal modem, that means restarting your computer--a waste of time. With an external modem it's as easy as flipping a switch.Here's a tip for you: in most areas, if you have Call Waiting, you can disable it by inserting *70 in front of the number you dial to connect to the Internet (or any online service). This will prevent an incoming call from accidentally kicking you off the line.This table illustrates the relative difference in data transmission speeds for different types of files. A modem's speed is measured in bits per second (bps). A 14.4 modem sends data at 14,400 bits per second. A 28.8 modem is twice as fast, sending and receiving data at a rate of 28,800 bits per second.Until nearly the end of 1995, the conventional wisdom was that 28.8 Kbps was about the fastest speed you could squeeze out of a regular copper telephone line. Today, you can buy 33.6 Kbps modems, and modems that are capable of 56 Kbps. The key question for you, is knowing what speed modems your Internet service provider (ISP) has. If your ISP has only 28.8 Kbps modems on its end of the line, you could have the fastest modem in the world, and only be able to connect at 28.8 Kbps. Before you invest in a 33.6 Kbps or a 56 Kbps modem, make sure your ISP supports them.Speed It UpThere are faster ways to transmit data by using an ISDN or leased line. In many parts of the U.S., phone companies are offering home ISDN at less than $30 a month. ISDN requires a so-called ISDN adapter instead of a modem, and a phone line with a special connection that allows it to send and receive digital signals. You have to arrange with your phone company to have this equipment installed. For more about ISDN, visit Dan Kegel's ISDN Page.An ISDN line has a data transfer rate of between 57,600 bits per second and 128,000 bits per second, which is at least double the rate of a 28.8 Kbps modem. Leased lines come in two configurations: T1 and T3. A T1 line offers a data transfer rate of 1.54 million bits per second. Unlike ISDN, a T-1 line is a dedicated connection, meaning that it is permanently connected to the Internet. This is useful for web servers or other computers that need to be connected to the Internet all the time. It is possible to lease only a portion of a T-1 line using one of two systems: fractional T-1 or Frame Relay. You can lease them in blocks ranging from 128 Kbps to 1.5 Mbps. The differences are not worth going into in detail, but fractional T-1 will be more expensive at the slower available speeds and Frame Relay will be slightly more expensive as you approach the full T-1 speed of 1.5 Mbps. A T-3 line is significantly faster, at 45 million bits per second. The backbone of the Internet consists of T-3 lines.Leased lines are very expensive and are generally only used by companies whose business is built around the Internet or need to transfer massive amounts of data. ISDN, on the other hand, is available in some cities for a very reasonable price. Not all phone companies offer residential ISDN service. Check with your local phone company for availability in your area.Cable ModemsA relatively new development is a device that provides high-speed Internet access via a cable TV network. With speeds of up to 36 Mbps, cable modems can download data in seconds that might take fifty times longer with a dial-up connection. Because it works with your TV cable, it doesn't tie up a telephone line. Best of all, it's always on, so there is no need to connect--no more busy signals! This service is now available in some cities in the United States and Europe.The download times in the table above are relative and are meant to give you a general idea of how long it would take to download different sized files at different connection speeds, under the best of circumstances. Many things can interfere with the speed of your file transfer. These can range from excessive line noise on your telephone line and the speed of the web server from which you are downloading files, to the number of other people who are simultaneously trying to access the same file or other files in the same directory.DSLDSL (Digital Subscriber Line) is another high-speed technology that is becoming increasingly popular. DSL lines are always connected to the Internet, so you don't need to dial-up. Typically, data can be transferred at rates up to 1.544 Mbps downstream and about 128 Kbps upstream over ordinary telephone lines. Since a DSL line carries both voice and data, you don't have to install another phone line. You can use your existing line to establish DSL service, provided service is available in your area and you are within the specified distance from the telephone company's central switching office.DSL service requires a special modem. Prices for equipment, DSL installation and monthly service can vary considerably, so check with your local phone company and Internet service provider. The good news is that prices are coming down as competition heats up.WebsitesAnatomy of a Web PageA web page is an electronic document written in a computer language called HTML, short for Hypertext Markup Language. Each web page has a unique address, called a URL* or Uniform Resource Locator, which identifies its location on the network.A website has one or more related web pages, depending on how it's designed. Web pages on a site are linked together through a system of hyperlinks* , enabling you to jump between them by clicking on a link. On the Web, you navigate through pages of information according to your interests.Home Sweet Home PageWhen you browse the World Wide Web you'll see the term home page often. Think of a homepage as the starting point of a website. Like the table of contents of a book or magazine, the home page usually provides an overview of what you'll find at the website. A site can have one page, many pages or a few long ones, depending on how it's designed. If there isn't a lot of information, the home page may be the only page. But usually you will find at least a few other pages.Web pages vary wildly in design and content, but most use a traditional magazine format. At the top of the page is a masthead* or banner graphic*, then a list of items, such as articles, often with a brief description. The items in the list usually link to other pages on the website, or to other sites. Sometimes these links are highlighted* words in the body of the text, or are arranged in a list, like an index. They can also be a combination* of both. A web page can also have images that link to other content.How can you tell which text are links? Text links appear in a different color from the rest of the text--typically in blue and underlined. When you move your cursor over a text link or over a graphic link, it will change from an arrow to a hand. The hypertext words often hint* at what you will link to.When you return to a page with a link you've already visited, the hypertext words will often be in a different color, so you know you've already been there. But you can certainly go there again. Don't be surprised though, if the next time you visit a site, the page looks different and the information has changed. The Web is a dynamic* medium. To encourage visitors to return to a site, some web publishers change pages often. That's what makes browsing the Web so excitingA Home (Page) of Your OwnIn the 60s, people asked about your astrological* sign. In the 90s, they want to know your URL. These days, having a web address is almost as important as a street address. Your website is an electronic meeting place for your family, friends and potentially*, millions of people around the world. Building your digital domain can be easier than you may think. Best of all, you may not have to spend a cent. The Web brims with all kinds of free services, from tools to help you build your site, to free graphics, animation and site hosting. All it takes is some time and creativity. Think of your home page as the starting point of your website. Like the table of contents of a book or magazine, the home page is the front door. Your site can have one or more pages, depending on how you design it. If there isn't a lot of information just yet, your site will most likely have only a home page. But the site is sure to grow over time.While web pages vary dramatically* in their design and content, most use a traditional magazine layout. At the top of the page is a banner graphic. Next comes a greeting and a short description of the site. Pictures, text, and links to other websites follow.If the site has more than one page, there's typically a list of items--similar to an index--often with a brief description. The items in the list link to other pages on the website. Sometimes these linksare highlighted words in the body of the text. It can also be a combination of both. Additionally, a web page may have images that link to other content.Before you start building your site, do some planning. Think about whom the site is for and what you want to say. Next, gather up the material that you want to put on the site: write the copy, scan the photos, design or find the graphics. Draw a rough layout on a sheet of paper.While there are no rules you have to follow, there are a few things to keep in mind:·Start simply. If you are too ambitious at the beginning, you may never get the site off the ground. You can always add to your site.·Less is better. Most people don't like to read a lot of text online. Break it into small chunks. ·Use restraint. Although you can use wild colors and images for the background of your pages, make sure your visitors will be able to read the text easily.·Smaller is better. Most people connect to the Internet with a modem. Since it can take a long time to download large image files, keep the file sizes small.·Have the rights. Don't put any material on your site unless you are sure you can do it legally. Read Learn the Net's copyright article for more about this.Stake Your ClaimNow it's time to roll up your sleeves and start building. Learn the Net Communities provides tools to help you build your site, free web hosting, and a community of other homesteaders.Your Internet service provider may include free web hosting services with an account, one alternative to consider.Decoding Error MessagesAs you surf the Net, you will undoubtedly find that at times you can't access certain websites. Why, you make wonder? Error messages attempt to explain the reason. Unfortunately, these cryptic* messages baffle* most people. We've deciphered* the most common ones you may encounter.400 - Bad RequestProblem: There's something wrong with the address you entered. You may not be authorized* to access the web page, or maybe it no longer exists.Solution: Check the address carefully, especially if the address is long. Make sure that the slashes are correct (they should be forward slashes) and that all the names are properly spelled. Web addresses are case sensitive, so check that the names are capitalized in your entry as they are in the original reference to the website.401 - UnauthorizedProblem: You can't access a website, because you're not on the guest list, your password is invalid or you have entered your password incorrectly.Solution: If you think you have authorization, try typing your password again. Remember that passwords are case sensitive.403 - ForbiddenProblem: Essentially the same as a 401.Solution: Try entering your password again or move on to another site.404 - Not FoundProblem: Either the web page no longer exists on the server or it is nowhere to be found.Solution: Check the address carefully and try entering it again. You might also see if the site has a search engine and if so, use it to hunt for the document. (It's not uncommon for pages to change their addresses when a website is redesigned.) To get to the home page of the site, delete everything after the domain name and hit the Enter or Return key.503 - Service unavailableProblem: Your Internet service provider (ISP) or your company's Internet connection may be down.Solution: Take a stretch, wait a few minutes and try again. If you still have no luck, phone your ISP or system administrator.Bad file requestProblem: Your web browser may not be able to decipher the online form you want to access. There may also be a technical error in the form.Solution: Consider sending a message to the site's webmaster, providing any technical information you can, such as the browser and version you use.Connection refused by hostProblem: You don't have permission to access the page or your password is incorrect.Solution: Try typing your password again if you think you should have access.Failed DNS lookupProblem: DNS stands for the Domain Name System, which is the system that looks up the name of a website, finds a corresponding number (similar to a phone number), then directs your request to the appropriate web server on the Internet. When the lookup fails, the host server can't be located.Solution: Try clicking on the Reload or Refresh button on your browser toolbar. If this doesn't work, check the address and enter it again. If all else fails, try again later.File contains no dataProblem: The site has no web pages on it.Solution: Check the address and enter it again. If you get the same error message, try again later.Host unavailableProblem: The web server is down.Solution: Try clicking on the Reload or Refresh button. If this doesn't work, try again later.Host unknownProblem: The web server is down, the site may have moved, or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online. If this fails, try using a search engine to find the site. It may have a new address.Network connection refused by the serverProblem: The web server is busy.Solution: Try again in a while.Unable to locate hostProblem: The web server is down or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online.Unable to locate serverProblem: The web server is out-of-business or you may have entered the address incorrectly.Solution: Check the address and try typing it again.Web BrowsersA web browser is the software program you use to access the World Wide Web, the graphical portion of the Internet. The first browser, called NCSA Mosaic, was developed at the National Center for Supercomputing Applications in the early '90s. The easy-to-use point-and-click interface* helped popularize the Web, although few then could imagine the explosive growth that would soon occur.Although many different browsers are available, Microsoft Internet Explorer* and Netscape Navigator* are the two most popular ones. Netscape and Microsoft have put so much money into their browsers that the competition can't keep up. The pitched battle* between the two companies to dominate* the market has lead to continual improvements to the software. Version 4.0 and later releases of either browser are excellent choices. (By the way, both are based on NCSA Mosaic.) You can download Explorer and Navigator for free from each company's website. If you have one browser already, you can test out the other. Also note that there are slight differences between the Windows and MacIntosh* versions.You can surf to your heart's content, but it's easy to get lost in this electronic web. That's where your browser can really help. Browsers come loaded with all sorts of handy features. Fortunately, you can learn the basics in just a few minutes, then take the time to explore the。
网络术语中英对照1。
ADSL (Asymmetric Digital Subscriber Line) 非对称数字环路2。
ANSI (American National Standard Institute) 美国国家标准协会3。
APIPA (Automatic Private IP Addressing) 自动私有IP寻址4. AppleTalk 由Apple公司推出的一种多层协议,一种可路由协议组5。
ARP (Address Resolution Protocol)地址解析协议6。
ARQ (Automatic Repeat Request) 自动重发请求7。
ASIC (Specific Integrated Circuit(Chip))专用集成电路芯片8。
ASN。
1 (Abstract Syntax Notation One)一种用于描述结构化客体的结构和内容的语言. 抽象语法定义9. ATM (Asynchronous Transfer Mode) 异步传输模式10. BBS (Bulletin Board System)电子公告板11. BGP (Border Gateway Protocol)边界网关协议12. B-ISDN (Broadband Integrated Services Digital Network)宽带综合业务数字网13. BOOTP (BOOTstrapping Protocol) 引导协议14. BRI (Basic Rate Interface) ISDN基本速率15。
Bridge 网桥16。
BUS (Broadcast/Unknown Server) 广播和未知服务器17。
CA Communication Automatization 通信自动化18。
Cable Modem 电缆调制解调器19。
CATV 公用天线电视20。
CCITT 国际电话电报咨询委员会21。
外文原文:COMPUTER NETWORKSDATE COMMUNICATIONSOne of the functions of the host computer is to store the applications programs for the various secondaries.The end equipment which either generates the digital information for transmission or uses the received digital data can be computer ,printers ,keyboards, CRTs, and so on. This equipment generally manipulates digital information internally in word units—all the bits that make up a word in a particular piece of equipment are transferred in parallel. Digital data, when transmitted, are in serial form. Parallel transmission of an 8-bit word require eight pairs of transmission lines—not at all cost-effective. Data terminal (DTE) is a general phrase encompassing all of the circuitry necessary to perform parallel-to-serial and serial-to-parallel conversions for transmission and reception respectively and for data link management. The UART (Universal Asynchronous Receiver/Transmitter) and USART (Universal Asynchronous/Asynchronous Receiver/Transmitter) are the devices that perform the parallel-to-serial and serial-to-parallel conversions. The primary DTE includes a line control unit (LCU or LinCo) which controls the flow of information in a multipoint data link system. A station controller (STACO) is the corresponding that belonged to the subscriber in a data link system. Between the DTEs, starting with the modems, was communications equipment ownedand maintained by T elco property.Data communications equipment (DCE) accepts the serial data stream from the DTE and converts it to some form of analog signal suitable for transmission on voice-grade lined. At the receive end, the DCE performs the reverse function of converting the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter, while at the receive end, it can considered a form of analog-to-digital converter. The most common of modulation by modems are frequency shift keying (FSK), phase shift keying (PSK), and quadrature amplitude modulation (QAM). This is a typically data transmission mode using the analog telephone lines. If you transmit data by digital channel (sometimes it is called “Digital T-carrier”), a pulse Code Modulation (PCM) equipment must be used. A microwave transmission system can also be used for the data communication. Finally, you can use the satellite communication system for data transmission.If the cables and signal levels used to interconnect the DTE and DCE were left unregulated, the variations generated would probably be proportional to the number of manufacturers. Electronics industries Association (EIA) , an organization of manufactures with establishing the DTE and modem. This is a 25-pincable whose pins have designated functions and specified signal levels. The RS-232C is anticipated to be replaced by an update standard.ARCHITECTURE OF COMPUTER NETWORKSComputer network is a complex consisting of two or more conned computing units, it is used for the purpose of data communication and resource resource sharing. Design of a network and its logical structure should comply with a set of design principles, including the organization of functions and the description of data formats and procedure. This is the network architecture and so called as a set of layers and protocols, because the architecture is a layer-based.In the next two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model.1.The OSI Reference ModelThe OSI model is shown in Fig.14-2(minus the physical medium). This model is based on a proposal developed by the International Standards Organizations (OSI) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems--that is, systems that are open for communication with other systems, We will usually just call it the OSI model for short.The OSI model has seven has seven layers. Note that the OSI model itself is not a network architecture because it does not specify the exact services and protocols to be used in each layer. It just tells what each layer should do. However , However, ISO has also produced standards for all the layers, although these are not part of the reference model itself. Each one has been published asa separate international standard.2.The TCP/IP Reference ModelThe TCP/IP reference model is an early transport protocol which was designed by the US Department of Defence (DOD) around in 1978. It is often claimed that it gave rise the OSI “connectionless” mode of operation. TCP/IP is still used extensively and is called as a industrial standard of internet work in fact, TCP/IP has two parts: TCP and IP. TCP means it is on the transport layer and IP means it is on the network layer separately.(1)There are two end-to-end protocols in the transport layer, one ofwhich is TCP (Transmission Control Protocol) , another is UDP (UserDatagram Protocol). TCP is a connection-oriented protocol thatallows a byte stream originating on one machine to be deliveredwithout error on any other machine in the internet. UDP is anunreliable, connectionless protocol for application that do not wantTCP’s sequencing of flows control flow control and wish to providetheir own.(2)The network layer defines an official packet format and protocolcalled IP (Internet protocol). The job of the network layer is to deliverIP packets where they are supposed to go.The TCP/IP Reference Model is shown in Fig.14.3. On top of the transport layer is the application layer, It contains all the higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), electronicmail (SMTP) and domain name service(DNS).WIDE AREA NETWORKA wide area network, or WAN, spans a large geographical area, often a country or continent . It contains a collection of machines intended for running user (i. e. , application) programs. We will follow traditional usage and call these machines hosts. By a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host, just as the telephone system carries words from speaker to listener. By separating the pure communication aspects of the network (the subnet) from the application aspects (the hosts), the complete network design is greatly simplified. Relation between hosts and the subnet is shown in Fig.14-4.One of many methods that can be used to categorize wide area networks is with respect to the flow of information on a transmission facility. If we use this method to categorize wide area networks, we can group them into three basic types: circuit switched, leased line and packet switched.1.CIRCUIT SWITCHED NETWORKSThe most popular type of network and the one almost all readers use on a daily basis is a circuit switched network. The public switched telephone network, however, is not limited to the telephone company, By purchasing appropriate switching equipment, any organization can construct their own internal circuit switched network and, if desired, provide one or more interfacesto the public switched network to allow voice and data transmission to flow between the public network and their private internal network2.LEASED LINE NETWORKSThis is a dedicated network connected by leased lines. Leased line is a communications line reserved for the exclusive use of a leasing customer without inter-exchange switching arrangements. Leased or private lines are dedicated to the user. This advantage is that the terminal or computer is a always physically connected to the line. Very short response times are met with service.3.PACKET SWITCHING NETWORKSA packet network is constructed through the use of equipment that assembles and disassembles packets, equipment that routes packet, and transmission facilities used to route packets from the originator to the destination device. Some types of data terminal equipment (DTE) can create their own packets, while other types of DTE require the conversion of their protocol into packets through the use of a packet assembler / disassemble (PAD). Packets are routed through the network by packet switches. Packet switches examine the destination of packets as they flow through the network and transfer the packets onto trunks interconnecting switches based upon the packet destination destination and network activity.Many older pubic networks follow a standard called X.25. It was developed during 1970s by CCITT to provide an interface between public packet-switchednetwork and their customers.CCITT Recommendation X.25 controls the access from a packet mode DTE, such as a terminal device or computer system capable of forming packets, to the DCE at a packet mode. CCITT Recommendation X.28 controls the interface between non-packet mode devices that cannot interface between the PAD and the host computer. CCITT Recommendation X.3 specifies the parameter settings on the PAD and X.75 specifies the interface between packet network.LOCAL AREA NETWORKLocal area data network , normally referred to simply as local area network or LANs, are used to interconnect distributed communities of computer-based DTEs located within a building or localized group of building. For example, a LAN may be used to interconnect workstations distributed around offices within a single building or a group of buildings such as a university campus. Alternatively, it may be complex. Since all the equipment is located within a single establishment, however, LANs are normally installed and maintained by the organization. Hence they are also referred to as private data networks.The main difference between a communication path established using a LAN and a connection made through a public data network is that a LAN normally offers much higher date transmission rates because of the relatively short physical separations involved. In the context of the ISO Reference Model for OSI, however, this difference manifests itself only at the lower networkdependent layers. In many instances the higher protocol layers in the reference model are the same for both types of network.Before describing the structure and operation of the different types of LAN, it is perhaps helpful to first identify some of the selection issues that must be considered. It should be stressed that this is only a summary; there are also many possible links between the tips of the branches associated with the figure.1.TopologyMost wide area networks, such as the PSTN, use a mesh (sometimes referred to as a network) topology. With LANs, however, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. The four topologies in common use are star, bus ,ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology, which is a variation a variation of the bus and ring. Sometimes it is called hub/tree topology.2. Transmission mediaTwisted pair, coaxial cable and optical fiber are the three main type of transmission medium used for LANs.3.Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs. They are carrier-sense-multiple-access with collision detection (CSMA/CD), for bus network topologies, and control token, for use with eitherbus or ring networks.CSMA/CD is used to control multiple-access networks. Each on the network “listens” before attempting to send a message, waiting for the “traffic” to clear. If two stations try to sent their messages at exactly the same time, a “collision” is detected, and both stations are required to “step back” and try later.Control token is another way of controlling access to a shared transmission medium that is by the use of a control (permission) token. This token is passed form one DTE to another according to a defined set of rules understood and adhered to by all DTEs connected to the medium. ADTE may only transmit a frame when it is in possession of the token and, after it has transmitted the frame, it passed the token on to allow another DTE to access the transmission medium.中文译文:计算机网络14.1 数据通信图14-1是数据通信链路的简化框图。