TCPIP的介绍说明-外文翻译.docx
《TCPIP的介绍说明-外文翻译.docx》由会员分享,可在线阅读,更多相关《TCPIP的介绍说明-外文翻译.docx(12页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Introduction to TCP/IPSummary: TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the Internet). It was initially successful because it delivered a few basic services that everyo
2、ne needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP component provides routing from the department to the enterprise network, then
3、to regional networks, and finally to the global Internet. On the battlefield a communications network will sustain damage, so the DOD designed TCP/IP to be robust and automatically recover from any node or phone line failure. This design allows the construction of very large networks with less centr
4、al management. However, because of the automatic recovery, network problems can go undiagnosed and uncorrected for long periods of time. As with all other communications protocol, TCP/IP is composed of layers: IP - is responsible for moving packet of data from node to node. IP forwards each packet b
5、ased on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then ar
6、ound the world. TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. Sockets - is a name g
7、iven to the package of subroutines that provide access to TCP/IP on most systems. Network of Lowest Bidders The Army puts out a bid on a computer and DEC wins the bid. The Air Force puts out a bid and IBM wins. The Navy bid is won by Unisys. Then the President decides to invade Grenada and the armed
8、 forces discover that their computers cannot talk to each other. The DOD must build a network out of systems each of which, by law, was delivered by the lowest bidder on a single contract. The Internet Protocol was developed to create a Network of Networks (the Internet). Individual machines are fir
9、st connected to a LAN (Ethernet or Token Ring). TCP/IP shares the LAN with other uses (a Novell file server, Windows for Workgroups peer systems). One device provides the TCP/IP connection between the LAN and the rest of the world. To insure that all types of systems from all vendors can communicate
10、, TCP/IP is absolutely standardized on the LAN. However, larger networks based on long distances and phone lines are more volatile. In the US, many large corporations would wish to reuse large internal networks based on IBMs SNA. In Europe, the national phone companies traditionally standardize on X
11、.25. However, the sudden explosion of high speed microprocessors, fiber optics, and digital phone systems has created a burst of new options: ISDN, frame relay, FDDI, Asynchronous Transfer Mode (ATM). New technologies arise and become obsolete within a few years. With cable TV and phone companies co
12、mpeting to build the National Information Superhighway, no single standard can govern citywide, nationwide, or worldwide communications. The original design of TCP/IP as a Network of Networks fits nicely within the current technological uncertainty. TCP/IP data can be sent across a LAN, or it can be
13、 carried within an internal corporate SNA network, or it can piggyback on the cable TV service. Furthermore, machines connected to any of these networks can communicate to any other network through gateways supplied by the network vendor. Addresses Each technology has its own convention for transmit
14、ting messages between two machines within the same network. On a LAN, messages are sent between machines by supplying the six byte unique identifier (the MAC address). In an SNA network, every machine has Logical Units with their own network address. DECNET, Appletalk, and Novell IPX all have a sche
15、me for assigning numbers to each local network and to each workstation attached to the network. On top of these local or vendor specific network addresses, TCP/IP assigns a unique number to every workstation in the world. This IP number is a four byte value that, by convention, is expressed by conve
16、rting each byte into a decimal number (0 to 255) and separating the bytes with a period. For example, the PC Lube and Tune server is 130.132.59.234. An organization begins by sending electronic mail to HostmasterINTERNIC.NET requesting assignment of a network number. It is still possible for almost
17、anyone to get assignment of a number for a small Class C network in which the first three bytes identify the network and the last byte identifies the individual computer. The author followed this procedure and was assigned the numbers 192.35.91.* for a network of computers at his house. Larger organ
18、izations can get a Class B network where the first two bytes identify the network and the last two bytes identify each of up to 64 thousand individual workstations. Yales Class B network is 130.132, so all computers with IP address 130.132.*.* are connected through Yale. The organization then connec
19、ts to the Internet through one of a dozen regional or specialized network suppliers. The network vendor is given the subscriber network number and adds it to the routing configuration in its own machines and those of the other major network suppliers. There is no mathematical formula that translates
20、 the numbers 192.35.91 or 130.132 into Yale University or New Haven, CT. The machines that manage large regional networks or the central Internet routers managed by the National Science Foundation can only locate these networks by looking each network number up in a table. There are potentially thou
21、sands of Class B networks, and millions of Class C networks, but computer memory costs are low, so the tables are reasonable. Customers that connect to the Internet, even customers as large as IBM, do not need to maintain any information on other networks. They send all external data to the regional
22、 carrier to which they subscribe, and the regional carrier maintains the tables and does the appropriate routing. New Haven is in a border state, split 50-50 between the Yankees and the Red Sox. In this spirit, Yale recently switched its connection from the Middle Atlantic regional network to the Ne
23、w England carrier. When the switch occurred, tables in the other regional areas and in the national spine had to be updated, so that traffic for 130.132 was routed through Boston instead of New Jersey. The large network carriers handle the paperwork and can perform such a switch given sufficient not
24、ice. During a conversion period, the university was connected to both networks so that messages could arrive through either path. Subnets Although the individual subscribers do not need to tabulate network numbers or provide explicit routing, it is convenient for most Class B networks to be internal
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TCPIP 介绍 说明 外文 翻译
限制150内