7 英文原文.doc
《7 英文原文.doc》由会员分享,可在线阅读,更多相关《7 英文原文.doc(4页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、ADDRESSESEach technology has its own convention for transmitting messages between two machines within the same network. On a LAN, messages are sent between machines by supplying the six byte unique identifier (the MAC address). In an SNA network, every machine has Logical Units with their own networ
2、k address. DECNET, Appletalk, and Novell IPX all have a scheme for assigning numbers to each local network and to each workstation attached to the network. On top of these local or vendor specific network addresses, TCP/IP assigns a unique number to every workstation in the world. This IP number is
3、a four byte value that, by convention, is expressed by converting each byte into a decimal number (0 to 255) and separating the bytes with a period. For example, the PC Lube and Tune server is 130.132.59.234. An organization begins by sending electronic mail to HostmasterINTERNIC.NET requesting assi
4、gnment of a network number. It is still possible for almost anyone to get assignment of a number for a small Class C network in which the first three bytes identify the network and the last byte identifies the individual computer. The author followed this procedure and was assigned the numbers 192.3
5、5.91.* for a network of computers at his house. Larger organizations can get a Class B network where the first two bytes identify the network and the last two bytes identify each of up to 64 thousand individual workstations. Yales Class B network is 130.132, so all computers with IP address 130.132.
6、*.* are connected through Yale. The organization then connects to the Internet through one of a dozen regional or specialized network suppliers. The network vendor is given the subscriber network number and adds it to the routing configuration in its own machines and those of the other major network
7、 suppliers. There is no mathematical formula that translates the numbers 192.35.91 or 130.132 into Yale University or New Haven, CT. The machines that manage large regional networks or the central Internet routers managed by the National Science Foundation can only locate these networks by looking e
8、ach network number up in a table. There are potentially thousands of Class B networks, and millions of Class C networks, but computer memory costs are low, so the tables are reasonable. Customers that connect to the Internet, even customers as large as IBM, do not need to maintain any information on
9、 other networks. They send all external data to the regional carrier to which they subscribe, and the regional carrier maintains the tables and does the appropriate routing.New Haven is in a border state, split 50-50 between the Yankees and the Red Sox. In this spirit, Yale recently switched its con
10、nection from the Middle Atlantic regional network to the New England carrier. When the switch occurred, tables in the other regional areas and in the national spine had to be updated, so that traffic for 130.132 was routed through Boston instead of New Jersey. The large network carriers handle the p
11、aperwork and can perform such a switch given sufficient notice. During a conversion period, the university was connected to both networks so that messages could arrive through either path. NETWORK FIREWALLSThe purpose of a network firewall is to provide a shell around the network which will protect
12、the systems connected to the network from various threats. The types of threats a firewall can protect against include:Unauthorized access to network resources-an intruder may break into a host on the network an gain unauthorized access to files.Denial of service an individual from outside of the ne
13、twork could, for example, send thousands of mail messages to a host on the net in an attempt to fill available disk space or load the network links.Masquerading electronic mail appearing to have originated from one individual could have been forged by another with the intent to embarrass or cause ha
14、rm.A firewall can reduce risks to network systems by filtering out inherently insecure network services .Network File System (NFS) services, for example , could be prevented from being used from outside of a network by blocking all NFS traffic to or from the network .This protects the individual hos
15、ts while still allowing the service, which is useful in a LAN environment , on the internal network . One way to avoid the problems associated with network computing would be to computing would be to completely disconnect an organizations internal network from any other external system. This, of cou
16、rse is not the preferred method. Instead what is needed is a way to filter access to the network while still allowing users access to the“outside world ”.In this configuration , the internet net work is separated from external network by a firewall gateway .A gateway is normally used to perform rela
17、y services between two networks . In the case of a firewall gateway, it also provides a filtering service which limits the types of information that can be passed to or from hosts located on the internal network .There are three basic techniques used for firewalls: packet filtering, circuit gateway,
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 英文原文 英文 原文
限制150内