Comprehensive sharing and organic collaboration of resources
open5 entries with the same name
Network technology is a new technology developed from the mid-1990s, which integrates scattered resources on the Internet intoOrganic entiretyTo realize the comprehensive sharing and organic collaboration of resources, so that people can transparently use the overall capacity of resources and obtain information on demand.Resources includeHigh performance computer, storage resourcesData resources、information resources、Knowledge resources, expert resourcesLarge database, network, sensor, etc.The current Internet is limited to information sharing, and the network is considered to be the third stage of the development of the Internet.The network can be constructedRegionalNetwork, enterprise internal network, LAN network, and evenHome NetworkAnd personal networks.The fundamental characteristic of the network is not necessarily its size.
Chinese name
network technique
Foreign name
network technique
Rise time
Mid 1990s
Features
Comprehensive sharing and organic collaboration of resources
InternetScope of applicationFrom the earliest military and national defense, it has expanded to domestic academic institutions in the United States, and then quickly covered all fields around the world. The nature of operations has also changed fromscientific researchEducation oriented gradually turned to commercialization.
In scientific research, we often encounter the problem of "sowing seeds and reaping beans". The emergence of the Internet is just like this: its prototype is 1969U.S. Department of DefenseThe network established by the Advanced Research Projects Agency for military experiments is calledARPANET,At the beginning, there were only four hostsdesign goal When part of the networkCauses of warWhen damaged, the rest can still operate normally;In the early 1980s, ARPA and the Communications Agency of the US Department of Defense successfully developedHeterogeneous networkOfTCP/IPAgreement and put into use;In 1986US CongressSupported by the National Science FoundationCommunication lineConnect some supercomputers distributed in different places and replace ARPANET with NFSNET;After more than ten years of development, the Internet came into being.
In the early 1990s, China joined the Internet as the 71st national network, and China has opened the Internet to the public through Chinainterconnection network(CHINANET)Or China Education and Research Network (CERNET) can be connected to the Internet.As long as there is a microcomputerModemAnd a domestic direct dial telephone can easily enjoy Internet resources;This is one of the reasons why the Internet gradually "climbs" into ordinary people's homes;Second, friendly user interface, richinformation resourcesThe humanized feeling close to life enables non professional family users to not only apply freely, but also feast their eyes on it, and even use it to enhance their work, study and life, and truly achieve "staying at home, you can accomplish things in the world, and be smart and contemporary".
1. Skillfully master the establishment and maintenance of enterprise network, and master the networkGeneric cablingBasic method.
2. Install and maintain the architecture and management of windows server.
Employment direction
be engaged inSmall and medium-sized enterprisesNetwork management and Windows server construction, network construction, network operation, network application, etc.
5. EnterpriseMail systemOrganization and maintenance (optional)
6. Enterprise Server Advanced Application (Elective)
Project Practice III: Intelligenceapplication systemExpansion, deepening and comprehensive practice
Stage training objectives
1. Install and manage various Linux environmentsapplication service;Completed independentlyEnterprise networkDaily operation and maintenance of.2. Be able to skillfully use and debug network equipment to set up the campus network and quickly eliminate network operation failures
The Internet is so wonderful that beginners can't help wondering: What can it do?In general, the Internet is a set of applications that complete useful communication tasks through the network. The following section will start with applications and show some of the most popular functions of the Internet, including:E-mail, WWW, file transferRemote login、Newsgroups, information inquiry, etc.
E-mail
E-mail
With the global access to the Internet, the first thing people think of is that they can use it to provide personal communication, and this communication should be able to combine the speed of telephone and the reliability of postal services.This idea takes root, sprouts and grows, and the final fruit isEmail。Through it, everyone can have their own private mailbox to store the letters that have been received but have not yet been read. The email address includesuser nameaddhost name, and separated by the @ symbol in the middle, such as the communication between two people at the beginningE-mail softwareMore complex and diverse services can be realized, including:One to many's sending, forwarding and replying, including voice, image, etcMultimedia informationEtc;It can even be done as long as your mail arrives and hangs on youbeeperGive prompt on beeping;People can also order the information they need online just like they order newspapers and magazines, and send it to them regularly via email.
WWW
World Wide Web (usually called WWW) is often translated into Chinese“web”In addition to the similar pronunciation, it also reflects its varied connotation.With the help of a browser software, users canAddress barEnter the page address (or domain name) you want to view, and then you can connect to the WWW server pointed to by the address to find the required image and text information.WWW access feels like shopping malls. You can wander aimlessly or move forward with a goal;However, when users finally get the content they want, they may have crossed thousands of mountains and rivers, so it is sometimes called "Web surfing".The page content stored by WWW server isHTMLWritten in Hyper Text Mark up LanguageHTTPThe Hyper Text Transferring Protocol is transferred to the user.
file transfer
Although e-mail can also deliver documents, it is generally used for shortinformation transfer。The Internet providesFTP(File Transfer Protocol), which enables users to send or receive very largedata file: When the user issues an FTP command, connect to theFTP serverAfter that, you can enter the command to display the storedFile directory, or copy files from a directory and transfer them to your computer through the network.FTP server provides an authenticationUser permissionsMethod (user name and password are used) to limit nonAuthorized userAccess to.However, manysystem administratorIn order to expand the impact, the anonymous ftp service setting is opened - anonymous ftp allows users without registered names or passwords to access specified files on the machine, and the special user name it uses is "anonymous".
Remote login
Remote loginUsers are allowed to connect from one machine to another remote machine and establish an interactive login connection.After logging in, each keystroke of the user is transmitted to the remote host, which processes the characters and sends them back to the local machine, as if the user is directly operating on the remote host.Remote login usually requires a valid login account to accept the authentication of the other host.Common login programs include TELNET, RLOGIN, etc.
Usenet newsgroup
UsenetNews is a discussion group on the Internet.Usenet organizes discussions under a set of titles called "newsgroups". Users can read the news sent by others or publish their own articles.NewsgroupsThere are dozens of categories and thousands of groups of "news", and on average, hundreds of "news" are published in each group every day.The way of news group intervention is also very casual. You can talk loudly, ask questions, or just watch others talk.The above list is only the main content of the Internet Cultural Corridor, but not all.The Internet is always developing and bringing forth new ideas. This will be the next content of the InternetDevelopment trend。Network researchOriginated in the past decadeU.S. governmentHigh performance computing research project supported by.The goal of this study is to integrate multipleHigh performance computer、Large databaseLarge scientific research equipmentCommunication equipment, visualization equipment and various sensors into a huge supercomputer systemTo support scientific computing andscientific research。
MicrosoftThe company developsConcentrationOn the data network, focus on the use ofNetwork sharingInformation, not networkComputing power, which reflects differences in academic and research fields.In fact, many network technologies used in academic fields can become commercial applications.
Globus is ArgonneNational LaboratoryNetwork technology ofR&D projects12 universities and research institutions across the United States participated in the project.Globus Yesresource management, safetyinformation serviceAnd data managementnetwork computingAnd develop network computing tools that can run on various platforms to help plan and build large networksTest platform, develop large-scale applications suitable for large-scale network system operation.Globus technology hasAmerican SpaceIt has been applied in 8 projects, including the Bureau Network, the European Data Network and the National Technology Network of the United States.In August 2005, IBM(IBM)Announcing billions of dollars in research and development of network computing, and GlobusCooperative developmentOpen network computing standards, and claimed that the value of the network is not only limited to scientific computing, but also has good prospects for commercial applications.network computingAnd Globus have received unprecedented attention from behind the scenes to the front stage.
China attaches great importance to the development of network technology863 ProgramChina's national network project supported by the major special project of "high-performance computers and their core software" has made innovative achievements in high-performance computers, network software, network environment and applications.It has 18 trillion times of aggregate computing capacity, supports network research andnetwork applicationOfNetwork testBed, China's national network, was officially put into operation on December 21, 2005.This means that through network technology, China has been able to effectively integrate across the countryMainframeTo form a powerfulComputing platform, help scientific research institutions andscientific and technical workerTo share computing resourcesdata sharingAnd collaboration.
key technology
Announce
edit
Networkedkey technology yesNetwork nodeBroadband network systemresource managementandtask scheduling Tools, application layer visualization tools.The network node isnetwork computingResource providers, including high-end serversCluster systemLarge MPP systemstorage device, database, etc.broadbandNetwork systemIt is a necessary means to provide high-performance communication in the network computing environment.Resource management and task scheduling tools are used to solve key problems such as resource description, organization and management.The task scheduling tool performs tasks in the system according to the current system loaddynamic scheduling, improve the system'soperating efficiency 。Network computing is mainlyScientific computing, which is often accompanied bymass data 。If the calculation results are converted into intuitiveGraphic informationCan help researchers get rid of difficulties in understanding data.This needs to develop the ability to transmit and read in network computing, and provide friendlyuser interfaceVisual tools for.
research status
Announce
edit
Network computing usually focuses on large-scale application projects. According to Globus technology, large-scale application projects should be completed by many organizations, which form a“virtual organization ”The computing resources owned by each organization are shared in the virtual organization to complete the project collaboratively.For sharing, what is valuable is not the device itself but the interface or interface of the entity.
From a technical perspective, sharing is the interoperability of resources or entities.Globus technology settings,network environment The interoperability under means that a set of general protocols need to be developed to describe the message format and message exchange rules.A series of services need to be developed based on the TCP/IP protocol/Internet Protocol)Onweb services The principle is the same.Define the application first in the serviceProgramming interface, based on these interfacesSoftware development tools。
Globus network computing protocol is established inInternet ProtocolBased on the communication, routing, name resolution and other functions in the Internet protocol.Globus protocol is divided into construction layeradjoining course, resource layer, collection layer and application layer.Each layer has its own services, application programming interfaces and software development tools, and services where the upper layer protocol calls the lower layer protocol.Global applications in the network need to call the operating system through the services provided by the protocol.
The function of the construction layer is to provide shared resources in the network, which is a physical or logical entity.frequently-usedshared resourceIncluding processing capacitystorage system , Contentsnetwork resource、distributed file system , distributed computer poolComputer clusterEtc.The connection layer is the network in the networktransaction processingCommunication andAuthorization controlThe core agreement of.Between resources submitted by the construction layerData exchangeAll are implemented under the control of this layer.Authorization verification and security control between resources are also implemented here.The role of the resource layer is to control a single resource, perform security handshake with available resources, initialize resources, monitor resource operation, and count resource usage data related to payment.The function of the collection layer is to collect the controlled resources submitted by the resource layer for the virtual organizationapplication programShare, call.In order to manage and control the sharing from applications, the aggregation layer providesdirectory services 、resource allocation , schedule, resource agentResource monitoringDiagnosis, network startupload control , account management and other functions.The application layer is the application program of users on the network. It first calls the corresponding service through the application programming interface of each layer, and then calls the resources on the network through the service to complete the task.Application development involves a lot ofLibrary function。In order to facilitate the development of network applications, it is necessary to build supportnetwork computingLibrary functions for.
GlobusArchitectureIt has been adopted by some large networks.Researchers have beenweather forecast, high energyphysical experiment , aircraft research and other fields have developed some applications based on Globus network computing.Although these applications are still experimental, they prove that network computing can accomplish a lotSupercomputerIncompetent large application tasks.It can be predicted that network technology will soon set off the next wave of Internet waves.Facing the comingThird generation InternetApplications, manydeveloped countryThey have invested a lot of research funds, hoping to seize the opportunity and grasp the future destiny.
China has also increased its investment in networking.The Computing Institute of the Chinese Academy of Sciences named its own network“VegaVega Grid, which aims to have large-scale data processingHigh performance computing、resource sharingAnd improve resourcesUtilizationAbility.And other domestic and foreignNetwork researchCompared with projects, the biggest feature of Vega Network is "service network".Many industries in China, such as energy, transportation, meteorology, water conservancy, agriculture and forestry, education, environmental protection, etc., are critical to high performanceComputing networkI.einformation networkThe demand for.It is expected to see more networks in two or three yearsTechnology applicationexample.
application area
Announce
edit
Network technologyapplication area It is very wide, mainly in the following aspects.
Distributed instrumentSystem Distributed Instrument System UsageNetwork managementValuable instrument systems distributed around the country provide a means of remote access to instruments and equipment to improve the utilization rate of instruments and facilitate the use of users.
Data intensive computingParallel computingThe technology is often driven by some computing intensive applications, especially some applications with huge challenges, which greatly promotes the high performanceParallel Architecture、Programming environment, large-scale visualization and other fields.The applications of data intensive computing are much more than those of computing intensive computing, and its corresponding data network focuses more on data storage, transmission and processing,Computing networkIt focuses more on the improvement of computing power.The leading project in this field is the DataGrid project carried out by the European Nuclear Center, which aims to deal with theLarge Hadron ColliderPB/s magnitude continuously generatedexperimental data 。
Remote immersion is a special networked virtual reality environment.It is a realistic reflection of reality or history, and visualizes high-performance computing results or databases."Immersion" means that people can fully integrate into it: participants from different places gather in the same place through the networkvirtual spaceYou can roam freely, communicate with each other, andvirtual environmentInteract to make it change.Dozens of remote immersion applications have been developed, including virtualhistory museum, Collaborationlearning environmentEtc.Remote immersion can be widely used for interactionScientific visualization, education, training, art, entertainmentindustrial design, information visualization and many other fields.
information integration The network was originally integratedHeterogeneous computingThe identity of the platform appears, and then enters the field of distributed massive data processing.Information network through unifiedinformation switchingArchitecture and a large number ofmiddleware And provide users with "information is readily available" services.Network information integration will be more applied to business. Applications and information distributed around the world can be seamlessly integrated and communicated through the network, thus forming new business opportunities.
Information integration, such as information network, service networkKnowledge networkAnd so on, which is the popular application direction of the network in recent years.In 2002, the Globus Alliance and IBMOnline forumPosted onOpennessnetwork serviceThe architecture and its detailed specifications combine the Globus standard with the support of commercialwebService standardsCombine.In 2004, the Globus Alliance, IBM andHP(HP) and others jointly released a new network standard draft, transforming the detailed specification I of the open network service architecture into six specifications for expanding the World Wide Web services. Network services have been completely integrated with the World Wide Web services, marking the advent of the era of network commercialization.
Standards are the key to the development of network technology.Just like the TCP/IP protocol isInternetAs the core of, building network computing also needs to define the core - standard protocols and services.Some standardization groups are taking active action.So far, although there is no formal standard for network computingcore technology The relevant institutions and enterprises have reached an agreement that the United StatesArgonne National LaboratoryAndUniversity of Southern Californiainformation scienceThe Globus computing tool software jointly developed by the college has become the actual standard of network computing, and 12 famous computer and software manufacturers have announced that they will use Globus computing tool software.As an open architecture andOpen standardsInfrastructure, Globus computing tool software provides many basic services needed to build network applications, such as securityResource discovery, resource management, data access, etc.All major network projects are based on the protocols and services provided by Globus computing tool software.
In addition to standards, the lack of security, manageability and talent is also an urgent problem for network computing, otherwise it will not become the business architecture of enterprises.Many problems still need to be solved before commercial applications can be realized.Even so, the prospect of building a global network is still irresistible.
In addition, the application of network technology also gave birth toCyberlinguistics。This doorEmerging disciplinesIt is a well-known scholar in ChinaZhou HaizhongIt was first proposed by professor in 2000.In his article "A New Language Discipline -- Cyberlinguistics", he studied the object of cyber linguisticsresearch method, research tasks, subject attributes and positioning issues, etc;Since then, cyber linguistics has attracted the attention of the international academic community.
major function
Announce
edit
In general,computer networkThe following main functions can be provided:
resource sharing
The emergence of the network makes resource sharing very simple. Both sides of the communication can cross the barriers of time and space and transmit information anytime and anywhere.
Load balancing is also a specialty of the network.A typical example: a largeICP(InternetContent Provider)In order to support more users to visit his website, WWW servers with the same content have been placed in many places around the world;Through certain techniques, users in different regions can see the same page placed on the server nearest to them, so as to achieve load balance of each server, and users can save many wasted roads.
A major trend of network development is multidimensional, that is, to provide integrated information services on a set of systems, including resources from political, economic, and other aspects, and even at the same time provideMultimedia information, such as image, voice, animation, etc.In the trend of multidimensional development, many new forms of network applications are emerging, such as:
① E-mail -- this should be one of the most convenient ways for people to communicate online.The recipient does not have to be online when sending an email, but he can see his own letters whenever he opens his mailbox in the future.
②Online transactionIt is to do business through the Internet.Some of them are to be settled directly through the network, which requires a higher security of the network.
③video on demandThis is a new entertainment or learning projectIntelligent community, hotels or schools.Its form is similar to TV station selection, but the content of the program is transmitted through the network.
④ Online conference - also known as video conference, as the name implies, is to hold meetings through the network.It is related tovideo on demandThe difference is that all participants need to actively send images to the outside world. In order to achieve real-time simultaneous transmission of data, images, and sounds, it hasprocessing speed Put forward the highest requirements.
The above functions of the network are just a few examples. We will use more detailed cases in the future to enrich your understanding of the network.
Classification composition
Announce
edit
On what basis and how is the network composed?
There are many types of computer networks, and there are different classifications.Network PressSwitching technologyIt can be divided into: line switching networkPacket switched network;PressTransmission technologyIt can be divided into: broadcast network, non broadcast multiple access network, point-to-point network;
According to topological structure, it can be divided into general line, star, ring, tree, full mesh and partialMesh network;PressTransmission mediumIt can also be divided intoCoaxial cable, twisted pair, optical fiber or satellite.Here we mainly talk about the network divided according to the network distribution scale: LAN, MANWANAnd inter network.
A network formed by interconnecting various communication devices in a small area,CoverageGenerally confined to rooms, buildings or parks.LAN is characterized by short distance, small delayData rateHigh and reliable transmission.
*The network interface card (NIC) is plugged into the computera main boardSlot, which is responsible for transferringdata conversionFor the format recognized by other devices on the networkNetwork mediaTransmission.Its main technical parameters are bandwidth, bus mode, electricalInterface modeEtc.
*Hub(Hub) is a single bus shared device, providing manynetwork interface, is responsible for connecting multiple computers in the network.The so-called sharing means that all ports of the hub share one portdata busTherefore, the average amount and rate of data transmitted by each user (port) are limited by the total number of active users (ports).Its main performance parameters includeTotal bandwidth、Number of ports, intelligence (whether network management is supported), scalability (Yes NocascadeAnd stacking), etc.
*Switchswitching hub 。It also has many interfaces, providing multiplenetwork nodeInterconnection.However, its performance is greatly improved than that of a shared hub: it is equivalent to having multiple buses, so that each port device can independently transmit data without being affected by other devices. In front of users, each port has independent and fixed bandwidth.In addition, the switch also has functions that the hub lacks, such as data filteringNetwork Segmentation, broadcast control, etc.
*The distance expansion of cable LAN needs to be realized through cables. Different LANs have different connecting cables, such as optical fiberTwisted pair, coaxial cable, etc.
Metropolitan area network
MAN(Metropolitan Area Network)
The coverage of MAN is limited to one city, and there are few targeted technologies for the metropolitan area network, which are generally based on the actual situation through the LAN orWANTo achieve.
WAN connectionThe geographical scope is large, often a country or a continent.The purpose is to make the remote distribution ofLAN interconnection, so its structure is divided into end systems (user sets at both ends) andcommunication system (intermediate link).The communication system isWANIt mainly includes the following:
*Public telephone networkPSTN(Public Switched Telephone Network), with a speed of 9600bps~28.8kbps, and a maximum of 115.2kbps after compression. The transmission medium is an ordinary telephone line.It is characterized by low cost, easy establishment and wide distribution.
*Integrated Services Digital NetworkI.eISDN(Integrated Service Digital Network) is also a dial-up connection mode.The low-speed interface is 128kbps (high-speed up to 2M). It uses ISDN lines or installs ISDN services on ordinary telephone lines through telecommunications bureaus.ISDN is a numbertransmission modeIt has the characteristics of fast connection and reliable transmission, and supports the number identification of the other party.ISDN charges slightly more than ordinary phones, but its dual channels enable it to support two independent applications at the same time, which is more suitable for individuals or small officesNetwork accessMode.
*The leased line, called DDN in China, is a point-to-point connection mode with a speed of 64kbps~2.048Mbps.The advantage of the special line is that the data transmission is better guaranteed and the bandwidth is constant;But the price is expensive, and the point-to-point structure is not flexible enough.
*X.25Web is an early and still widely usedWANMode, the speed is 9600bps~64kbps;It has redundant error correction function and high reliability, but the side effects are slow speed and large delay;
*Frame relayFrame Relay is a relatively new technology developed on the basis of X.25. The speed is generally 64kbps~2.048Mbps.Frame relay is characterized by flexibility: it can realize one to many connection, andLarge timeIt can transmit data beyond the agreed rate, and is a good connection option for commercial users.
*Asynchronous Transfer Mode (ATM) is aCell exchangeThe network is characterized by high speed, low delay and guaranteed transmission quality.ATM mostly uses optical fiber asConnecting mediaThe speed can be as high as gigabit (109bps), but the cost is also high.
WANThe difference from LAN is that the line usually needs to be paid.Most enterprises cannot build their own lines, but need to rent existing links, so most of the cost of WAN is spent here.People often consider how to optimize the bandwidth and use "good knives on the blade".
Common WAN devices include:
*Router(Router)The WAN communication process looks for the path to the destination according to the address. This process is called "Routing" in the WAN.Routers are responsible for establishing routes between each WAN and LAN according to the address, and sending data to the final destination.
*Modem(Modem)As a signal conversion equipment between terminal system and communication system, it is one of the essential equipment in WAN.There are two types: synchronous and asynchronous. They are respectively used to connect with the synchronous and asynchronous serial ports of the router. Synchronous can be used for special linesFrame relay, X.25, etc., asynchronous connection is used for PSTN.
Inter network
The Internet is a series of local area networks andWANTherefore, the technology included is also the existing LAN andWAN Technologies Synthesis of.The Internet is currently the largest and most typical inter network.
Problems
Announce
edit
In the first part, we talked about the brief history of Internet development and its applications in all aspects.Because of the InternetRich and colorfulWill attract more and more people to join in: For users, the Internet is gradually penetrating into all aspects of our work and life, greatly changing theTraditional thinkingAnd lifestyle;As for the Internet, the active participation of users has led to the rapid expansion of this global network?ToleranceFaced with bandwidth shortageIP addressResources shortage and other severe challenges.
Bandwidth shortage
According to mid 1995 estimates, there were more than 150countries and regions More than 60000 networks are connected to the Internet, about 4.5 million computers are connected to the network, and 40 million users directly use the Internet.Today, the Internet has been opened to most countries and regions in the world. A new network is connected almost every 30 minutes, and the number of hosts quadruples every year,Number of usersIt is estimated that by the end of this century and the beginning of the next century, the Internet will connect nearly 100 million computers, reaching one billion users.It is difficult for people to accurately estimate the future.In any case, these figures are enough to explain the crisis of the Internet: just like a steel wire rope with many heavy objects suspended, the rope is in danger of breaking as the weight increases;In fact, users travel on the Internet through many such "wire ropes". The more users there are, the heavier the load of the rope is. If any of them is not solid, it will become a bottleneck, leading to network access failure.Therefore, the reinforcement of "steel wire rope" - the increase of bandwidth capacity is imperative, from Internet backbone to branch toend userMany mature or developing link technologies have emerged to meet this demand. We will focus on the types of links that users care about mostAccess technology。
Lack of IP address
We introducedIP addressThe format and classification ofIPv4- It is a 32-bitBinary numberTherefore, the total address capacity is 232, that is, hundreds of millions of addresses.And according toTCP/IP protocol(Like many other protocols), each node in the interconnected network must have its own unique address as an identifier. Obviously, compared with the growing number of users mentioned above, the existing IP address resources have been overwhelmed and will soon be used up - some predictions indicate that the InternetDevelopment speedCalculation, allIPv4 addressThe distribution will be completed between 2005 and 2010.
One way to solve the problem of IP address shortage is to find a way to delay resource exhaustion. At present, the most widely used technology is NAT (Network Address Translation,network addressIt enables enterprise users to use self defined addresses in internal network applications and translate them into legal Internet addresses only when Internet access is required;Its biggest advantage is that users do not need to change the internal address structure when they join the Internet, but only need to implement it at the internal and external boundariesaddress translation, and multiple users can reuse the same legal address, thereby greatly saving address resources;However, NAT conversion also increases the complexity of the network, and it can not prevent the trend of decreasing available addresses.
As a pairIPv4To solve the problem, a new definition of IP address came into being, which is described belowIPv6。
Develop technology
Announce
edit
How to solve the problem of InternetDevelopment bottleneck?What is the new application trend of Internet?
The development of the Internet is first to get out of the predicament and expand the capacity, and then it is possible to continue to launch new applications and use them freely.We will start with the development of network lines and talk about the communication hotspotsBroadband access technology, and the new application trend of Internet.
Access technology
Access technology is also called“Last kilometer”Technology, which refers to a connection from the end user to the local telecommunication service provider.What you are familiar with arePSTNDial up, ISDN, leased line and other technologies, and access in recent yearstechnological development Fast and mature:
ADSLalso calledasymmetric digital subscriber line, DSL family technology (HDSL, VDSLIDSLAnd so on).Its biggest advantage is to use the existing telephoneTwisted pairAsTransmission medium, so the cost is low;The access bandwidth is relativelyTelephone lineThe PSTN transmitted (currently the highest is 115.2Kbps) is much fasterOffice terminalTo user'sDownlink rateTheoretically, it can reach 7-8M, and the actual downlink rate is generally 1.5-2MbpsUplink rateIt is hundreds of Kbps, which is also much higher than PSTN;ADSLAsymmetryAndend userThe network access characteristics of are consistent -- most applications of individual users obtain data from the Internet in the form of customers, such as WWW and FTP, and only send a large amount of data to the network in a few times, such as sending attachedMultimedia informationAs a result, the amount of downlink data is large and the amount of uplink data is small, which is also asymmetric.
CableModemIt is a very suitable access technology for home users.It's inCable televisionOn the basis ofDistribution networkThe backbone ofService nodeCompleted atphotoelectric conversion , and thenCoaxial cabletakeTransmission signalDelivered to users' homes, it can effectively realize Internet access, TV on demand, data phone and other services, and has broad market prospects.Cable transmission is also asymmetric. The downlink rate of each service node can reach 10-30Mbps and the uplink rate can reach about 2M. However, unlike ADSL, it is a shared network. The actual available bandwidth per user is inversely proportional to the number of Internet users connected to the node. Even so, the bandwidth that users can enjoy is considerable.
The biggest obstacle to the application and development of cable modems is the two-way transformation of cable lines -- traditionalCable TVMostlyOne way transmission;The data access is bidirectional, so the line transformation must be implemented to adapt to thisItem newApplication of.There is also a temporary solution before the transformation is completed: downwardData transferTV cable is used, and telephone cable is used for uplink dataEcho。
(3) It is derived from the dedicated wireless local loop system, which adopts high power, large coverage and low cost.With its unique advantages, it was quickly accepted by the market and developed rapidly.Almost all the major communication companies in the world have typical products.
CDMA(Code Division Multiple Access)Compared with its derivative wireless local loop technology, it has incomparable advantages with other wireless access technologies and represents the development direction of wireless access technology.
The development of access technology fully reflects“Triple play ”Application trend of ADSL: ADSL uses the original voice carrier telephone line to transmit data, cableModemUse the originalImage carrierCable TV transmits data, which everyone is familiar withIP phoneVoice is transmitted through various data carriers.Therefore, the futureData networkThe TV network and the telephone network will no longer be isolated from each other, and they will jointly undertake data, voice, and image integration services, easing the pressure on Internet bandwidth.
IPv6 technology
Just when people are worried about the problems faced by IPv4, IPv6 appears, which brings people a near perfect solution:
● Asphone numberJust like the upgrade, IPv6 provides 128 bit IP addresses, which greatly increases the number of addresses, thus solving the IP address resource crisis;
● IPv6 adopts the structure of "aggregatable global unified computing address", which makes the IP address structure the same as that of the networktopological structure (connection form), thus reducing the size ofRouting table, enabling routers to efficiently determine routes;
● IPv6 has the function of automatically assigning IP addresses to users, which greatly reduces the networkAdministrative expenses。
Although IPv6 has obvious advantages over IPv4, there are many practical difficulties in upgrading addresses worldwide.To this end, the Internet Research OrganizationIETFA set of transition scheme from IPv4 to IPv6 has been formulated, including three mechanisms: IPv4 compatibleIPv6 address, dual IP protocol stack and IPv6 based on IPv4 tunnel.
Electronic Commerce
In the first chapter of the history of Internet development, we introduced various Internet based applications, but they are just the means people use to achieve certain goals, just like primitive people learned to use tools.E-Commerce is a comprehensive transformation of various technologies based on network applications in all walks of life, showing a new and bright world for people.Electronic commerce may not be completed through the Internet, but the rapid development of the Internet has provided fertile ground for it to take root.FamousAmazonThe company should say that it dares to be the first to build its own booksSupporting servicesOur huge empire has become a model of e-commerce operation.Compared with the applications mentioned before, e-commerce is more like a concept, and its implementation has no fixed format.Use various technologies on the Internet or your own network to buildIntranet、ExtranetAmong them, the formulation of strategies is the key to development.Regardless of the progress, e-commerce is bound to be a major development trend of Internet applications.
Looking at the development history of the Internet for more than ten years, it is hard to tell what it will be like in the future, but the Internet will continue to change our lives and promotehuman civilizationNo one can deny the development of.
A protocol is a combination of a series of regulations on the way in which devices in the network exchange information. It determines the rate of information exchange, transmission code, code structureTransmission controlStep, error control and many other parameters are defined.
The network is interconnectedLarge groupsTherefore, if you want to join this group, you can't do whatever you want.Just as a country or a race has its own language, everyone must be familiar with it and use it to talk, each node in the interconnected network also needs to have a common "language" according to itsDefined rulesTo control the transmission of data, this language is often heard of as "protocol".The protocol defines a number of parameters such as a br/>code, code structure, transmission control steps, and error control for how the devices in the network exchange information.
For network beginners, complicated protocols often make peopleheadacheNo -- what role do these agreements play?What is the connection between them?Why does Agreement A need to supplement Agreement B?These problems are unclear and often become obstacles to further learning.In fact, this problem should be understood as follows: there were nationalities with different languages first, and then with the development of society, there was a need for communication between different nationalities.The same is true of the network. At first, people only need to make some simple agreements to ensure that users within a limited range comply with the network;Laternetwork size More and more big, so we can consider making more strictRules and regulationsI.e. agreement;In order to realize the interconnection of multiple different networks, many new protocols will be added as supplements or grow into new unified standards.
Data transmission from source to destination in the network requires a series of processing. To facilitate understanding, let's use a metaphor here.If we compare the data to chocolate, we can use the equipment for processing chocolate as the source and the consumers' hands as the purpose to see what will happenTransmission process。Chocolate factories usually add a layer of packaging to each chocolate, and then put several chocolate boxes into one chocolate box, and then put several chocolate boxes into oneOuter packaging,Transportation companyMany boxes of chocolates will also be put into a container. After arriving in the city where the consumers live, the carriers, wholesalers, retailers and consumers will open different packaging layers.Different levels of packaging and unpacking require different specifications and equipment, and computer networks also have different packaging and transmission levelsInternational Organization for StandardizationISO was proposed in 1978“Open Systems Interconnection Reference Model”, that is, the famousOSI(OpenSystemInterconnection)Seven layer model, which will be introduced in the following pages, and will not be discussed here.The protocol of the network is used for these differentnetwork layerOfCode of conductOf.The network has formed many differentprotocol familyEach protocol family has corresponding protocols at each layer of the network, among which the ICP/IP protocol family is the Internet specification, which is also what we are going to talk about today.
Definition, hierarchy and function of TCP/IP protocol
What is TCP/IP protocol, divided into several layers, and what are their functions?
TCP/IP (Transmission Control Protocol/Internet Protocol) is the most widely used protocol in the world at present. Its popularity is closely related to the rapid development of the Internet,TCP/IP has proved to do this, makingNetwork interconnectionBecome easy to get up
Come, and let more and more networks join in, become the Internet'sFactual criterion。
*Application layer -- The application layer is the general name of the applications that all users are facing.TCP/IP protocol family has many protocols at this level to support different applications. Many familiar Internet based applications can not be realized without these protocols.If we conductweb(WWW) Access uses HTTP protocol and file transferFTP protocol, for sending e-mailSMTPDNS protocol for domain name resolution and remote loginTelnetProtocols and so on belong to the TCP/IP application layer;As far as users are concerned, they see that most of the operating interfaces built by software are graphical, while the actual background running is the above protocol.
*Transport layer - This layer is mainly used to provide communication between applications,TCP/The IP protocol family includes TCP andUDP。
*Network layer - TCP/IPA key layer in the protocol family, which mainly defines the IP address format, so that data of different application types can be transmitted smoothly on the Internet. IP protocol is aNetwork layer protocol。
*Network interface layer-- This is the lowest layer of TCP/IP software, responsible for receiving IP addressesdata packetAnd send it through the network, or receive physical frames from the network and extractIP datagram, toIP layer。
TCP (Transmission ControlProtocol)And UDP (User Datagram Protocol) are transport layer protocols.TCP provides data in the IP environmentReliable transmission, its services includedata streamTransmission, reliability and effectivenessFlow control、full duplexOperation andMultiplexing。adoptConnection oriented、end to endAnd reliable packet transmission.Generally speaking, it is to create a well connected channel for the data sent in advance, and thenData transmission;UDP does not provide reliability, flow control or error recovery functions for IP.Generally speaking, TCP corresponds to applications with high reliability requirements, while UDP corresponds to applications with low reliability requirements and economical transmission.TCP supportedapplication protocol Mainly:Telnet、FTP, SMTP, etc;The application layer protocols supported by UDP mainly include: NFS(Network File System)、SNMP(Simple Network Management Protocol), DNS (Primary Domain Name System), TFTP (Universal File Transfer Protocol), etc.
Definition of IP protocol, classification and characteristics of IP address
What is an IP protocol? How are IP addresses represented? How are they classified? What are their characteristics?
In order to facilitate addressing and hierarchical network construction, IP addresses are divided into five categories: A, B, C, D, and E. In commercial applications, only A, B, and C are used.
IP ProtocolInternet Protocol, which supports interconnection between networksDatagramProtocol, which is linked toTCPTCP/IP protocol (Transmission Control Protocol) constitutes the core of TCP/IP protocol family.It provides complete functions of inter network connection, including IP datagram provisionsinterconnection networkIP address format in the range.
On the Internet, in order to realize the communication between nodes connected to the Internet, each node (the computer connected to the network) must be assigned an address, and it should be ensured that this address is unique throughout the network, which is the IP address.
The IP address (IPv4: IP version 4) is represented by 32 binary bits, one for every 8 binary bits
Integer, intermediate bydecimal pointInterval, such as 159.226.41.98, there are four groups of 8-bit binary numbers in the entire IP address space, which are composed of the address of the network where the host is located (similar to the number of troops) and the host's identification in the network (similar to the number of soldiers in the troops).
In order to facilitate addressing and hierarchical network construction, IP addresses are divided into five categories: A, B, C, D, and E. In commercial applications, only A, B, and C are used.
*Class A address: The network ID of class A address is represented by the first group of 8-bit binary numbers, and the host ID in the network
It accounts for three groups of 8-bit binary numbers. Class A addresses are characterized by that the value of the first binary number of the network ID must be "0".It is not difficult to calculate that 126 Class A addresses are allowedNetwork segment(The range ranges from 0 to 127. 0 is reserved and represents all IP addresses, while 127 is reserved and is used to test loop reuse, so subtracting two is 126). Each network allows about 16.7 million hosts, which are usually allocated to networks with a large number of hosts (such asBackbone network)。
*Class B address: The network ID of the class B address is represented by the first two groups of 8-bit binary numbers. The host ID in the network accounts for two groups of 8-bit binary numbers. The feature of the class B address is that the first two binary numbers of the network ID must be "10".
16384 Class B addresses are allowedNetwork segmentEach network allows 65533 hosts, which is suitable for networks with more nodes (such as regional networks).
*Class C address: The network ID of the class C address is represented by the first three groups of 8-bit binary numbers. The host ID in the network accounts for one group of 8-bit binary numbers. The feature of the class C address is that the first three binary numbers of the network ID must be "110".The network with class C address allows 254 hosts, which is applicable to the network with few nodes (such asCampus network)。
In order to facilitate memory, we usually use 4Decimal numberTo represent an IP address, decimal numbers are usedPeriod".".This representation of IP address is also calleddotted decimal Law.If expressed in this way, the IP address range of Class A network is 1.0.0.1 - 127.255.255.254;IP address range of Class B network: 128.1.0.1 - 191.255.255.254;The IP address range of Class C network is 192.0.1.1 - 223.255.255.254.
Class D address: range from 224-239,Class D IP addressThe first byte starts with "1110", which is a specially reserved address.It does not point to a specific network. This type of address is used in multicast.MultipointBroadcast addressIt is used to address a group of computers at a time. It identifies a group of computers that share the same protocol.
Class E address: The range is 240-254, starting with "11110", reserved for future use.All zero ("0.0.0.0") addresses correspond to the current host.All "1" IP addresses ("255.255.255.255") are currentSubnetThe broadcast address of.
TCP/IP protocol and low-leveldata link layerandphysical layerThis is also an important feature of TCP/IP.Because of this, it can widely supportPhysical networkStructure.TCP/IP has been used to connect to intercontinental networks, national networks and trans regional networks.