Chapter 9 Internet Control Message Protocol (ICMP)
iPhone 使用手册说明书

iPhone User Guide For iOS 7 SoftwareContents8 Chapter 1: iPhone at a Glance8 iPhone overview9 Accessories10 Multi-Touch screen10 Buttons12 Status icons14 Chapter 2: Getting Started14 Install the SIM card14 Set up and activate iPhone15 Connect iPhone to your computer15 Connect to Wi-Fi16 Connect to the Internet16 Set up mail and other accounts16 Apple ID17 Manage content on your iOS devices17 iCloud18 Sync with iTunes19 Date and time19 International settings19 Your iPhone name20 View this user guide on iPhone21 Chapter 3: Basics21 Use apps23 Customize iPhone25 Type text27 Dictate28 Voice Control29 Search29 Control Center30 Alerts and Notification Center31 Sounds and silence31 Do Not Disturb31 AirDrop, iCloud, and other ways to share32 Transfer files33 Personal Hotspot33 AirPlay34 AirPrint34 Use an Apple headset35 Bluetooth devices35 Restrictions36 Privacy36 Security38 Charge and monitor the battery39 Travel with iPhone40 Chapter 4: Siri40 Make requests41 Tell Siri about yourself41 Make corrections42 Siri settings43 Chapter 5: Phone43 Phone calls46 Visual voicemail47 Contacts47 Call forwarding, call waiting, and caller ID 47 Ringtones and vibrations47 International calls48 Phone settings49 Chapter 6: Mail49 Write messages50 Get a sneak peek50 Finish a message later50 See important messages51 Attachments52 Work with multiple messages52 See and save addresses53 Print messages53 Mail settings54 Chapter 7: Safari54 Safari at a glance54 Search55 Browse55 Bookmark56 Share56 AutoFill56 Reader57 Reading list57 Privacy and security57 Safari settings58 Chapter 8: Music58 iTunes Radio59 Get music59 Browse and play61 Album Wall61 Audiobooks61 Playlists62 Genius—made for you62 Siri and Voice Control63 iTunes Match63 Home Sharing64 Music settings65 Chapter 9: Messages65 SMS, MMS, and iMessages65 Send and receive messages66 Manage conversations67 Share photos, videos, and more67 Messages settings68 Chapter 10: Calendar68 Calendar at a glance68 Invitations69 Use multiple calendars70 Share iCloud calendars70 Calendar settings71 Chapter 11: Photos71 View photos and videos72 Organize your photos and videos72 iCloud Photo Sharing73 My Photo Stream74 Share photos and videos75 Edit photos and trim videos75 Print photos75 Photos settings76 Chapter 12: Camera76 Camera at a glance77 Take photos and videos78 HDR78 View, share, and print79 Camera settings80 Chapter 13: Weather82 Chapter 14: Clock82 Clock at a glance83 Alarms and timers84 Chapter 15: Maps84 Find places85 Get more info85 Get directions86 3D and Flyover86 Maps settings87 Chapter 16: Videos87 Videos at a glance88 Add videos to your library88 Control playback89 Videos settings90 Chapter 17: Notes90 Notes at a glance91 Use notes in multiple accounts92 Chapter 18: Reminders93 Scheduled reminders93 Location reminders93 Reminders settings94 Chapter 19: Stocks96 Chapter 20: Game Center96 Game Center at a glance97 Play with friends97 Game Center settings98 Chapter 21: Newsstand98 Newsstand at a glance99 Chapter 22: iTunes Store99 iTunes Store at a glance99 Browse or search100 Purchase, rent, or redeem100 iTunes Store settings101 Chapter 23: App Store101 App Store at a glance102 Find apps102 Purchase, redeem, and download 103 App Store settings104 Chapter 24: Passbook104 Passbook at a glance104 Passbook on the go105 Passbook settings106 Chapter 25: Compass106 Compass at a glance107 On the level108 Chapter 26: Voice Memos 108 Voice Memos at a glance108 Record109 Listen109 Move recordings to your computer 110 Chapter 27: FaceTime110 FaceTime at a glance111 Make and answer calls111 Manage calls112 Chapter 28: Contacts112 Contacts at a glance113 Use Contacts with Phone113 Add contacts114 Contacts settings115 Chapter 29: Calculator116 Chapter 30: Nike + iPod116 At a glance116 Link and calibrate your sensor117 Work out117 Nike + iPod Settings118 Appendix A: Accessibility118 Accessibility features118 Accessibility Shortcut119 VoiceOver129 Siri130 Zoom130 Invert Colors130 Speak Selection130 Speak Auto-text131 Large and bold text131 Reduce screen motion131 Display on/off switch labels131 Hearing aids132 Subtitles and closed captions133 LED Flash for Alerts133 Mono Audio133 Route the audio of incoming calls 133 Assignable ringtones and vibrations 133 Ambient Noise Cancellation133 Guided Access134 Switch Control137 AssistiveTouch137 TTY support137 Visual voicemail138 Widescreen keyboards138 Large phone keypad138 Voice Control138 Accessibility in OS X139 Appendix B: iPhone in Business 139 Mail, Contacts, and Calendar139 Network access139 Apps141 Appendix C: International Keyboards 141 Use international keyboards142 Special input methods143 Appendix D: Safety, Handling, & Support 143 Important safety information145 Important handling information146 iPhone Support site146 Restart or reset iPhone146 Reset iPhone settings147 Get information about your iPhone147 Usage information148 Disabled iPhone148 Back up iPhone149 Update and restore iPhone software149 Cellular settings150 Sell or give away iPhone?150 Learn more, service, and support151 FCC compliance statement152 Canadian regulatory statement152 Disposal and recycling information153 Apple and the environment1iPhone at a Glance iPhone overview This guide describes the features of iOS 7, and of iPhone 4, iPhone 4S, iPhone 5, iPhone 5c, and iPhone 5s. iPhone 5siPhone 5cYour iPhone features and apps may vary depending on the model of iPhone you have, and on your location, language, and carrier. To find out which features are supported in your area, see /ios/feature-availability.Note: Apps that send or receive data over a cellular network may incur additional fees. Contact your carrier for information about your iPhone service plan and fees.AccessoriesThe following accessories are included with iPhone:Apple headset. Use the Apple EarPods with Remote and Mic (iPhone 5 or later) or the Apple Earphones with Remote and Mic (iPhone 4S or earlier) to listen to music and videos, and make phone calls. See Use an Apple headset on page 34.Connecting cable. Using the Lightning to USB Cable (iPhone 5 or later) or the 30-pin to USB Cable (iPhone 4S or earlier), connect iPhone to your computer to sync and charge.Apple USB power adapter. Use with the Lightning to USB Cable or the 30-pin to USB Cable to charge the iPhone battery.SIM eject tool. Use to eject the SIM card tray. (Not included in all areas.)Multi-Touch screenThe Multi-Touch screen displays a wealth of info, entertainment, and creativity, all at your fingertips. A few simple gestures—tap, drag, swipe, and pinch—are all you need to explore and use iPhone apps.ButtonsMost of the buttons you use with iPhone are virtual ones on the touchscreen. A few physical buttons control basic functions, such as turning iPhone on or adjusting the volume.Sleep/Wake buttonWhen you’re not using iPhone, press the Sleep/Wake button to lock iPhone. Locking iPhone puts the display to sleep, saves the battery, and prevents anything from happening if you touch the screen. You can still get phone calls, FaceTime calls, text messages, alarms, and notifications. You can also listen to music and adjust the volume.iPhone locks automatically if you don’t touch the screen for a minute or so. To adjust the timing, go to Settings > General > Auto-Lock.Turn iPhone on. Press and hold the Sleep/Wake button until the Apple logo appears.Unlock iPhone. Press either the Sleep/Wake or Home button, then drag the slider.Turn iPhone off. Press and hold the Sleep/Wake button until the red slider appears, then drag the slider.For additional security, you can require a passcode to unlock iPhone. Go to Settings > General > Passcode & Fingerprint (iPhone 5s) or Settings > General > Passcode Lock (other models). See Use a passcode with data protection on page 36.Home buttonThe Home button takes you to the Home screen, and provides other convenient shortcuts.See apps you’ve opened. Double-click the Home button. See Start at home on page 21.Use Siri (iPhone 4S or later) or Voice Control. Press and hold the Home button. See Voice Control on page 28 and Chapter 4, Siri, on page 40.On iPhone 5s, you can use the sensor in the Home button to read your fingerprint, instead of using your passcode or Apple ID. See Touch ID sensor on page 37.You can also use the Home button to turn accessibility features on or off. See Accessibility Shortcut on page 118.Volume controlsWhen you’re on the phone or listening to songs, movies, or other media, the buttons on the side of iPhone adjust the audio volume. Otherwise, the buttons control the volume for the ringer, alerts, and other sound effects.To limit the volume for music and videos, go to Settings > Music > Volume Limit.Note: In some European Union (EU) countries, iPhone may warn that you’re setting the volume above the EU recommended level for hearing safety. To increase the volume beyond this level, you may need to briefly release the volume control. To limit the maximum headset volumeto this level, go to Settings > Music > Volume Limit and turn on EU Volume Limit. To prevent changes to the volume limit, go to Settings > General > Restrictions.You can also use either volume button to take a picture or record a video. See Take photos and videos on page 77.Ring/Silent switch.Flip the Ring/Silent switch to put iPhone in ring mode or silent modeChapter 1 iPhone at a Glance 11。
因特网发展简史(英文版)

T. Tronco (Ed.): New Network Architectures, SCI 297, pp. 1–11. © Springer-Verlag Berlin Heidelberg 2010 A Brief History of the InternetTania Regina TroncoCPqD Foundation, Rodovia Campinas Mogi-Mirim, km 118,5,Campinas – São Paulo, CEP 13096-902, Brazil tania@.brAbstract. This chapter introduces a brief history review of Internet with focus on its original conception. It’s important to remember such initial ideas because they were the basis of Internet architecture, they are still at the core of today’s Internet and they can be helpful to rethink new design requirements nowadays. Hence, we start by the initial packet-based network protocols and their evolution to TCP/IP. 1 IntroductionThe Internet architecture concept was conceived at the end of the 60´s by ARPA (Advanced Research Projects Agency) during the Cold War, when the United States and Soviet Union were preparing for an eventual military confrontation. At that time, the U.S. military created an underground network of cables and equip-ments intended to survive a nuclear attack. This network was named ARPANET and its design consisted of a number of requirements such as:•Data should be moved through leased lines to avoid problems with in-terruptions of the telephone system; •The information to be transmitted should be broken into segments of fixed length (packets) instead of being a continuous stream and •The network should be totally decentralized, without a single node in the control of the network, yielding reliability and robustness.ARPANET was opened to universities after the end of arms race and a key re-quirement was added to the network project:•Communication between computers, called hosts, should be done through devices called Interface Message Processor (IMP), as shown in Fig. 1.The IMP function was to receive messages from a host and break them in packets. These packets should pass from IMP to IMP through the network until the destina-tion IMP, which should pass them to the destination host.The network consisted of the interconnection of these IMPs through the leased lines supplied by telephonic companies. The first IMP was built by the companyTronco2 T.R.Fig. 1 A Typical Section of ARPANET (adapted from [1])BBN (Bolt Beraneck and Newman) from Cambridge in 1976. The report No. 1822of BBN [2] contains the specifications for the interconnection of a host and anIMP. According to this report, for each regular message, the host specified a desti-nation, composed of three parameters: IMP, host and handling type. These pa-rameters specified uniquely a connection between source and destination host. Thehandling type was used to specify characteristics of the connection, such as prior-ity or non-priority of transmission. The messages should be sent to the destinationin the same order that were transmitted by the source and, for each regular mes-sage, the host also specified a 12 bit identifier to be used with the destination ofthe message, forming a message-id, in order to retransmit them in case of thenetwork failure.The first IMP was installed at University of California (UCLA), in Los Ange-les, followed by SRI (Stanford Research Institute), University of California inSanta Barbara and University of Utah, 4 points in total. The first ARPANETtransmission was made between UCLA and SRI in Mento Park, California in1969. In the same year, the first RFC (Request for Comments) was published;RFC3 defined the RFC series for ARPANET and later, the Internet.2 Decade of the 70´sAfter installing some IMPs in a network, the objective of DARPA was to stan-dardize the ARPANET network interface to allow more DARPA sites to join theA Brief History of the Internet 3 network. To achieve this, the first standard networking protocol was developed in December 1970, namely Network Control Protocol (NCP) [4].2.1 Network Control Protocol OperationThe NCP operation consisted of store-and-forward messages from a sending host to a receiving host. After a host sent a message, it was prohibited from sending another message until receives a RFMN (Request-for-Next-Message). This se-quence of requests made a connection. A connection linked two processes be-tween a sending and a receiving host.The primary function of the NCP was to establish connections and release con-nections. In order to send control commands to establish and release connections between the hosts, one particular link, designated as the control link, was estab-lished between each pair of host.Each host had its internal naming scheme, often incompatible with other hosts. Then, an intermediate name space, named socket, was created in NCP to prevent using this internal name scheme. Each host was responsible for mapping its inner process identifiers into sockets as shown in shown in Fig. 2.Fig. 2 A Typical Socket (adapted from [4])A socket specifies one connection endpoint and is determined by three numbers:• A user number (24 bits) composed by:o 8-bit for home host number,o16 bits to identify him at that host.• A host number (8 bits)•An AEN (Another Eight-bit Number) composed by:o 1 bit that indicate a receive host (=0) or a send host (=1);o7 bits – that provide a population of 128 sockets for each used number at each host.When a user tried to log into a host, her user number was used to tag all the proc-esses created in that host, producing a sort of virtual network.4 T.R.TroncoBy the end of 1971, there were fifteen sites attached into ARPANET usingNCP [10] as follows:•Bolt Baranek and Newman (BBN)•Carnegie Mellon University•Case Western Reserve University•Harvard University•Lincoln Laboratories•Massachusetts Institute of Technology (MIT)•NASA at AMES•RAND Corporation•Stanford Research Institute (SRI)•Stanford University•System Development Corporation•University of California at Los Angeles (UCLA)•University of California of Santa Barbara•University of Illinois at Urbana•University of UTAHAt this time, BBN also developed an electronic mail program for ARPANET thatquickly became the most popular application on the ARPANET [11]. The e-mailprogram specified the destination address as username@hostname, where user-name was the same used to login in the host.At the end of the seventies, there were about 200 hosts connected to ARPA-NET [11]. The NCP was becoming inefficient to connect different packet switch-ing networks because individual networks could differ in their implementationslike the heterogeneous addressing schemes, the different maximum size for thedata, the different time delays for accepting, delivering, and transporting data andso on. In May 1974, Robert Kahn and Vinton Cerf published a paper entitled “AProtocol for Packet Network Intercommunication” on IEEE Transaction on Com-munication [3], proposing a new protocol to support the sharing resources betweendifferent packet switching networks. This protocol was named TCP (TransmissionControl Protocol).According to [3], for both economic and technical considerations, it was con-venient that all the differences between networks could be resolved by simple andreliable interface. This interconnection should also preserve intact the internal op-eration of each individual network. This interface was named Gateway.Fig. 3 illustrates two network interconnected by one gateways.The gateway was divided into two parts; each one associated with its own net-work and its function was understand the source and destination host addressesand insert this information in a standard format in every packet. For this operation,an internetwork header was added to the local header of the packet by the sourcehost, as illustrated in Fig. 4.A Brief History of the Internet 5Fig. 3 Internetworking by Gateway (adapted from [3])Fig. 4 Internetwork Header (adapted from [3])The internetwork header contained the standardized source and destination ad-dresses. The next two fields in the header provided a sequence number and a byte count used to properly sequence the packets upon delivery to the destination and also enabling the gateways to detect fault conditions. The flag field was used to The gateway does not modify the information, only forwarded the header check sum along the path.2.2 TCPThe TCP protocol specified by Cerf and Kahn [3] had the function of promoting the transmission and acceptance of messages of processes that wanted to commu-nicate. To implement this function, TCP first broke the process messages into segments according to a maximum transmission size. This action was called frag-mentation and was done in such a way that the destination process was able to re-assemble the fragmented segments. On the transmission side, the TCP multiplexed together segments from different processes and produced packets for delivery to the packet switches. On the reception side, the TCP accepted the packets sequence from the packet switches, demultiplexed and reassembled the segments to the des-tination processes.This system introduced the notion of ports and TCP address. A port was used to designate a message stream associated with a process. A TCP address was used to routing and delivery packets from diverse processes to the suitable destination host. The original TCP address format is shown in Fig. 5.6 T.R.TroncoFig. 5 TCP Address Format (adapted from [3])The use of 8 bits for network identification (ID) allowed up to 256 distinct net-works. At that time, this address field seemed enough for the future. The TCPidentifier field permitted up to 65 536 distinct TCP be addressed. As each packetpassed through the gateway, it observed the destination network ID to determinethe packet route. If the destination network was connected to the gateway, thelower 16 bits of the TCP address were used to produce a local TCP address in thedestination network. On the other hand, if the destination network was not con-nected to the gateway, the upper 8 bits was used to select the next gateway.In order to send a TCP message, a process settled the information to be trans-mitted in its own address space, inserted network/host/port addresses of the trans-mitter and receiver in a transmit control block (TCB), and transmitted it. At thereceiving side, the TCP examined the source and destination port addresses anddecided whether accepted or reject the request. If the request was rejected, it mere-ly transmitted a release indicating that the destination port address was unknownor inaccessible. On the other hand, if the request was accepted, the sending and re-ceiving ports were associated and the connection was established. After it, TCPstarted the transmission of the packets and waited for the acknowledgements car-ried in the reverse direction of the communication. If no acknowledgement for aparticular packet was received, the TCP retransmitted the packet.Aftertime, a window strategy to flow control of sent and received packets alsowas proposed by Cerf and Kahn [3], as shown in Fig. 6.Fig. 6 Window Strategy (adapted from [3])Supposing that the sequence number field in the internetwork header permitspacket sequence numbers to range from 0 to n – 1, the sender could not transmitmore than w bytes without receiving an acknowledgment. The w bytes werenamed a window (see Fig. 6). On timeout, the sender retransmits the unacknow-ledged bytes. Once acknowledgment was received, the sender’s left window edgeadvanced over the acknowledged.A Brief History of the Internet 7After the development of fundamental characteristics of TCP, the next chal-lenge of DARPA was running TCP on multiple hardware platforms and making experiments to determine optimal parameters for the protocol. In 1977, the ARPA research program included important players in this development such as: BBN, DCEC, ISI, MIT, SRI, UCLA and some prototypes of TCP/IP were implemented.2.3 EthernetAt the same time, the development of the first concepts of new computer network-ing technology for local area networks (LANs) named Ethernet. This technology technologies.The Ethernet idea began on May 22, 1973, when Bob Metcalfe (then at the Xe-rox Palo Alto Research Center, PARC, in California) wrote a memo describing the Ethernet network system he had invented for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed la-ser printers (see Fig. 7). The seminal article: "Ethernet: Distributed Packet Switch-ing for Local Computer Networks" was published by Robert M. Metcalfe and David R. Boggs in [6].Robert Metcalfe got the idea for the Ethernet protocol when he read a 1970 computer conference paper by Norman Abramson of the University of Hawaii about the packet radio system called ALOHANET linking the Hawaiian Islands. At the end of 1972, the ALOHANET was connected to ARPANET by satellite given a pass to the development of the Internet.Each node in ALOHANET sent out its messages in streams of separate packets of information. If it did not get an acknowledgment back for some packets becauseFig. 7 Robert Metcalfe picture and his famous Ethernet first drawing(adapted from [4])8 T.R.Troncotwo radios were broadcasting at the same time, then the missing packets were con-sidered “lost in the ether”. The word ether was used to denote the propagationmedium that could be used by any type of machine, in analogy to the materialbelieved by the physicists to fill in the free space enabling the electromagneticpropagation.When a packet was lost in the ether, the node would re-broadcast them afterwaiting a random interval of time. Because of this randomness, problems with col-lisions were quickly resolved except under very high traffic loads. On average, thenetwork rarely had to retry more than once or twice to get all the packets to thedestination, which was more efficient than trying to implement a complex coordi-nation system to prevent collisions in the first place. The original 10 Mbps Ether-net standard was first published in the next decade by the DEC-Intel-Xerox (DIX)vendor consortium.3 Decade of the 80´sAfter testing three increasingly better versions: TCPv1, TCPv2, a split into TCPv3and IPv3, finally in 1981, TCP (Transmission Control protocol) v4 and IP (Inter-net Protocol) v4, posted in RFC 791 [7] and RFC 793 [9], respectively, becamestable. This version is still in use on the Internet today.In 1982, an Internet Gateway, to route internet packets based on TCPv4/IPv4,developed by BBN, was standardized in RFC 823 [5]. TCPv4/IPv4 became a stan-dard for DARPA and, in January, 1983, the ARPANET protocol switched fromNCP to TCP/IP. This date is considered the date of the birth of the Internet [11]. In1985, Dan Lynch and the IAB (Internet Architecture Board) realized a workshopfor the computer industry to become TCP/IP a commercial standard and promotethe development of networking products.3.1 Internet ProtocolThe IPv4 implements two basic functions: fragmentation and addressing. Frag-packet" networks.The addressing is used to forward Internet packets toward their destinations.The Internet protocol treats each Internet packet as an independent entity. Thereare no connections or logical circuit establishment. So, the Internet protocol doesnot provide a reliable communication facility, only hop-by-hop forwarding ofpackets. There is no error control for the information, only a header checksum anderrors detected in the header are reported via the Internet Control Message Proto-col (ICMP) [8].The Internet transmission occurs when an application program via transportprotocols sends a request on its local router (gateway) to send data as a packetthought the Internet (see Fig. 8). The Internet router prepares the packet headerand attaches it to the data. The router determines a local network address andsends the packet to the local network interface. The local network interface createsA Brief History of the Internet 9 a local network header, attaches it to the packet and sends it to the local network. The packet is forward hop-by-hop through the network until the local network where the destination host is located. At each hop, the router examines the header and determines the next hop based on the destination address. At the destination router, the packet is sent to the destination host, via transport protocol socket to the application.Fig. 8 Internet Forwarding Packets (adapted from [3])3.2 Ethernet ProtocolThe first Ethernet standard was entitled “The Ethernet, A Local Area Network: Data Link Layer and Physical Layer Specifications” and was published in 1980 by the DIX vendor consortium. It contained the specifications of both the operation of Ethernet and the single media system based on thick coaxial cable.Ethernet is by definition a broadcast protocol where any signal can be received by all hosts. The packets from the network layer are transmitted over an Ethernet by encapsulating them in a frame format as shown in Fig. 9.Fig. 9 Ethernet FrameThe fields of this frame are described as follow:Preamble: is a sequence of 8 bytes, each set to “10101010” and used to syn-chronize receiver before actual data is sent;Addresses•48-bit unicast address assigned to each adapter, named MAC (Me-dium Access Control) Address•Broadcast address: all bits set to 1•Multicast: first bit is set to 1Type field: is used to determine which higher level protocol the frame should be delivered toBody: contains up to 1500 bytes of data10 T.R.TroncoWhen the Ethernet standard was published, a new effort led by the Institute ofElectrical and Electronics Engineers (IEEE) to develop open network standardswas also getting underway. The IEEE standard was created under the direction ofthe IEEE Local and Metropolitan Networks (LAN/MAN) Standards Committee,which identifies all the standards it develops with the number 802. There have beena number of networking standards published in the 802 branch of the IEEE, includ-ing the 802.3 Ethernet and 802.5 Token Ring standards. The IEEE 802.3 committeetook up the network system described in the original DIX standard and used it asthe basis for an IEEE standard. The IEEE standard was first published in 1985 withthe title IEEE 802.3 Carrier Sense Multiple Access with Collision Detection(CSMA/CD). Ethernet uses CSMA/CD to listen the line before sending data:•If the line is idle (no carrier sensed), it sends packet immediately;•If line is busy (carrier sensed), it wait until idle and transmit packetimmediately;•If collision is detected, it stops sending and try again later.After the publication of the original IEEE 802.3 standard for thick Ethernet, thenext development in Ethernet media was the thin coaxial Ethernet variety, inspiredby technology first marketed by the 3Com Corporation. When the IEEE 802.3committee standardized the thin Ethernet technology, they gave it the shorthandidentifier of 10BASE2. Following the development of thin coaxial Ethernet cameseveral new media varieties, including the twisted-pair and fiber optic varieties forthe 10 Mbps system. Next, the 100 Mbps Fast Ethernet system was developed,which also included several varieties of twisted-pair and fiber optic media sys-tems. Most recently, the Gigabit Ethernet and 10 Gigabit Ethernet systems weredeveloped and 100 Gigabit Ethernet is in development. These systems were alldeveloped as supplements to the IEEE Ethernet standard.3.3 Evolution of InternetIn 1985, the National Science Foundation (NSF) launched a network to connectacademic researchers to supercomputer centers to provide very high-speed com-puting resources for the research community. This network was named NSFNETand one of its project design premises was to use ARPANET's TCP/IP protocol. In1986, the NSFNET was connected to ARPANET and these backbones formingwhat today is known as Internet. At the end of this decade, NSFNET became defacto the backbone of the Internet and the ARPANET was ended (Stewart 2000).Also in this period, the World Wide Web (WWW) system was created by TimBerners-Lee [1] to run in the Internet and provide graphical user interfaces andhypertext links between different addresses.In 1991, the Internet became commercially exploited and new backbones werebuilt to offer services of communications. This fact became Internet completelydecentralized, without a central coordination, difficult architectural changes. In1995, the NSFNET was officially dissolved, although, retained a core researchA Brief History of the Internet 11 network called the Very High Speed Backbone Network Service (vBNS), which formed the basis for the Internet2 project [10].Since 1995, the Internet continues growing; more and more people use it to be connected, find information, create business, and share information. The Internet is now an essential part of our lives.References1.Berners-Lee: Information Management: A Proposal, CERN (1989),/History/1989/proposal.html(accessed March 2010)2.Bolt, Beranek, Newman: Report No. 1822: Specification for the Interconnection of ahost and an IMP (1976)3.Cerf, V., Kahn, R.: A Protocol for Packet Network Intercommunication. IEEE Trans-actions on Communication 22(5) (1974)4.Cocker, S., Carr, S., Cerf, V.: RFC 33 New Host-Host Protocol (1970)5.Hinden, R., Shelzer, A.: RFC 823 DARPA Internet gateway (1982)6.Metcalfe, R., Boggs, D.: Ethernet: Distributed Packet Switching for Local ComputerNetworks. Communications of the ACM 19(5), 395–404 (1976),/classics/apr96/ (accessed March 2010)7.Postel, J.: RFC 791 Internet Protocol (1981)8.Postel, J.: RFC 792 Internet Control Message Protocol (1981)9.Postel, J.: RFC 793 Transmission Control Protocol (1981)10.Stewart, B.: Living Internet (2000),/i/i.htm11.Wladrop, M.: Darpa and the Internet Revolution. DARPA 78-85 (2008),/Docs/Internet_Development_200807180909255.pdf (accessed March 2010)。
HP Color LaserJet Enterprise MFP M776用户指南说明书

Legal informationCopyright and License© Copyright 2019 HP Development Company, L.P.Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowedunder the copyright laws.The information contained herein is subject to change without notice.The only warranties for HP products and services are set forth in the express warranty statementsaccompanying such products and services. Nothing herein should be construed as constituting anadditional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.Edition 1, 10/2019Trademark CreditsAdobe®, Adobe Photoshop®, Acrobat®, and PostScript® are trademarks of Adobe Systems Incorporated.Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries.macOS is a trademark of Apple Inc., registered in the U.S. and other countries.AirPrint is a trademark of Apple Inc., registered in the U.S. and other countries.Google™ is a trademark of Google Inc.Microsoft®, Windows®, Windows® XP, and Windows Vista® are U.S. registered trademarks of MicrosoftCorporation.UNIX® is a registered trademark of The Open Group.iiiT able of contents1 Printer overview (1)Warning icons (1)Potential shock hazard (2)Printer views (2)Printer front view (2)Printer back view (4)Interface ports (4)Control-panel view (5)How to use the touchscreen control panel (7)Printer specifications (8)T echnical specifications (8)Supported operating systems (11)Mobile printing solutions (12)Printer dimensions (13)Power consumption, electrical specifications, and acoustic emissions (15)Operating-environment range (15)Printer hardware setup and software installation (16)2 Paper trays (17)Introduction (17)Load paper to Tray 1 (multipurpose tray) (17)Load Tray 1 (multipurpose tray) (18)Tray 1 paper orientation (19)Use alternative letterhead mode (24)Enable Alternative Letterhead Mode by using the printer control-panel menus (24)Load paper to Tray 2 (24)Load Tray 2 (24)Tray 2 paper orientation (26)Use alternative letterhead mode (29)Enable Alternative Letterhead Mode by using the printer control-panel menus (29)Load paper to the 550-sheet paper tray (30)Load paper to the 550-sheet paper tray (30)550-sheet paper tray paper orientation (32)Use alternative letterhead mode (35)Enable Alternative Letterhead Mode by using the printer control-panel menus (35)ivLoad paper to the 2 x 550-sheet paper trays (36)Load paper to the 2 x 550-sheet paper trays (36)2 x 550-sheet paper tray paper orientation (38)Use alternative letterhead mode (41)Enable Alternative Letterhead Mode by using the printer control-panel menus (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)2,700-sheet HCI paper tray paper orientation (43)Use alternative letterhead mode (45)Enable Alternative Letterhead Mode by using the printer control-panel menus (45)Load and print envelopes (46)Print envelopes (46)Envelope orientation (46)Load and print labels (47)Manually feed labels (47)Label orientation (48)3 Supplies, accessories, and parts (49)Order supplies, accessories, and parts (49)Ordering (49)Supplies and accessories (50)Maintenance/long-life consumables (51)Customer self-repair parts (51)Dynamic security (52)Configure the HP toner-cartridge-protection supply settings (53)Introduction (53)Enable or disable the Cartridge Policy feature (53)Use the printer control panel to enable the Cartridge Policy feature (54)Use the printer control panel to disable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to enable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to disable the Cartridge Policy feature (55)Troubleshoot Cartridge Policy control panel error messages (55)Enable or disable the Cartridge Protection feature (55)Use the printer control panel to enable the Cartridge Protection feature (56)Use the printer control panel to disable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to enable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to disable the Cartridge Protection feature (57)Troubleshoot Cartridge Protection control panel error messages (57)Replace the toner cartridges (58)T oner-cartridge information (58)Remove and replace the cartridges (59)Replace the imaging drums (62)Imaging drum information (62)Remove and replace the imaging drums (63)Replace the toner-collection unit (66)T oner-collection unit information (66)vRemove and replace the toner-collection unit (67)Replace the staple cartridge (M776zs model only) (70)Staple cartridge information (70)Remove and replace the staple cartridge (71)4 Print (73)Print tasks (Windows) (73)How to print (Windows) (73)Automatically print on both sides (Windows) (74)Manually print on both sides (Windows) (74)Print multiple pages per sheet (Windows) (75)Select the paper type (Windows) (75)Additional print tasks (76)Print tasks (macOS) (77)How to print (macOS) (77)Automatically print on both sides (macOS) (77)Manually print on both sides (macOS) (77)Print multiple pages per sheet (macOS) (78)Select the paper type (macOS) (78)Additional print tasks (79)Store print jobs on the printer to print later or print privately (79)Introduction (79)Create a stored job (Windows) (79)Create a stored job (macOS) (80)Print a stored job (81)Delete a stored job (81)Delete a job that is stored on the printer (81)Change the job storage limit (82)Information sent to printer for Job Accounting purposes (82)Mobile printing (82)Introduction (82)Wi-Fi, Wi-Fi Direct Print, NFC, and BLE printing (82)Enable wireless printing (83)Change the Wi-Fi Direct name (83)HP ePrint via email (83)AirPrint (84)Android embedded printing (85)Print from a USB flash drive (85)Enable the USB port for printing (85)Method one: Enable the USB port from the printer control panel (85)Method two: Enable the USB port from the HP Embedded Web Server (network-connectedprinters only) (85)Print USB documents (86)Print using high-speed USB 2.0 port (wired) (86)Method one: Enable the high-speed USB 2.0 port from the printer control panel menus (86)Method two: Enable the high-speed USB 2.0 port from the HP Embedded Web Server (network-connected printers only) (87)vi5 Copy (88)Make a copy (88)Copy on both sides (duplex) (90)Additional copy tasks (92)6 Scan (93)Set up Scan to Email (93)Introduction (93)Before you begin (93)Step one: Access the HP Embedded Web Server (EWS) (94)Step two: Configure the Network Identification settings (95)Step three: Configure the Send to Email feature (96)Method one: Basic configuration using the Email Setup Wizard (96)Method two: Advanced configuration using the Email Setup (100)Step four: Configure the Quick Sets (optional) (104)Step five: Set up Send to Email to use Office 365 Outlook (optional) (105)Introduction (105)Configure the outgoing email server (SMTP) to send an email from an Office 365 Outlookaccount (105)Set up Scan to Network Folder (108)Introduction (108)Before you begin (108)Step one: Access the HP Embedded Web Server (EWS) (108)Step two: Set up Scan to Network Folder (109)Method one: Use the Scan to Network Folder Wizard (109)Method two: Use Scan to Network Folder Setup (110)Step one: Begin the configuration (110)Step two: Configure the Scan to Network Folder settings (111)Step three: Complete the configuration (118)Set up Scan to SharePoint (118)Introduction (118)Before you begin (118)Step one: Access the HP Embedded Web Server (EWS) (118)Step two: Enable Scan to SharePoint and create a Scan to SharePoint Quick Set (119)Scan a file directly to a SharePoint site (121)Quick Set scan settings and options for Scan to SharePoint (122)Set up Scan to USB Drive (123)Introduction (124)Step one: Access the HP Embedded Web Server (EWS) (124)Step two: Enable Scan to USB Drive (124)Step three: Configure the Quick Sets (optional) (125)Default scan settings for Scan to USB Drive setup (126)Default file settings for Save to USB setup (126)Scan to email (127)Introduction (127)Scan to email (127)Scan to job storage (129)viiIntroduction (129)Scan to job storage on the printer (130)Print from job storage on the printer (132)Scan to network folder (132)Introduction (132)Scan to network folder (132)Scan to SharePoint (134)Introduction (134)Scan to SharePoint (134)Scan to USB drive (136)Introduction (136)Scan to USB drive (136)Use HP JetAdvantage business solutions (138)Additional scan tasks (138)7 Fax (140)Set up fax (140)Introduction (140)Set up fax by using the printer control panel (140)Change fax configurations (141)Fax dialing settings (141)General fax send settings (142)Fax receive settings (143)Send a fax (144)Additional fax tasks (146)8 Manage the printer (147)Advanced configuration with the HP Embedded Web Server (EWS) (147)Introduction (147)How to access the HP Embedded Web Server (EWS) (148)HP Embedded Web Server features (149)Information tab (149)General tab (149)Copy/Print tab (150)Scan/Digital Send tab (151)Fax tab (152)Supplies tab (153)Troubleshooting tab (153)Security tab (153)HP Web Services tab (154)Networking tab (154)Other Links list (156)Configure IP network settings (157)Printer sharing disclaimer (157)View or change network settings (157)Rename the printer on a network (157)viiiManually configure IPv4 TCP/IP parameters from the control panel (158)Manually configure IPv6 TCP/IP parameters from the control panel (158)Link speed and duplex settings (159)Printer security features (160)Introduction (160)Security statements (160)Assign an administrator password (160)Use the HP Embedded Web Server (EWS) to set the password (160)Provide user access credentials at the printer control panel (161)IP Security (161)Encryption support: HP High Performance Secure Hard Disks (161)Lock the formatter (161)Energy-conservation settings (161)Set the sleep timer and configure the printer to use 1 watt or less of power (161)Set the sleep schedule (162)Set the idle settings (162)HP Web Jetadmin (163)Software and firmware updates (163)9 Solve problems (164)Customer support (164)Control panel help system (165)Reset factory settings (165)Introduction (165)Method one: Reset factory settings from the printer control panel (165)Method two: Reset factory settings from the HP Embedded Web Server (network-connectedprinters only) (166)A “Cartridge is low” or “Cartridge is very low” message displays on the printer control panel (166)Change the “Very Low” settings (166)Change the “Very Low” settings at the control panel (166)For printers with fax capability (167)Order supplies (167)Printer does not pick up paper or misfeeds (167)Introduction (167)The printer does not pick up paper (167)The printer picks up multiple sheets of paper (171)The document feeder jams, skews, or picks up multiple sheets of paper (174)Clear paper jams (174)Introduction (174)Paper jam locations (174)Auto-navigation for clearing paper jams (175)Experiencing frequent or recurring paper jams? (175)Clear paper jams in the document feeder - 31.13.yz (176)Clear paper jams in Tray 1 (13.A1) (177)Clear paper jams in Tray 2 (13.A2) (182)Clear paper jams in the fuser (13.B9, 13.B2, 13.FF) (188)ixClear paper jams in the duplex area (13.D3) (194)Clear paper jams in the 550-sheet trays (13.A3, 13.A4) (199)Clear paper jams in the 2 x 550 paper trays (13.A4, 13.A5) (206)Clear paper jams in the 2,700-sheet high-capacity input paper trays (13.A3, 13.A4, 13.A5, 13.A7) (213)Resolving color print quality problems (220)Introduction (220)Troubleshoot print quality (221)Update the printer firmware (221)Print from a different software program (221)Check the paper-type setting for the print job (221)Check the paper type setting on the printer (221)Check the paper type setting (Windows) (221)Check the paper type setting (macOS) (222)Check toner-cartridge status (222)Step one: Print the Supplies Status Page (222)Step two: Check supplies status (222)Print a cleaning page (222)Visually inspect the toner cartridge or cartridges (223)Check paper and the printing environment (223)Step one: Use paper that meets HP specifications (223)Step two: Check the environment (223)Step three: Set the individual tray alignment (224)Try a different print driver (224)Troubleshoot color quality (225)Calibrate the printer to align the colors (225)Troubleshoot image defects (225)Improve copy image quality (233)Check the scanner glass for dirt and smudges (233)Calibrate the scanner (234)Check the paper settings (235)Check the paper selection options (235)Check the image-adjustment settings (235)Optimize copy quality for text or pictures (236)Edge-to-edge copying (236)Improve scan image quality (236)Check the scanner glass for dirt and smudges (237)Check the resolution settings (238)Check the color settings (238)Check the image-adjustment settings (239)Optimize scan quality for text or pictures (239)Check the output-quality settings (240)Improve fax image quality (240)Check the scanner glass for dirt and smudges (240)Check the send-fax resolution settings (242)Check the image-adjustment settings (242)Optimize fax quality for text or pictures (242)Check the error-correction setting (243)xSend to a different fax machine (243)Check the sender's fax machine (243)Solve wired network problems (244)Introduction (244)Poor physical connection (244)The computer is unable to communicate with the printer (244)The printer is using incorrect link and duplex settings for the network (245)New software programs might be causing compatibility problems (245)The computer or workstation might be set up incorrectly (245)The printer is disabled, or other network settings are incorrect (245)Solve wireless network problems (245)Introduction (245)Wireless connectivity checklist (245)The printer does not print after the wireless configuration completes (246)The printer does not print, and the computer has a third-party firewall installed (246)The wireless connection does not work after moving the wireless router or printer (247)Cannot connect more computers to the wireless printer (247)The wireless printer loses communication when connected to a VPN (247)The network does not appear in the wireless networks list (247)The wireless network is not functioning (247)Reduce interference on a wireless network (248)Solve fax problems (248)Checklist for solving fax problems (248)What type of phone line are you using? (249)Are you using a surge-protection device? (249)Are you using a phone company voice-messaging service or an answering machine? (249)Does your phone line have a call-waiting feature? (249)Check fax accessory status (249)General fax problems (250)The fax failed to send (250)No fax address book button displays (250)Not able to locate the Fax settings in HP Web Jetadmin (250)The header is appended to the top of the page when the overlay option is enabled (251)A mix of names and numbers is in the recipients box (251)A one-page fax prints as two pages (251)A document stops in the document feeder in the middle of faxing (251)The volume for sounds coming from the fax accessory is too high or too low (251)Index (252)xiPrinter overview1Review the location of features on the printer, the physical and technical specifications of the printer,and where to locate setup information.For video assistance, see /videos/LaserJet.The following information is correct at the time of publication. For current information, see /support/colorljM776MFP.For more information:HP's all-inclusive help for the printer includes the following information:●Install and configure●Learn and use●Solve problems●Download software and firmware updates●Join support forums●Find warranty and regulatory informationWarning iconsUse caution if you see a warning icon on your HP printer, as indicated in the icon definitions.●Caution: Electric shock●Caution: Hot surface●Caution: Keep body parts away from moving partsPrinter overview1●Caution: Sharp edge in close proximity●WarningPotential shock hazardReview this important safety information.●Read and understand these safety statements to avoid an electrical shock hazard.●Always follow basic safety precautions when using this product to reduce risk of injury from fire orelectric shock.●Read and understand all instructions in the user guide.●Observe all warnings and instructions marked on the product.●Use only a grounded electrical outlet when connecting the product to a power source. If you do notknow whether the outlet is grounded, check with a qualified electrician.●Do not touch the contacts on any of the sockets on the product. Replace damaged cordsimmediately.●Unplug this product from wall outlets before cleaning.●Do not install or use this product near water or when you are wet.●Install the product securely on a stable surface.●Install the product in a protected location where no one can step on or trip over the power cord.Printer viewsIdentify certain parts of the printer and the control panel.Printer front viewLocate features on the front of the printer.2Chapter 1 Printer overviewPrinter front view3Printer back viewLocate features on the back of the printer.Interface portsLocate the interface ports on the printer formatter. 4Chapter 1 Printer overviewControl-panel viewThe control panel provides access to the printer features and indicates the current status of the printer.NOTE:Tilt the control panel for easier viewing.The Home screen provides access to the printer features and indicates the current status of the printer.screens.NOTE:The features that appear on the Home screen can vary, depending on the printerconfiguration.Control-panel view5Figure 1-1Control-panel view?i 12:42 PM6Chapter 1 Printer overviewHow to use the touchscreen control panelPerform the following actions to use the printer touchscreen control panel.T ouchT ouch an item on the screen to select that item or open that menu. Also, when scrolling T ouch the Settings icon to open the Settings app.How to use the touchscreen control panel 7SwipeT ouch the screen and then move your finger horizontally to scroll the screen sideways.Swipe until the Settings app displays.Printer specificationsDetermine the specifications for your printer model.IMPORTANT:The following specifications are correct at the time of publication, but they are subject to change. For current information, see /support/colorljM776MFP .T echnical specificationsReview the printer technical specifications.Product numbers for each model ●M776dn - #T3U55A ●Flow M776z - #3WT91A ●Flow M776zs - #T3U56APaper handling specificationsPaper handling features Tray 1 (100-sheet capacity)Included Included Included Tray 2 (550-sheet capacity)IncludedIncludedIncluded8Chapter 1 Printer overview550-sheet paper trayOptional Included Not included NOTE:The M776dn models accept one optional550-sheet tray.Optional Included Included2 x 550-sheet paper tray and standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of thestand.Optional Not included Not included2,700-sheet high-capacity input (HCI) paper trayand standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Printer standOptional Not included Not included NOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Inner finisher accessory Not included Not included Included Automatic duplex printing Included IncludedIncludedIncluded Included Included10/100/1000 Ethernet LAN connection with IPv4and IPv6Hi-Speed USB 2.0Included Included IncludedIncluded Included IncludedEasy-access USB port for printing from a USBflash drive or upgrading the firmwareIncluded Included Included Hardware Integration Pocket for connectingaccessory and third-party devicesHP Internal USB Ports Optional Optional OptionalOptional Optional OptionalHP Jetdirect 2900nw Print Server accessory forWi-Fi connectivity and an additional Ethernet portOptional IncludedIncludedHP Jetdirect 3100w accessory for Wi-Fi, BLE, NFC,and proximity badge readingPrints 45 pages per minute (ppm) on Letter-sizepaper and 46 ppm on A4-size paperEasy-access USB printing for printing from a USBIncluded Included Includedflash driveT echnical specifications9Included Included Included Store jobs in the printer memory to print later orprint privatelyScans 100 pages per minute (ppm) on A4 andIncluded Included Included letter-size paper one-sidedIncluded Included Included 200-page document feeder with dual-headscanning for single-pass duplex copying andscanningNot included Included Included HP EveryPage T echnologies including ultrasonicmulti-feed detectionNot included Included Included Embedded optical character recognition (OCR)provides the ability to convert printed pages intotext that can be edited or searched using acomputerIncluded Included Included SMART Label feature provides paper-edgedetection for automatic page croppingIncluded Included Included Automatic page orientation for pages that haveat least 100 characters of textIncluded Automatic tone adjustment sets contrast,Included Includedbrightness, and background removal for eachpageIncluded Included Includedfolders on a networkIncludedSend documents to SharePoint®Included IncludedIncluded Included Included NOTE:Memory reported on the configurationpage will change from 2.5 GB to 3 GB with theoptional 1 GB SODIMM installed.Mass storage: 500 GB hard disk drive Included Included IncludedSecurity: HP Trusted Platform Module (TPM)Included Included IncludedT ouchscreen control panel Included Included IncludedRetractable keyboard Not included Included Included 10Chapter 1 Printer overviewFax Optional Included IncludedSupported operating systemsUse the following information to ensure printer compatibility with your computer operating system.Linux: For information and print drivers for Linux, go to /go/linuxprinting.UNIX: For information and print drivers for UNIX®, go to /go/unixmodelscripts.The following information applies to the printer-specific Windows HP PCL 6 print drivers, HP print driversfor macOS, and to the software installer.Windows: Download HP Easy Start from /LaserJet to install the HP print driver. Or, go tothe printer-support website for this printer: /support/colorljM776MFP to download the printdriver or the software installer to install the HP print driver.macOS: Mac computers are supported with this printer. Download HP Easy Start either from /LaserJet or from the Printer Support page, and then use HP Easy Start to install the HP print driver.1.Go to /LaserJet.2.Follow the steps provided to download the printer software.Windows 7, 32-bit and 64-bit The “HP PCL 6” printer-specific print driver is installed for this operating system aspart of the software installation.Windows 8.1, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows 10, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows Server 2008 R2, SP 1, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012 R2, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2016, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2019, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Supported operating systems11macOS 10.13 High Sierra, macOS 10.14 MojaveDownload HP Easy Start from /LaserJet , and then use it to install the print driver.NOTE:Supported operating systems can change.NOTE:For a current list of supported operating systems and HP’s all-inclusive help for the printer, go to /support/colorljM776MFP .NOTE:For details on client and server operating systems and for HP UPD driver support for this printer, go to /go/upd . Under Additional information , click Specifications .●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection● 2 GB of available hard-disk space ●1 GB RAM (32-bit) or2 GB RAM (64-bit)●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection●1.5 GB of available hard-disk spaceNOTE:The Windows software installer installs the HP Smart Device Agent Base service. The file size is less than 100 kb. Its only function is to check for printers connected via USB hourly. No data is collected. If a USB printer is found, it then tries to locate a JetAdvantage Management Connector (JAMc) instance on the network. If a JAMc is found, the HP Smart Device Agent Base is securelyupgraded to a full Smart Device Agent from JAMc, which will then allow printed pages to be accounted for in a Managed Print Services (MPS) account. The driver-only web packs downloaded from for the printer and installed through the Add Printer wizard do not install this service.T o uninstall the service, open the Control Panel , select Programs or Programs and Features , and then select Add/Remove Programs or Uninstall a Programto remove the service. The file name isHPSmartDeviceAgentBase.Mobile printing solutionsHP offers multiple mobile printing solutions to enable easy printing to an HP printer from a laptop, tablet, smartphone, or other mobile device.T o see the full list and to determine the best choice, go to /go/MobilePrinting .NOTE:Update the printer firmware to ensure all mobile printing capabilities are supported.●Wi-Fi Direct (wireless models only, with HP Jetdirect 3100w BLE/NFC/Wireless accessory installed)●HP ePrint via email (Requires HP Web Services to be enabled and the printer to be registered with HP Connected)●HP Smart app ●Google Cloud Print12Chapter 1 Printer overview。
计算机网络专业词汇中英对照

《计算机网络》中英文对照Chapter 1End system P28 端系统Modem P29 调制解调器(俗称:猫)Base station P29 基站Communication link P30 通信链路Physical media P30 物理介质Coaxial cable P30 同轴电缆Fiber optics P30 光纤Radio spectrum P30 射频频谱Transmission rate P30 传输速率Packets P30 (数据)包,或分组Routers P30 路由器Link-layer switches P30 链路层交换机Path P30 路径ISP (Internet Service Provider) P30 网络服务提供商TCP (Transmission Control Protocol) P31 传输控制协议IP ( Internet Protocol) P31 网际协议Intranets P31 内网API (Application Programming Interface) P32 应用程序编程接口Network edge P35 网络边缘Access Networks P38 接入网Ethernet P42 以太网Network core P48 网络核心Circuit Switching P50 电路转换Packet Switching 分组交换FDM (frequency-division multiplexing) P50 频分多路复用TDM (time-division multiplexing) P50 时分多路复用Statistical Multiplexing 统计复用Store-and-forward 存储转发Queuing delays P53 排队延迟Transmission delay P60 传输延迟,或发送延迟Propagation delay P60 传播延迟Throughput P59 吞吐量Internet backbone P57 骨干网Delay P59 延迟,或时延Loss P59 丢包Packet-Switched Network P59 分组交换网络Nodal processing delay P60 节点处理延迟End-to-end delay P66 端到端延迟Instantaneous throughput P68 瞬时吞吐量Network interface card P74 网络接口卡(即网卡)Message P75 消息,或报文Segment P75 (报文)段Datagram P75 数据报Frames P75 帧Packet sniffer P82 数据包监听器Protocol Stack 协议栈Peer entities 对等实体Chapter 2 应用层Server farm P110 服务器集群Infrastructure P110 基础设施,或基础架构Self-scalability P111 自扩展性Timing P114 实时性Bandwidth-sensitive applications P115带宽敏感应用Connection-oriented service P117 面向连接的服务Directory service P121 目录服务Base HTML 基本HTML文件Stateless protocol P124 无状态协议RTT (round-trip time ) P126 往返时间Web proxy caches P128 网页代理缓存Status line P130 状态行Out-of-band P141 (频)带外(的)In-band P141 带内(的)User agents P144 用户代理Mail servers P144 邮件服务器Pull protocol P148 拉式协议Push protocol p148 推式协议Host aliasing P158 主机别名Canonical hostname P158 规范主机名Mail server aliasing P158 邮件服务器别名Load distribution P158 负载分配Top-level domain (TLD) servers P161 顶级域名服务器Authoritative DNS servers P161 权威域名服务器Iterative queries P168 迭代查询Resource records (RRs) P165 资源记录Overlay network P179 覆盖网Nonpersistent HTTP 非持久HTTP,或非坚持HTTP Persistent HTTP 持久性HTTP,或坚持的HTTP Peer-to-Peer (P2P) Network 对等网络Socket programming 套接字编程Chapter 3 传输层Multiplexing and demultiplexing P226 复用与分用Unidirectional data transfer P241 单向数据传送Finite-state machine (FSM) P242 有限状态机Positive acknowledgments P243 肯定确认Negative acknowledgments P243 否定确认Countdown timer P250 (倒数)计时器Cumulative acknowledgment P258 累积确认Receive buffer P269 接收缓冲区,或接收缓存Resource-management cells 资源管理单元Source (port number) 源端口号Destination (port number) 目的端口号Checksum 校验与Pipelined protocols 流水线(型)协议Go-back-N 回退NSelective Repeat 选择重传Timeout (定时器)超时Fast Retransmit 快速重传Flow Control 流量控制Three way handshake 三次握手sequence number 序列号(简写为seq)acknowledgement number 确认号(简写为ack;注意与大小的ACK不同)Congestion Control 拥塞控制additive increase, multiplicative decrease 加性增乘性减Slow Start 慢启动congestion-avoidance 拥塞避免fast recovery 快速恢复duplicate (ACK) 冗余(ACK)Random Early Detection 随机早期检测Chapter 4 网络层Forwarding table P338 转发表Virtual-circuit networks P343 虚电路网络Datagram networks P343 数据报网络Signaling message P346 信令报文Content Addressable Memory P354 内容可寻址存储器Crossbar switch P356 纵横开关Active queue management 主动队列管理Head-of-the-line (HOL) 队头Classless interdomain routing (CIDR) P371 无类域间路由Plug-and-play P376 即插即用Anycast P386 任播Interior gateway protocols P414 内部网关协议Routing information Protocol P414 路由信息协议(RIP)Open shortest Path First OSPF P414 开放最短路径优先Area border routers P419 区域边界路由器Sequence-number-controlled flooding P430 序列号控制的洪泛,或带序列号的受控洪泛Reverse path forwarding (RPF) P431 逆向路径转发Rendezvous point P433 汇聚点Longest prefix matching 最长前缀匹配Scheduling 调度Fragmentation 分片,或分段Fragment Offset 报文段偏移量Network Address Translation (NAT) 网络地址转换NAT traversal NAT穿越Multicast 组播,或多播Unicast 单播Tunneling 隧道技术Link-State Routing Algorithm 链路状态路由算法Distance Vector Routing Algorithm 距离向量路由算法Count to Infinity Problem 无穷计数问题Hierarchical Routing 分层路由autonomous systems 自治系统BGP (Border Gateway Protocol) 边界网关协议in-network duplication 网内复制broadcast storm 广播风暴spanning tree 生成树redundant packets 冗余数据包Chapter 5 数据链路层,或链路层Broadcast channels P461 广播信道Trailer fields P464 尾部字段Link access P464 链路接入,或链路访问Network interface card P466 网络接口卡(即网卡)Parity checks P469 奇偶校验Forward error correction (FEC) P471 前向纠错Cyclic Redundancy Check 循环冗余校验Polynomial code P472 多项式码(即CRC码)Multiple access P475 多路接入Random access protocols P477 随机接入协议CSMA/CD P484 带冲突检测的载波侦听多路访问CSMA/CA 带冲突避免的载波侦听多路访问Token passing protocol P487 令牌传递协议ARP P491 地址解析协议Preamble P497 前导(字段)Exponential backoff P502 指数回退,或指数退避Repeater P504 中继器Virtual-channel identifier P520 虚拟信道标识Cell-loss priority P520 信元丢失优先权Label-switched router P524 标签交换路由器Framing (封装)成帧error detection 误差检测,或检错Channel Partitioning 信道分割式(MAC协议)Taking turns MAC protocol 轮流式MAC协议Collision 冲突,或碰撞Time Slot 时隙Slotted ALOHA 时隙ALOHAUnslotted ALOHA 无时隙ALOHA Nonpersistent CSMA 非坚持CSMA1-persistent CSMA 1坚持CSMAp-persistent CSMA p坚持CSMAToken Ring 令牌环(Wireless) LAN (无线)局域网Hub 集线器Collision domain 冲突域Bridge 网桥。
计算机专业英语Chapter009

Multiple Choice Questions1. People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agencies2. These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. Cookies3. Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxies4. These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookies5. Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggers6. Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bug7. This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke logger8. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy mode9. Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-Aware10. A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horse11. Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horses12. Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. Worms13. Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulation14. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. Snoopware15. These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. Cyberbullying16. According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse Act17. Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggers18. This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attack19. This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. Rogue20. The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. Encryption21. A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checker22. Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA223. Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistently24. _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data security25. This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. Privacy26. This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse Act27. Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActTrue / False Questions28. The essential elements that control how computers are used are laws.True False29. A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.True False30. It is highly likely that each one of us has an electronic profile created by information resellers.True False31. Identity theft and mistaken identity are the same.True False32. Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.True False33. A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.True False34. Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.True False35. It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.True False36. Spy removal programs are designed to detect and remove various types of privacy threats. True False37. The archiving and search features of the Web make your online identity available indefinitely.True False38. Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False39. Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.True False40. The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.True False41. Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.True False42. Biometric scanning devices are used to scan employee identification cards.True False43. Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False44. A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.True False45. The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).True False46. If copyright-protected music is uploaded to a Web site, it is legal to download it.True False47. Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.True FalseFill in the Blank Questions48. _____, a privacy issue, relates to the responsibility of controlling who is able to use data. ________________________________________49. Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.________________________________________50. _____ is the illegal assumption of someone's identity for the purposes of economic gain. ________________________________________51. _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.________________________________________52. _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.________________________________________53. A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.________________________________________54. _____ bugs are invisible images or HTML code hidden within a Web page or e-mail message and are used to transmit information without your knowledge.________________________________________55. _____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.________________________________________56. A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.________________________________________57. A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.________________________________________58. _____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.________________________________________59. Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____.________________________________________60. _____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.________________________________________61. A(n) _____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.________________________________________62. _____ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.________________________________________63. _____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.________________________________________64. _____ scanning devices use fingerprints and iris scanners to identify individuals.________________________________________65. _____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.________________________________________66. _____ security is concerned with protecting software and data from unauthorized tampering or damage.________________________________________67. As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _____.________________________________________68. A(n) _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.________________________________________69. _____ is representing some other person's work and ideas as your own without giving credit to the original source.________________________________________Essay Questions70. Describe how information about individuals is collected and compiled.71. Explain cookies and identify the difference between first-party cookies and third-party cookies.72. Describe spyware and computer monitoring software.73. Explain how a Web bug works.74. Describe the three most common types of malware, including viruses, worms, and Trojan horses.75. How do firewalls work?76. What are computer ethics?77. Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.78. What is plagiarism, and why is it a particular concern today?Multiple Choice Questions1. (p. 244) People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agenciesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases2. (p. 246) These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. CookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Private Networks3. (p. 247) Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web4. (p. 248) These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web5. (p. 249) Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web6. (p. 249) Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bugAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web7. (p. 251) This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke loggerAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime8. (p. 248) Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy modeAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web9. (p. 250) Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-AwareAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-04Topic: The Internet and the Web10. (p. 251) A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horseAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime11. (p. 252) Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horsesAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime12. (p. 253) Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. WormsAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime13. (p. 253) Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulationAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime14. (p. 253-254) The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. SnoopwareAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime15. (p. 254) These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. CyberbullyingAACSB: TechnologyBlooms: AnalyzeDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime16. (p. 263) According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management17. (p. 263) Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management18. (p. 256) This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attackAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security19. (p. 254) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. RogueAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime20. (p. 256-257) The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. EncryptionAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security21. (p. 256) A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checkerAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security22. (p. 260) Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA2AACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security23. (p. 255) Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistentlyAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security24. (p. 260) _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data securityAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security25. (p. 263) This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. PrivacyAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-07Topic: Copyright and Digital Rights Management26. (p. 246) This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases27. (p. 251) Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-05Topic: CybercrimeTrue / False Questions28. (p. 263) The essential elements that control how computers are used are laws.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-07Topic: Ethics29. (p. 244-245) A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases30. (p. 244) It is highly likely that each one of us has an electronic profile created by information resellers.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases31. (p. 245-246) Identity theft and mistaken identity are the same.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases32. (p. 248) Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web33. (p. 248) A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web34. (p. 249) Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web35. (p. 249) It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.FALSEAACSB: TechnologyBlooms: ApplyDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web36. (p. 249) Spy removal programs are designed to detect and remove various types of privacy threats.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web37. (p. 250) The archiving and search features of the Web make your online identity available indefinitely.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-04Topic: Online Identity38. (p. 251) Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security39. (p. 245) Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases40. (p. 254) The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime41. (p. 254) Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime42. (p. 255) Biometric scanning devices are used to scan employee identification cards. FALSEAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security43. (p. 251) Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security44. (p. 256) A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security45. (p. 260) The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security46. (p. 263) If copyright-protected music is uploaded to a Web site, it is legal to download it. FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management47. (p. 264) Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: PlagiarismFill in the Blank Questions48. (p. 243) _____, a privacy issue, relates to the responsibility of controlling who is able to use data.AccessAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-02Topic: Privacy49. (p. 244) Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.electronic profilesAACSB: TechnologyBlooms: UnderstandDifficulty: 3 HardLearning Outcome: 09-03Topic: Large Databases50. (p. 245) _____ is the illegal assumption of someone's identity for the purposes of economic gain.Identity theftAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases51. (p. 247) _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.FirstAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web52. (p. 248) _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.ThirdAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web53. (p. 251) A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.hackerAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Security。
大学英语跨文化交际总结

Chapter 1 cultureThe nature of culture:1.culture is like an iceberg2.culture is our software3.culture is like the water a fish swims in4.culture is the grammar of our behaviorCharacteristics of culture:1.culture is learned (through proverbs, folklore, art, mass media)2.culture is dynamic 动态的3.culture is pervasive 普遍的4.culture is integrated 综合的5.culture is adaptiveCultural identity 文化认同1.cultural identity defined2.formation of cultural identity (unexamined, search, achievement)3.characteristics of cultural identityCultures within culture1.subculture亚文化群2.Co-culture 共文化3.Sub-group 亚群体SummaryMany of us take our culture for granted. The only time when we may ever think about it is when we leave our own country to travel abroad or when we encounter someone with a culture so different from ours that we have to examine our own beliefs. Much of what we think is the "right" or "correct" way to act or do something is actually part of the knowledge that we have learned from our culture.Culture is a large and inclusive concept. The first definition of culture, by the English anthropologist Edward B. Tylor, involves knowledge, belief, art, morals, law, customs and any other capabilities and habits acquired by man as a member of society. Although this definition has tried to cover more aspects that may direct human behavior, more inclusive definitions continue to come into being. However, in this book, culture is defined from the intercultural communication perspective: culture is the deposit of knowledge, experience, beliefs, values, actions, attitudes, hierarchies, religions, notions of time, roles, spatial relations, concepts of the universe, and artifacts acquired by a group of people in the course of generations through individual and group striving.Compared with the different ideas on what culture is, scholars agree on thecharacteristics of culture. Generally speaking, culture is learned, dynamic, pervasive, integrated and adaptive.Cultural identity refers to one's sense of belonging to a particular culture or ethnic group. People identify with being a member of a group. Being a member of a group helps to define who we are. We are all members of groups of different sizes. One of the largest groups that a person can belong to is a culture. Everyone belongs to a culture.Other groups that people may be a member of are subcultures (also called co-culture) and subgroups. Subcultures exist within dominant culture, and are often based on economic or social class, ethnicity, race, or geographic region.Co-culture refers to groups or social communities exh 如ting communication characteristics, perceptions, values, beliefs, and practices that are significantly different enough to distinguish them from the other groups, communities, and the dominant culture.Subgroups usually do not involve the same large number of people and are not necessarily thought of as accumulating values and patterns of behavior over generations in the same way as cultures do. Subgroups can be as small as a fewpeople or as large as a major religion. Subgroups provide their members with norms that tell people how to behave and think. Subgroups can be considered "deviant" forms of behavior. Subgroups can also be defined as "non-exclusive" and "temporary" forms of behavior.Chapter 2 intercultural communicationCommunicationmunication definedponents (组成) of communication(sender/message/encoding/channel/receiver/decoding 编码।/feedback/noise/context)Characteristics of communicationmunication is dynamicmunication is systematicmunication is symbolic 象征的munication is irreversible 不可逆的munication is transactional 相互作用的munication is self-reflective 自我反思的munication is contextual 前后关系的Culture and communicationCulture and communication, although two different concepts, are directly linked. They are so inextricably bound that some anthropologists believe the terms are virtually synonymous. Whenever people interact, they communicate. Culture is learned, acted out, transmitted, and preserved through communication.Although the concepts of communication and culture work together, we separate them here for purposes of our discussion, we begin by examining "communication" because to understand intercultural interaction, you must first recognize the role of communication in that process.Cultures inherently contain communication systems. Communication and culture are inseparable. One implication of this insight is that cultures generate symbols, rituals, customs, and formats. To use a simple example, every culture has rules for achievement and attainment. In Western culture, the symbols include degrees, promotions, certificates, material objects, technology, and other symbols of material wealth. However, nationals in rural Botswana take pride in the primary group and not just individual attainment. Cultural misunderstanding occurs when we fail to matchthe appropriate symbols and general communication system to the culture. Just witness the awkwardness of an expatriate who attends a gathering in a host culture, but fails to wear the appropriate clothes. One cannot escape this inseparability of culture and communication.Each culture encourages a particular communication style expected within it. This implies not only using correct symbols, but also applying the appropriate communication style for the occasion. Communication styles include mannerisms, phrases, rituals, and communication customs appropriate for various situations in a culture. For instance, in Saudi Arabia the correct interpersonal communication style upon meeting one's host is often language loaded with compliments and thanks. Public criticism of fellow workers in this culture is rare, for such a message would appear disrespectful. Some West Africans exhibit a friendly and warm interpersonal communication style. Some Asians are described as conscious of propriety, ceremony, and rules of respect and honor. Some U.S. culture members appear informal and uninhibited Some Britons display a reserved manner, preferring understatement and control in interpersonal interaction. These examples remind us of the importance of understanding intercultural communication style.Areas like loudness, pitch, rate, and certain stances and gestures characterize communication behaviors. A specific culture expects an "ideal" communication style. The contrasts are striking, such as when an American speaks in a "normal" conversational voice, a "quiet" Thai national may think the voice is too loud and interpret the American to be angry.Intercultural communication1.intercultural communication defined2.forms of intercultural communication (international communication/interracialcommunication 跨人种/interethnic communication 跨种族/intraculturalcommunication 同一文化内)SummaryCommunication is an element of culture. It is believed that every cultural pattern and every single act of social behavior involves communication. When a baby is just born, he usually cries. His crying communicates something. When you graduate, your friends usually say "Congratulations!" to you. When a driver sees the red light, he/she will stop. All these are cases of communication.Communication is derived from the Latin word communicate, meaning to share with or to make common, as in giving to another part or share of your thoughts, hopes, and knowledge.However, like culture, the term "communication" has been defined from different perspectives. In fact, the way that people view communication - what it is, how to do it, and reasons for doing it - is part of their culture. Western culture emphasizes the instrumental function of communication and the prior consideration is to achieve the sender's personal goal, while in Eastern culture, in addition to sending and receiving messages simultaneously, communicators take their relationship into account.The process of communication has nine components: sender/source, message, encoding, channel, receiver, decoding, feedback, noise and context. The sender encodes a message (information that the sender wants to share with other people) by putting it into symbols (usually words or nonverbal gestures) and then sending it through a channel. A channel can be printed media such as magazines and newspapers; electronic media such as television, radio, and the Internet; or sounds traveling through the air when two people speak face to face. Sometimes, it is difficult for the message to reach the receiver. The difficulty is due to "noise". When receivers get the message, they must "decode" or try to understand it. For example, if the sender encodes a message using English, the receiver must use their knowledge of English language to understand it. Often, the sender pays attention to the feedbackof the receiver. The communication takes place within a setting or situation called context.Any communication process demonstrates several characteristics, that is, dynamic, systematic, symbolic, irreversible, transactional, self-reflective and contextual.When communicating with people from different cultures, it is important to remember that culture and communication are strongly connected. Culture is a code we learn and share, and learning and sharing require communication.Intercultural communication refers to communication between people whose cultural perception and symbol system are distinct enough to alter the communication event. Intercultural communication as a term was first used in 1959 by Edward T. Hall—an American anthropologist. Intercultural communication includes international communication, interracial communication, interethnic commurucat10n and intracultural communication.Chapter 4 barriersEmotional problems as barriers1.anxiety and uncertainty (definition/strategies to overcome)2.assuming similarity instead of difference 假想相同点多于不同点Attitudinal problems as barriers1.ethnocentrism 种族或民族中心主义(defined/various forms)2.stereotyping(definition/categories)3.prejudice4.racism5.reasons for the persistence of ethnocentrism, stereotyping, prejudice and racism(socialization 社交化/social benefits/economic benefits/psychologicalbenefits)Translation problems as language barriersck of vocabulary equivalenceck of idiomatic equivalenceck of grammatical-syntactical equivalenceck of experiential equivalence 经验ck of conceptual equivalence 概念SummaryThere are several barriers to intercultural communication—anxiety and uncertainty,assuming similarity instead of difference, ethnocentrism, stereotyping, prejudice, racism and translation problems.Anxiety and uncertainty, as well as assuming similarity instead of difference belong to the emotional problems.Anxiety occurs because of not knowing what one is expected to do, and focusing on that feeling and not being totally present in the communication transaction. Anxiety may also affect your ability to communicate your ideas to others, for you pay too much attention to your uncomfortable feelings. Uncertainty refers to our cognitive inability to explain our own or other's feelings and behaviors in interactions because of an ambiguous situation that evokes anxiety.Assuming similarity instead of difference is a natural thing to do if you do not have any information about a culture. It refers to the idea that people coming from another culture are more similar to you than they actually are or that another person's situation is more similar to yours than it in fact is. Assuming that a culture is similar to your own can cause you to ignore important differences This assumption always leads to disrupted communication and even conflict.Ethnocentrism, stereotyping, prejudice and racism belong to the attitudinal problemsEthnocentrism is negatively judging another culture by your own culture's standards. To make ethnocentric judgments is to believe that the ways of your own culture are better than those of others.Stereotyping is used to refer to negative or positive judgments made about individuals based on any observable or believed group membership. It assumes that a person has certain qualities (good or bad) just because the person is a member of a specific group.Prejudice refers to the irrational dislike, suspicion or hatred of a particular group, race, religion, or sexual orientation. Prejudiced attitudes can take many forms.A specific kind of prejudice, racism refers to any policy, practice, belief, or attitude that attributes characteristics or status to individuals based on their race. Racism involves not only prejudice, but also the exercise of power over individuals based on their race.Ethnocentrism, stereotyping, prejudice, racism continue to exist because of socialization and the apparent social, economic, and psychological benefits that come from it.Due to language differences and cultural differences, translation can become a barrier to intercultural communication.Five elements that typically cause problems in translation are the lack of equivalences in vocabulary, idioms, grammar and syntax, experiences, and concepts.Chapter 5 verbal communicationSignificance of verbal communication"Verbal" means "consisting of words". Language, spoken or written, is a means of verbal communication. Therefore, verbal intercultural communication happens when people from different cultural backgrounds communicate with each other by using language.Language and culturenguage as a reflection of the environmentnguage as a reflection of values3.the meaning of wordsVerbal communication styles1.direct and indirect styles2.self-enhancement and self-effacement styles 宣扬和谦逊3.elaborate, exacting and succinct styles 详尽的,确切的,简洁的4.personal and contextual styles 不同的称呼方式根据场合和地位5.instrumental and affective styles 理性与感性Language diversity1.dialects and sociolects 方言和社会方言2.pidgin and lingua franca洋泾浜语(汉语中夹杂外语),混合语(母语不互通)3.taboo and euphemism 禁用语委婉语4.jargon 行话Cultural influence on written communication1.direct plan2.indirect planSummaryVerbal intercultural communication happens when people from different cultural backgrounds communicate with each other by using language.It is agreed that language helps in communicating with people from different backgrounds. However, people may be less aware that cultural literacy is necessary in order to understand the language being used. Words in themselves do not carry the meaning. The meaning comes out of the context. Although people use the dictionary to explain one language with another language, words of differentlanguages don't mean the same thing because of the cultural influence on word meaning.There are mainly five verbal communication styles introduced in this chapter: direct / indirect; self-enhancement / self-effacement; elaborate / exacting / succinct; personal / contextual; and instrumental / affective.Language is a cultural phenomenon which is used to express different uses and to communicate different meanings. Language varies according to the communicative uses but also according to the users. In fact, users of the same language in a sense all speak differently and the kind of language each of them chooses to use is in part determined by their cultural background.In short, some language variations result from the language user, that is, his or her geographical origin (dialect), or his or her social condition (sociolect). However, some language variations result from the circumstances of communication, such as pidgin, Lingua Franca, jargon, taboo and euphemism. Dialect refers to geographical variation, while sociolect refers to variation in terms of social class or style. Pidgin refers to a mixed language that is used for trading purposes, while Lingua Franca refers to a specific language that is used as an international means of communication. Taboo refers to expressions that are considered impolite, while euphemism refers to polite expressions used to soften the offensive and disturbing language. Jargon refers to aspecial or technical vocabulary that is developed for professional purposes within professional groups like medicine or law.Furthermore, verbal communication involves both oral and written forms. Written communication is especially important in intercultural business communication. As the modem technological renovation (e-mail and ecommerce) calls for the written communication in business, businessmen should be more conscious about the written communication because mistakes made inwritten form are more serious and permanent.Cultural patterns influence not only oral communication but also written communication. Cultural impact on discourse patterns is to be classified into two categories: direct plan and indirect plan. In direct plans, clarity and conciseness are essential to a successful business writing style. The indirect plan has other priorities than the quick delivery of ideas, such as nurturing a relationship or developing some other context for the message. Direct plan is favored by results- oriented cultures Indirect plan is favored by relationship-oriented culture.Chapter 6 nonverbalSignificance of nonverbal communication1.nonverbal behavior accounts for much of the meaning we get from conversations.2.nonverbal behavior is significant because it spontaneou sly<D reflects thesubconsciousness.3.Nonverbal communication is significant is that we cannot avoid communicating. Definition and functions of nonverbal communication1.definition of nonverbal communication2.functions of nonverbal communication (repeating 重复/complementing 补充/substituting 代替/regulating/contradicting 反对)Paralanguage and silence1.paralanguage副语言(语音语调)2.silenceTime and space1.chronemics 时间行为学的2.proxemics 人际距离学(fixed features of space/semifixed features ofspace/personal space包括四种情况下的不同距离)Other categories of nonverbal communication1.oculesics 目光语2.olfactics 嗅觉3.haptics 触觉4.kinesics 人体动作学(gestures/posture/facial expressions/chromatics 色彩/attire 打扮)SummaryWhen we learn to communicate, we learn not only language but also various ways of communicating. Communicators use both verbal and nonverbal codes to communicate, listeners expect to receive both kinds of messages during a conversation. If a speaker uses nonverbal codes poorly or inappropriately, a listener may consider the person a poor speaker. However, misunderstandings may occur when the speakers and listeners are from different cultures and do not share the same nonverbal codes.In brief, the messages sent without using words are called nonverbal communication. Nonverbal communication involves those nonverbal stimuli in a communication setting that are generated by the sender and his or her use of the environment—these have potential message value for both the sender and receiver.Nonverbal communication codes or symbols or stimuli in a communicating setting can be divided into different categories: paralanguage, silence, proxemics,chronemics, oculesics, olfactics, haptics, kinesics, chromatics and attire.Paralanguage is the set of audible sounds that accompany oral language to augment its meaning When the German poet Klopstock wrote "The tones of human voices are mightier than strings or brass to move the soul", he meant that sounds we generate often communicate more than the words that they produce. We have the experience of watching foreign movies: if we don't know the language they speak and there are no subtitles, we can still infer when performers are expressing anger, sorrow, joy, or any other emotions.Silence cues affect interpersonal communication by providing an interval in an ongoing interaction during which the participants have time to think, check or suppress an emotion, encode a lengthy response, or inaugurate another line of thought.Chronemics is the study of how people perceive and use time. People have different attitudes toward punctuality because they have different time orientations. People from monochronic cultures emphasize schedules, while people from polychronic cultures stress involvement of people and the completion of tasks as opposed to a strict adherence to schedules.Proxemics refers to the study of spatial relations. Cultures vary in such things as how living space is arranged and the distance between people in interaction.Oculesics refers to the study of communications sent by the eyes. Eyes play a central role in impression management. When people say that eyes talk, they mean that eyes convey messages. Although eye contact is a very important way of communication, direct eye-to-eye contact is not a custom throughout the world.Olfactics refers to the study of communication via smell. Americans feel uncomfortable with natural smells, so they spend millions of dollars to make themselves smell "good". However, many cultures regard natural smells as normal. Most 心abs perceive a person's smell as an extension of the person.Haptics or touch refers to communication through the use of bodily contact. There are different behavioral patterns regarding touch. We learn the rules, as we move from infancy into childhood. The wrong behavior of touching in strange cultures can create uncertainty and even ill feeling.Kinesics refers to gestures, facial expressions, eye contact, body position, body movement, and forms of greeting and their relations to communication. Although any part of the body can be used for communicating nonverbally, face, hands, and armsare the primary 灼nesic channels through which nonverbal messages are sent.Chromatics refers to the study of color in reference to people's perceptions, behaviors, and impressions of others. The same color may be interpreted differently in different cultures. The wrong color of your clothes may make people dislike you, or even hate you. It is quite important to watch what color is appropriate in certain settings, when you are in a foreign countryAttire refers to clothing and physical appearance. It also serves as nonverbal symbols. We often identify a person's culture by his or her physical appearance and dress. Communication with others is often perceived by visual observations of his or her physical appearance.Chapter 7 cultural patternsDefining cultural patterns1.ways of thinking2.ways of actingComponents of cultural patterns 组成1.beliefs 信仰2.values 价值观3.norms 行为准则4.social practices 社会行为Culture theory1.high-context culture高语境文化(很多信息在环境中是可见的,没有必要用语言过多描述)2.low-context culture (语言作为主要传递信息的方式)3.problems posed (高语境的会嫌弃低语境的人说的太多,给予了太多不需要的信息)Value orientation1.human nature orientation2.person-nature orientation(mastery-over-nature view/harmony-with-natureview/subjugation-to-nature view)3.time orientation(value-past/value-present/value-future)4.activity orientation(value-doing/value-being/value-being-in-becoming)5.relational orientationCultural variability1.individualism and collectivism 独立的集中的2.uncertainty avoidance3.power distance4.masculinity and femininity 男权主义女权主义SummaryAlthough individuals, even in the same culture, tend to have different value patterns, there are overall values shaped by one's culture which are shared by the members of the group. Understanding a culture's value pattern is of great significance in terms of understanding their behaviorsShared beliefs, values, norms, and social practices that are stable over time andthat lead to roughly similar behaviors across similar situations are known as cultural patterns.A belief is an idea that people assume to be true about the world.Values involve what a culture regards as good or bad, right or wrong, fair or unfair, just or unjust, beautiful or ugly, clean or dirty, valuable or worthless, appropriate or inappropriate, and kind or cruel.Norms are the socially shared expectations of appropriate behaviors.Social practices are the predictable behavior patterns that members of a culture typically follow.Context is defined as the information that surrounds an event; it is inextricably boundup with the meaning of the event. Edward T. Hall introduced the high context communication and low context communication. A high context (HC) communication or message is one in which most of the information is already in the person, while very little is in the coded, explicitly transmitted part of the message. A low context (LC) communication is just the opposite; i.e., the mass of the information is vested in the explicit code. It is verbalized.Kluckhohn and Strodtbeck's Value Orientations are based on: human nature, person-nature interface, time, activity and human relationships. These five aspects define group cultures according to different categories:A s for human-nature orientation, cultures could be divided into six groups: (1) Humans are evil but changeable; (2) Humans are evil and unchangeable; (3)Humans are neutral with respect to good and evil; (4) Humans are a mixture of good and evil; (5) Humans are good but changeable; (6) Humans are good and unchangeable.The person-nature orientation consists of three categories: (1) Mastery over nature;(2) Harmony with nature; (3) Subjugation to nature.As far as time orientation is concerned, cultures may belong to (1) The past orientation; (2) The present orientation; (3) The future orientation.The activity orientation involves three groups: (1) The d, omg onentat10n; (2) The being orientation; (3) The being-in-becoming orientation.Geert Hofstede has identified four value dimensions that have a significant impact on behavior in all cultures. These dimensions are individualism and collectivism, uncertainty avoidance, power distance, and masculinity and femininity.Individualistic cultures give more importance to individuals' needs when they do things such as setting goals.Collectivism is characterized by a rigid social framework that distinguishes between in-groups and out-groups.Uncertainty avoidance deals with the degree to which members of a culture try to avoid uncertainty.Power distance is "the extent to which the less powerful members of institutions and organizations accept that power is distributed unequally". That is to say, how equal or unequal .the people in a particular culture think people should be.The major differentiation between masculine and feminine cultures is how gender roles are distributed in cultures.Those dimensions offer certain measurements for researchers to study a specificculture or do comparative research work from an intercultural perspective.Chapter 8 cultural influence on contextsThe business context1.culture influence on business context2.management不同国家方式不同3.business etiquette norms 商务礼仪(appointment seeking/the date forbusiness/greeting behavior/gift giving)The educational context1.culture influence on the educational context2.role behaviors of students and teachers3.classroom participation4.turn taking说话的方式时间和行为The health care context1.culture influence on the health care context2.family and gender roles in the health care context3.conversational structures and languageSummaryMeaning in communication is basically decided by context. Communication is notdevoid of external influence: all human interaction is influenced to some degree by the social, physical, and cultural settings in which it occurs. This is known as the communication context. Context may consist of the social, political, and historical structuresin which the communication occurs. Communication in three areas is most influenced by context: business, education and health care.In the business field, management has become a crucial issue and the managing styles vary from culture to culture. These differences are apt to cause troubles for intercultural communication. In add 山on to management, many concrete business practices such as appointment seeking, greeting, gift giving and negotiation are also posing problems for the business interaction. People need to understand and practice the rules in intercultural business context to be competent communicators.The educational context is another significant area where intercultural communication frequently occurs. All participants in the educational context—teachers, students, parents, school administrators, and other staff—bring their cultures' beliefs, values, norms, and social practices with them. All of these can influence behaviors on how students and teachers relate to each other in the classroom.。
ControlNet网络媒介组件说明书

Components ListControlNet Media SystemThis document contains the ControlNet network media components.For the most current list, see the NetLinx Selection Guide,publication NETS-SG001.Contact your Rockwell Automation representative for information about ordering ControlNet network media components.Nonhazardous LocationsThe table lists components available for nonhazardous environments.You may be able to buy fewer component pieces than shown per order or you may have to purchase all the pieces per order depending upon a unique situation. For more information, contact your distributor or the Rockwell Automation sales office.Cat. ponent DescriptionCoaxial tap kits - See the ControlNet Coax Media Planning and Installation Guide, publication CNET-IN002, for more information.1786-TPR Right-angle T-tap •IP20•1 piece per order 1786-TPS Straight T-tap 1786-TPYR Right-angle Y-tap 1786-TPYS Straight Y-tap Coaxial connectors - See the ControlNet Coax Media Planning and Installation Guide, publication CNET-IN002, for more information.2 ControlNet Media System Components ListCat. ponent DescriptionRG-6 quad-shield coaxial cable -See the ControlNet Coax Media Planning and Installation Guide, publication CNET-IN002, for more information.1786-RG6F/A High-flex•304.8 m (1000 ft)1786-RG6Standard PVC CM-CL2•304.8 m (1000 ft)1786-CTK Coax toolkit Includes:•ControlNet Coax Media Planning andInstallation Guide, publicationCNET-IN002•Cable strip tool•Memory blade holder•Memory blade cartridges•Calibration/flare tool•Crimp tool1788-CNCHKR ControlNet NetChecker Handheld diagnostic tool that analyzesactive ControlNet networks1788-MCHKR NetLinx Media Checker Handheld diagnostic tool that identifiescable failures, measures length, and checkswiring for ControlNet, DeviceNet, DH+/RIO,and Ethernet physical mediaIP67 TNC media -See the ControlNet IP67 Tap and Cable Assembly Kit Installation Instructions, publication 1786-IN017, formore information.Publication AG-PA002E-EN-P - April 2010ControlNet Media System Components List 3Repeater adapter - See the following publications for more information:•ControlNet Fiber Media Planning and Installation Guide, publication CNET-IN001•ControlNet Ex Media Planning and Installation Guide, publication CNET-IN0031786 RPA/B Modular repeater adapter•Supplies power for up to four repeatermodules (1786-RPCD, 1786-RPFS, and1786-RPFM)•Supplies power for up to two repeatermodules (1786-RPFRL, 1786-RPFXL)•One coax BNC connection•RG6 copper coaxUse with these repeater modules:•1786-RPCD•1786 RPFS•1786 RPFM•1786-RPFRL•1786-RPFRXLRepeater modules - See the following publications for more information:•ControlNet Fiber Media Planning and Installation Guide, publication CNET-IN001•ControlNet Ex Media Planning and Installation Guide, publication CNET-IN0031786-RPCD Coaxial repeater•Two coaxial segments per module•Point-to-point and star topologies•RG6 copper coax1786-RPFS Short-distance fiber repeater•Two fiber segments per module•Point-to-point and star topologies •V-pin style connector, use pre-made 1786-FS cable with any of the following catalog numbers:1786-FS101786-FS201786-FS601786-FS1001786-FS2001786-FS300See page4 for more information.1786-RPFM Medium-distance fiber repeater•Two fiber segments per module•Point-to-point and star topologies •ST-style connector, 62.5/125 micron multimode fiber1786-RPFRL/B Long-distance fiber ring repeater•Two fiber segments per module•Point-to-point, star, and ring topologies•Fault relay for runtime diagnostics •ST-style connector, 62.5/125 micron multimode fiber1786-RPFRXL/B Extra-long-distance fiber ring repeater•Two fiber segments per module•Point-to-point, star, and ring topologies•Fault relay for runtime diagnostics •ST-style connector, 62.5/125 micron multimode fiber•ST-style connector, 9/125 micron single mode fiberCat. ponent DescriptionPublication AG-PA002E-EN-P - April 2010Publication AG-PA002E-EN-P - April 20104 ControlNet Media System Components ListShort-distance fiber-optic cable with V-pin connectors - See the ControlNet Fiber Media Planning and Installation Guide, publication CNET-IN001, for more information.1786-FS1010 m (32.8 ft) cable assembly •200 micron cable•Use with the 1786-RPFS repeater1786-FS2020 m (65.6 ft) cable assembly 1786-FS6060 m (196.8 ft) cable assembly 1786-FS100100 m (328.1 ft) cable assembly 1786-FS200200 m (656.2 ft) cable assembly 1786-FS300300 m (948.2 ft) cable assemblyNetwork access cable (laptop computer to ControlNet network) - See the ControlNet Network Access Cable Installation Instructions, publication 1786-TD006, for more information.1786-CP3.05 m (10 ft) cable assemblyControlNet network access cableCat. ponent DescriptionPublication AG-PA002E-EN-P - April 2010ControlNet Media System Components List 5Hazardous LocationsThe table lists components available for hazardous environments.You may be able to buy fewer component pieces than shown per order or you may have to purchase all the pieces per order depending upon a unique situation. For more information, contact your distributor or the Rockwell Automation sales office.Cat. ponentDescriptionIntrinsically safe (FLEX Ex) tap kits - See the ControlNet Ex Media Planning and Installation Guide, publication CNET-IN003, for more information.1797-TPR FLEX Ex right-angle T-tap •IP20•1 piece per order1797-TPS FLEX Ex straight distance T-tap 1797-TPYR FLEX Ex right-angle Y-tap 1797-TPYSFLEX Ex straight Y-tapIntrinsically safe (FLEX Ex) connectors - See the ControlNet Ex Media Planning and Installation Guide, publication CNET-IN003, for more information.See the ControlNet Ex Media Planning and Installation Guide, publication CNET-IN003, for more information.1797-BOOT FLEX Ex boot insulator kit • 1 kit containing 50 pieces 1797-EXMK FLEX Ex cable marking kit • 1 kit containing 100 pieces Coaxial barrier - See the ControlNet Ex Media Planning and Installation Guide, publication CNET-IN003, for more information.1797-BCNRCoaxial barrierIsolates a ControlNet segment from a hazardous to a non-hazardous areaRepeater adapter - See the following publications for more information:•ControlNet Fiber Media Planning and Installation Guide, publication CNET-IN001•ControlNet Ex Media Planning and Installation Guide, publication CNET-IN0031797-RPAIntrinsically safe modular repeater adapter •Supplies power for up to two repeater modules (1797-RPFM)•One coax BNC connectionRG6 copper coax•Use with the 1797-RPFM repeater6 ControlNet Media System Components ListRepeater module - See the following publications for more information:•ControlNet Fiber Media Planning and Installation Guide, publication CNET-IN001•ControlNet Ex Media Planning and Installation Guide, publication CNET-IN0031797-RPFM Intrinsically safe medium-distance repeater•Two fiber segments per module•Point-to-point and star topologies •ST-style connector, 62.5/125 micron multimode fiber•Connect the 1797-RPFM repeater module (in an intrinsically safe area) to the 1786-RPFM repeater module (in a non-intrinsically safe area) using fiberCat. ponent DescriptionPublication AG-PA002E-EN-P - April 2010ControlNet Media System Components List 7 Notes:Publication AG-PA002E-EN-P - April 2010Rockwell Automation SupportRockwell Automation provides technical information on the Web to assist you in using its products. At/support/, you can find technical manuals, a knowledge base of FAQs, technical andapplication notes, sample code and links to software service packs, and a MySupport feature that you can customize to make the best use of these tools.For an additional level of technical phone support for installation, configuration, and troubleshooting, we offer TechConnect support programs. For more information, contact your local distributor or Rockwell Automation representative, or visit /support/.Installation AssistanceIf you experience an anomoly within the first 24 hours of installation, review the information that is contained in this manual.You can contact Customer Support for initial help in getting your product up and running.New Product Satisfaction ReturnRockwell Automation tests all of its products to ensure that they are fully operational when shipped from the manufacturing facility. However, if your product is not functioning and needs to be returned, follow these procedures.Documentation FeedbackYour comments will help us serve your documentation needs better. If you have any suggestions on how to improve this document, complete this form, publication RA-DU002, available at /literature/.Allen-Bradley, Rockwell Automation, Rockwell Software, NetLinx, and TechConnect are trademarks of Rockwell Automation, Inc.Trademarks not belonging to Rockwell Automation are property of their respective companies.United States or Canada1.440.646.3434Outside United States or Canada Use the Worldwide Locator at /support/americas/phone_en.html , or contact your local Rockwell Automation representative.United States Contact your distributor. You must provide a Customer Support case number (call the phone number above to obtain one) to your distributor to complete the return process.Outside United StatesPlease contact your local Rockwell Automation representative for the return procedure.。
计算机网络_中英文名词术语对照表

Advanced Data Communication Control
Procedure
High-level Data Link Control
Point-to-Point Protocol
Link Control Protocol
Network Control Protocol
缩写 CRC
PAR ARQ
LAN
Metropolitan Area Networks
MAN
Wide Area Networks
WAN
对应的中文名称 开放系统互连 传输控制协议 国际互联网络协议 参考模型 物理层 数据链路层 网络层 传输层 会话层 表示层 应用层 异步传输模式 国际电讯联盟 国际标准化组织
美国国家标准学会 (美国)国家标准与与技术学会
Physical layer coding violations
Hamming Code
Hamming Distance
Even
Odd
Parity bit
Codeword
Finite state machine models
Petri net models
Synchronous Data Link Control
缩写 MAC CSMA CSMA/CD MACA
TDR
FE FDDI GE LLC
VLAN NIC
对应的中文名称 多路访问协议 介质访问控制 纯 ALOHA 协议 分槽 ALOHA 协议 载波侦听多路访问 带冲突检测的载波侦听多路访问 避免冲突的多路访问 冲突窗口 位图协议 二进制倒计数 适应树搜索协议 时域反射计 曼侧斯特编码 差分曼侧斯特编码 以太帧格式 二进制指数回退算法 快速以太网(100M) 光纤分布式数据接口 吉比特以太网(1G,1000M) 逻辑链路控制 透明网桥 交换机 逆向地址学习 泛洪/广播 转发 丢弃 过滤 冲突域 生成树 虚拟局域网 网络接口卡(网卡) 存储转发交换 直通交换 无分片交换
《计算机英语》课后习题答案

《计算机英语》参考答案Chapter 11.(1) 中央处理器(Central Processing Unit)(2) 随机访问内存(Random-access Memory)(3) 美国国际商用机器公司(International Business Machine)(4) 集成电路(Integrated Circuit)(5) 大规模集成电路(Large Scale Integration)(6) 超大规模集成电路(Very Large Scale Integration)(7) 个人数字助理(Personal Digital Assistant)(8) 图形用户界面(Graphical User Interface)2.(1) data(2) software(3) IC(4) ENIAC(5) supercomputer(6) superconductivity3.(1) F (ENIAC is the second digital computer after Atanasoff-Berry Computer)(2) T(3) F (Data is a unorganized)(4) T(5) T(6) T4.(1) 人工智能(2) 光计算机(3) 神经网络(4) 操作系统(5) 并行处理(6) vacuum tube(7) integrated circuit(8) electrical resistance(9) silicon chip(10) minicomputer5.数据是未经组织的内容的集合,数据可以包括字符、数字、图形和声音。
计算机管理数据,并将数据处理生成信息。
向计算机输入的数据称为输入,处理的结果称为输出。
计算机能在某一个称为存储器的地方保存数据和信息以备后用。
输入、处理、输出和存储的整个周期称为信息处理周期。
与计算机交互或使用计算机所产生信息的人称为用户。
1.(1) 发光二极管(Light-Emitting Diode)(2) 静态随机存储器(Static Random Access Memory)(3) 只读存储器(Read Only Memory)(4) 运算器(Arithmetic and Logical Unit)(5) 阴极射线管(Cathode Ray Tube)(6) 视频显示单元(Visual Display Unit)(7) 可编程只读存储器(Programmable Read Only Memory)(8) 液晶显示屏(Liquid Crystal Display)2.(1) CPU(2) peripheral(3) memory(4) modem(5) control unit(6) byte3.(1) T(2) T(3) F (RAM is volatile memory because the information within the computer chips is erased as soon as the computer is powered off whereas ROM is nonvolatile)(4) T(5) T(6) F (Microphones and digital cameras are input devices)4.(1) 寄存器组(2) 主机(3) 二进制的(4) 算法(5) 光盘(6) CD-RW(7) logic operation(8) barcode(9) peripheral device(10) volatile memory5.计算机的内存可被视为一系列的单元,可以在单元中存取数字。
计算机专业英语(2008影印版)课后习题答案(包括crossword_puzzle的句子翻译)

Computing Essentials 2008课后练习题答案详解Chapter 1: Information Technology, The Internet, and Y ouCrossword Puzzle Answers: (p22)Across1 、The most essential part of an information system. People信息系统最基本的部分。
人7 、Coordinates computer resources. Operating System协调计算机资源。
操作系统10 、Modifies signals for processing. Modem修改信号以便处理。
调制解调器12 、Data that has been processed by the computer. Information计算机处理过的数据。
信息13 、Unprocessed facts. Data没处理过的事实。
数据14 、Notebook computer that accepts handwritten input.. Tablet PC可以用手写输入的笔记本电脑。
平板电脑DownNum. Clue Answer2 、Uses computers to become more productive. End User使用电脑变得更有效率。
终端用户3 、Rules or guidelines to follow when using software, hardware, and data. Procedures使用软件,硬件和数据时遵循的规则或指引。
指令说明书4 、Created by word processors. Document Files文字处理创建出来的。
文档文件5 、Specialized programs that allow input and output devices to communicate. Device Drivers 允许输入和输出设备通信的专业程序。
《计算机网络》中英词汇对照表

《计算机网络》中英文对照表Chapter 11.1Internet:因特网Computer network :计算机网络Host: 主机End system: 终端系统Packet switching: 分组交换Route: 路径Internet service provider (ISP): 因特网服务提供商Protocol: 协议Transmission Control Protocol (TCP):传输控制协议1.2Client: 客户端Server: 服务器Peer: 对等机Reliable data transfer: 可靠数据传输Flow control: 流量控制Congestion-control: 拥塞控制User Datagram Protocol (UDP): 用户数据报协议1.3Circuit switching: 电路交换/线路交换Packet switching: 分组交换Frequency-division multiplexing (FDM): 频分多路复用Time-division multiplexing (TDM): 时分多路复用Bandwidth: 带宽Time slot: 时隙Frame: 帧Message: 报文:Packet: 分组Store-and-forward: 存储转发Datagram network: 数据报网络Virtual-circuit network: 虚电路网络1.4Router: 路由器Modem: 调制解调器Local area network (LAN): 局域网Ethernet: 以太网Wireless LAN: 无线局域网Guided media: 导向型介质Unguided media: 非导向型介质Twisted-pair copper wire: 双绞线Unshielded twisted pair(UTP): 非屏蔽双绞线Coaxial cable: 同轴电缆Fiber optics: 光线/光缆1.6Nodal processing delay: 结点处理延迟Queuing delay: 排队延迟Transmission delay: 发送延迟Propagation delay: 传播延迟Traffic intensity: 流通强度End-to-end delay: 端到端延迟1.7Layer: 层次Protocol stack: 协议栈Application layer: 应用层Transport layer: 传输层Network layer: 网络层Link layer: 链路层Physical layer: 物理层Encapsulation: 封装Message: 报文Segment: 报文段Datagram: 数据报Frame: 帧Chapter 22.1Client-server architecture: 客户端-服务器体系结构;C/S结构P2P architecture: 对等结构Processes: 进程Socket: 套接字Application programming interface (API): 应用程序编程接口IP address: IP地址Prot number: 端口号Syntax: 语法Semantics: 语义Full-duplex: 全双工Handshaking: 握手Real-time application: 实时应用2.2The World Wide Web: 万维网HyperText Transfer Protocol (HTTP): 超文本传输协议Web page: 网页Object: 对象HyperText Markup Language (HTML): 超文本标记语言URL:统一资源定位符Browser: 浏览器Persistent connection: 持久连接Non-persistent connection: 非持久连接Round-trip time (RTT): 往返时间Without pipelining: 非流水线方式With pipelining: 流水线方式Web cache: web 缓存Proxy server: 代理服务器2.3File Transfer Protocol (FTP): 文件传输协议Control connection: 控制连接Data connection: 数据连接Out-of-band: 带外In-band: 带内2.4Electronic Mail: 电子邮件User agent: 用户代理Mail server: 邮件服务器Simple Mail Transfer Protocol (SMTP): 简单邮件传输协议Mailbox: 邮箱Multipurpose Internet Mail Extensions (MIME): 多用途因特网邮件扩展协议Post Office Protocol (POP): 邮局协议Internet Mail Access Protocol (IMAP): Internet 邮件访问协议2.5Domain Name System (DNS): 域名系统Hostname: 主机名Host aliasing: 主机别名Mail server aliasing: 邮件服务器别名Load distribution: 负载分配Root DNS server: 根DNS服务器Top-Level Domain (TLD) servers: 顶级域DNS服务器Authoritative DNS servers: 授权DNS服务器;权威DNS服务器Local DNS server: 本地DNS服务器Database: 数据库Chapter 33.1Logical communication: 逻辑通讯3.2Multiplexing: 多路复用Demultiplexing: 多路分解Well-known port number: 众所周知的端口号3.3UDP segment: UDP报文段Checksum: 校验和;检查和Wrapped around: 回卷3.4Channel: 通道;信道Positive acknowledgement : 肯定应答Negative acknowledgement: 否定应答ARQ (automatic repeat request): 自动重传请求Feedback: 反馈Retransmission: 重传Stop-and-wait protocol: 停止-等待协议Duplicate packets: 冗余分组Sequence number: 顺序号Timer: 定时器Alternating-bit protocol: 比特交替协议Utilization: 利用率Go-back-N (GBN): 回退N步Window size: 窗口大小Sliding-window protocol: 滑动窗口协议Cumulative acknowledgement: 累积确认Timeout: 超时Selective Repeat (SR): 选择重传3.5Connection-oriented: 面向连接Point-to-point: 点到点Three-way handshake: 三次握手Maximum segment size (MSS): 最大报文段大小Maximum transmission unit (MTU): 最大传输单元Piggybacked: 捎带Sample RTT: 样本RTTFast retransmit: 快速重传Selective acknowledgement: 选择确认Flow-control: 流量控制Receive window: 接收窗口3.7Congestion control: 拥塞窗口Self-clocking: 自定时的Additive-increase, multiplicative-decrease: 加性增,乘性减Slow star: 慢启动Congestion avoidance: 拥塞避免Threshold: 阈值Fast recovery: 快速恢复Bottleneck: 瓶颈Latency: 延迟Chapter 44.1Forwarding: 转发Routing: 路由Routing algorithm: 路由算法Forwarding table: 转发表Router: 路由器Jitter: 抖动Best-effort service: 尽力而为的服务4.2Virtual-circuit (VC) network: 虚电路网络Datagram network: 数据报网络Prefix: 前缀Longest prefix matching rule: 最长前缀匹配规则4.3Input port: 输入端口Switching fabric: 交换结构Routing processor: 路由处理器Crossbar: 交叉结构4.4Time-to-live (TTL) :生存时间Fragmentation: 分片;片段Dotted-decimal notation: 点分十进制表示法Subnet: 子网Subnet mask: 子网掩码Classless Interdomain Routing (CIDR): 无类别域际路由选择Dynamic Host Configuration Protocol(DHCP):动态主机配置协议Plug-and-play: 即插即用Network address translation (NA T): 网络地址转换Internet Control Message Protocol (ICMP): 因特网控制报文协议Dual-stack: 双栈Tunneling: 隧道4.5Default router: 默认路由器Graph: 图A global routing algorithm : 全局路由算法A decentralized routing algorithm : 分布式路由算法Static routing algorithm: 静态路由算法Dynamic routing algorithm : 动态路由算法Link-State (LS): 链路状态Distance-Vector(DV): 距离向量Routing table: 路由表Autonomous system (AS): 自治系统Intra-autonomous system routing protocol: 自治系统内路由协议Inter-AS routing protocol: 自治系统间路由协议4.6Interior gateway protocol: 内部网关协议Routing Information Protocol (RIP): 路由信息协议Open Shortest Path First (OSPF): 开放最短路径优先协议Advertisement: 公告Hop: 跳Border Gateway Protocol (BGP): 边界网关协议4.7Broadcast: 广播Multicast: 多播Chapter 55.1Node: 结点Link: 链路Frame: 帧Medium access control (MAC): 介质访问控制Full-duplex: 全双工Half-duplex: 半双工Adapter: 适配器Network interface card (NIC): 网卡Interface: 接口5.2Parity check: 奇偶校验Odd: 奇数Even: 偶数Cyclic redundancy check (CRC): 循环冗余校验Polynomial: 多项式5.3Collide: 冲突Multiple access protocol: 多路访问协议Channel partitioning protocol: 信道划分协议Random access protocol: 随机访问协议Taking-turns protocol: 轮转协议Code division multiple access (CDMA): 码分多址访问Carrier sensing: 载波侦听Collision detection: 冲突检测Polling protocol: 轮询协议Token-passing protocol: 令牌传递协议Token: 令牌Local Area Network (LAN): 局域网Token-ring: 令牌环Fiber distributed data interface (FDDI): 光纤分布式数据接口Metropolitan Area Network (MAN): 城域网5.4Address Resolution Protocol (ARP): 地址解析协议Dynamic Host Configuration Protocol (DHCP): 动态主机配置协议5.5Ethernet: 以太网Preamble: 前导码Manchester encoding: 曼彻斯特编码5.6Hub: 集线器Collision domain: 冲突域Switch: 交换机Filtering: 过滤Forwarding: 转发Switch table: 交换表Self-learning: 自学习Plug-and-play devices: 即插即用设备Cut-through switching: 直通式交换5.7Point-to-point: (PPP): 点到点。
第9章 The World Wide Web

Abbreviations GML (Generalized Markup Language) 通用置标语言 SGML (Standard Generalized Markup Language) 标准通用置标语言 XML (Extensible Markup Language) 可扩展标记语言 PDA (personal digital assistant) 个人数字助理 HTML (Hypertext Markup Language ) 超文本标记语言
HTTP是每个网址的第一个字母组合,位于网址的起始位置,紧跟着它的是域名。域 名指定组织(机构)的服务器计算机,而文件收藏于服务器计算机上。大多数公司 有一个与其官方公司名字相同或接近的域名。
The directory path and document name are two more pieces of information within the Web address that help the browser track(跟 踪) down the requested page. Together, the address is called a Uniform Resource Locator, or URL. When typed into a browser, a URL tells it exactly where to look for the information.
超文本是使用嵌入式链接形成格式化网页的一种方法,这些链接将文档彼此联结, 而且将网页链接到其他对象如声音、视频或动画文件。当你点击一个图形和一个 视频剪辑播放按钮的时候,你在点击一个超链接。 clip:修剪, 夹子, 回形针, 剪下来的东西
click:单击
double-click :双击
DS2208数字扫描器产品参考指南说明书

-05 Rev. A
6/2018
Rev. B Software Updates Added: - New Feedback email address. - Grid Matrix parameters - Febraban parameter - USB HID POS (formerly known as Microsoft UWP USB) - Product ID (PID) Type - Product ID (PID) Value - ECLevel
-06 Rev. A
10/2018 - Added Grid Matrix sample bar code. - Moved 123Scan chapter.
-07 Rev. A
11/2019
Added: - SITA and ARINC parameters. - IBM-485 Specification Version.
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
MBA必修课《管理沟通》英文版课件

The grapevine is an important source of information in mosting reports and oral presentations
Chapter 10 planning business reports and proposals
Chapter 11 writing business reports and proposals
Part III writing letters; memos; email; and other brief messages
Chapter 7 writing routine messages Chapter 8 writing badnews messages Chapter 9 writing persuasive message
Outsiders may form an impression of your organization on the basis of the subtle; unconscious clues you transmit through your tone of voice; facial expression; and general appearance
Chapter 3 municating interculturally
Part II applying the threestep writing process
Chapter 4 planning business message Chapter 5 writing business messages Chapter 6 pleting business messages
计算机网络(第二版)课后习题答案第九章

计算机网络参考答案第九章(高教第二版冯博琴)1. 应用层协议对传输层协议选择的主要考虑因素是哪些?数据丢失、带宽需求、实时性2. 列出五个常用的因特网应用项目以及相关协议。
万维网:HTTP电子邮件:SMTP, POP, IMAP文件传输:FTP远程终端登录:TELNET域名服务:DNS3. 在两个主机的通信会话中,那个主机是服务器,哪个是客户端?答案:在两个主机的通信会话中,首先发起会话的一方为客户端,处于“倾听”状态的为服务器。
但是,通信会话成功的先决条件是服务器必须首先处于开机或“倾听”状态。
4. 一个运行在某台主机中的通信进程,需要那些信息来确定运行在另一台主机中的进程?答案:一个运行在某台主机中的通信进程,需要对方主机的IP地址、对方的端口号或服务访问点(SAP)来确定运行在该主机中的对等通信进程。
5. 列出常见的网络应用的用户代理程序。
答:万维网:IE, FIREFOX电子邮件:OE, FOXMAIL文件传输:IE, cuteFTP远程终端登录:telnet, IE多媒体视频:realplay6. 为什么HTTP、FTP、SMTP、POP和IMAP需要TCP的支持而不是UDP的?答:因为上述协议都是基于“文件”的网络应用,对数据丢失十分敏感,要求数据的完整和可靠、但对带宽需求、实时性的要求并不高,所以,TCP协议可以满足这样的要求。
7. 为什么大部分FTP服务器需要限制同时连接的客户端数量?答:实际上,所有的网络服务器都会对同时可接入的客户数量进行限制,其原因也十分简单,任何网上的服务资源都是有限的,但是这种情况,尤以FTP服务器表现的最为突出。
首先,因为FTP是一种十分普及的网络应用,使用客户众多;其次它是“面向连接”的应用,服务器需要保留登录用户的状态和根据用户权限控制用户对文件的访问,对于每一个FTP连接,一般需要两个通道进行才能进行有效的文件传输。
由于以上原因,FTP对服务器资源的占用是比较多的。
计算机网络——自顶向下方法与Internet特色(第三版)chapter9

request
response
agent data Managed device
"Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost."
Network Management 9-12
What is network management?
autonomous systems (aka “network”): 100s or 1000s
of interacting hardware/software components other complex systems requiring monitoring, control: jet airplane nuclear power plant others?
Network Management 9-11
Chapter 9 outline
What is network management? Internet-standard management framework Structure of Management Information: SMI Management Information Base: MIB SNMP Protocol Operations and Transport Mappings Security and Administration ASN.1
2025年软件资格考试网络工程师(中级)(基础知识、应用技术)合卷试题及解答参考

2025年软件资格考试网络工程师(基础知识、应用技术)合卷(中级)模拟试题(答案在后面)一、基础知识(客观选择题,75题,每题1分,共75分)1、计算机网络中,OSI模型中的哪一层负责数据链路层和网络层的接口功能?A、物理层B、数据链路层C、网络层D、传输层2、在TCP/IP模型中,哪一层负责处理端到端的通信,确保数据可靠传输?A、应用层B、传输层C、网络层D、数据链路层3、在OSI七层参考模型中,哪一层负责处理数据的格式化、加密等任务?A. 传输层B. 会话层C. 表示层D. 应用层4、以下哪个协议不属于TCP/IP模型的应用层协议?B. FTPC. TCPD. SMTP5、以下关于TCP/IP模型的描述中,错误的是()A. TCP/IP模型分为应用层、传输层、网络层和数据链路层B. IP协议工作在网络层,主要负责数据的传输C. TCP协议工作在传输层,主要负责数据的可靠性D. UDP协议工作在传输层,不保证数据传输的可靠性6、在OSI模型中,以下哪一层主要负责数据的转换和压缩()A. 物理层B. 数据链路层C. 网络层D. 传输层7、在OSI七层模型中,哪一层负责处理端到端的消息传递,并提供可靠的数据传输服务?A. 物理层B. 数据链路层C. 网络层D. 传输层E. 会话层8、下列哪个协议属于应用层协议,并用于支持万维网的信息检索?B. UDPC. HTTPD. IP9、题干:以下关于IP地址分类的说法中,错误的是:A. A类IP地址的第一位为0,用于大型网络B. B类IP地址的前两位为10,用于中型网络C. C类IP地址的前三位为110,用于小型网络D. D类IP地址的前四位为1110,用于多播 10、题干:以下关于TCP/IP协议栈的说法中,正确的是:A. TCP/IP协议栈分为四层:网络接口层、网络层、传输层、应用层B. IP协议工作在TCP/IP协议栈的传输层C. UDP协议工作在TCP/IP协议栈的网络层D. HTTP协议工作在TCP/IP协议栈的应用层11、在OSI七层模型中,负责处理端到端的差错控制和流量控制的是哪一层?A. 物理层B. 数据链路层C. 网络层D. 传输层12、在IPv4地址中,C类地址的默认子网掩码是什么?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.25513、在OSI模型中,负责处理网络层以下(包括网络层)的所有协议的层次是:A. 物理层B. 数据链路层C. 网络层D. 传输层14、IP地址192.168.1.1属于以下哪个类别?A. A类B. B类C. C类D. D类15、在OSI七层模型中,哪一层负责处理数据的压缩与加密?A. 会话层B. 传输层C. 表示层D. 应用层16、以下哪种网络拓扑结构具有一个中心节点,所有其他节点都直接连接到这个中心节点上?A. 总线型B. 星型C. 环型D. 网状17、以下关于TCP/IP协议栈的层次结构,描述正确的是:A. 应用层、传输层、网络层、数据链路层、物理层B. 物理层、数据链路层、网络层、传输层、应用层C. 网络层、传输层、应用层、数据链路层、物理层D. 传输层、网络层、数据链路层、应用层、物理层18、在OSI七层模型中,负责数据包在两个端点之间传输的是:A. 应用层B. 表示层C. 会话层D. 传输层19、在OSI七层参考模型中,哪一层负责处理数据的加密与解密?A. 物理层B. 数据链路层C. 传输层D. 表示层 20、下列哪种网络拓扑结构中,如果中心节点发生故障,整个网络将无法工作?A. 总线型B. 星型C. 环形D. 网状21、在TCP/IP协议族中,用于确保数据可靠传输的协议是:B. TCP协议C. UDP协议D. ICMP协议22、以下关于OSI七层模型的描述,正确的是:A. 物理层负责数据链路层和网络层的通信B. 数据链路层负责在相邻节点之间提供可靠的数据传输C. 网络层负责处理网络中的路由和交换D. 应用层负责处理用户的应用程序和用户界面23、下列关于OSI七层模型的描述正确的是:A. 物理层负责数据帧的封装与解封装。
计算机专业英语影印版(Compu...

Key Terms Page 1of 6 Key TermsKey TermDefinition3G cellular network (249) A computer network that allows users to download data from the Internet at 400 to 700 Kbps using cell phone technology. analog signal (247) Continuous electronic waves. asymmetric digital subscriber line (ADSL) (248) The most widely used types of DSL. backbone (258) A common connecting cable on which all communications travel along. (see also bus) bandwidth (249) A measurement of the width or capacity of the communication channel. base station (254) A network’s centrally located receiver that interprets incoming radio frequencies and routes communications to the appropriate devices. (see also wireless receiver) bits per second (bps) (247) How transfer speed is measured Bluetooth (245) A short-range wireless communication standard that uses microwaves to transmit data over short distances broadband (250) The bandwidth used for high-capacity transmissions. broadcast radio (245) Uses radio signals to send and receive signals from wireless devices. bus (258) A common connecting cable on which all communications travel along. (see also backbone) bus network (258) Each device in the network handles its own communications control. cable modem (249) Use existing television cables to provide high-speed connections to the Internet. cellular service (249) Offer an alternative for mobile devices and laptops. client (251) A node that requests and uses resources available from other nodes. client/server network system (260) A computer network where one computer coordinates and supplies services to other nodes on the network. coaxial cable (244) A high-frequency transmission cable with a single solid-copper core. Communication channel (244) The actual connecting or transmission medium that carries the message. Communication system (243) An electronic system that transmit data from one location to another computer network (251) A communication system that connects two or more computers so that they can exchange information and share resources. connectivity (242) Using computer networks to link people and resources. demodulation (247) The process of converting from analog to digital. dial-up service (248) Using standard telephone lines and conventional modems to link to the Internet or other computers digital signal (247) A representation of the presence or absence of an electronic pulse – on/off digital subscriber line (DSL) (248) Uses existing telephone lines to provide high-speed connections distributed data processing system Computers that can perform processing tasks at their own Key Terms Page 2of 6 (258) dispersed locations. distributed processing (251) A system in which computing power is located and shared at different locations. domain name server (DNS) (250) Converts text-based addresses to IP addresses Ethernet (253) The most common way in which nodes can be connected to one another and communications can be controlled. external modem (247) A modem that stands apart from the computer and typically is connected by a cable to the computer’s serial port. extranet (262) A private network that connects more than one organization. fiber-optic cable (244) Transmits data as pulses of light through tiny tubes of glass. firewall (263) A security system designed to protect an organization’s network against external threats. global positioning system (GPS) (245) Global positioning system (GPS) devices use location information sent by satellites to uniquely determine the geographic location of the device. hierarchical network (258) Consists of several computers linked to a central host computer, but also are hosts to other, smaller computers or peripheral devices. home network (254) Local Area Networks used by individuals in their homes and apartments. host computer (251) A large centralized computer, usually a minicomputer or a mainframe. hub (251) The center or central node for other nodes. infrared (245) A type of wireless connection that uses infrared light waves to communicate over short distances. internal modem (248) A modem that consists of a plug-in circuit board inside the system unit. intranet (262) A private network within an organization that resembles the Internet. IP address (Internet Protocol address) (250) A unique numeric address for every computer on a network. local area network (LAN) (253) Networks with nodes that are in close physical proximity low bandwidth (250) Used for standard telephone communication. (see also voiceband) medium band (250) the bandwidth used in special leased lines to connect minicomputers and mainframes metropolitan area network (MAN) (254) A network that span distances up to 100 miles. microwave (245) A type of communication uses high-frequency radio waves. modem (247) Modulator-demodulator, enables digital microcomputers to communicate across analog telephone lines. modulation (247) The process of converting from digital to analog. network administrator (251, 264) A computer specialist responsible for efficient network operations and implementation of new networks. network gateway (253) A device that allows one LAN to be linked to other LANs or to larger networks. network hub (255) A central unit in a network, such as a server. Key Terms Page 3of 6 network interface card (NIC) (251) Expansion cards located within the system unit that connect the computer to a network network operating system (NOS) (251) An operating system that control and coordinate the activities of all computers and other devices on a network. node (251) Any device that is connected to a network. packet (250) Data reformatted or broken down into small parts PC Card modem (248) A modem that is a credit card –size expansion board that is inserted into portable computers peer-to-peer network system (261) A network system where nodes have equal authority and can act as both clients and servers. polling (255) A type of communications where each connecting device is asked whether it has a message to send. protocol (250) Rules for exchanging data between computers proxy server (263) A computer through which all communications between the company’s internal n etworks and the outside world must pass. ring network (258) Each device is connected to two other devices, forming a ring with no central computer satellite (245) A type of communication that uses satellites orbiting about 22,000 miles above the earth as microwave relay stations. satellite/air connection service (249) Use satellites and the air to download or send data to users at a rate seven times faster than dial-up connections. server (251) A node that shares resources with other nodes. star network (255) A number of small computers or peripheral devices are linked to a central unit. strategy (260) A way of coordinating the sharing of information and resources T1, T2, T3, T4 lines (248) Special high-speed lines leased from telephone companies. telephone line (244) A type of cable that uses 2, 4, or 8 pairs of copper wire. terminal network (260) A network system where processing power is centralized in one large computer, usually a mainframe. time-sharing system (258) Several users can share resources (time) on a central computer. topology (255) How a network is arranged or configured transfer rate (247) The speed at which data can be transmitted Transmission Control Protocol/Internet Protocol (TCP/IP) (250) The standard protocol for the Internet voiceband (250) Used for standard telephone communication. (see also low bandwidth) wide area network (WAN) (254) A countrywide or worldwide network that spans distances greater than 100 miles. Wi-FI (wireless fidelity) (245) A wireless standard used to connect computers to each other and to the Internet. wireless LAN (WLAN) (254) Local area network that uses wireless devices to connect nodes together. wireless modem (248) A modem that may be internal, external, or a PC Card sends and receives through the air. wireless receiver (254) A network’s centrally located receiver that interprets incoming radio frequencies and routes communications to the appropriate devices. (see also base station) Crossword Puzzle Answers:AcrossNum. Clue Answer 5 Interprets and routs incoming radio frequencies. Base station7 Continuous electronic waves. Analog9 Configuration of a network. topology10 Network interface card. NIC11 Transfer speed or transfer rate. bps12 Short range wireless communication standard. bluetooth14 Measurement of the width of the communication channel. bandwidth DownNum. Clue Answer 1 Node that requests and uses resources available from other nodes. client 2 Each device in the network handles its own communications. Bus network 3 Device that allows links between LANs. Network gateway 4 Process that converts digital to analog. modulation6 Pieces of a message sent over the Internet. packets8 Global positioning system. GPS13 Any device that is connected to a network. node15 Uses existing telephone lines to provide high-speed connections. DSL 16 Central node for other nodes. hubNum Multiple ChoiceAnswers Matching Answers1 C G 2 B B 3 A A 4 D I 5 C H 6 D E 7 B C 8 B J 9 B D 10 D F Open Ended Questions:to another 2.Identify and describe the various physical and wireless communication channels.PhysicalTelephone lines - consist of twisted-pair cable made up of hundreds of copper wires. Coaxial cable- a high-frequency transmission cable with a single solid-copper core. Fiber-optic cable - transmits data as pulses of light through tiny tubes of glass. WirelessInfrared - uses infrared light waves to communicate over short distances. Broadcast radio sends and receive radio signals through transceivers. Microwave - uses high-frequency radio waves. Satellite - uses satellites orbiting above the earth as microwave relay stations. 3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP (transmission control protocol/Internet protocol). Every computer on the Internet has a unique numeric address called an IP address. Information is reformatted or broken down into small parts called packets. 4.Define and discuss the four principal network topologies.S tar network - a number of small computers or peripheral devices are linked to a central unit. Bus network - each device in the network handles its own communications control. Ring network - each device is connected to two other devices, forming a ring. Hierarchical network— consists of several computers linked to a central host computer, and also hosts to other, smaller computers or to peripheral devices. 5.Define and discuss the three most common network strategies.Terminal network system,- processing power is centralized in one large computer, usually a mainframe. - use one computer to coordinate and supply services to other Client/server network systems - use one computer to coordinate and supply services to other nodes on the network. Peer-to-peer network system, nodes have equal authority and can act as both clients and servers. Answers to End of Chapter materials Page 5 of 6 Focus Applying Technology Expanding YourKnowledgeWriting AboutTechnologyEthical Electronic Monitoring Digital Rights Management Web Tools Palm How Napster and Gnutella Work Software Tools Home Networking Distributed Computing How Wireless Home Networks Work Hotspots Writing Skills Ethical focusWriting About Technology exercise #1 Electronic Monitoring explores the FBI Carnivore monitoring system and how it affects personal privacy. Writing About Technology exercise #2 Digital Rights Management explores the issue of sharing copyrighted material over the Internet and how it affects software piracy. Applying Technology exercise #3 Palm explores how Palms work with the Internet and looks at the types of information are available. Expanding Your Knowledge #2 How Napster and Gnutella Work looks at the different types of network architectures employed by each program and their efficiencies. Applying Technology exercise #1 Home Networking works with the Making it Work for you section in exploring the different types of home networking and how to configure Applying Technology exercise #2 Distributed Computing has the students research the concept of distributed computing, how it works, and why it is beneficial. Expanding Your Knowledge exercise #1 How Wireless Home Networks Work has the students discover basic features and functionalities of home networking and how they can Expanding Your Knowledge exercise #3 Hotspots has the student explore the technology of public Internet access and what is necessary to use it. 。
计算机网络缩写词

Chapter 1ISPs = Internet Service Providers 因特网服务提供者TCP= Transmission Control Protocol 传输控制协议IP = Internet Protocol 网际协议UDP = User Datagram Protocol 用户数据报协议RFC = Request for comments 注解请求API= Application Programming Interface应用程序编程接口FDM = frequency division multiplexing 频分多路复用TDM= time division multiplexing 时分多路复用POP = Points of Presence 入网点,网络连接点DoS= denial of service attacks 服务器拒绝攻击Chapter 2HTTP = Hypertext Transfer Protocol 超文本传输协议SMTP = simple mail transfer protocol 简单邮件传送协议RTT = round-trip time 循环时间FTP = file transfer protocol 文件传输协议MIME =multipurpose Internet mail extensions 多用途网际邮件扩展IMAP = Internet mail access protocol 互联网邮件访问协议POP3 = post office protocol-version3 邮局协议-版本3DNS = domain name system 域名系统TLD = top-level domain 顶级域名RR = resources records 储存信息Chapter 3MSS = maximum segment size 最大数据段AIMD = additive-increase, multiplicative-decrease 加增乘减CA = congestion avoidance 拥塞避免SR = selective repeat 选择重传SS = slow start 慢启动GBN = Go-Back-N 多帧滑动窗口与后退N帧协议MTU = maximum transmission unit 最大传输单元Chapter 4NAT = network address translation 网络地址转换ICMP = Internet Control Message Protocol 互联网控制报文协议CBR = Constant bit rate 恒定比特率ABR = Available bit rate 可用比特率VC = virtual-circuit 虚电路CAM = Content addressable memories 内容可寻址内存AQM = active queue management 主动队列管理RED = Random Early Detection 随机早期检测HOL = head-of-the-line 线路前部TOS = type of service 服务类型TTL = time to live 寿命CIDR = Classless Interdomain Routing 无类别域间选路DHCP = Dynamic Host Configuration Protocol 动态主机配置协议UPnP = Universal Plug and Play 通用即插即播IGMP = Internet Group Management Protocol 互联网组管理协议LS = link-state 链路状态DV = Distance-Vector 距离向量AS = autonomous system 自治系统RIP = Routing Information Protocol 选路信息协议OSPF = Open Shortest Path First 开放最短路径优先BGP = Border Gateway Protocol 边界网关协议RPF = reverse path forwarding 反向路径转换DVMRP = Distance-Vector Multicast Routing Protocol 距离向量多播选路协议Chapter 5NIC = network interface card 网络接口卡PPP = Point-to-Point Protocol 点对点协议ARP = address resolution protocol 地址解析协议LAN = local area network 局域网WAN = Wide Area Network 广域网MAN = metropolitan area network 城域网ATM = Asynchronous Transfer Mode 异步传输方式CRC = Cyclic Redundancy Check 循环冗余检测FEC = forward error correction 前向纠错EDC = error detection and correction 差错检测和纠错MAC = Medium/Media Access Control 介质访问控制CDMA = Code Division Multiple Access 码分多址FDMA = frequency division multiple access 频分多址TDMA= Time Division Multiple Access 时分多址HDLC = High-level Data Link Control 高级数据链路控制MPLS = Multiprotocol Label Switching 多协议标签交换AAL = ATM Adaptation Layer ATM适配层CSMA = carrier sense multiple access 载波侦听多路访问CSMA/CD = Carrier Sense Multiple Access with Collision Detect 具有碰撞检测的载波侦听多路访问CSMA/CA = Carrier Sense Multiple Access with Collision Avoidance 带有冲突避免的载波侦听多路访问MA 多址multiple access。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
TCP/IP Protocol Suite
22
Note: In a time-exceeded message, code 0 is used only by routers to show that the value of the time-to-live field is zero. Code 1 is used only by the destination host to show that not all of the fragments have arrived within a set time.
ICMP messages are divided into error-reporting messages and query messages. The error-reporting messages report problems that a router or a host (destination) may encounter. The query messages get specific information from a router or another host.
TCP/IP Protocol Suite
19
Note: One source-quench message is sent for each datagram that is discarded due to congestion.
TCP/IP Protocol Suite
20
Note: Whenever a router decrements a datagram with a time-to-live value to zero, it discards the datagram and sends a time-exceeded message to the original source.
TCP/IP Protocol Suite
12
Figure 9.6
Contents of data field for the error messages
TCP/IP Protocol Suite
13
Figure 9.7
Destination-unreachable format
TCP/IP Protocol Suite
TCP/IP Protocol Suite
4
Figure 9.3
ICMP messages
TCP/IP Protocol SuiCMP messages
TCP/IP Protocol Suite
6
9.2 MESSAGE FORMAT
An ICMP message has an 8-byte header and a variable-size data section. Although the general format of the header is different for each message type, the first 4 bytes are common to all.
Chapter 9
Internet Control Message Protocol
Objectives
Upon completion you will be able to:
• Be familiar with the ICMP message format • Know the types of error reporting messages • Know the types of query messages • Be able to calculate the ICMP checksum • Know how to use the ping and traceroute commands • Understand the modules and interactions of an ICMP package
The topics discussed in this section include: Destination Unreachable Source Quench Time Exceeded Parameter Problem Redirection
TCP/IP Protocol Suite
9
Note: ICMP always reports error messages to the original source.
TCP/IP Protocol Suite
7
Figure 9.4
General format of ICMP messages
TCP/IP Protocol Suite
8
9.3 ERROR REPORTING
IP, as an unreliable protocol, is not concerned with error checking and error control. ICMP was designed, in part, to compensate for this shortcoming. ICMP does not correct errors, it simply reports them.
TCP/IP Protocol Suite
28
Figure 9.12
Redirection message format
TCP/IP Protocol Suite
29
Note: A redirection message is sent from a router to a host on the same local network.
The topics discussed in this section include: Echo Request and Reply Timestamp Request and Reply Address-Mask Request and Reply Router Solicitation and Advertisement
TCP/IP Protocol Suite
10
Figure 9.5
Error-reporting messages
TCP/IP Protocol Suite
11
Note:
The following are important points about ICMP error messages:
❏ No ICMP error message will be generated in response
TCP/IP Protocol Suite
17
Figure 9.8
Source-quench format
TCP/IP Protocol Suite
18
Note:
A source-quench message informs the source that a datagram has been discarded due to congestion in a router or the destination host. The source must slow down the sending of datagrams until the congestion is relieved.
TCP/IP Protocol Suite
15
Note: A router cannot detect all problems that prevent the delivery of a packet.
TCP/IP Protocol Suite
16
Note: There is no flow-control mechanism in the IP protocol.
TCP/IP Protocol Suite
25
Figure 9.10
Parameter-problem message format
TCP/IP Protocol Suite
26
Figure 9.11 Redirection concept
TCP/IP Protocol Suite
27
Note: A host usually starts with a small routing table that is gradually augmented and updated. One of the tools to accomplish this is the redirection message.
TCP/IP Protocol Suite
31
Figure 9.13
Query messages
TCP/IP Protocol Suite
32
Note: An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo-request message.
TCP/IP Protocol Suite
30
9.4 QUERY
ICMP can also diagnose some network problems through the query messages, a group of four different pairs of messages. In this type of ICMP message, a node sends a message that is answered in a specific format by the destination node.
TCP/IP Protocol Suite