网络设计与规划中英文对照外文翻译文献
网络工程局域网中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)PUTER NETWORKSDATE COMMUNICATIONSThe end equipment which either generates the digital information for transmission or uses the received digital data can be computer ,printers ,keyboards, CRTs, and so on. This equipment generally manipulates digital information internally in word units—all the bits that make up a word in a particular piece of equipment are transferred in parallel. Digital data, when transmitted, are in serial form. Parallel transmission of an 8-bit word require eight pairs of transmission lines—not at all cost-effective. Data terminal (DTE) is a general phrase encompassing all of the circuitry necessary to perform parallel-to-serial and serial-to-parallel conversions for transmission and reception respectively and for data link management. The UART (Universal Asynchronous Receiver/Transmitter) and USART (Universal Asynchronous/Asynchronous Receiver/Transmitter) are the devices that perform the parallel-to-serial and serial-to-parallel conversions. The primary DTE includes a line control unit (LCU or LinCo) which controls the flow of information in a multipoint data link system. A station controller (STACO) is the corresponding that belonged to the subscriber in a data link system. Between the DTEs, starting with the modems, was communications equipment owned and maintained by Telco property.Data communications equipment (DCE) accepts the serial data stream from the DTE and converts it to some form of analog signal suitable for transmission on voice-grade lined. At the receive end, the DCE performs the reverse function of converting the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter, while at the receive end, it can considered a form of analog-to-digital converter. The most common of modulation by modems are frequency shift keying (FSK), phase shift keying (PSK), and quadrature amplitude modulation (QAM). This is a typically data transmission mode using the analog telephone lines. If you transmit data by digital channel (sometimes it is called “Digital T-carrier”), a pulse Code Modulation (PCM) equipment must be used. A microwave transmission system can also be used for the data communication. Finally, you can use the satellite communication system for data transmission.If the cables and signal levels used to interconnect the DTE and DCE were left unregulated, the variations generated would probably be proportional to the number of manufacturers. Electronics industries Association (EIA),an organization of manufactures with establishing the DTE and modem. This is a 25-pincable whose pins have designated functions and specified signal levels. The RS-232C is anticipated to be replaced by an update standard.2.ARCHITECTURE OF COMPUTER NETWORKSComputer network is a complex consisting of two or more conned computing units, it is used for the purpose of data communication and resource resource sharing. Design of a network and its logical structure should comply with a set of design principles, including the organization of functions and the description of data formats and procedure. This is the network architecture and so called as a set of layers and protocols, because the architecture is a layer-based.In the next two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model.1.The OSI Reference ModelThe OSI model is shown in Fig.14-2(minus the physical medium). This model is based on a proposal developed by the International Standards Organizations (OSI) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems--that is, systems that are open for communication with other systems, We will usually just call it the OSI model for short.The OSI model has seven has seven layers. Note that the OSI model itself is not a network architecture because it does not specify the exact services and protocols to be used in each layer. It just tells what each layer should do. However , However, ISO has also produced standards for all the layers, although these are not part of the reference model itself. Each one has been published as a separate international standard.2.The TCP/IP Reference ModelThe TCP/IP reference model is an early transport protocol which was designed by the US Department of Defence (DOD) around in 1978. It is often claimed that it gave rise the OSI “connectionless”mode of operation. TCP/IP is still usedextensively and is called as a industrial standard of internet work in fact, TCP/IP has two parts: TCP and IP. TCP means it is on the transport layer and IP means it is on the network layer separately.1.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol) , another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet. UDP is an unreliable, connectionless protocol for application that do not want TCP’s sequencing of flows control flow control and wish to provide their own.2.The network layer defines an official packet format and protocol called IP (Internet protocol). The job of the network layer is to deliver IP packets where they are supposed to go.The TCP/IP Reference Model is shown in Fig.14.3. On top of the transport layer is the application layer, It contains all the higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), electronic mail (SMTP) and domain name service(DNS).3.WIDE AREA NETWORKA wide area network, or WAN, spans a large geographical area, often a country or continent . It contains a collection of machines intended for running user (i. e. , application) programs. We will follow traditional usage and call these machines hosts. By a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host, just as the telephone system carries words from speaker to listener. By separating the pure communication aspects of the network (the subnet) from the application aspects (the hosts), the complete network design is greatly simplified. Relation between hosts and the subnet is shown in Fig.14-4.One of many methods that can be used to categorize wide area networks is with respect to the flow of information on a transmission facility. If we use this method to categorize wide area networks, we can group them into three basic types: circuit switched, leased line and packet switched.1.CIRCUIT SWITCHED NETWORKSThe most popular type of network and the one almost all readers use on a daily basis is a circuit switched network. The public switched telephone network, however,is not limited to the telephone company, By purchasing appropriate switching equipment, any organization can construct their own internal circuit switched network and, if desired, provide one or more interfaces to the public switched network to allow voice and data transmission to flow between the public network and their private internal network2.LEASED LINE NETWORKSThis is a dedicated network connected by leased lines. Leased line is a communications line reserved for the exclusive use of a leasing customer without inter-exchange switching arrangements. Leased or private lines are dedicated to the user. This advantage is that the terminal or computer is a always physically connected to the line. Very short response times are met with service.3.PACKET SWITCHING NETWORKSA packet network is constructed through the use of equipment that assembles and disassembles packets, equipment that routes packet, and transmission facilities used to route packets from the originator to the destination device. Some types of data terminal equipment (DTE) can create their own packets, while other types of DTE require the conversion of their protocol into packets through the use of a packet assembler / disassemble (PAD). Packets are routed through the network by packet switches. Packet switches examine the destination of packets as they flow through the network and transfer the packets onto trunks interconnecting switches based upon the packet destination destination and network activity.Many older pubic networks follow a standard called X.25. It was developed during 1970s by CCITT to provide an interface between public packet-switched network and their customers.CCITT Recommendation X.25 controls the access from a packet mode DTE, such as a terminal device or computer system capable of forming packets, to the DCE at a packet mode. CCITT Recommendation X.28 controls the interface between non-packet mode devices that cannot interface between the PAD and the host computer. CCITT Recommendation X.3 specifies the parameter settings on the PAD and X.75 specifies the interface between packet network.4.LOCAL AREA NETWORKLocal area data network , normally referred to simply as local area network or LANs, are used to interconnect distributed communities of computer-based DTEs located within a building or localized group of building. For example, a LAN may be used to interconnect workstations distributed around offices within a single building or a group of buildings such as a university campus. Alternatively, it may be complex. Since all the equipment is located within a single establishment, however, LANs are normally installed and maintained by the organization. Hence they are also referred to as private data networks.The main difference between a communication path established using a LAN and a connection made through a public data network is that a LAN normally offers much higher date transmission rates because of the relatively short physical separations involved. In the context of the ISO Reference Model for OSI, however, this difference manifests itself only at the lower network dependent layers. In many instances the higher protocol layers in the reference model are the same for both types of network.Before describing the structure and operation of the different types of LAN, it is perhaps helpful to first identify some of the selection issues that must be considered. It should be stressed that this is only a summary; there are also many possible links between the tips of the branches associated with the figure.1.TopologyMost wide area networks, such as the PSTN, use a mesh (sometimes referred to as a network) topology. With LANs, however, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. The four topologies in common use are star, bus ,ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology, which is a variation a variation of the bus and ring. Sometimes it is called hub/tree topology.2.Transmission mediaTwisted pair, coaxial cable and optical fiber are the three main type of transmission medium used for LANs.3. Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs. They are carrier-sense-multiple-access with collision detection (CSMA/CD), for bus network topologies, and control token, for use with either bus or ring networks.CSMA/CD is used to control multiple-access networks. Each on the network “listens” before attempting to send a message, waiting for the “traffic” to clear. If two stations try to sent their messages at exactly the same time, a “collision” is detected, and both stations are required to “step back” and try later.Control token is another way of controlling access to a shared transmission medium that is by the use of a control (permission) token. This token is passed form one DTE to another according to a defined set of rules understood and adhered to by all DTEs connected to the medium. ADTE may only transmit a frame when it is in possession of the token and, after it has transmitted the frame, it passed the token on to allow another DTE to access the transmission medium.1.计算机网络数据通信端设备可以是计算机、打印机、键盘、CRT等,它们可以产生要发送的数字信息,也可使用所接收的数字数据。
网站设计与实现中英文对照外文翻译文献
网站设计与实现中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)H O L I S T I C W E B B R O W S I N G:T R E N D S O F T H E F U T U R EThe future of the Web is everywhere. The future of the Web is not at your desk. It’s not necessarily in your pocket, either. It’s everywhere. With each new technological innovation, we continue to become more and more immersed in the Web, connecting the ever-growing layer of information in the virtual world to the real one around us. But rather than get starry-eyed with utopian wonder about this bright future ahead, we should soberly anticipate the massive amount of planning and design work it will require of designers, developers and others.The gap between technological innovation and its integration in our daily lives is shrinking at a rate much faster than we can keep pace with—consider the number of unique Web applications you signed up for in the past year alone. T his has resulted in a very fragmented experience of the Web. While running several different browsers, with all sorts of plug-ins, you might also be running multiple standalone applications to manage feeds, social media accounts and music playlists.Even though we may be adept at switching from one tab or window to another, we should be working towards a more holistic Web experience, one that seamlessly integrates all of the functionality we need in the simplest and most contextual way. With this in mind, l et’s review four trends that designers and developers would be wise to observe and integrate into their work so as to pave the way for a more holistic Web browsingexperience:1.The browser as operating system,2.Functionally-limited mobile applications,3.Web-enhanced devices,4.Personalization.1. The Browser As Operating SystemThanks to the massive growth of Web productivity applications, creative tools and entertainment options, we are spending more time in the browser than ever before. The more time we spend there, the less we make use of the many tools in the larger operating system that actually runs the browser. As a result, we’re beginning to expect the same high level of reliability and sophistication in our Web experience that we get from our operating system.For the most part, our expectations have been met by such innovations as Google’s Gmail, Talk, Calendar and Docs applications, which all offer varying degrees of integration with one another, and online image editing tools like Picnik and Adobe’s on line version of Photoshop. And those expec tations will continue to be met by upcoming releases, such as the Chrome operating system—we’re already thinking of our browsers as operating systems. Doing everything on the Web was once a pipe dream, but now it’s a reality.U B I Q U I T YThe one limitation of Web browsers that becomes more and more obvious as we make greater use of applications in the cloud is the lack of usable connections between open tabs. Most users have grown accustomed to keeping many tabs open, switching back and forth rapidly between Gmail, Google Calendar, Google Docs and various social media tools. But this switching from tabto tab is indicative of broken connections between applications that really ought to be integrated.Mozilla is attempting to functionally connect tools that we use in the browser in a more intuitive and rich way with Ubiquity. While it’s definitely a step in the right direction, the command-line approach may be a barrier to entry for thoseunable to let go of the mouse. In the screenshot below, you can see how Ubiquity allows you to quickly map a location shown on a Web page without having to open Google Maps in another tab. This is one example of integrated functionality without which you would be required to copy and paste text from one tab to another. Ubi quity’s core capability, which is creating a holistic browsing experience by understanding basic commands and executing them using appropriate Web applications, is certainly the direction in which the browser is heading.This approach, wedded to voice-recognition software, may be how we all navigate the Web in the next decade, or sooner: hands-free.T R A C E M O N K E Y A N D O G GMeanwhile, smaller, quieter releases have been paving the way to holistic browsing. This past summer, Firefox released an update to its software that includes a brand new JavaScript engine called TraceMonkey. This engine delivers a significant boost in speed and image-editing functionality, as well as the ability to play videos without third-party software or codecs.Aside from the speed advances, which are always welcome, the image and video capabilities are perfect examples of how the browser is encroaching on the operating system’s territory. Being able to edit images in the browser could replace the need for local image-editing software on your machine, andpotentially for separate applications such as Picnik. At this point, it’s not certain how sophisticated this functionality can be, and so designers and ordinary users will probably continue to run local copies of Photoshop for some time to come.The new video functionality, which relies on an open-source codeccalled Ogg, opens up many possibilities, the first one being for developers who do not want to license codecs. Currently, developers are required to license a codec if they want their videos to be playable in proprietary software such as Adobe Flash. Ogg allows video to be played back in Firefox itself.What excites many, though, is that the new version of Firefox enables interactivitybetween multiple applications on the same page. One potential application of this technology, as illustrated in the image above, is allowing users to click objects in a video to get additional information about them while the video is playing.2. Functionally-Limited Mobile ApplicationsSo far, our look at a holistic Web experience has been limited to the traditional br owser. But we’re also interacting with the Web more and more on mobile devices. Right now, casual surfing on a mobile device is not a very sophisticated experiences and therefore probably not the main draw for users. Thecombination of small screens, inconsistent input options, slow connections and lack of content optimized for mobile browsers makes this a pretty clumsy, unpredictable and frustrating experience, especially if y ou’re not on an iPhone.However, applications written specifically for mobile environments and that deal with particular, limited sets of data—such as Google’s mobile apps,device-specific applications for Twitter and Facebook and the millions of applications in the iPhone App Store—look more like the future of mobile Web use. Because the mobile browsing experience is in its infancy, here is some advice on designing mobile experiences: rather than squeezing full-sized Web applications (i.e. ones optimized for desktops and laptops) into the pocket, designers and developers should become proficient at identifying and executing limited functionality sets for mobile applications.A M A Z O N M OB I L EA great example of a functionally-limited mobile application is Amazon’s interface for the iPhone (screenshot above). Amazon has reduced the massive scale of its website to the most essential functions: search, shopping cart and lists. And it has optimized the layout specifically for the iPhone’s smaller screen.FA C E B O O K F O R I P H O N EFacebook continues to improve its mobile version. The latest version includes a simplified landing screen, with an icon for every major function of the website in order of priority of use. While information has been reduced and segmented, the scope of the website has not been significantly altered. Each new update brings the app closer to replicating the full experience in a way that feels quite natural.G M A I L F O R I P H O N EFinally,Gmail’s iPhone application is also i mpressive. Google has introduced a floating bar to the interface that allows users to batch process emails, so thatt hey don’t have to open each email in order to deal with it.3. Web-Enhanced DevicesMobile devices will proliferate faster than anything the computer industry has seen before, thereby exploding entry points to the Web. But the Web will vastly expand not solely through personal mobile devices but through completely new Web-enhanced interfaces in transportation vehicles, homes, clothing and other products.In some cases, Web enhancement may lend itself to marketing initiatives and advertising; in other cases, connecting certain devices to the Web will make them more useful and efficient. Here are three examples of Web-enhanced products or services that we may all be using in the coming years: W E B-E N H A N C E D G R O C E RY S H O P P I N GWeb-connected grocery store “VIP” card s may track customer spending as they do today: every time you scan your customer card, your purchases are added to a massive database that grocery stores use to guide their stocking choices. In exchange for your data, the stores offer you discounts on selected products. Soon with Web-enhanced shopping, stores will be able to offer you specific promotions based on your particular purchasing history, and in real time (as illustrated above). This will give shoppers more incentive to sign up for VIP programs and give retailers more flexibility and variety with discounts, sales and other promotions.W E B-E N H A N C E D U T I L I T I E SOne example of a Web-enhanced device we may all see in our homes soon enough is a smart thermostat (illustrated above), which will allow users not only to monitor their power usage using Google PowerMeter but to see their current charges when it matters to them (e.g. when they’re turning up the heater, not sitting in front of a computer).W E B-E N H A N C E D P E R S O N A L B A N K I N GAnother useful Web enhancement would be a display of your current bank account balance directly on your debit or credit card (as shown above). This data would, of course, be protected and displayed only after you clear a biometric security system that reads your fingerprint directly on the card. Admittedly, this idea is rife with privacy and security implications, but something like this will nevertheless likely exist in the not-too-distant future.4. PersonalizationThanks to the rapid adoption of social networking websites, people have become comfortable with more personalized experiences online. Being greeted by name and offered content or search results based on their browsing history not only is common now but makes the Web more appealing to many. The next step is to increase the user’s control of their personal information and to offer more tools that deliver new information tailored to them.C E N T R A L I Z ED P R O F I LE SIf you’re like most people, you probably maintain somewhere between two to six active profiles on various social networks. Each profile contains a set of information about you, and the overlap varies. You probably have unique usernames and passwords for each one, too, though using a single sign-on service to gain access to multiple accounts is becoming more common. But wh y shouldn’t the information you submit to these accounts follow the same approach? In the coming years, what you tell people about yourself online will be more and more under your control. This process starts with centralizing your datain one profile,which will then share bits of it with other profiles. This way, if your information changes, you’ll have to update your profile only once.D ATA O W NE R S H I PThe question of who owns the data that you share online is fuzzy. In many cases, it even remains unaddressed. However, as privacy settings on social networks become more and more complex, users are becoming increasingly concerned about data ownership. In particular, the question of who owns the images, video and messages created by users becomes significant when a user wants to remove their profile. To put it in perspective, Royal Pingdom, inits Internet 2009 in Numbers report, found that 2.5 billion photos were uploaded to Facebook each month in 2009! The more this number grows, the more users will be concerned about what happens to the content they transfer from their machines to servers in the cloud.While it may seem like a step backward, a movement to restore user data storage to personal machines, which would then intelligently share that data with various social networks and other websites, will likely spring up in response to growing privacy concerns. A system like this would allow individuals to assign meta data to files on their computers, such as video clips and photos; this meta data would specify the files’ availability to social network profiles and other websites. Rather than uploading a copy of an image from your computer to Flickr, you would give Flickr access to certain files that remain on your machine. Organizations such as the Data Portability Project areintroducing this kind of thinking accross the Web today.R E C O M M E N D AT I O N E N G I N E SSearch engines—and the whole concept of search itself—will remain in flux as personalization becomes more commonplace. Currently, the major search engines are adapting to this by offering different takes on personalized search results, based on user-specific browsing history. If you are signed in to your Google account and search for a pizza parlor, you will more likely see local results. With its social search experiment, Google also hopes to leverage your social network connections to deliver results from people you already know. Rounding those out with real-time search results gives users a more personal search experience that is a much more realistic representation of the rapid proliferation of new information on the Web. And because the results are filtered based on your behavior and preferences, the search engine will continue to “learn” more about you in order to provide the most useful information.Another new search engine is attempting to get to the heart of personalized results. Hunch provides customized recommendations of information based onusers’ answers to a set of questions for each query. The more you use it, the better the engine gets at recommending information. As long as you maintain a profile with Hunch, you will get increasingly satisfactory answers to general questions like, “Where should I go on vacation?”The trend of personalization will have significant impact on the way individual websites and applications are designed. Today, consumer websites routinely alter their landing pages based on the location of the user. Tomorrow, websites might do similar interface customizations for individual users. Designers anddevelopers will need to plan for such visual and structural versatility to stay on the cutting edge.整体网页浏览:对未来的发展趋势克里斯托弗·巴特勒未来的网页无处不在。
物联网中英文对照外文翻译文献
中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. T o have the CPU;5.T o have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (e xtranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks . Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International T elecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "T echnology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International T elecommunication Union released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet o f Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International T elecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S.business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet" strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. T o a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.T oday, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the UnitedStates, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention. The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from$ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensor is the small size, large-scale mass production cost reduction, mainly used in two major areas of automoti ve and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales. 7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In the era of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature.8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprisesto strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the app lication of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design and research and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information T echnology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to T aiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the data collection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things willbecome a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one of the dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensortechnology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.T er, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymeric integrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.es。
外文文献和中文翻译.doc-Internet-basedCommunications
Internet-based CommunicationsIf you use the Internet, then you probably use Internet-based communications to contact family, friends or co-workers. From sending an instant message to a friend, to e-mailing co-workers, to placing phone calls, to conducting video conferences, the Internet offers a number of ways to communicate.The advantages of Internet-based communications are many. Since you're already paying for an Internet account (or your employer is), you can save money on phone calls by sending someone an instant message or by using V oIP instead of standard local telephone services. Of course, no technology is without a downside and Internet-based communications has plenty, such as viruses, privacy issues and spam. Like all technologies (and especially technology tied to the Internet), the way we can communicate online is constantly evolving . In this week's "Did Y ou Know...?" article we'll take a look at some of the most popular forms of Internet-based communications.Instant MessagingOne of the fastest-growing forms of Internet communications is instant messaging, or IM. Think of IM as a text-based computer conference between two or more people. An IM communications service enables you to create a kind of private chat room with another individual in order to communicate in real-time over the Internet. Typically, the IM system alerts you whenever somebody on your buddy or contact list is online. Y ou can then initiate a chat session with that particular individual.One reason that IM has become so popular is its real-time nature. Unlike e-mail, where you will wait for the recipient to check his or her e-mail and send a reply, if a person you want to reach is online and available in your IM contact list, your message appears instantly in a window on their screen.While IM is used by millions of Internet users to contact family and friends, it's also growing in popularity in the business world. Employees of a company can have instant access to managers and co-workers in different offices and can eliminate the need to place phone calls when information is required immediately. Overall, IM can save time for employees and help decrease the amount of money a business spends on communications.Key Terms To Understanding Internet-based Communications.SIPShort for Session Initiated Protocol, or Session Initiation Protocol, an application-layer control protocol; a signaling protocol for Internet Telephony. SIP canestablish sessions for features such as audio/videoconferencing, interactive gaming, and call forwarding to be deployed over IP networks.WAPShort for the Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators.More Internet-based Communications TermsE-mailInstant MessagingV oIPV oWiFiInternet FaxMobile IPIP AddressWhile different IM clients offer slightly different features and benefits, the look and feel of an IM client is basically the same. Public IM clients and services available include ICQ, AOL Instant Messenger (AIM), Microsoft MSN Messenger, and Y ahoo! Messenger. For businesses and enterprises looking for a more secure method of IM, there are enterprise IM packages available such as Microsoft Live Communication Server 2005 and IBM Lotus Instant Messaging. Third-party software is available to help businesses make using public IM services in the workplace more secure.Some problems and issues associated with IM include spim and virus propagation. Spim is the IM equivalent of spam and is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spim to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market. Spim is a bit more intrusive than spam due to the nature of IM itself. These advertisements and junk messages will pop-up in your IM window and you need to deal with the messages immediately, where with e-mail you can usually filter a lot of it out and deal with it later. Additionally, viruses and Trojans can be spread through IM channels. These malicious programs are usually spread when an IM user receives a message that links to a Web site where the malicious code is downloaded. The message will appear to be from a known IM contact, which is why recipients re more likely to click the hyperlink and download the file. Using safe chat rules (such as never clicking the link) and keeping an updated anti-virus program on your system will help reduce the chances of becoming infected by malicious programs being spread through instant messaging.Internet Telephony & V oIPInternet telephony consists of a combination of hardware and software that enables you to use the Internet as the transmission medium for telephone calls. For users who have free, or fixed-price Internet access, Internet telephony software essentially provides free telephone calls anywhere in the world. In its simplest form, PC-to-PC Internet telephony can be as easy as hooking up a microphone to your computer and sending your voice through a cable modem to a person who has Internet telephony software that is compatible with yours. This basic form of Internet telephony is not without its problems, however. Connecting this way is slower than using a traditional telephone, and the quality of the voice transmissions is also not near the quality you would get when placing a regular phone call.Many Internet telephony applications are available. Some, such as CoolTalk and NetMeeting, come bundled with popular Web browsers. Others are stand-alone products. Internet telephony products are sometimes called IP telephony, V oice over the Internet (VOI) or V oice over IP (V oIP) products.V oIP is another Internet-based communications method which is growing in popularity. V oIP hardware and software work together to use the Internet to transmit telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions, called PSTN (Public Switched Telephone Network). The voice traffic is converted into data packets then routed over the Internet, or any IP network, just as normal data packets would be transmitted. When the data packets reach their destination, they are converted back to voice data again for the recipient. Y our telephone is connected to a V oIP phone adapter (considered the hardware aspect). This adapter is connected to your broadband Internet connection. The call is routed through the Internet to a regular phone jack, which is connected to the receiver's phone. Special hardware (the phone adapter) is required only for the sender.Much like finding an Internet service provider (ISP) for your Internet connection, you will need to use a V oIP provider. Some service providers may offer plans that include free calls to other subscribers on their network and charge flat rates for other V oIP calls based on a fixed number of calling minutes. Y ou most likely will pay additional fees when you call long distance using V oIP. While this sounds a lot like regular telephone service, it is less expensive than traditional voice communications, starting with the fact that you will no longer need to pay for extras on your monthly phone bill.E-mailShort for electronic mail, e-mail is the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers and computer networks have ane-mail system. Some e-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling you to send electronic mail anywhere in the world.Using an e-mail client (software such as Microsoft Outlook or Eudora), you can compose an e-mail message and send it to another person anywhere, as long as you know the recipient e-mail address. All online services and Internet Service Providers (ISPs) offer e-mail, and support gateways so that you can exchange e-mail with users of other systems. Usually, it takes only a few seconds for an e-mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.One of the biggest black clouds hanging over e-mail is spam. Though definitions vary, spam can be considered any electronic junk mail (generally e-mail advertising for some product) that is sent out to thousands, if not millions, of people. Often spam perpetrates the spread of e-mail Trojans and viruses. For this reason, it's important to use an updated anti-virus program, which will scan your incoming and outgoing e-mail for viruses.For more information on e-mail, see "Deciphering Internet E-mail", a Webopedia Quick Reference.IRCShort for Internet Relay Chat, IRC is a multi-user chat system that allows to people gather on "channels" or "rooms" to talk in groups or privately. IRC is based on a client/server model. That is, to join an IRC discussion, you need an IRC client (such a mIRC) and Internet access. The IRC client is a program that runs on your computer and sends and receives messages to and from an IRC server. The IRC server, in turn, is responsible for making sure that all messages are broadcast to everyone participating in a discussion. There can be many discussions going on at once and each one is assigned a unique channel. Once you have joined an IRC chat room (chatroom discussions are designated by topics), you can type your messages in the public chatroom where all participants will see it, or you can send a private message to a single participant. With many IRC clients you can easily create your own chatroom and invite others to join your channel. You can also password protect your chatroom to allow for a more private discussion with just people whom you invite. Once you become familiar with your IRC client you'll find many options available to help you moderate and take part in a channel. One problem commonly associated with IRC is lag. IRC relies on the connections between the servers, and the connections or the servers can slow down. If you're in a discussion and people do not respond, or you notice that people are responding to things you types several minutes ago, then you can attribute this to lag. If you continue to experience lag, you can try connecting tothe IRC network on a different server.VideoconferencingVideoconferencing is a conference between two or more participants at different sites by using computer networks to transmit audio and video data. Each partic ipant has a video camera, microphone and speakers connected on his or her computer. As the two participants speak to one another, their voices are carried over the network and delivered to the other's speakers, and whatever images appear in front of the video camera appear in a window on the other participant's monitor.In order for videoconferencing to work, the conference participants must use the same client or compatible software. Many freeware and shareware videoconferencing tools are available online for download, and most Web cameras also come bundled with videoconferencing software. Many newer videoconferencing packages can also be integrated with public IM clients for multipoint conferencing and collaboration.In recent years, videoconferencing has become a popular form of distance communication in classrooms, allowing for a cost efficient way to provide distance learning, guest speakers, and multi-school collaboration projects. Many feel that videoconferencing provides a visual connection and interaction that cannot be achieved with standard IM or e-mail communications.SMS & Wireless CommunicationsShort message service (SMS) is a global wireless service that enables the transmission of alphanumeric messages between mobile subscribers and external systems such as e-mail, paging and voice-mail systems. Messages can be no longer than 160 alpha-numeric characters and must contain no images or graphics. Once a message is sent, it is received by a Short Message Service Center (SMSC), which must then get it to the appropriate mobile device or system. As wireless services evolved, Multimedia Messaging Service (MMS) was introduced and provided a way to send messages comprising a combination of text, sounds, images and video to MMS capable handsets.Communication on wireless devices such as mobile phones and PDAs is frequently changing. Today you can use your wireless device to not only make phone calls, but to send and receive e-mail and IM. While you can use e-mail, IRC or IM for free if you have an Internet account, you will end up paying fees to you mobile carrier to use these services on a wireless device.网络通讯如果你使用互联网,那么你可能通过因特网与家人朋友或同事通讯联系.网上提供多种沟通方式,如向一位朋友送即时讯息,或发送电子邮件给同事,拨打网络电话,召开视频会议.基于因特网通信优点有很多. 如果你是已付费的网络用户(或者是您的雇主),你就可以利用网络发送即时讯息或者使用网络电话代替标准本地电话服务. 当然,任何技术都是有负面的.基于因特网内的通讯.上有很多沟通,如病毒、垃圾邮件、隐私问题.像所有的技术(特别是因特网技术系)都是在不断演变才使得我们能网上沟通. 这篇文章中我们会介绍一些最流行的基于因特网的通信.即时信息增长最快的网络通讯方式莫过于即时信息,简称IM. IM的思想是基于两台或多台计算机之间的文本传输.通过因特网,IM通讯服务器就能够为你建造一个个性化的私人聊天室,你可以在个人列表中选择他人与你进行实时对话.通常,IM 系统允许你随时与你的联系列表中的某个朋友在线联络.你也可以新加入其它朋友一起,进行多人交谈.IM如此受欢迎的其中一个原因是它本身的实时性.不同于电子邮件,你只能等待接收他或她的电子邮件查阅后并回复.如果一个人要与你在线联系,就必须获得你的IM联系名,你的上线消息就会立即出现在他们的屏幕上的一个窗口中.当千百万网民利用IM与家人和朋友联系的同时,在商业领域也同样成为新宠.在公司中,当员工需要立即与其它办公室的主管或同事索取信息资料时,就无需拨打本地电话了.总而言之,IM既可以为员工节省时间,又有助于降低商务间的通讯开支.关键词在于理解基于因特网的通信.会话发起协议SIP是会话发起协议的简称,或者会话启动协议,是一个应用层控制协议;也是一项互联网技术的信令协议. SIP能创建特色会话,如音频/视频会议、互动游戏、以及部署在IP网络的呼叫转移. 安全规格,使用户能够通过即时信息接入设备.无线应用协议WAP是无线应用协议的简称,是一项准许用户通过无线手持设备获取即时信息的安全规格说明书 ,如用手持无线移动电话、寻呼机、收发两用无线电设备、智能电话与他人沟通.更多基于因特网的通信术语如下:e-mail电子邮件instant messaging即时消息VoIP 网络电话VoWiFi 无限网络电话Internet fax网络传真mobile IP IP电话IP address IP地址不同的IM客户端的特点和优势也不近相同,但基本功能还是大体相近. 大众普遍使用的IM包括ICQ 、AOL的即时通、MSN、雅虎通. 而商业和企业则使用一种更为安全的企业级的即时通讯包,如微软05版生活沟通服务器,IBM莲花即时通. 第三方软件使得商人在工作场合使用大众IM时更为安全有效.伴随IM而来的还有恶意垃圾电子邮件和病毒的繁殖等矛盾性问题. Spim 的意思是即时通讯中的垃圾邮件,更确切说,它是即时讯息成果中永久的蠕虫,它冒充真实的人类使用昵称向用户发送带病毒的即时讯息.恶意垃圾邮件通常包含一个链接网址,它为撰写垃圾邮件者建造了市场.对于即时讯息本身, 恶意垃圾邮件比垃圾邮件更具侵害性. 这些广告和垃圾信息在你的即时通讯工具窗口弹出,你需要立即处理这些信息,通常你都要先过滤掉大量垃圾邮件后再去处理那些你的电子邮件.另外,木马病毒可以通过即时讯息的渠道传播.这些恶意程式的散布通常是当一个即时讯息用户接收一条需要点击一个网址的信息时,就会下载恶意代码. 这个信息将会出现在一个已知的即时通讯中, 这就是为什么更多的接收者如此相似的去点击超级链接并下载文件的原因.利用聊天安全规则(如没点击链接),并保持最新的反病毒程序,将会有帮助于你的系统减少感染机会,并通过即时讯息传染恶意程式.互联网电话及网络电话互联网电话由硬件和软件结合组成,让能够用互联网作为传输介质进行电话呼叫. 用户可以免费或者只需要支付固定上网费用,通过网络电话软件本身所提供的免费电话就可呼叫世界上的任何用户. 这种使用计算机--计算机拨打网络电话的形式,只需要在你的计算机上配置一个麦克风,通过调制解调器,那么和你安装了相同网络电话软件的一方就能听到你透过麦克风向他传话的声音了.然而,这种网络电话的基本形式仍存在一定问题.这种方式相对于使用传统电话来说速度较慢,并且话音的质量也不能保证像付费电话那样清晰.某些网络电话程序是可以获得的,诸如cooltalk和NetMeeting,它们与当前流行的浏览器捆绑.另外的就都自成一体化产品. 互联网电话产品有时称为IP 电话、语音跨越在因特网(VOI)或IP语音产品(VoIP).VoIP是另一个越来越受欢迎基于互联网的通讯方式. VoIP的硬件和软件一起利用互联网进行电话交流,通过IP发送语音数据包,而非传统的电路传输. 称为PSTN(大众网络电话首选).语音转换成数据包然后路由在互联网,或者一些IP 网络,如同正常的数据包一样被传送. 当数据包抵达目的地后,它们又把接收者语音数据返回.您的电话是连接在VoIP电话适配器上(硬件组成方面).这个适配器是让你通过连接宽频上网. 电话是经由当地电话网上定期杰克,连接接收机的电话.就像为你连接网络寻找一个因特网服务供应商(ISP),你需要一个网络电话的供应商. 一些服务供应商推出了各种方案,可能包括提供免费呼叫某些单位的网络, 或者收取基于网络电话拨打固定电话呼叫时间的收费比率.当你使用的VoIP拨打长途电话时,最可能将为此付出额外的费用.尽管听起来不完全和普通电话一样,但它比传统的语音通讯要便宜的多,从此你不再需要在你每月电话单中支付额外费用.电子邮件E-Mail是电子邮件简称,它是通过网络来传递文本信息的.信息可以来自于键盘敲入或储存在磁盘中的电子文档. 很多巨型计算机,微型计算机都有电子邮件系统. 一些电子邮件系统是局限于单一的计算机系统或网络,但是有部分电脑系统等门户,让你在世界任何地方发送电子邮件.利用电子邮件客户端(如微软的Outlook或Eudora软件),你可以谱写一封电子邮件并发送到任何地方的人,只要你知道收件人的电子邮件地址. 所有在线服务和互联网服务供应商(ISPs)提供了电子邮件和支持网关,那么就可以用电子邮件与他们系统的用户交流. 通常,只需几秒钟电子邮件就能到达目的地. 这是一个特别有效的集体交流方式,让你可以一次性与集体每一位发送信息或文档.恶意垃圾邮件像一个巨大无比的黑云把电子邮件所笼罩.. 尽管定义多变,恶意垃圾邮件仍可以被认定为是上千封的电子垃圾信件(通常是一些产品广告), 如果没有数以万计的客户的话. 垃圾邮件照样常常被电子邮件木马、病毒所蔓延.为此,它的重要使用最新的反病毒程序,您将扫描收支电子邮件病毒. 因此,使用最新的反病毒程序尤为重要,它会扫描你发送和接收的电子邮件是否存在病毒.更多关于电子邮件信息,请见"互联网电子邮件破译",这是计算机与网络名词的在线查询字典的参考.因特网中继聊天IRC是因特网中继聊天的简称,IRC是多用户、多频道的群聊系统,许多用户可以在一个被称为“channel”或"房间"的地方就某一话题交谈或私谈.IRC是基于客户端/服务器端的模式.即参加室内讨论.你需要一个IRC的客户软件(如mIRC)和网络.IRC客户端程序运行在你的电脑与IRC服务器端做信息传递.而另一端也就是IRC服务器,它是负责确保所有信息传播给讨论组中的每一个成员.它可以让讨论者同时进行群聊,也可以彼此单独开设了通道.一旦加入一个IRC 聊天室(聊天室讨论主题由对话者决定),你可以在某个公共聊天室的公开讨论并让所有成员看到你信息内容,另外你也可以发送私人讯息给某个参与者.有了IRC 客户端你可以轻易创造自己的聊天室并邀请他人加入你的频道.在你想进行更私人对话时.也可以使用密码保护的方式,只允许你所邀请的人进入聊天室.一旦你熟悉了IRC的顾客,你就会在渠道里找到一些愿意参与并帮助你解决问题的人.与IRC伴随的一个普遍问题是滞后. IRC依赖于彼此相连的主机导致速度变慢.如果你所在的讨论组无人响应,或者你通知的那个人在几分钟以后才答复你,那么可以归结为这是滞后.如果你有多次滞后的经历,那么你可以尝试连接不同的IRC服务器.视频会议视像会议是由两个或多人在不同地点的与会者,利用电脑网络传送语音、录像资料的工具. 每位与会者都要将摄像头,麦克风和听筒与他/她的电脑连接.如果双方会议要给另一方知道,那么他们的声音将透过网络传到给另一个对话者,并且瞄准摄像头的画面也将会呈现在其它会议群的监视者.为了让工作视频会议有序,与会人员必须使用相同客户端或兼容的软件.许多免费软件和共享视频工具提供网上下载,绝大部分的在线影院都捆绑了视频会议的软件.一些新颖的视频会议将大众即时讯息客户端整合成套装,可以用作多方会议和项目.近年来,视频会议已成为一种流行的远程交流的教室,为远程学习,宾客讨论以及多媒体学校合作项目提供了高效的方式. 许多人都认为视频会议提供了一个标准即时信息软件或者电子邮件所不能完成的可视化互动连接.短讯及无线通讯短信服务(SMS)是全球无线服务,使的移动用户与外部系统之间可以传递任何的字母数字信息,如系统电子邮件、传呼、语音邮件系统. 信息可以不再超过160字母数字字符、图象或图形必须包含无. 一旦讯息被发送,就会被对应的移动设备或系统的某个短信服务中心接收.作为无线服务的演变,多媒体信息服务(彩信MMS)被推广,它提供了多种传递讯息方式,包括文字、声音、以手机彩信和视频图象集于一体的能力.无线通讯设备如移动电话、掌上电脑(PDA)等是时常革新的. 如今你所使用的无线设备并不仅限于电话呼叫,还可以收发电子邮件和即时信息. 如果你有一个因特网帐户,那么你使用的电子邮件、网络聊天室或即时讯息是免费的,不过,如果你用无线设备来完成服务,你仍需付费给你的移动运营商.。
计算机类网站网络建设外文翻译、中英文翻译、外文文献翻译
外文翻译Birth of the NetThe Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet.In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service.NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business.NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF.How the Web WorksThe World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video.So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information.The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works:Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web browser interprets the data, displaying it on your computer screen.The Louvre's website also has links to the sites of other museums, such as the Vatican Museum. When you click your mouse on a link, you access the web server for the Vatican Museum.The "glue" that holds the Web together is called hypertext and hyperlinks. This feature allow electronic files on the Web to be linked so you can easily jump between them. On the Web, you navigate through pages of information based on what interests you at that particular moment, commonly known as browsing or surfing the Net.To access the Web you need web browser software, such as Netscape Navigator or Microsoft Internet Explorer. How does your web browser distinguish between web pages and other files on the Internet? Web pages are written in a computer language called Hypertext Markup Language or HTML.Some Web HistoryThe World Wide Web (WWW) was originally developed in 1990 at CERN, the European Laboratory for Particle Physics. It is now managed by The World Wide Web Consortium, also known as the World Wide Web Initiative.The WWW Consortium is funded by a large number of corporate members, including AT&T, Adobe Systems, Inc., Microsoft Corporation and Sun Microsystems, Inc. Its purpose is to promote the growth of the Web by developing technical specifications and reference software that will be freely available to everyone. The Consortium is run by MIT with INRIA (The French National Institute for Research in Computer Science) acting as European host, in collaboration with CERN.The National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, was instrumental in the development of early graphical software utilizing the World Wide Web features created by CERN. NCSA focuses on improving the productivity of researchers by providing software for scientific modeling, analysis, and visualization. The World Wide Web was an obvious way to fulfill that mission. NCSA Mosaic, one of the earliest web browsers, was distributed free to the public. It led directly to the phenomenal growth of the World Wide Web.Understanding Web AddressesYou can think of the World Wide Web as a network of electronic files stored on computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate thesefiles. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type a URL into your browser or click on a hypertext link, your browser is sending a request to a remote computer to download a file.What does a typical URL look like? Here are some examples:/The home page for study english.ftp:///pub/A directory of files at MIT* available for downloading.news:rec.gardens.rosesA newsgroup on rose gardening.The first part of a URL (before the two slashes* tells you the type of resource or method of access at that address. For example:∙http - a hypertext document or directory∙gopher - a gopher document or menu∙ftp - a file available for downloading or a directory of such files∙news - a newsgroup∙telnet - a computer system that you can log into over the Internet∙WAIS* - a database or document in a Wide Area Information Search database∙file - a file located on a local drive (your hard drive)The second part is typically the address of the computer where the data or service is located. Additional parts may specify the names of files, the port to connect to, or the text to search for in a database.You can enter the URL of a site by typing it into the Location bar of your web browser, just under the toolbar.Most browsers record URLs that you want to use again, by adding them to a special menu. In Netscape Navigator, it's called Bookmarks. In Microsoft Explorer, it's called Favorites. Once you add a URL to your list, you can return to that web page simply by clicking on the name in your list, instead of retyping the entire URL.Most of the URLs you will be using start with http which stands for Hypertext Transfer Protocol*. http is the method by which HTML files are transferred over the Web. Here are some other important things to know about URLs:∙ A URL usually has no spaces.∙ A URL always uses forward slashes (//).If you enter a URL incorrectly, your browser will not be able to locate the site or resource you want. Should you get an error message or the wrong site, make sure you typed the address correctly.You can find the URL behind any link by passing your mouse cursor over the link. The pointer will turn into a hand and the URL will appear in the browser's status ba r, usually located at the bottom of your screen.Domain NamesWhen you think of the Internet, you probably think of ".com." Just what do those three letters at the end of a World Wide Web address mean?Every computer that hosts data on the Internet has a unique numerical address. For example, the numerical address for the White House is198.137.240.100. But since few people want to remember long strings of numbers, the Domain Name System (DNS)* was developed. DNS, a critical part of the Internet's technical infrastructure*, correlates* a numerical address to a word. To access the White House website, you could type its number into the address box of your web browser. But most people prefer to use "." In this case, the domain name is . In general, the three-letter domain name suffix* is known as a generictop-level domai n and describes the type of organization. In the last few years, the lines have somewhat blurred* between these categories..com - business (commercial).edu - educational.org - non-profit.mil - military.net - network provider.gov - governmentA domain name always has two or more parts separated by dots and typically consists of some form of an organization's name and the three-letter suffix. For example, the domain name for IBM is ""; the United Nations is "."If a domain name is available, and provided it does not infringe* on an existing trademark, anyone can register the name for $35 a year through Network Solutions, Inc., which is authorized to register .com, .net and .org domains. You can use the box below to see if a name is a available. Don't be surprised ifthe .com name you want is already taken, however. Of the over 8 million domain names, 85% are .com domains.ICANN, the Internet Corporation for Assigned Names and Numbers, manages the Domain Name System. As of this writing, there are plans to add additional top-level domains, such as .web and .store. When that will actually happen is anybody's guess.To check for, or register a domain name, type it into the search box.It should take this form: In addition to the generic top-level domains, 244 national top-level domains were established for countries and territories*, for example:.au - Australia.ca - Canada.fr - France.de - Germany.uk - United KingdomFor US $275 per name, you can also register an international domain name with Net Names. Be aware that some countries have restrictions for registering names.If you plan to register your own domain name, whether it's a .com or not, keep these tips in mind:The shorter the name, the better. (But it should reflect your family name, interest or business.)The name should be easy to remember.It should be easy to type without making mistakes.Remember, the Internet is global. Ideally, a domain name will "read" in a language other than English.Telephone lines were designed to carry the human voice, not electronic data from a computer. Modems were invented to convert digital computer signals into a form that allows them to travel over the phone lines. Those are the scratchy sounds you hear from a modem's speaker. A modem on theother end of the line can understand it and convert the sounds back into digital information that the computer can understand. By the way, the word modem stands for MOdulator/DEModulator.Buying and using a modem used to be relatively easy. Not too long ago, almost all modems transferred data at a rate of 2400 Bps (bits per second). Today, modems not only run faster, they are also loaded with features like error control and data compression. So, in addition to converting and interpreting signals, modems also act like traffic cops, monitoring and regulating the flow of information. That way, one computer doesn't send information until the receiving computer is ready for it. Each of these features, modulation, error control, and data compression, requires a separate kind of protocol and that's what some of those terms you see like V.32, V.32bis, V.42bis and MNP5 refer to.If your computer didn't come with an internal modem, consider buying an external one, because it is much easier to install and operate. For example, when your modem gets stuck (not an unusual occurrence), you need to turn it off and on to get it working properly. With an internal modem, that means restarting your computer--a waste of time. With an external modem it's as easy as flipping a switch.Here's a tip for you: in most areas, if you have Call Waiting, you can disable it by inserting *70 in front of the number you dial to connect to the Internet (or any online service). This will prevent an incoming call from accidentally kicking you off the line.This table illustrates the relative difference in data transmission speeds for different types of files. A modem's speed is measured in bits per second (bps). A 14.4 modem sends data at 14,400 bits per second. A 28.8 modem is twice as fast, sending and receiving data at a rate of 28,800 bits per second.Until nearly the end of 1995, the conventional wisdom was that 28.8 Kbps was about the fastest speed you could squeeze out of a regular copper telephoneline. Today, you can buy 33.6 Kbps modems, and modems that are capable of 56 Kbps. The key question for you, is knowing what speed modems your Internet service provider (ISP) has. If your ISP has only 28.8 Kbps modems on its end of the line, you could have the fastest modem in the world, and only be able to connect at 28.8 Kbps. Before you invest in a 33.6 Kbps or a 56 Kbps modem, make sure your ISP supports them.Speed It UpThere are faster ways to transmit data by using an ISDN or leased line. In many parts of the U.S., phone companies are offering home ISDN at less than $30 a month. ISDN requires a so-called ISDN adapter instead of a modem, and a phone line with a special connection that allows it to send and receive digital signals. You have to arrange with your phone company to have this equipment installed. For more about ISDN, visit Dan Kegel's ISDN Page.An ISDN line has a data transfer rate of between 57,600 bits per second and 128,000 bits per second, which is at least double the rate of a 28.8 Kbps modem. Leased lines come in two configurations: T1 and T3. A T1 line offers a data transfer rate of 1.54 million bits per second. Unlike ISDN, a T-1 line is a dedicated connection, meaning that it is permanently connected to the Internet. This is useful for web servers or other computers that need to be connected to the Internet all the time. It is possible to lease only a portion of a T-1 line using one of two systems: fractional T-1 or Frame Relay. You can lease them in blocks ranging from 128 Kbps to 1.5 Mbps. The differences are not worth going into in detail, but fractional T-1 will be more expensive at the slower available speeds and Frame Relay will be slightly more expensive as you approach the full T-1 speed of 1.5 Mbps. A T-3 line is significantly faster, at 45 million bits per second. The backbone of the Internet consists of T-3 lines. Leased lines are very expensive and are generally only used by companies whose business is built around the Internet or need to transfer massiveamounts of data. ISDN, on the other hand, is available in some cities for a very reasonable price. Not all phone companies offer residential ISDN service. Check with your local phone company for availability in your area.Cable ModemsA relatively new development is a device that provides high-speed Internet access via a cable TV network. With speeds of up to 36 Mbps, cable modems can download data in seconds that might take fifty times longer with a dial-up connection. Because it works with your TV cable, it doesn't tie up a telephone line. Best of all, it's always on, so there is no need to connect--no more busy signals! This service is now available in some cities in the United States and Europe.The download times in the table above are relative and are meant to give you a general idea of how long it would take to download different sized files at different connection speeds, under the best of circumstances. Many things can interfere with the speed of your file transfer. These can range from excessive line noise on your telephone line and the speed of the web server from which you are downloading files, to the number of other people who are simultaneously trying to access the same file or other files in the same directory.DSLDSL (Digital Subscriber Line) is another high-speed technology that is becoming increasingly popular. DSL lines are always connected to the Internet, so you don't need to dial-up. Typically, data can be transferred at rates up to 1.544 Mbps downstream and about 128 Kbps upstream over ordinary telephone lines. Since a DSL line carries both voice and data, you don't have to install another phone line. You can use your existing line to establish DSLservice, provided service is available in your area and you are within the specified distance from the telephone company's central switching office.DSL service requires a special modem. Prices for equipment, DSL installation and monthly service can vary considerably, so check with your local phone company and Internet service provider. The good news is that prices are coming down as competition heats up.Anatomy of a Web PageA web page is an electronic document written in a computer language called HTML, short for Hypertext Markup Language. Each web page has a unique address, called a URL* or Uniform Resource Locator, which identifies its location on the network.A website has one or more related web pages, depending on how it's designed. Web pages on a site are linked together through a system of hyperlinks* , enabling you to jump between them by clicking on a link. On the Web, you navigate through pages of information according to your interests.Home Sweet Home PageWhen you browse the World Wide Web you'll see the term home page often. Think of a home page as the starting point of a website. Like the table of contents of a book or magazine, the home page usually provides an overview of what you'll find at the website. A site can have one page, many pages or a few long ones, depending on how it's designed. If there isn't a lot of information, the home page may be the only page. But usually you will find at least a few other pages.Web pages vary wildly in design and content, but most use a traditional magazine format. At the top of the page is a masthead* or banner graphic*, then a list of items, such as articles, often with a brief description. The items in the list usually link to other pages on the website, or to other sites. Sometimes these links are highlighted* words in the body of the text, or are arranged in a list, like an index. They can also be a combination* of both. A web page can also have images that link to other content.How can you tell which text are links? Text links appear in a different color from the rest of the text--typically in blue and underlined. When you move yourcursor over a text link or over a graphic link, it will change from an arrow to a hand. The hypertext words often hint* at what you will link to.When you return to a page with a link you've already visited, the hypertext words will often be in a different color, so you know you've already been there. But you can certainly go there again. Don't be surprised though, if the next time you visit a site, the page looks different and the information has changed. The Web is a dynamic* medium. To encourage visitors to return to a site, some web publishers change pages often. That's what makes browsing the Web so excitingA Home (Page) of Your OwnIn the 60s, people asked about your astrological* sign. In the 90s, they want to know your URL. These days, having a web address is almost as important as a street address. Your website is an electronic meeting place for your family, friends and potentially*, millions of people around the world. Building your digital domain can be easier than you may think. Best of all, you may not have to spend a cent. The Web brims with all kinds of free services, from tools to help you build your site, to free graphics, animation and site hosting. All it takes is some time and creativity.Think of your home page as the starting point of your website. Like the table of contents of a book or magazine, the home page is the front door. Your site can have one or more pages, depending on how you design it. If there isn't a lot of information just yet, your site will most likely have only a home page. But the site is sure to grow over time.While web pages vary dramatically* in their design and content, most use a traditional magazine layout. At the top of the page is a banner graphic. Next comes a greeting and a short description of the site. Pictures, text, and links to other websites follow.If the site has more than one page, there's typically a list of items--similar to an index--often with a brief description. The items in the list link to other pages on the website. Sometimes these links are highlighted words in the body of the text. It can also be a combination of both. Additionally, a web page may have images that link to other content.Before you start building your site, do some planning. Think about whom the site is for and what you want to say. Next, gather up the material that you wantto put on the site: write the copy, scan the photos, design or find the graphics. Draw a rough layout on a sheet of paper.While there are no rules you have to follow, there are a few things to keep in mind:∙Start simply. If you are too ambitious at the beginning, you may never get the site off the ground. You can always add to your site.∙Less is better. Most people don't like to read a lot of text online. Break it into small chunks.∙Use restraint. Although you can use wild colors and images for the background of your pages, make sure your visitors will be able to readthe text easily.∙Smaller is better. Most people connect to the Internet with a modem.Since it can take a long time to download large image files, keep the file sizes small.∙Have the rights. Don't put any material on your site unless you are sure you can do it legally. Read Learn the Net's copyright article for moreabout this.Stake Your ClaimNow it's time to roll up your sleeves and start building. Learn the Net Communities provides tools to help you build your site, free web hosting, and a community of other homesteaders.Your Internet service provider may include free web hosting services with an account, one alternative to consider.Decoding Error MessagesAs you surf the Net, you will undoubtedly find that at times you can't access certain websites. Why, you make wonder? Error messages attempt to explain the reason. Unfortunately, these cryptic* messages baffle* most people.We've deciphered* the most common ones you may encounter.400 - Bad RequestProblem: There's something wrong with the address you entered. You may not be authorized* to access the web page, or maybe it no longer exists.Solution: Check the address carefully, especially if the address is long. Make sure that the slashes are correct (they should be forward slashes) and that all the names are properly spelled. Web addresses are case sensitive, socheck that the names are capitalized in your entry as they are in the original reference to the website.401 - UnauthorizedProblem: You can't access a website, because you're not on the guest list, your password is invalid or you have entered your password incorrectly.Solution: If you think you have authorization, try typing your password again. Remember that passwords are case sensitive.403 - ForbiddenProblem: Essentially the same as a 401.Solution: Try entering your password again or move on to another site.404 - Not FoundProblem: Either the web page no longer exists on the server or it is nowhere to be found.Solution: Check the address carefully and try entering it again. You might also see if the site has a search engine and if so, use it to hunt for the document. (It's not uncommon for pages to change their addresses when a website is redesigned.) To get to the home page of the site, delete everything after the domain name and hit the Enter or Return key.503 - Service unavailableProblem: Your Internet service provider (ISP) or your company's Internet connection may be down.Solution: Take a stretch, wait a few minutes and try again. If you still have no luck, phone your ISP or system administrator.Bad file requestProblem: Your web browser may not be able to decipher the online form you want to access. There may also be a technical error in the form.Solution: Consider sending a message to the site's webmaster, providing any technical information you can, such as the browser and version you use.Connection refused by hostProblem: You don't have permission to access the page or your password is incorrect.Solution: Try typing your password again if you think you should have access.Failed DNS lookupProblem: DNS stands for the Domain Name System, which is the system that looks up the name of a website, finds a corresponding number (similar to a phone number), then directs your request to the appropriate web server on theInternet. When the lookup fails, the host server can't be located.Solution: Try clicking on the Reload or Refresh button on your browser toolbar. If this doesn't work, check the address and enter it again. If all else fails, try again later.File contains no dataProblem: The site has no web pages on it.Solution: Check the address and enter it again. If you get the same error message, try again later.Host unavailableProblem: The web server is down.Solution: Try clicking on the Reload or Refresh button. If this doesn't work, try again later.Host unknownProblem: The web server is down, the site may have moved, or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online. If this fails, try using a search engine to find the site. It may have a new address.Network connection refused by the serverProblem: The web server is busy.Solution: Try again in a while.Unable to locate hostProblem: The web server is down or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online.Unable to locate serverProblem: The web server is out-of-business or you may have entered the address incorrectly.Solution: Check the address and try typing it again.Web BrowsersA web browser is the software program you use to access the World Wide Web, the graphical portion of the Internet. The first browser, called NCSA Mosaic, was developed at the National Center for Supercomputing Applications in the early '90s. The easy-to-use point-and-click interface*helped popularize the Web, although few then could imagine the explosive growth that would soon occur.Although many different browsers are available, Microsoft Internet Explorer* and Netscape Navigator* are the two most popular ones. Netscape and Microsoft have put so much money into their browsers that the competition can't keep up. The pitched battle* between the two companies to dominate* the market has lead to continual improvements to the software. Version 4.0 and later releases of either browser are excellent choices. (By the way, both are based on NCSA Mosaic.) You can download Explorer and Navigator for free from each company's website. If you have one browser already, you can test out the other. Also note that there are slight differences between the Windows and MacIntosh* versions.You can surf to your heart's content, but it's easy to get lost in this electronic web. That's where your browser can really help. Browsers come loaded with all sorts of handy features. Fortunately, you can learn the basics in just a few minutes, then take the time to explore the advanced functions.Both Explorer and Navigator have more similarities than differences, so we'll primarily cover those. For the most up-to-date information about the browsers, and a complete tutorial, check the online handbook under the Help menu or go to the websites of the respective* software companies.Browser AnatomyWhen you first launch your web browser, usually by double-clicking on the icon on your desktop, a predefined web page, your home page, will appear. With Netscape Navigator for instance, you will be taken to Netscape's NetCenter.The Toolbar (工具栏)The row of buttons at the top of your web browser, known as the toolbar, helps you travel through the web of possibilities, even keeping track ofwhere you've been. Since the toolbars for Navigator and Explorer differ slightly, we'll first describe what the buttons in common do:o The Back button returns you the previous page you've visited.o Use the Forward button to return to the page you just came from.o Home takes you to whichever home page you've chosen. (If you haven't selected one, it will return you to the default home page,usually the Microsoft or Netscape website.)。
计算机网络中英文对照外文翻译文献
中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。
网络可以根据其多种特点来分类。
计算机网络允许资源和信息在互联设备中共享。
一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。
1957年俄罗斯向太空发射人造卫星。
十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。
然后用阿帕网上的另外一台计算机分享了这个信息。
这一切的负责者是美国博士莱德里尔克。
阿帕网于来于自印度,1969年印度将其名字改为因特网。
上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。
因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。
二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。
共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。
共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。
提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。
共享软件:用户可以连接到远程计算机的网络应用程序。
信息保存。
安全保证。
三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。
以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。
经常部署的设备包括网络集线器、交换机、网桥、路由器。
无线局域网技术是使用无线设备进行连接的。
5G无线通信网络中英文对照外文翻译文献
5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)翻译:5G无线通信网络的蜂窝结构和关键技术摘要第四代无线通信系统已经或者即将在许多国家部署。
然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。
无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。
在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。
面临潜在技术的未知挑战也被讨论了。
介绍信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。
无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。
欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。
无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。
从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。
4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。
在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。
4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。
LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。
然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。
网络设计与规划中英文对照外文翻译文献
网络设计与规划中英文对照外文翻译文献(文档含英文原文和中文翻译)Service-Oriented Network Architecture (SONA)1.T he challenges facing businessesAlthough a large number of IT capital investment, but many companies have found that most of the critical network resources and information assets remain in the free state. In fact, can not have hundreds of "orphaned" applications and databases communicate with each other is a common business phenomenon.This is partly due to growing internal and external customers, but due to unpredictable demand. Many companies have been forced to rapidly deploy new technologies, often leading to the deployment of a plurality of discrete systems, and thus can not effectively share information across the organization. For example, if you do not create the applications and information together various overlapping networks, sales, customer service or purchasing department will not be able to easily access customer records. Many companies have found that the blind expansion brought them multiple underutilized and irreconcilable separation systems and resources. These disparate systems while also difficult to manage and expensive to administer.2. Intelligent Information Network - The Cisco AdvantageCisco Systems, Inc. ® With the Intelligent Information Network (IIN) program, is helping global IT organizations solve these problems and meet new challenges, such as the deployment of service-oriented architecture, Web services and virtualization. IIN elaborated network in terms of promoting the development of integrated hardware and software, which will enable organizations to better align IT resources with business priorities. By intelligent built into the existing network infrastructure, IIN will help organizations achieve lower infrastructure complexity and cost advantages.3. Power NetworksInnovative IT environment focused on by traditional server-based system to distributenew business applications. However, the network is still transparent connectivity and support IT infrastructure platform for all components. Cisco ® Service-Oriented Network Architecture (SONA), enterprises can optimize applications, processes and resources to achieve greater business benefits. By providing better network capabilities and intelligence, companies can improve the efficiency of network-related activities, as well as more funds for new strategic investments and innovation.Standardization reduces the amount of assets needed to support the same operating costs, thereby improving asset efficiency. Virtualization optimizes the use of assets, physical resources can be divided logically for use in all sectors of the dispersion. Improve the efficiency of the entire network can enhance the flexibility and scalability, and then have a huge impact on business development, customer loyalty and profits - thereby enhancing their competitive advantage.4. Use architecture to succeedCisco SONA framework illustrates how companies should develop into intelligent information network to accelerate applications, business processes and resources, and to IT to provide enterprises with better service.Cisco SONA Cisco and Cisco partner solutions in the industry, services and experience to provide proven, scalable business solutions.Cisco SONA framework illustrates how to build on the full integration of the intelligent network integration system, in order to greatly improve the flexibility and efficiency.Enterprises can deploy this integrated intelligence among the entire network, including data centers, branch offices and campus environments.4-1 Cisco Service-Oriented Network ArchitectureApplication layer business applications collaborative applicationsInteractive Services Layer Application Networking Services Adaptive Management ServicesInfrastructure ServicesNetwork infrastructure virtualizationNetwork infrastructure layer Park branch office data center WAN / MAN teleworkers Client server storageIntelligent Information Network5. Three levels of Cisco SONANetwork infrastructure layer, where all the IT resources on the Internet converged network platformInteractive services layer, the use of network infrastructure, applications and business processes efficient allocation of resourcesApplication layer, contains business applications and collaboration applications, take advantage of the efficiency of interactive servicesIn the network infrastructure layer of Cisco's proven enterprise architecture provides comprehensive design guide that provides a comprehensive, integrated end-system design guidelines for your entire network.In the interactive services layer, Cisco will integrate a full-service intelligent systems to optimize the distribution business and collaboration applications, thereby providing more predictable, more reliable performance, while reducing operating costs.At the application layer, through deep integration with the network fabric, Cisco application networking solutions without having to install the client or change the application, the entire application delivery while maintaining application visibility and security.6. Build business advantage of Cisco SONASimpler, more flexible, integrated infrastructure will provide greater flexibility and adaptability, and thus a lower cost for higher commercial returns. Use Cisco SONA, you will be able to improve overall IT efficiency and utilization, thereby enhancing the effectiveness of IT, we call network multiplicative effect.7. Network amplification effectZoom effect refers to the network to help enterprises enhance the contribution of IT across the enterprise through Cisco SONA. Optimal efficiency and use IT resources will be more low-cost to produce higher impact on the business, so that your network of value-added resources become profitable.Network amplification effect is calculated as follows:Efficiency = Cost ÷ IT assets (IT assets cost + operating costs)Utilization percentage (such as the percentage of available storage being used) assets to total assets used =Effectiveness = Efficiency x usageAsset Effectiveness Network amplifying effect = assets ÷ efficacy when using the Cisco SONA when not in use Cisco SONA8. Investment incomeCisco Advantage Cisco SONA in intelligent systems is not only to improve efficiency and reduce costs. By Cisco SONA, through the power of your network can achieve:Increase in income and opportunityImproved customer relationsImprove business resiliency and flexibilityIncrease productivity and efficiency and reduce costs9. Real-Time DevelopmentBy Cisco SONA toward more intelligent integrated network development, enterprises can be completed in phases: integration, standardization, virtualization and automation. Working with Cisco channel partner or customer groups, you can use the Cisco SONA framework to develop a blueprint for the development of enterprises. With rich experience in Cisco Lifecycle Management Services, a leading position in the field of standardization, mature enterprise architecture and create targeted industry solutions, Cisco account team can help you meet business requirements in real time.10.The development of the Intelligent Information NetworkRole of the network is evolving. Tomorrow's intelligent network will provide more than basic connectivity, bandwidth and application user access services, which will provide end functionality and centralized control, to achieve true enterprise transparency and flexibility.Cisco SONA enables enterprises to extend their existing infrastructure, towards the development of intelligent network to accelerate applications and improve business processes. Cisco provides design, support and financing services to maximize your return on investment.服务导向网络架构(SONA)1.企业面临的挑战尽管投入大量IT资金,但许多企业发现大多数的关键网络资源和信息资产仍处于游离状态。
网络工程专业外文翻译--GSM无线网络规划与网络优化
外文原文:GSM network planning and network optimizationBetween the fast growth mobile communication network capacity demand and the limited frequency resources contradiction seriously is puzzling the mobile communication operation business, the network planning and the network optimizes receives day by day takes. The network planning is in the mobile communication network construction important link, it all has the very important influence regarding the network construction cost and the movement quality. In overseas, the majority GSM network camp conveyance all extremely takes to the network constructions, invested the massive manpower, the physical resource and the financial resource in the network planning and the optimization. At present, the domestic various provinces mobile communication company and the association pass the company in its mobile communication equipment tender process also the equipment supplier's network planning and the optimized technology took an important inspection target object, from this is worthy of looking at the network planning and the optimization in the mobile communication network construction vital significance. First, network planning key contentFirst is to plans the region earlier period survey, including to the terrain, the landform, the building distribution, the transportation and the commercial development situation, inhabitant's living standard as well as their habits and customs and so on various aspects situation carries on the generalized analysis, thus forecast at present and future locality potential user group number. According to camp merchant grade of service, thus determined in entire region main part traffic load distribution and cloth station strategy, station disposition, stand number, investment scale and so on, fully considered the local high-rise building and the tower distribution, basically determines the stand distribution and the number. Regarding the stand position choice and the cover radius, must consider the telephone traffic demand quantity, the dissemination environment, about the good signal balance and so on to BTS the cover radius limit as well as the station construction comprehensive cost and so on many factors.The network planning goal will be constructs by the lowest cost conforms to the near future and the forward telephone traffic demand, has the certain grade of service the mobile communication network, thus will provide the formidable strut for the service development.The network planning is a more complex project, it receives the various factors the restriction, and therefore, it not merely is the simple technical question. Must especially point out in here is the radio wave propagation performance test, it is in the network planning process a not allow to neglect important aspect. It uses in the radio wave propagation model adjustment, thus forecasts the stand cover radius. To stand cover radius forecast is whether accurate, directly will affect the network construction quality and the cost, therefore, the overseas GSM operation businessman all very much will take to the network dissemination performance test.Second, the network optimizes fault analysis and countermeasureOnce after when the network completes, because the earlier period plan and actual userdevelopment existence certain deviation, creates the busy area resources tense and the idle area resources surplus situation, as well as the user like the voice which bumps into in the middle of the telephone conversation process off and on, the jam, wireless falls the speech and so on many phenomena, these all do not favor the service the development.In view of these situations, Engineer GSM must carry on the optimization to the network, while meets the general consumer need, causes the existing network to obtain the best economic efficiency, it is one item important moreover the long-term work.Because the network optimizes the plan is more complex than, on the one hand in this, our motion signal battalion salt merchants, specially is engaged in engineers who the network optimizes all to have the profound experience and the lesson, moreover network optimization and network planning close correlation, therefore many battalions of salt merchants in to had system dilatancy perhaps time the newly built system, but all without one exception optimizes and plans two parts when to carry on as the network construction important link the equipment tenders alone lists it, thus it can be seen the network optimization and the network planning are similarly important.1. fault analyses(1) pair plans the area cover, the frequency neighbouring frequency disturbs the plot to carry on the survey and the analysis, thus proposes to the plot antenna direction, the antenna angle of pitch, base-station system biggest emissive power (MAX_TX_BTS), biggest handset emissive power (MAX_TX_MS) as well as handset permission turning on time system network parameter and so on lowest turning on level (RXLEV_ACCESS_MIN) adjustment plans.(2) pair plans the area voice quality, the plot cut, the plot choice, the plot gravity separation, the jam, falls the speech and so on to carry on the survey and the analysis, discovers the question, proposes the solution.(3) basis plan area each base depot telephone traffic statistics, the cut and fall situations and so on speech to carry on the generalized analysis, carries on the adjustment to the plot radio frequency parameter and the network parameter, thus the appropriate readjustment each plot direction detection separates by gravity the boundary; Cuts the boundary to the plot to carry on the adjustment, causes the network various plots the telephone traffic load to be as far as possible balanced, and causes the network the cover and the disturbance situation can improve.The network optimizes the goal is analyzes the system the actual movement situation, discovers question which the existing network possibly exists, determined the solution, enhances the network performance stably, the guarantee network, the good movement.2. system optimization data origin(1)OMC telephone traffic statistical analysisIn the network various nets Yuan network performance statistical data, may carry on gathering through the OMC_R terminal.The OMC telephone traffic statistics are understood the network performance index the important way, it has the comprehensive network performance data, through the telephone traffic statistics, may understand each plot the traffic load, the channel availability factor, the TCH voice dropout rate, the TCH jam rate, the cut success ratio, the call completing rate and so on each target, thus understood various plots TCH, SDCCH, RACH and so on the channel takes with thesignaling load bearing situation, grasps the entire net the telephone traffic and the signaling current capacity, carries on the analysis to the existence question and the latent question, provides the important basis for the network optimization.The OMC telephone traffic statistics result all has the primary data result, the statistical analysis result, the graph form generally and so on several display modes, the optimized work should act according to the target generally which must inspect item of and the analysis demand, chooses the appropriate data display way, carries on the statistics and the analysis to each target.(2)CQT, DT testWith tests the handset to carry on the test to various plots cover field intensity, and makes the CQT test regularly; When to the plot jam, the cut, falls the speech, the voice quality and so on carries on the test, then has a part of outstanding test backstage analysis software to be able to provide to the test data demonstration, labelling, the statistical analysis and so on.Mainly is completes this advancement in the MOTOROLA system using the TEMS software, also is the data acquisition process.Lu Ce (DRIVE TEST) the goal lies in the appraisal network whole grade of service, understood various plots field intensity distribution, connection quality whether satisfies requests.When test, the road measured the equipment report user in the position, the base depot distance, the receive signal strength, the received signal quality rxqual, the switching point, the neighboring plot basic condition, the entire frequency band scan result and so on, and may record each test data completely, is advantageous for carries on the backstage analysis.The test data may according to the map statistical distribution, reflect effectively the wireless plot the cover scope, RXLEV, RXQUAL and the interference region, are advantageous for the analysis noise source position, the definite frequency allocation is whether reasonable, inspects the neighbouring area relations and the observation cut, falls the speech event the occurrence.In addition, but also whether can inspect the day to feed the system actual installment and the performance meets the anticipated design requirements.According to the test result, to the system parameter, the antenna condition carries on the corresponding adjustment, in which system parameter adjustment mainly includes: The adjustment base depot emissive power, the change frequency disposition plan, the cut level adjustment, the neighboring plot parameter establishment adjustment, the telephone traffic load adjustment as well as SDCCH and the TCH disposition number and the adjustment and so on, adjust the antenna condition to improve the cover, to reduce the disturbance to have the vital role.(3) pair of user's suit careful analysisAs a result of handset user distribution randomness, has possibly spread the network each quoin unit.Whether does the handset shout normally into and exhales, they often are the network quality quality first the feeling.Such as upward link random access channel rach RACH number disposition, downlink paging channel PCH and access grant channel AGCH number disposition, independent dedicated control channel SDCCH number disposition, plot telephone traffic whether has the jam, whether has the blind spot, whether between the plot has area cover and so on, we all may gain the first material from user's suit.中文译文:GSM无线网络规划与网络优化快速增长的移动通信网络容量需求与有限的频率资源之间的矛盾正严重困扰着移动通信运营商,网络规划和网络优化日益受到重视。
网站建设外文文献翻译
O n s i t e c o n s t r u c t i o n t e c h n o l o g y1 IntroductionThe development of network technology for today's global information exchange and sharing funding source in the establishment of contacts and provide more channels and possible. Homes will be known world affairs, according few keyboard or a few mouse clicks can be distant friends thousands of miles away exchanges, and online communications, Internet browsing, on-line interactive, e-commerce has become a modern part of people's lives. Internet era, has created the new people's work and lifestyle, the Internet, openness and sharing of information model, breaking the traditional mode of information dissemination many barriers for people with new opportunities. With computers and the advent of the information age, the pace of the advance of human society in gradually accelerated. In recent years the development of web design, fast people occupied.With the development of web design, a colorful online website together one scenic beauty. To design aesthetic and practical web site should be thoroughly master the building techniques. In building site, we analyzed the websites of objectives, contents, functions, structure, the application of more web design technology. 2 the definition of websit 2.1 How definition of websites Web site identified the tasks and objectives, the building site is the most important issue. Why people will come to your website? You have a unique service? The first people to your website is to what? They will come back? All these issues must be taken into account when the site definition of the problem. Definition site to, first of all, the entire site must have a clear understanding of what the design should understand in the end, the main purpose of the mission, how to carry out the task of organization and planning. Second, to maintain the high-quality Web site. Many websites in the face of strong competition from high-quality product is the greatest long-term competitive advantage. An excellent Web site should have the following:(1) users visit Web site is faster.(2) attention to the feedback and updates. To update the content of the website and timely feedback the user's requirements;(3) Home design to be reasonable. Home to the first impression left by visitors is important, the design must be attractive in order to have a good visual effect.2.2 The contents of the website and functionThe content of the web site is to be a new, fast, all three sides. The content of the website, including the type of static, dynamic, functional and things to deal with. Website content is determined in accordance with the nature ofthe site, in the design of the site, commercial websites, popular science site, company websites, teaching and exchange websites, the content and style are different. We have established websites with the nature of these types of sites are not the same. 2.3 The structure website(1) site structure;(2) definition of navigation; (3) Visual Design;(4) framework and design pages. 3 Site Design and ImplementationWith increasing demands on design, high style, high-grade design work before gaining popularity. This also to the designers have put forward higher requirements, from this point of view, the plate design is to meet the requirements of the people should be and Health. The rapid development of science and technology, the Internet into millions of households, also produced a new design space, and a new web design an important part of the field of design. Excellent web design, we must have good creative, so that the audience can be difficult to shift attention long time, produce power. Layout is very important, through text, graphics space portfolio, can best express harmony with the United States. If you want to further understand website design, made separately from other web site's homepage, you need to have more like CSS, javascript, CGI, and other web design technology. In building on the site of the CSS, javascript and other web design technology. 3.1 Application Design website CSS(1)What is CSS? CSS is a style sheet (stylesheet) technology. Some of them called CSS (Cascading Stylesheet).(2) the combination of CSS and HTML form. Mode 1: The CSS content, as defined in the writing between the labels. Mode 2: CSS will be preserved as a separate text file, and then from labels to call.(3) CSS the web site of examples. The web site pages, and increase the following definition so that the pages show with special effects. 3.2 Application Design website javascriptjavascript and the emergence of making information between users is not only a display and browse the relationship, but to achieve a real-time, dynamic, cross-expression. Thus based on the CGI static HTML pages will be to provide dynamic real-time information, and customer response to the operation of the Web pages replaced. javascript scripting is satisfy this demand arising from the language. It's loved by extensive user. Many scripting language it is in a relatively good. WWW and effectively achieve the combination of the computer network computing and network blueprint.4 Construction on the site ExperienceWith the popularity of the Internet, more and more government departments, companies and individuals aware of the need to have their own independent Website. Below on the design and production sites on some of their own experience. After conducting systematic analysis End, we should carry out system design. Web page design similar to the development of software design, top-down, bottom-up and continuous updating, and other design methods. The main task is to design the content of the sites, including the website information organization structure, appearance, content block, navigation and links, directory structure design. System design is the site ready before the concrete realization of the website to further the realization of more specific requirements, the overall effect on the website, local details have a clearer idea. This entire process is the key site planning.Next is how to achieve their own Web site design issues. The realization of the site, I think the need to be considered in two parts: the realization website; Web servers can be achieved. In the process of achieving website, technology selection is very important. Former major use HTML language, the stronger the interactive website, the proposed use of ASP, JSP, PHP and other programming to help achieve,the more complex Web site may also have its own database. The latter is based on all kinds of different operating systems used Web server software installation and debugging. This stage is the whole process of the most important and most time-consuming part.When we completed the work, the need for website released. At this stage of the production on the website drawing to a close, the main task is to do a good job in the website release to the network, the web site for final modifications, testing, homepage can guarantee normal operation of the network.Published in the website after website to deal with various aspects of the tests, including the possibility of any different web browsers, different visitors have shown normal, ASP, JSP, PHP normal procedure can work, and so on. This stage is the website of trial operation period, the website at this time should be to make up for various shortcomings, the website will be more perfected.After a period of operation, the site entered the normal operation period, the main task is to update outdated information website, the visitor's message timely feedback to further improve the website, the introduction of new technologies constantly update website, visit web pages more quickly, more aesthetic appearance, Information Resources richer.Above is the establishment of the station to roughly follow the seven steps, seven steps are complementary, but can be the basis of ease of website and complexity of a weakening or strengthening appropriate link. In short, building a successful web site is not an easy task, it needs all-round consideration, the Composite various factors.5 concluding remarksWith the rapid development of Internet technology, in all walks of life have joined the industry to the Internet. Whether from the management side, or from a commercial point of view, the Internet can bring immense vitality. Internet to become a talented designer Shi new world. People will continue to explore, will be the site of the building in the application of new technologies in the web site.网站建设技术1 介绍网络技术的发展,为今天全球性的信息交流与资源共享和交往提供了更多的途径和可能。
Internet中英文资料对照外文翻译文献综述
中英文资料对照外文翻译文献综述Internet的历史起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。
这项工程的目的,是为了建立远距离之间点与点的通信,以便处理国家军事范围内的紧急事件,例如核战争。
这项工程被命名为ARPAnet,它就是Internet的前身。
建立此工程的主要应用对象就是军事通讯,那些负责ARPAnet的工程师们当时也没有想到它将成为“Internet”。
根据定义,一个“Internet”应该由四或者更多的计算机连接起来的网络。
ARPAnet是通过一种叫TCP/IP的协议实现连网工作的。
此协议最基础的工作原理是:如果信息在网络中的一条路径发送失败,那么它将找到其他路径进行发送,就好象建立一种语言以便一台计算机与其他计算机“交谈”一样,但不注意它是PC,或是Macintosh。
到了20世纪80年代,ARPAnet已经开始变成目前更为有名的Internet了,它拥有200台在线主机。
国防部很满意ARPAnets的成果,于是决定全力将它培养为能够联系很多军事主机,资源共享的服务网络。
到了1984年,它就已经超过1000台主机在线了。
在1986年ARPAnet关闭了,但仅仅是建立它的机构关闭了,而网络继续存在与超过1000台的主机之间。
由于使用NSF连接失败,ARPAnet才被关闭。
NSF是将5个国家范围内的超级计算机连入ARPAnet。
随着NSF的建立,新的高速的传输介质被成功的使用,在1988年,用户能通过56k的电话线上网。
在那个时候有28,174台主机连入Internet。
到了1989年有80,000台主机连入Internet。
到1989年末,就有290,000台主机连入了。
另外还有其他网络被建立,并支持用户以惊人的数量接入。
于1992年正式建立。
现状——Internet如今,Internet已经成为人类历史上最先进技术的一种。
每个人都想“上网”去体验一下Internet中的信息财富。
网络工程中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)目录1 对象的创建和存在时间 (1)1.1 对象的创建及破坏方式 (1)1.2 内存池中动态创建对象 (1)1.3 对象的生命周期 (1)1.4 其它内容 (2)1.4.1 集合与继承器 (2)1.4.2 单根结构 (4)1.4.3 集合库与方便使用集合 (5)2Object landscapes and lifetimes (7)2.1objects created and destroyed (7)2.2objects created dynamically (7)2.3Objects’ Lifetime (8)2.4Other section (8)2.4.1 Collections and iterators (8)2.4.2 The singly rooted hierarchy (10)2.4.3 Collection libraries and support for easy collection use (11)1对象的创建和存在时间从技术角度说,OOP(面向对象程序设计)只是涉及抽象的数据类型、继承以及多形性,但另一些问题也可能显得非常重要。
本节将就这些问题进行探讨。
1.1对象的创建及破坏方式对象需要的数据位于哪儿,如何控制对象的“存在时间”呢?针对这个问题,解决的方案是各异其趣的。
C++认为程序的执行效率是最重要的一个问题,所以它允许程序员作出选择。
为获得最快的运行速度,存储以及存在时间可在编写程序时决定,只需将对象放置在堆栈(有时也叫作自动或定域变量)或者静态存储区域即可。
这样便为存储空间的分配和释放提供了一个优先级。
某些情况下,这种优先级的控制是非常有价值的。
然而,我们同时也牺牲了灵活性,因为在编写程序时,必须知道对象的准确的数量、存在时间、以及类型。
如果要解决的是一个较常规的问题,如计算机辅助设计、仓储管理或者空中交通控制,这一方法就显得太局限了。
Web应用中英文对照外文翻译文献
Web应用中英文对照外文翻译文献(文档含英文原文和中文翻译)外文:A Comparative Study of Web Application Design ModelsUsing the Java TechnologiesAbstract.The Servlet technology has been the most widely used technology for building scalable Web applications. In the events, there are four design models for developing Web applications using the Java technologies: Model 1, Model2, Struts, and JavaServer Faces (JSF). Model 1 employs a series of JSP pages; Model 2 adopts the Model-View-Controller pattern; Struts is a framework employing the Model 2 design model; and JSF is a new technology that supports ready-to-use components for rapid Web application development. Model 1 is not recommended for medium-sized and large applications as it introduces maintenance nightmare. This paper compares and evaluates the ease of application development and theperformance of the three design models (Model 2, Struts, and JSF) by building three versions of an online store application using each of the three design models, respectively.1 IntroductionToday, Web applications are the most common applications for presenting dynamic contents. There are a number of technologies for building Web applications, the most popular of which is the Servlet technology . This technology gains its popularity from its superiority over other technologies such as CGI and PHP .Servlets are cumbersome to develop, however, because sending HTML tags requires the programmer to compose them into a String object and send this object to the browser. Also, a minor change to the output requires the servlet to be recompiled. To address this issue, Sun Microsystems invented JavaServer Pages (JSP) . JSP allows HTML tags to be intertwined with Java code and each page is translated into a servlet. A JSP page is a servlet. However, compilation occurs automatically when the page is first requested. As a result, changing the output does not need recompilation. In addition, JSP enables the separation of presentation from the business logic through the use of JavaBeans and custom tag libraries. The norm now in developing Javabased Web applications is to use servlets along with JavaServer Pages.In the later development, there are a number of design models for building servlet/JSP applications: Model 1, Model 2, Struts , and JSF . Model 1 and Model 2 were first mentioned in the early specifications of JSP. Model 1 strictly uses JSP pages, with no servlets, and Model 2 uses the combination of both servlets and JSP pages. The terms of Model 1 and Model 2 have been used ever since. Model 1 is suitable for prototypes and very small applications, and Model 2 is the recommended design model for medium sized and large applications.As Model 2 gained more acceptances in the industry, an open source initiative to build the Struts Framework was initiated. Struts perfects Model 2 by providing the controller part of the Model-View-Controller of Model 2. In addition, Struts provides better page navigation management and several custom tag libraries for more rapid development. Despite its steep learning curve and the fact that it wasnever defined in any specification, Struts has been gaining popularity as the alternative to Model 2.JavaServer Faces is built under the Java Community Process under JSR-127.Sun Microsystems proposed this technology in the hope that JSF will be the ultimate model for building Java Web applications. The most important feature of JSF is the availability of ready-to-use components such as extensible UI components, easy page navigation, input validators, data converters and JavaBeans management.The problem facing servlet/JSP programmers are to choose the most appropriate design model. Clearly, JSF provides a better solution in regard to development time. However, some people are not sanguine to adopt this technology for fear of performance penalty due to the overhead of the JSF implementation.We build three versions of an online store application named BuyDirect using Model 2, Struts and JSF. The parameters compared are the number of lines of code, the number of classes, and the performance measurement results. We investigate which of the design models allows the most rapid development process. We evaluate the performances of the applications built upon these models. We provide some suggestions to perfect the existing design models to make development more rapid.The rest of the paper is organised as follows. Section 2 discusses the issues in Web development. Section 3 explains how the three design models address these development issues. Section 4 provides the details of the hardware and software used in these experiments. Section 5 presents the experiment results and analysis. Section 6 reviews the related work. Section 7 concludes by offering some suggestions to improve the existing design models.2 Java Web Development IssuesAll Java Web development uses the Servlet technology as the underlying technology. As such, all Java Web applications have certain issues that need to be addressed:User Interface. The user interface is what the client browser renders as HTMLtags. Any server-side component used in the application must be encoded into the corresponding HTML elements. Besides for displaying the content and data, the user interface is also responsible in receiving input from the user.●Input Validation. User input needs to be validated. There are two types of inputvalidation, server-side and client-side. As the name implies, the server-side input validation is performed on the server after the input reaches the server.Client-side input validation is done on the browser, usually by using JavaScript or other scripting languages. The advantages of using client-side input validation are prompt response and reducing the server workload. The server-side input validation should always be performed regardless the presence of client-side validation because there is no guarantee the user browser's scripting feature is being on and malicious users can easily work around client-side validation.●Model Objects. Model objects in Java-based Web applications are in the formsof JavaBeans. Model objects make up the Model part of the MVC based design model. A model object can be used to bind a component value to be used at a later stage. In addition, it can encapsulate business logic required for processing.●Page Navigation. Almost all Web applications have multiple pages that the usercan navigate from one to another. All MVC-based design models use a servlet as the Controller part. This servlet also acts as the sole entry point to the application. Which page to be displayed after the current request is determined by the value of a specified request parameter. Managing page navigation is critically important.3 Web Application Design ModelsThe Model 2 design model is based on the Model-View-Controller (MVC) design pattern. As explained by Burbeck , there are three main modules in MVC, the Controller, the View, and the Model. The Controller acts as the central entry point to the application. All user interactions go through this controller. The View contains the presentation part of the application, and the Model stores data or encapsulates business logic of the application. In the later development, the StrutsFramework provides a common framework to easily build Model 2 applications. Then, the last initiative is the JavaServer Faces, which also employs the MVC design pattern.In the following sections, we discuss these three design models and explain how each design model addresses the development issues specified in the previous section.3.1 Model 2A Java Web application that is based on the Model 2 design model has one servlet(called the Controller servlet) that serves as the Controller part. All requests are first handled by this servlet, which immediately dispatches the requests to the appropriate views using RequestDispatcher objects. Views in the Model 2 design model are represented by JSP pages. To store data, a Model 2 application uses JavaBeans, which are the Model part of the application. In addition to storing data, the JavaBeans also encapsulate business logic. Each HTTP request carries an action parameter that indicates which view to dispatch this request to. The programmer must code the HTML tags for user interface in all JSP pages in the application and write input validation code. In addition, the model objects are managed by individual JSP pages.3.2 StrutsThe Struts Framework is an improvement of the Model 2 design model. It provides a default Controller servlet so that the user does not have to write and compile one. Struts alleviates the task of page navigation by allowing navigation rules to be present in its application configuration file (an XML document). Changes to the navigation rules do not require recompilation of a Java servlet class. In addition to easier page navigation, Struts provides custom tag libraries that define tags representing HTML elements. One of these tags is used for error handling and Struts is therefore capable of displaying localized error messages in support for internationalization. Struts applications use JavaBeans as their models, just like the Model 2 design model. In addition, Struts programmers have to write their own input validation code.3.3 JSFJSF also employs a controller servlet that is called FacesServlet. This servlet is the only entry point to a JSF application. JSF also uses JSP pages as its views and JavaBeans as its model objects. Unlike Model 2 and Struts, however, JSF provides ready-to-use user interface components that can be written on JSP pages. Upon an invocation of a page of a JSF application, the FacesServlet constructs a component tree that represents the JSP page being requested. Some of the components can also trigger events, making JSF event-driven. For page navigation, JSF uses an approach similar to Struts, i.e., by allowing navigation rules to be defined in an application configuration file (again, an XML document).What distinguishes a JSF application from non-JSF servlet/JSP application is that JSF applications are event-driven. The user interface of a JSF application is one or many JSP pages that host Web components such as forms and input boxes. These components are represented by JSF custom tags and can hold data. A component can be nested inside another, and it is possible to draw a tree of components. Just as in normal servlet/JSP applications, you use JavaBeans to store the data the user entered.4 Function EnvironmentThe software and hardware details for our experiments are described below.4.1 The Servlet ContainerA Java Web application runs in a servlet container, which is the engine that processes the incoming HTTP requests for the resources in the application. For this research project, we use Tomcat, an open source servlet container from the Apache Software Foundation. The version we use is 6.0.Basically, a servlet container processes a servlet by performing the following tasks:- Creating the HttpRequest Object- Creating the HttpResponse Object- Calling the service method of the Servlet interface, passing the HttpRequest and HttpResponse objects.4.2 Testing ClientsFor performance testing, we emulate multiple users using JMeter 1.9 , also from the Apache Software Foundation. JMeter allows the user to choose the number of threads to perform testing. Each thread emulates a different user. JMeter also lets us choose how many times a test will be done. To test a Web application using JMeter, you direct requests to certain IP address, context path, and port number. You can also specify request parameters to be included in each HTTP request. As the output, JMeter notifies the response time of the server in milliseconds for a test. From the response time, we derive the number of hits/seconds the server is capable of serving.4.3 HardwareWe use different computers for running the applications and for testing, so as to obtain maximum performance measurement accuracy. The computer running the application is a XP machine having the following hardware specifications: Intel Core 1GHz CPU with 1G RAM. The computer running the testing clients is a Windows 2000 machine running JMeter. The computer has the following specifications: Intel Core 1GHz CPU with 1G RAM.5 ResultsWe obtain experimental results in two categories: the ease of development and performance. The ease of development category compares the number of classes and the number of lines of code. These numbers indicate how easy it is to develop an application by following a certain design model. An application with the fewer number of classes or the number of lines of code indicates that the application is relatively easier to build. The application with the more number of classes indicates that the application takes more time to develop.The performance measurement results are obtained by comparing two operations. The Search operation is the most common operation in such an application,and the Browse operation.5.1 Ease of Application DevelopmentAs Table 1 shows, it takes the most effort to implement the Model 2 design model. Using Struts alleviates the problem a bit, and the best saving in the development comes if one uses JSF.Table 1. The number of classes and the number of lines for the applications under studyThe Model 2 design model is characterised by the presence of a Controller servlet and a number of JavaBeans classes (as the Model) and JSP pages (as the Views). The Controller servlet is responsible for page navigation rules that employ a series of if statements. Model 2 application programmers must also code for the input validation that in this research is implemented inside a number of custom tag libraries. The other classes in the Model 2 design model are custom tag library and the tag library descriptors responsible for input validation and data display. In fact, input validation takes 590 lines of code, or almost 30% of the total amount of code.In the Struts application, the Controller servlet is provided by the framework, therefore a Struts programmer saves time for not having to write one. However, he/she still needs to write page navigation rules in the Application Configuration file, which is easier than writing a servlet because the Application Configuration file can be edited using a text editor and no compilation is necessary. Input validation must still be done manually, even though the Struts Framework provides an error handling mechanism. The number of classes and the number of lines of code for input validation are almost similar to the Model 2 application. In Struts, the other classes are Action classes to which the default Controller servlet dispatches requests.In JSF input validation comes free through the availability of validatorcomponent. As a result, a JSF application developer can skip this task. In addition, page navigation takes the same course as Struts, i.e. by utilising an Application Configuration file. The other classes in JSF are a ContextListener, an ActionListener, and a Database utility class.5.2 Performance MeasurementFor each operation, we measure the server response time (in milliseconds) for 1 to 10 concurrent users. The number of users is specified by setting the number of threads in Jmeter. Each test is conducted 10 times and the average is taken. Each operation is discussed further is the following sub-sections.5.2.1 Search OperationThe Search operation whose name or description matches the keyword. There is one SQL SELECT statement performed. Figure 2 compares the three versions of applications for the Search operation.Fig. 2. The performance comparison for the Search operation For the Model 2 application, the average server response time for one user is 173 ms and for 10 users is 919 ms. For the Struts application, these numbers are 189 ms and 900 ms, respectively. For the application built using JSF, the average server response time is 210 ms for one user and 932 ms for 10 users. The increase of the response time is proportional to the increase of the number of concurrent users, which means that the server is still able to cope with the load.The Model 2 application has the least overhead, therefore the averageperformance should be better than the Struts and JSF applications. However, the Struts application performs as well as the Model 2 application. This is because the server has enough memory to load all Struts libraries required to run Struts. Also, note that page navigation rules in Struts are loaded and stored in an object called ActionMapping. Therefore, given an action request parameter, the next page of navigation is obtained through a look-up. On the other hand, the Model 2 application uses a series of if statements to find the next page of navigation, given the action request parameter.The JSF application performs slightly worse than the other applications in almost all numbers of concurrent users. This could be due to the time taken by the JSF implementation to construct a component tree for each page requested. However, the difference in server response time between JSF and other applications is not that significant.5.2.2 Browse OperationThe Browse operation,like the Search operation, there is one SQL SELECT statement performed. Figure 3 gives the test results for this operation.Fig. 3. The performance comparison for the Browse operation On average, the Model 2 application performs the best because it has the least overhead. The average server response time is 111 ms for one user and 899 ms for 10 users. The Struts application has comparable performance, with one user average server response time of 180 ms and 10 user response time of 920 ms. The JSF lacks a bit behind the two applications with these numbers being 190 and 1009ms respectively. The increase of the server response time is proportional to the increase of the number of concurrent users, which means the server is able to serve those users well. The average performance measurement results of the Browse operation are very similar to the ones for the Search operation because the database operations of both operations are also similar.6 Related WorkCompare the performance of database-based Web applications using Java servlets, PHP version 3, and Common Gateway Interface (CGI). After a series of benchmark tests that performs data retrieval from a MySQL database, find that the solution of Java servlets with persistent database connection has the best performance. PHP3 using persistent database connections performs fairly well when compared to the CGI solution,also mention the advantages of using Java servlets. According to these authors. Java servlets are an excellent choice to meet the requirement of e-commerce (such as online shopping) applications and are able to handle client requests in a highly interactive mode.Comparing PHP 4, Java servlets, and Enterprise JavaBeans. Measure the performance of these three architectures using two applications. Study reveals that PHP4 is more efficient than Java servlets, and the EJBs perform even worse than servlets. However, note that servlets, being part of the Java solution, provides the flexibility of being able to be ported to another system with a different operating system.7 ConclusionWe find that it is most rapid to build Web applications using JSF. Model 2 applications are the least rapid but give the best performance. Struts applications sit in the middle of the other two design models in both comparisons.We make some suggestions that could improve the Servlets technology in general and enhance the performance of applications based on both design models. Struts. Struts is not based on any specification and there is no documentation that discusses its internal working. Therefore, it is hard to know what have been implemented and what could be improved.●The Servlets Technology. The Servlet 2.3 Specification does not define anycaching mechanism. There is no mention of caching in the upcoming Servlet2.4 Specification either. Despite the dynamic nature of the content of a Webapplication, some contents do not change very often. For example, the categories of products that a user can browse in an online store application probably only change once in a month. If those semi-static contents must be generated from the database every time they are requested, a lot of programming resources will be wasted. Servlet programmers get around the absence of caching by writing an object that caches certain content. However, since there is no standard for caching, many programmers write the same piece of code again and again.●Model 2.The main drawback is that the page navigation rules are hard-coded inthe Controller servlet. This means any minor change to the program flow will require the Controller servlet to be re-compiled. The solution to this problem is to provide a mapper that reads the page navigation rules when the application starts. The code could be conveniently written in the init method of the Controller servlet. This method is only executed once, i.e. the first time the servlet is loaded into memory. If the properties file needs to be re-read every time it changes, the programmer can check the timestamp of the properties file for each request, and compares it with the previous read of this file. If the timestamp is more current than the previous read, the mapper can be re-constructed. This feature can be enabled and disabled by using an initial parameter in the Context object. At the development phase, this feature should be enabled. At deployment, this feature should be off. The use of the properties file to store the page navigation rules also makes it possible to avoid a series of if statements in the Controller Servlet, which can be time-consuming for every request. Instead, a HashMap can be used, with action request parameters as keys and the next JSP pages as values. The other disadvantage of this design model is the absence of standard components for input validation and user interface. However, this has been solved in JSF.●JSF. JSF provides solutions to common problems in Web development, such aspage navigation management, UI components and input validators. However, because this technology is still very young, there are not too many UIcomponents available, forcing programmers to combine JSF with non-JSF servlets/JSP pages. JSF is event-driven. JSF programmers determine the behavior of a JSF application by writing event listeners, just like those listeners in a Swing application. In JSF version 1.0, there are currently two types of events that can be triggered: ActionEvent and ValueChangedEvent. However, this is good enough to provide sufficient level of interactivity between the application and its users. Adding more types of events will definitely make JSF more appealing.References[1].Cecchet, E., Chanda A., Elnikety S., Marguerite J., Zwaenepoel W.: Performance Comparison of Middleware Architectures for Generating Dynamic Web Content. Proceeding of the 4th International Middelware Conference, 2003.[2].Cecchet, E., Marguerite, J., and Zwaenepoel, W.: Performance and Scalability of EJB Applications. Proceedings of OOPSLA’02, 2002.[3].Wu, A., Wang, H., and Wilkins, D.: Performance Comparison of Alternative Solutions for Web-To-Database Applications. Proceedings of the Southern Conference on Computing, the University of Southern Mississippi, 2000.基于Java技术的Web应用设计模型的比较研究摘要Servlet技术在建立可扩展性Web应用中是被应用最广泛的技术。
网页设计与制作外文翻译文献中英文
外文文献翻译(含:英文原文及中文译文)文献出处:Computer Knowledge & Technology, 2013,12(1):31-41英文原文Web design and productionM SiegelAbstractThe paper will study and discuss methods and tools for personal web page design and production. Based on the introduction of web design and production language, we focused on using JavaScript as a tool language for actual web page design and production. We used object-based JavaScript language, the use of internal object systems, and WEB page information interaction—window and framework. Describe it in detail and use specific examples for verification.Keywords: web page production, web design, software, html1 IntroductionWith the advent of the 21st century, people feel more and more deeply that the role of computers in life and work is more and more important. More and more professions need computer application skills. Mastering the need for computers is a career, but also the need for career development. Web design and production is a concrete manifestation of computer capabilities. This chapter mainly introduces related knowledgeof web design.1.1 Web Design OverviewA website is a way for companies to provide information (including products and services) to users and netizens. It is an infrastructure and information platform for companies to develop e-commerce. It is impossible to leave e-commerce (or just use a third-party website) to talk about e-commerce. . The company's web site is called the “Internet Trademark” and is also part of the company's intangible assets. The website is an important window on the Internet to promote and reflect corporate image and culture.1.2 Elements of Web DesignThe two major elements of web design are: overall style and color matching. First, determine the overall style of the siteChapter 2 Application of HTML Web Design Technology2.1 HTML language introductionHTML (HyperText Mark-up Language) is a hypertext markup language or hypertext markup language. It is the most widely used language on the Internet and the main language constituting webpage documents.HTML text is descriptive text composed of HTML commands. HTML commands can describe text, graphics, animations, sounds, forms, links, and so on. The structure of HTML includes two parts: the head andthe body. The head describes the information needed by the browser, and the body contains the specific content to be explained.2.1.1 Features of HTML LanguageHTML document production is not very complicated and powerful. It supports the inlaying of files in different data formats. This is one of the reasons for the popularity of the WWW. The features of the HTML language are as follows:1. Simplicity: The HTML version upgrade adopts a superset method, which is more flexible and convenient.2. Extensibility: The extensive use of HTML language has brought about enhanced functions, increased identifiers, and other requirements. HTML takes the form of sub-elements to provide guarantees for system expansion.3, platform independence. Although PCs are popular, there are plenty of other machines using MAC and so on. HTML can be used on a wide range of platforms, which is another reason why WWW is prevalent.2.1.2 HTML language editing softwareWrite it, too. However, use .htm or .html as an extension when saving, so that the browser can interpret it.2. Semi-WYSIWYG software, this software can greatly improve the development efficiency, it can enable you to make Homepage in a veryshort time, and you can learn HTML, this type of software mainly has HOTDOG, as well as domestic Software webpage workshop.3, WYSIWYG software, using the most extensive editor, you can completely do not know HTML knowledge to make web pages.2.2.3 JavaScript Technology Used in Web DesignOne, JavaScript OverviewJavaScript is an object-based and event-driven scripting language with safe performance. The purpose of using it is to implement linking multiple objects in a Web page together with HTML hypertext markup language and Java scripting language (Java applets) to interact with Web clients. This allows you to develop client applications and more. It is implemented by embedding or loading in the standard HTML language. Its appearance has made up for the shortcomings of the HTML language. It is a compromise between Java and HTML. It has the following basic features:1, is a scripting languageJavaScript is a scripting language that uses small blocks to program. Like other scripting languages, JavaScript is also an interpreted language that provides an easy development process.Its basic structure is very similar to that of C, C++, VB, and Delphi. But unlike these languages, it needs to be compiled first, but it is interpreted line by line during the execution of the program. It iscombined with HTML tags to make it easier for users to use.2, based on the language of the object.JavaScript is an object-based language that can be viewed as an object-oriented one. This means it can use the objects that it has already created. Therefore, many functions can come from the interaction of methods and scripts in the script environment.3, simplicityThe essence of HTML is text, which requires the interpretation of the browser. The HTML editor can be roughly divided into three types: 1. The basic editing software, which can be written using WINDOWS's own notebook or writing, of course, if you use WPS The simplicity of compiling JavaScript is mainly reflected in: First, it is a simple and compact design based on Java basic statements and control flow, which is a very good transition for learning Java. Second, its variable types are weakly typed and do not use strict data types.4, securityJavaScript is a security language. It does not allow access to the local hard disk. It does not store data on the server. It does not allow the modification or deletion of web documents. Information browsing or dynamic interaction can only be achieved through the browser. This effectively prevents data loss.5, dynamicJavaScript is dynamic. It can respond directly to user or customer input without going through a Web service program. It responds to the user's response in an event-driven manner. The so-called event-driven refers to an action that is performed by performing an operation in a Home Page. It is called an "Event". For example, pressing a mouse, moving a window, selecting a menu, etc. can all be considered events. When an incident occurs, it may cause a corresponding event response.6, cross-platformJavaScript is dependent on the browser itself, regardless of the operating environment, as long as it can run the browser's computer, and the JavaScript browser can be executed correctly. In order to achieve the "write once, travel the world" dream. In fact, the most outstanding thing about JavaScript is that you can do a lot of things with very small programs. Without high-performance computers, the software requires only a word processing software and a browser. It does not require a WEB server channel and can do everything through its own computer.In short, JavaScript is a new description language that can be tethered to HTML documents. The JavaScript language can respond to user's demand events (such as form input) without using any network to transfer data back and forth, so when a user enters a data, it does not pass it to the server (server). ) Processing, and then returned to the process, and can be directly handled by the client's application.The third chapter WEB page information interaction - form and frameTo realize the dynamic interaction of web pages, you must master more complex knowledge about form objects and frame objects.3.1 Form BasicsThe form object allows the designer to interact with the client user using different elements in the form, but without having to first perform data input, the behavior of the Web document can be changed dynamically.3.1.1 Form objectForm: It forms the basic element of a Web page. Usually a Web page has a form or several windows, using the Forms[] array to access different forms.3.1.2 Form Object MethodsThere is only one --submit() method for the form object. The main function of this method is to submit the form information. 3.1.3 Form Object PropertiesThe attributes of the window object mainly include the following: elements name action target encoding method. In addition to Elements, several others reflect the state of the corresponding attribute in the identity of the form, which is usually a single form identifier; elements are often an array of values for multiple form elements.3.1.4 Accessing a Form ObjectAccessing a form object in JavaScript can be implemented in two ways: (1) by accessing the formIn the properties of the form object, you must first specify the name of the form, and then you can access the form with the following ID: document.Mytable().(2) access the form through an arrayIn addition to using the form name to access the form, you can use the array of form objects to access the form object. However, it should be noted that because the form object is provided by the browser environment, the array index provided by the browser environment is from 0 to n.3.1.5 Prerequisites for Reference FormsThe condition for reference to a form in JavaScript is that the form must be created on the page with an identifier and the defined form part is placed before the reference.3.2 The basic elements in the formThe basic elements in the form consist of buttons, radio buttons, check buttons, submit buttons, reset buttons, text boxes, and so on. To access these basic elements in JavaScript, you must implement an array subscript or window element name that corresponds to a specific form element. Each element is primarily referenced by its attributes ormethods.3.3 FrameworkThe main function of the Frames Frames is the "split" window, so that each "small window" can display different HTM L files. Different frames can interact with each other. This means that different frames can exchange messages and data. For example: Suppose you have opened two frames. The first frame shows the book's directory. The second frame shows the chapter's specific content.The framework can divide the screen into different areas. Each area has its own URL. Frames[] array objects can be used to access different frameworks. In fact, the frame object itself is also a kind of window, which inherits all the features of the window object and possesses all the attributes and methods. The use of the framework of the specific instructions3.4 Framework AccessEarlier we introduced using document.forms[] to access different elements in a single form. To access different elements of a multiframe in a frame, you must use the Frames property in the window object. The Frames property is also an array. It has one item for each sub-frame in the parent frameset.3.5 Summary of this chapterThis chapter mainly introduces the main functions and uses of thebasic elements in the framework. The use of JavaScript scripts can be very convenient and flexible to implement more complex information interaction of Web pages. This is not what the HTML markup language can provide. Y ou can see from it that JavaScript is a good tool for the Web to involve people.中文译文网页设计与制作作者M Siegel摘要本文将对个人网页设计与制作的方法、工具等展开研究和探讨。
网络设计与规划中英文对照外文翻译文献
网络设计与规划中英文对照外文翻译文献(文档含英文原文和中文翻译)Service-Oriented Network Architecture (SONA)1.T he challenges facing businessesAlthough a large number of IT capital investment, but many companies have found that most of the critical network resources and information assets remain in the free state. In fact, can not have hundreds of "orphaned" applications and databases communicate with each other is a common business phenomenon.This is partly due to growing internal and external customers, but due to unpredictable demand. Many companies have been forced to rapidly deploy new technologies, often leading to the deployment of a plurality of discrete systems, and thus can not effectively share information across the organization. For example, if you do not create the applications and information together various overlapping networks, sales, customer service or purchasing department will not be able to easily access customer records. Many companies have found that the blind expansion brought them multiple underutilized and irreconcilable separation systems and resources. These disparate systems while also difficult to manage and expensive to administer.2. Intelligent Information Network - The Cisco AdvantageCisco Systems, Inc. ® With the Intelligent Information Network (IIN) program, is helping global IT organizations solve these problems and meet new challenges, such as the deployment of service-oriented architecture, Web services and virtualization. IIN elaborated network in terms of promoting the development of integrated hardware and software, which will enable organizations to better align IT resources with business priorities. By intelligent built into the existing network infrastructure, IIN will help organizations achieve lower infrastructure complexity and cost advantages.3. Power NetworksInnovative IT environment focused on by traditional server-based system to distributenew business applications. However, the network is still transparent connectivity and support IT infrastructure platform for all components. Cisco ® Service-Oriented Network Architecture (SONA), enterprises can optimize applications, processes and resources to achieve greater business benefits. By providing better network capabilities and intelligence, companies can improve the efficiency of network-related activities, as well as more funds for new strategic investments and innovation.Standardization reduces the amount of assets needed to support the same operating costs, thereby improving asset efficiency. Virtualization optimizes the use of assets, physical resources can be divided logically for use in all sectors of the dispersion. Improve the efficiency of the entire network can enhance the flexibility and scalability, and then have a huge impact on business development, customer loyalty and profits - thereby enhancing their competitive advantage.4. Use architecture to succeedCisco SONA framework illustrates how companies should develop into intelligent information network to accelerate applications, business processes and resources, and to IT to provide enterprises with better service.Cisco SONA Cisco and Cisco partner solutions in the industry, services and experience to provide proven, scalable business solutions.Cisco SONA framework illustrates how to build on the full integration of the intelligent network integration system, in order to greatly improve the flexibility and efficiency.Enterprises can deploy this integrated intelligence among the entire network, including data centers, branch offices and campus environments.4-1 Cisco Service-Oriented Network ArchitectureApplication layer business applications collaborative applicationsInteractive Services Layer Application Networking Services Adaptive Management ServicesInfrastructure ServicesNetwork infrastructure virtualizationNetwork infrastructure layer Park branch office data center WAN / MAN teleworkers Client server storageIntelligent Information Network5. Three levels of Cisco SONANetwork infrastructure layer, where all the IT resources on the Internet converged network platformInteractive services layer, the use of network infrastructure, applications and business processes efficient allocation of resourcesApplication layer, contains business applications and collaboration applications, take advantage of the efficiency of interactive servicesIn the network infrastructure layer of Cisco's proven enterprise architecture provides comprehensive design guide that provides a comprehensive, integrated end-system design guidelines for your entire network.In the interactive services layer, Cisco will integrate a full-service intelligent systems to optimize the distribution business and collaboration applications, thereby providing more predictable, more reliable performance, while reducing operating costs.At the application layer, through deep integration with the network fabric, Cisco application networking solutions without having to install the client or change the application, the entire application delivery while maintaining application visibility and security.6. Build business advantage of Cisco SONASimpler, more flexible, integrated infrastructure will provide greater flexibility and adaptability, and thus a lower cost for higher commercial returns. Use Cisco SONA, you will be able to improve overall IT efficiency and utilization, thereby enhancing the effectiveness of IT, we call network multiplicative effect.7. Network amplification effectZoom effect refers to the network to help enterprises enhance the contribution of IT across the enterprise through Cisco SONA. Optimal efficiency and use IT resources will be more low-cost to produce higher impact on the business, so that your network of value-added resources become profitable.Network amplification effect is calculated as follows:Efficiency = Cost ÷ IT assets (IT assets cost + operating costs)Utilization percentage (such as the percentage of available storage being used) assets to total assets used =Effectiveness = Efficiency x usageAsset Effectiveness Network amplifying effect = assets ÷ efficacy when using the Cisco SONA when not in use Cisco SONA8. Investment incomeCisco Advantage Cisco SONA in intelligent systems is not only to improve efficiency and reduce costs. By Cisco SONA, through the power of your network can achieve:Increase in income and opportunityImproved customer relationsImprove business resiliency and flexibilityIncrease productivity and efficiency and reduce costs9. Real-Time DevelopmentBy Cisco SONA toward more intelligent integrated network development, enterprises can be completed in phases: integration, standardization, virtualization and automation. Working with Cisco channel partner or customer groups, you can use the Cisco SONA framework to develop a blueprint for the development of enterprises. With rich experience in Cisco Lifecycle Management Services, a leading position in the field of standardization, mature enterprise architecture and create targeted industry solutions, Cisco account team can help you meet business requirements in real time.10.The development of the Intelligent Information NetworkRole of the network is evolving. Tomorrow's intelligent network will provide more than basic connectivity, bandwidth and application user access services, which will provide end functionality and centralized control, to achieve true enterprise transparency and flexibility.Cisco SONA enables enterprises to extend their existing infrastructure, towards the development of intelligent network to accelerate applications and improve business processes. Cisco provides design, support and financing services to maximize your return on investment.服务导向网络架构(SONA)1.企业面临的挑战尽管投入大量IT资金,但许多企业发现大多数的关键网络资源和信息资产仍处于游离状态。
校园网的规划与构建外文文献及其中文翻译
石家庄经济学院本科生毕业设计外文文献题目石家庄经济学院本部校园网网络规划设计姓名姬云飞学号************学院信息工程学院专业通信工程指导教师张晨燕Campus Network planning and ConstructionAt present, China's rapid development of the cause of the campus network, to early 2003, almost all colleges have set up their own campus network, and carry out a variety of its services and applications. Campus Network build a rich learning resources to enhance the efficiency of education. But as the number of users increased dramatically increased and the pattern of operations, campus network security is increasingly conspicuous, and the ever threat to the healthy development of the campus network, as an education development of the information industry should not be neglected problem. This paper focuses on the campus network design and the process of building the campus network established the goal of building, campus network technology programme design, information resources construction, application software development, network management and security, the five key issues. The campus network is the infrastructure of importance of school, taking the school teaching, research, managing and outward communicate many roles of etc..The safe condition of the campus net affects the teaching activity of the school directly.Set up in the network of initial stage, the safe problem may still be not outstanding, but along with applied thorough, various data of the campus net would nasty play increment, the safe problem beginning of various each kind perplexes us.The Internet flies to develop soon, to the campus network the teachers and the students' life and studies have already produced the profound influence, the network have already not have no place in our life at. But at enjoy the convenience that high technology bring at the same time, we need to be awake of know, the safe problem of network also become the network application more and more increasingly and seriously huge bar, the situation that the campus network safety hazes already arrived and must unify the management and resolve thoroughly, only good resolve the safe problem of network, the application of the campus network then can be healthy, high speed of development. We should consider the comprehensive usage fire wall and encrypt several measures, such as technique and the anti-virus software...etc. completely, work in coordination, strengthening the management, looking for the balance point of insure the network safety and the network efficiency from it, the safety of the comprehensive exaltation campus network, thus build up rise a set of real in keeping with safe system of the calculator network of the school.The time today's knowledge-based economy and information technology have the development and popularization of Internet in the world have decided the time the network will become the main tool for information. With the development of computer network technology, network has become an important platform for the exchange of information.Internet-based e-learning with time-sensitive, shared, interactive and many of the characteristics of the individual, so it has a traditional teaching model of unmatched advantages. It created a new teaching model, breaking the traditional teaching model at the time and space limitations, the use of advanced teaching methods and teaching methods, greatly improve the teaching efficiency and teaching effectiveness, teaching and learning activities to enable a new level. Do a good jobin the design of the campus network, are among the schools, both internal and external communication between the key and convenient.21st century the size of the campus network and application level are reflected in schools and science teaching and learning environment an important component of the force, so we should make use of existing campus conditions, design a secure, unified campus network. Large Campus Network DesignBusinesses operating large campus networks are increasingly looking for infrastructure upgrades to:(1) Handle high bandwidth applications such as voice, video, and IP multicast Improve backbone capacity for shared Ethernet or FDDI campus backbones(2) Support applications based on Novell IPX, DECNET, AppleTalk, and SNA(3) Offer high availability, performance, & manageability for your company's intranetUse Layer 2, Layer 3, or ATM backbone solutions to expand your large campus network. In typical designs, the buildings or different parts of the campus connect together across a high performance, switched backbone. Network redundancy and high availability is provided at each layer. A high capacity, centralized server farm provides resources to the campus, and when combined with Cisco IOS, network management strategies support QoS, security, troubleshooting, and other common management features from end to end.Medium Campus Network DesignA medium campus consists of one large building or several buildings. Networking for a medium campus is designed for high availability, performance, and manageability. This is also called a 'collapsed backbone' design for medium campus networks. Additional requirements of these designs typically include:(1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECNET, AppleTalk, and SNA Based on the Cisco AVVID architecture, these intelligent network platforms and products provide the basis for a complete network solution.Small campus networks DesignIn most cases, network redundancy is not the top priority, but cost effectiveness is. Additional requirements of these designs typically include:(1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECNET, AppleTalk, and SNA校园网的规划与构建目前,我国校园网事业飞速发展,至2003年初,几乎所有的大中专院校都建立了自己的校园网,并在其上开展了多种服务和应用。
信息工程网站设计与制作中英文对照外文翻译文献
中英文外文翻译(文档含英文原文和中文翻译)Web design and productionSummaryPapers will expand the personal web design and production methods, tools and other research and discussion. Based on the introduction of web design and production of language, the emphasis on using the JavaScript language as a tool for the actual operation of web design and production of, respectively, based on the object of the JavaScript language, the use of internal object system and WEB pages of information exchange - windows and frameworks Detailed description of the use of specific examples and verified.1. IntroductionWith the advent of the 21st century, people are more and more important to feel the life and work of the computer's role in the increasingly professional needs to have a computer application skills deeply. Is required to master the computer profession, but also career development needs. Web design and production is a concrete manifestation of the ability of a computer, this chapter introduces the relevant knowledge of web design.1.1 Web Design OverviewWebsite is a way businesses and users to provide information (including products and services) to the user, is the enterprise e-commerce infrastructure and information platform, leave the site (or just use a third-party site) is not possible to talk about e-commerce . Corporate web site called "network brand", also part of intangible assets, and the site is an important window of publicity and reflect the corporate image and culture on the INTERNET.Web Design Elements 1.2Two elements of web design are: overall style and color matching. First, determine the overall style of the siteApplication chapter HTML web design technology2.1 HTML language descriptionHTML (HyperText Mark-up Language) ie, HTML, or Hypertext Markup Language, is currently the most widely used language network, but also constitute the primary language of the document pages.HTML text is composed by HTML commands descriptive text, HTML commands can explain text, graphics, animation, sound, tables, links, and so on. HTML structure includes a head (Head), the specific content of the body (Body) into two parts, of which the head of the description of the browser you want, and the body contains the desired note.Features 2.1.1 HTML languageHTML document production is not very complex and powerful, supporting different data file formats insert, which is one of the reasons for the prevalence of WWW, HTML language characteristics are as follows:1, simplicity, HTML version upgrade using a superset of the way, which is more flexible and convenient.2, scalability, widely used in HTML language brings to strengthen capabilities and increase identifiers and other requirements, HTML elements take the form of a subclass, bring assurance system expansion.3, platform independence. While the PC is popular, but the use of MAC and other machines out there, HTML can be used on a wide range of platforms, and this is another reason for theprevalence of WWW.2.1.2 HTML language editing softwareHTML is the essence of the text, you need to explain your browser, HTML editor can be roughly divided into three types: 1, the basic editing software, using WINDOWS notepad or write version can be written, of course, if you use WPS to write, you can. However, please use .htm or .html as the extension, so the browser can interpret save when executed.2, semi-WYSIWYG software, which can greatly improve development efficiency, it can make you make a Homepage in a very short period of time, and you can learn HTML, this type of software has HOTDOG, as well as domestic Software web workshop.3, WYSIWYG software, the most widely used editor, can understand a little HTML knowledge can make pages.Application chapter HTML web design technology2.2.3 JavaScript technology in web designOne, JavaScript OverviewJavaScript is an object-based (Object) and event-driven (Event Driven) and safety performance have scripting language. Its purpose is to use HTML and HTML, Java scripting language (Java applet) link together to achieve multiple objects in a Web page, the Web client interactions. Which can develop client applications. It is by embedding or transferred in standard HTML language implemented. It appears to make up for the shortcomings of HTML language, which is a compromise choice for Java and HTML, has the following basic characteristics:1, is a scripting languageJavaScript is a scripting language, which uses a small way to block implementation of programming. Like other scripting languages, JavaScript is an interpreted language is also, it provides an easy development process.Its basic structure with C, C ++, VB, Delphi is very similar. But it is not like these languages, you need to compile, but is interpreted line by line in the program is running. It is combined with HTML markup, so as to facilitate the user's operation.2, object-based language.JavaScript is an object-based language, but to be seen as an object-oriented. This means that itcan use objects that they have created. Therefore, many functions can be derived from the interaction of methods and scripts scripting environment object.3. SimplicitySimplicity is mainly reflected in JavaScript: First, it is a Java basic statements and control flow above the simple and compact design based on order for Java is a very good transition study. Secondly, it is the use of weakly typed variable type, did not use strict data types.4, securityJavaScript is a safe language, it does not allow access to the local hard disk, data can not be stored on the server, the network is not allowed to modify and delete documents, can only be achieved through a dynamic interactive information browsing or browser. Thus effectively prevent the loss of data.5, the dynamic nature ofJavaScript is dynamic, it can respond directly to the user or customer input, without going through the Web service program. It reflects the user's response, is the use of event-driven manner. The so-called event-driven, meaning the implementation of certain actions arising from the action on the home page (Home Page), and is called the "event" (Event). For example, pressing the mouse button, move the window, select the menu and so can be considered an event. When the event occurs, it may cause the appropriate incident response.6, cross-platformJavaScript is dependent on the browser itself, regardless of the operating environment, as long as the computer running the browser, and the browser supports JavaScript can be executed correctly. In order to achieve the "write once, everywhere" dream.In fact the most prominent place JavaScript program that can be used to do a lot of little things. No need to have a high-performance computers, software is only a word processing software and a browser without WEB server channels through their computer to complete everything.In short, JavaScript is a new description language, it can be among the clamp into the HTML file. JavaScript language can be done to respond to the needs of the user event (such as: form input) without any network transfer data back and forth, so that when a user enters a material, it does not pass through the servo end (server ) processing, and transmits it back to the process, and can be directly handled by the client (client) apps.Chapter III WEB page interaction information - Forms and FrameworkTo achieve a dynamic interactive web pages, you must master the form object (Form) and the frame object (Frames) more complex knowledge.3.1 Form BasicsForm object allows designers can form different elements interact with client users, and do not need to carry out before the first data entry, you can dynamically change the behavior of Web documents.3.1.1 Form objectForm (Form): It constitutes the basic element of a Web page. Usually a Web page has a form or several forms, using Forms [] array to achieve different forms of access.Methods 3.1.2 Form objectThe method of the form object is only one --submit () method, which main function is to achievea form of information submitted.3.1.3 Form object propertiesForm object properties include the following: elements name action target encoding method. In addition Elements addition, several other forms of state are reflected in the corresponding attribute identifier, which is usually a form of individual identification; and the array elements are often more than one form element values.3.1.4 Access form objectAccess form object in JavaScript by two methods: (1) the form by visitingFirst, you must specify the name of the form in the property of a form object, and after you can access the form by following identifies as: document.Mytable ().(2) to access the form by the arrayIn addition to using the form name to access the form, you can also use the form to access the form object array of objects. But note that, due to the form object is to provide a browser environment, and the array subscript browser environment provided is from 0 to n.3.1.5 references prerequisite formConditions in JavaScript want to form reference is: you must first create a form on the page to identify with, and forms part of the place before the reference definition.3.2 The basic elements of the formForm the basic elements of the buttons, radio buttons, check buttons, submit buttons, reset buttons, text boxes and other components.In JavaScript you want to access these basic elements must be achieved through a specific form elements corresponding array subscript or form element names. Each element is referenced by major property or method of the element.3.3 FrameworkFrame Frames main function is to "split" the window, so that each "small window" can show different HTM L files, interaction between different frameworks (interact), which means you can exchange messages and data between different frameworks. For example: Suppose you opened two frames, the first frame of the book catalog can be displayed, and the second frame displays specific content sections.Framework can be divided into different areas of the screen, each region has its own URL, through Frames [] array of objects to achieve access to different frameworks. Frame object itself is actually a class of window, it inherits all the characteristics of a window object, and has all the attributes and methods. Specific examples illustrate the use of the frameworkAccess Framework 3.4In front of us had to use document.forms [] to access the different elements to achieve a single form. In order to achieve access to the different elements of the framework of multi-form, you must use the window object Frames property. Frames property is also an array, he focused on the parent frame for each sub-frame is provided with one.网站设计与制作摘要论文将对个人网页设计与制作的方法、工具等展开研究和探讨。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
网络设计与规划中英文对照外文翻译文献现代企业面临的挑战尽管企业进行了大量的IT资本投资,但许多公司发现,大部分关键网络资源和信息资产仍处于自由状态。
实际上,许多"孤立"的应用程序和数据库无法相互通信,这是一种常见的商业现象。
2.The n: Service-Oriented ork Architecture (SONA)___'___(SONA) ___ is based on a service-oriented architecture (SOA) approach。
___.解决方案:面向服务的网络架构(SONA)___的面向服务的网络架构(SONA)是一个全面的框架,帮助企业克服网络设计和规划的挑战。
SONA基于面向服务的架构(SOA)方法,使企业能够将不同的应用程序和数据库集成到一个统一的网络中。
3.___ SONABy implementing SONA。
businesses ___ of benefits。
___。
increased security。
___。
___ security features。
such as identity and access management。
to protect critical n assets。
Finally。
___.SONA的好处通过实施SONA,企业可以获得许多好处,包括提高网络敏捷性、增加安全性和降低成本。
SONA通过提供灵活和可扩展的网络架构,使企业能够快速适应不断变化的业务需求。
此外,SONA提供了增强的安全功能,如身份和访问管理,以保护关键信息资产。
最后,SONA通过简化网络管理和减少对额外硬件和软件的需求,帮助企业降低成本。
4.nIn today's fast-paced business environment。
it is essential for ___。
secure。
and cost-effective ork architecture.结论在今天快节奏的商业环境中,企业必须拥有一个可以快速适应不断变化的业务需求的网络基础设施。
SONA提供了一个全面的框架,通过提供灵活、安全和具有成本效益的网络架构,使企业能够实现这一目标。
___。
___。
this has ___。
For instance。
without integratingns and n。
different departments such as sales。
customer service。
and purchasing will struggle to access customer records。
Many companies have experienced the negative consequences of thisblind n。
___.___ its ___ systems and ns。
___ ___ Advantage。
companies ___。
cloud computing。
and security to optimize their ns and ___n sharing。
companies ___。
With the Cisco Intelligent n ork。
companies ___ and stay ahead of the ___.Cisco Systems。
Inc。
is helping global IT ___ service-oriented architecture。
web services。
___ through their Intelligent n ork (IIN) program。
The IIN program aims to promote the development of integrated hardware and are to better align IT resources with business ___ into the existing ork infrastructure。
___.One area where IIN can be particularly beneficial is in power orks。
nal server-based ___ the ork。
IIN can help ns design and plan their orks to support this new approach to power n.Another ___ to support the deployment of service-oriented architecture (SOA)。
___ create flexible。
___ SOA。
___.___。
IIN can also help ns ___ with each other over the。
while ___ to run on a single physical server。
IIN can help ns design and deploy their orks to support these technologies。
___.Overall。
the Intelligent n ork program from Cisco Systems。
Inc。
is an important tool for global IT ns looking to address new ___ infrastructure。
___ and cost advantages。
___ such as SOA。
web services。
and n.In order to succeed in today's business world。
it is important to have a ork that is ___。
it is ___ and can support IT infrastructure platforms for all components。
One way to achieve this is through the use of Cisco® Service-Oriented orkArchitecture (SONA)。
which allows enterprises to optimize ns。
processes。
___ intelligence。
companies can increase the ___.n is a key factor in cing the amount of assets needed to support the same operating costs。
which in turn ___ that can be used to optimize the use of assets。
By dividing physical resources logically for use in all sectors of the n。
___。
___。
This can havea huge impact on business development。
customer loyalty。
and profits。
___.In n。
it is clear that ___ role in the success of modern ___ capabilities。
companies ___。
This can lead to increased customer n。
greater profits。
and a ___.The ___ ___ accelerate ns。
business processes。
and resources。
___ and its partners offer industry-leading ns。
services。
___.By ___ n system。
the ___ ___。
including data centers。
branch offices。
and ___.The Cisco Service-Oriented ork Architecture (SONA) ___ interactive services and infrastructure services。
It includes four layers: the n layer。
the interactive services layer。
the infrastructure services layer。
and the ork infrastructure layer.___ infrastructure services layer includes ork infrastructure n。
___。
including servers。
memory。
clients。
and WAN/MAN connectivity.Finally。
the SONA framework includes adaptive management ___ to ork design and planning。
___.In the interactive services layer。
___.At the n layer。
Cisco's n ___ with the ork fabric。
This will allow for the delivery of entire ns without the need for client ___。
n visibility and security will be maintained.By utilizing ___ SONA。
businesses ___ a simpler。
more flexible。
___。
___ commercial returns。
The use of Cisco SONA ___ IT efficiency and ___。
___.___ IT when utilizing ___ ___。
___ infrastructure.___'s Service-Oriented ork Architecture (SONA) allows ___ offers design。
support。
and ___.___ of having critical ork resources and n assets that ___ of IT ___。