计算机网络双语论文局域网的设计

上传人:痛*** 文档编号:146355574 上传时间:2022-08-31 格式:DOC 页数:30 大小:243KB
收藏 版权申诉 举报 下载
计算机网络双语论文局域网的设计_第1页
第1页 / 共30页
计算机网络双语论文局域网的设计_第2页
第2页 / 共30页
计算机网络双语论文局域网的设计_第3页
第3页 / 共30页
资源描述:

《计算机网络双语论文局域网的设计》由会员分享,可在线阅读,更多相关《计算机网络双语论文局域网的设计(30页珍藏版)》请在装配图网上搜索。

1、东北电力大学计算机网络双语论文 作 者: 学 号:院 系: 自动化工程学院 专 业: 自动化 题 目: 局域网的设计 指导教师: WANTechnologyAndVPNDesign Chapter1 Introduction.3Chapter 2 WAN.3Chapter 3 Routing7Chart 4 “infinite counting” question.14Chapter 5 Network Present Situation And Demand Survey.16Chapter 6 Realization of VPN Technology.18Chapter 7 Realiz

2、es The VPN Network Hardware Disposition.21Chapter 8 VPN Network Realization.23WAN Technology And VPN DesignAbstractIn recent years, the Internet with its rich internet applications can be spread in the community for its swift, internet technology, advanced, causing widespread concern in the enterpri

3、se. So the use of internet technology, the idea of the enterprise local area network (LAN), be applied to form an intranet Intranet become fashionable. So, to understand technology, wide area networks and wide area network to form a good network for our system is essential. Here, we compare the WAN

4、and LAN, come to their differences and linkages. The same time, connect to the network of the most important type of equipment - routers in the network and address of the principle of the work of routing in-depth analysis.In the familiar with the wide-area network and wide area network technology, b

5、ased on, we give an advantage of WAN, VPN technology, the words of a companys INTERNET Netcom had connected into a virtual local area network design. Through the hardware and software settings, use of IPsec security protocol of the VPN and encryption capabilities, to achieve between the two business

6、es across the Internet, internal network connections to achieve a secure internal data communications. The internal control system through the firewall policy on the VPN, the data can be an effective control and management of the enterprises internal network traffic has good scalability and manageab

7、ility. Key words: WAN technology, routing algorithm, router, VPN design, IP addressChapter1 IntroductionThe role of local area network from the original host connectivity, file and print services, turning around the client / server model of the large data streaming applications, Intranet, WWW browsi

8、ng, real-time audio / video transmission and other services has become increasingly large and growing data flow continues increase in network load. The same time, based on work group or department-level enterprise-class server solution has been replaced by the server to facilitate data flow to a fun

9、damental change in the status of the network backbone and further improved. These have all contributed to local area network technology from the bridge technology, the backbone routing technology to LAN switching technology transition. The development of switching technology LAN switch provides an u

10、nprecedented opportunity for development, but also greatly contributed to the LAN switch technology and product upgrading.With the development and application of information technology, information security, content in the continuous extension of the confidentiality of information from the initial d

11、evelopment of information integrity, availability, controllability and non-repudiation, which in turn developed into the attack (attack) , anti-(against), measured (test), control (control), tube (management), evaluation (assessment) and other aspects of the basic theory and implementation of techno

12、logy. Modern information systems in the information security and its core issue is the password Theory and Its Applications, based on credible information system structure to make and evaluation. Overall, the current field of information security the focus of attention by people mainly the following

13、 aspects: 1) Password theory and technology; 2) security protocol theory and technology; 3) The security architecture theory and technology; 4) information against the theory and technology; 5) network security and security products.Chapter 2 WAN2.1 IntroductionA WAN is a data communications network

14、 that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network lay

15、er. Figure 3-1 illustrates the relationship between the common WAN technologies and the OSI model.In general,a network technology is classified into one of three broad categories, depending on the size of networks that can be created LAN,MAN and WAN which can span sites in moltiple cities,countries

16、or continents.2.2 The Difference Between LAN And WANTo appreciate the distinction,it is important to understand how the size of a network is measured.We have seen that although LAB thchnologies are designed to be used at a single site,techniques exist that can extend the distance spanned.In particul

17、ar,a satellite bridge can connect two segments of a LAN over an arbitrary distance.However,a bridged LAN is not considered a Wide Area techonlogy because bandwidth limitations prevent a bridged LAN from serving arbitrarily many computers at arbitrarily many sites.The key issue that separates WAN tec

18、hnologies from LAN technologies is scalabilitya WAN must be able to grow as needed to connect many sites spread across large geographic distances,with many conputers at each site. For example,a WAN should be able to connect al the computers in a large corporation that has offices or factories at doz

19、ens of locations spread across thousands of square miles.Furthermore,a technology is not classified as a WAN unless it can deliber reasonable performance for large size networks.That is ,a WAN does not merely connect to many computers at many sitesit must provide sufficient capacity to permit the co

20、nputers to communicate simultaneouly.2.3 Forming A WANA group of switchboard interconnection constitutes WAN. A switchboard usually has many input/output interface, enables it to form many kinds of different topology, connects many computers. For example,figure 1 - 1 had demonstrated changes planes

21、WANs one kind of possibility situation which by four bawyos becomes with eight computer interconnections. Like the chart shows, WAN does not need interconnection and each connection between the symmetrical - switchboards capacity according to the anticipated current capacity to decide, and provides

22、the redundancy by against breakdown. If on the example shows, the stand 1 switchboard connects two computers, and has an exterior connection (e.g. a T 1 line) and another switchboard is connected. But only connects a computer in the stand 2 switchboards, and has in two exterior connection and other

23、stand switchboards is connected. The summary is as follows: the bawyo changes planes is WANs basic composition block. WAN changes planes the constitution by some interconnections bawyo and connects the computer from this. Other switchboards or the connection may when the need joins expands WAN.We ca

24、n summarize:A packet switch is the basic building block of Wide Area Networks.A WAN is formed by interconnecting a set of packet switches,and then connecting computers.Additional switches or interconnections can be added as needed to increase the capacity of the WAN.Simulation telephone channelISDNP

25、oint-to-point owner-use circuittypesCircuit switching, public, simulation.Circuit switching, public, digitPoint-to-point special-purposeBand width9.633.6kbit/sBRI 64128kbit/sPRI 2Mbit/sN64kbit/s1N30UsingAs data transmission physical linkAs high speed data transmission physical linkPhysical connectio

26、n which provides as two verticesConnection vertex numberNo limitedNo limitedThe expense limit, can only be very fewPerformance superiorityMay realize any two vertex connection, the extendibility is good, the expense is lowHigh speed, digital transmission The call time is short,May realize the applic

27、ation environment which between any two vertices correspondsPerformance weak trendThe band width is low, the reliability is badThe correspondence expense does not suit the long time correspondence the application environmentThe line correspondence expense is highCost wayInstallation fee ,month rent

28、,working costInstallation fee ,month rent ,working costThe installation fee, collects the month rent according to the band width and the distanceSwitch at site 1Switch at site 2Switch at site 3Switch at site 4high-speed connections between switchesComputers connected to network Figure2-1 A small WAN

29、 formed by interconnecting packet switchse.2.4 Examples of WAN TechnologiesMany technologied have been created for experimental and production use in Wide Area Networks.This section presents a few example technologies that illustrate sone of the diversity.Each kind of WAN connection technology compa

30、rison like chart 1.Chart 1 Each kind of WAN connection technology comparisonReads the table to be possible to know, regarding the circuit switching network, the ISDN high band width, the redundant reliability most has the attraction. Regarding the owner-use circuit, the remote communication can only

31、 use the point-to-point owner-use circuit, but as the line attachment, x DSLb will certainly to become the user the first choice connection technology. Regarding the packet switching network, the frame relay is the most attractive connection technology, but develops and the SMDS popularization uncea

32、singly along with the new application, SMDS and the ATM technology will definitely become the band width WANs main connection technology. Chapter 3 Routing3.1 Packet SwitchesHow can a WAN to hold many computers? The network own must be expandable. WAN is composed of many switchboards, each computer

33、connects on the switchboard, but is not a computer rents from that kind of computer direct Lian Daoling the data link to compose point-to-point. The WAN initial scale is the computer number which and links into by the stand number decided that other switchboards may the on demand probably join, use

34、for to connect other stands or the computer. in the WAN the basic electronic switchboard is called the bawyo to change planes (packet switch), because it a stand transmits entire Bao Cong to another stand. In the concept said that each bawyo changes planes is a small computer, has the processor and

35、the memory, as well as uses for to receive the contract award the input/output unit. In the modern high speed WANs bawyo changes planes by the special hardware constitution, in the early WANs bawyo changes planes, then trades the duty by the execution bawyo the ordinary microcomputer constitution. F

36、igure 3-1 had demonstrated includes two kind of input/output interface bawyo to change planes. in the chart the first kind of connection has the high speed, connects another bawyo through the digital circuit to change planes. The second kind of connection has the low speed, with connects a computer.

37、 Hardwares detail is decided in the WAN technology and needs the speed. The nearly all point-to-point communication way applies in WANs construction, including rents the data link, the optical fiber, the microwave, the satellite channel. Many WAN designs permits the customer choice Packet switch use

38、d to connect to other packet switchesUsed to connect to computersFigure 3-1 A packet switch with two types of I/O connectors:one type is used to connect to other packet switches,and the other is used to connect to computers.3.2 Store And ForwardUnlike a shared LAN that allows only one pair of comput

39、ers to exchange a frame at a given time,a WAN permits many computers to send packets simultaneously. The macrozonality package of exchange systems fundamental mode is saves the repeater (store and forward) to exchange. In order to complete the memory repeater function, the bawyo changes planes must

40、carry on the cushion in the memory to the package. The store operation is when the package arrives carries out: The bawyo changes planes the input/outputs the hardware to place a package transcription in the memory and informs the processor (e.g. use interrupt). Then carries on the repeater (f o r w

41、 a r d) to operate. The processor inspection package, decided that which connection should deliver, and starts the output hardware equipment to transmit the package. the use memory repeater patterns system can cause the package the quickest speed which may allow by the hardware to transmit in the ne

42、twork. More importantly, if has many packages to deliver the identical output unit, the bawyo changes planes can wrap has saved in the memory vacates until this output unit. For example, considered wraps in Figure 2 -1 to show in the network to transmit, the supposition stand 1 two computers nearly

43、simultaneously send out a package to a stand 3 computer, these two computers a package of transmission for switchboard. When each package arrives, in switchboards input/outputs the hardware to place the package in the memory and informs the processor, the processor to inspect each packages destinati

44、on address and knew that the package sends out the stand 3. When a package arrives, if stand 3 exports just right idle, the processor starts to transmit immediately; If just busy, the processor places the package with this export related formation. Once transmits a package, this export the extractio

45、n next package and starts from the formation to transmit. The summary is as follows: the macrozonality package of exchange system use saves - the repeater technology, will arrive at switchboards package to disperse into a formation, and at appropriate time continues to retransmit forward toward the

46、destination. This technology causes the bawyo to change planes can simultaneously arrive short-time arises suddenly the package to carry on the cushion.3.3 Physical Addressing In A WANLooking from the company computers angle, WANs operation is similar to the local area network. Each kind of WAN tech

47、nology precise definition computer when has received and dispatched the data uses the frame form, and arrived at on WANs each computer for the company to assign a physical address. When transmission frame to other computer, the sender must give the goal computers address. the many WAN use level addr

48、ess plan (hierarchical addressing scheme), causes the repeater efficiency to be higher. The level address divides into an address several parts. The simple the level address plan divides into an address two parts: The first part expresses the bawyo to change planes, the second part expresses Lian Da

49、ogai on switchboards computer. For example, Figure 3 - 2had demonstrated assigns changes planes on the company computers two section of type level address for a pair of bawyo. the chart use a pair of decimal base system integer to express that an address, including arrives at the bawyo to change pla

50、nes 2 on port 6 computers addresses for 2,6. Is expresses the address in the practical application with a binary number: The binary number some expression address first part, other, then expresses the second part. Because each address indicated with a binary number, the user and the application proc

51、edure may regard as the address integer - they not to need to know this address is the lamination.Switch 1Switch 2addressaddress2,11,2addresss address1,5 2,6Figure 3-2 Example of hierarchical address in a WAN3.4 Next-hop ForwardingThe packet switch must choose a way to transfer the contract award. I

52、f a package of destination is a direct connected computer, the bawyo changes planes sends out the package this computer. If a package of destination is the computer which another bawyo changes planes, the package should through lead to this switchboards high speed connection repeater. Must make this

53、 kind of choice, the bawyo changes planes must use package of the destination address.how does the bawyo change planes does not need to preserve arrives at all possible destinations the complete information. On the contrary, assigns the switchboard only contains to enable this package to arrive at t

54、he destination should finally to transmit as soon as under which stands (next hop) the information. The next station repeater (n e x t - h o pf o r w a r d i n g) this concept is similar to the airplane flight table. Supposes one to fly to Miamis passengers from San Francisco to discover that the ro

55、ute has three sections: The first section arrives at Russ from San Francisco, the second section from Dallas to Atlanta, the third section from Atlanta to Miami. The entire travels destination is the same: Miami, as soon as however stands in each airports under is dissimilar. When this passenger whe

56、n San Francisco, the next station is Dallas; When passenger when Dallas, the next station is Atlanta; when Atlanta, the next station is Miami. Figure 2 - 3 have demonstrated in the package of exchange network next station repeater technology:as the figure above shows, the next-hop information may ma

57、ke a table. In the table each item has listed a destination address as well as the corresponding next station. When to anteversion contract award, the switchboard inspection package of destination address, searches the item which matches with it, then next station which sections out this package sen

58、ding-out item. How in the chart did the example extol shows the bawyo to change planes 2 is transfers the contract award. After it receives the destination address is (3,5) package, this switchboard 4 (the bawyo changes planes the software this package sending-out connection usually to appoint for e

59、ach connection a small integer, this value in exchanges outside the aircraft not any significance, also does not appear in the package. In the chart the switchboard 2 connections are count from left to right), this connection path switchboard 3. When the package of destination address is (2,1), swit

60、chboard directly this package sending-out computer Chapter 4 Router4.1 Concept And FunctionThe router (Router) is one kind seeks the diameter responsibly the network equipment, it seeks for a traffic least network way in the interconnecting network from many ways to provide to the user the correspon

61、dence. The router uses in connecting in many logic the separated network. Provides the best correspondence way to the user, the router use routing list for the data transmission choice way, the routing list contains between the network address as well as various addresses the distance detailed list,

62、 the router use routing list search data packet from the current position to the destination address correct way. The router use least time algorithm or the optimal choice algorithm adjusts the information transmission the way.Generally speaking, the router function and the function prime task are c

63、arry on the memory repeater to the data packet, the concrete process is as follows:The first step: When the data packet arrives at the router, according to the network physical interfaces type, the router function transfers the corresponding link level functional module, explained that processes this data packet the link level agreement masthead. This step processing is quite simple, is mainly carries on the confirmation to the data integrity, like CRC verification, frame length inspection and so on.the second step: In the lin

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!