计算机专业英语第5章课件
《计算机专业英语第5章课件》由会员分享,可在线阅读,更多相关《计算机专业英语第5章课件(59页珍藏版)》请在装配图网上搜索。
1、1第5章ComputerNetworkTechnology 5.1ComputerNetworkBasics5.2InformationSecurity5.3WirelessNetworks5.4专业英语应用模块25.1ComputerNetworkBasics Agroupofcomputersandotherdevicesconnectedtogetheriscalledanetwork,andthetechnicalconceptofconnectedcomputerssharingresourcesiscallednetworking.Computersthatarepartofane
2、tworkcansharedata,messages,graphics,printers,faxmachines,modems,CD-ROMs,harddisks,andotherdatastorageequipment.3Fig.5-1Compositionofcomputernetwork4MainContentsoftheTextNetworkstructureNetworkadministratorTopologiesStarnetworkGridnetworkBusnetworkRingnetworkHybridnetwork5nNetworkscomeinavarietyofsiz
3、esandcomplexities.Generally,thebigger,themorecomplex,andthemoredifficulttomanage.(1)LocalAreaNetwork(2)BridgedLAN(3)SwitchedLAN(4)CampusAreaNetwork(5)RoutedNetwork(6)WideAreaNetwork6nThe Internet is a huge worldwide WANconsistingofthousandsofLANandmillionsofroutersandservers(Fig.5-2).7nNetworkadmini
4、stratorhasfullrightsandpermissions to all resources on a network.Theadministrator is usually responsible for installing,managing,and controlling servers and networkingcomponents.nAdministratorscanalsomodifythepropertiesofuseraccountsandthemembershipofgroups,createandmanageprinters,installprinters,sh
5、areresourcesandassignpermissionstothoseresources.8nThephysicaltopologydescribesthelayoutofthenetwork,justlikeamapshowsthelayoutofvariousroads,andthelogicaltopologydescribeshowthedataissentacrossthenetworkorhowthecarsareabletotravel(thedirectionandspeed)ateveryroadonthemap.Logicaltopologyisthemethodu
6、sedtopasstheinformationbetweenthecomputers.(1)Starnetwork(2)Gridnetwork(3)Busnetwork(4)Ringnetwork(5)Hybridnetwork9KeyWords accurate正确的,精确的annulus环backbone骨干,支柱contractor合同人,承包商diagnose诊断fashion风尚,时尚hierarchical分层的hybrid混合的merge使合并neighbor邻居,邻接10KeyWords permission许可,允许regular常规的,合格的router路由器spreads
7、heet电子表格token令牌,记号topology拓扑,结构upgrade升级,上升unreliable不可靠的11Notes 1Withoutanetwork,thedocumentshavetobeprintedoutsothatotherscaneditthemorusethem.译文:没有网络,就必须将文档打印出来才能供他人编辑或使用。本句的“Withoutanetwork”是条件状语,“sothat”引导的是目的状语从句。12Notes 2Iftheuserweretoconnecthiscomputertoothercomputers,he could share data on
8、 other computers,includinghigh-qualityprinters.译文:如果用户能把他们的计算机与其他计算机联在一起的话,他们就可以共享其他计算机上的数据,包括高性能的打印机。本句由“If”引导条件状语从句,“includinghigh-qualityprinters”是补语。13Notes3Arouterknowswherestuffis,evenifitsseveralroutersaway.译文:路由器知道信息的位置,即使要经过几个路由器的距离。本句的“wherestuffis”是宾语从句,“evenifitsseveralroutersaway”是让步状语从
9、句。14Notes 4 A grid network is a kind of computer networkconsistingofanumberofcomputersystemsconnectedinagridtopology.译文:网状网络是一种计算机网络,它以网状拓扑结构将许多计算机系统连接在一起。本 句 的“consisting of a number of computersystems”是现在分词短语作定语,修饰“network”,而“connectedinagridtopology”是过去分词短语作定语,修饰“computersystems”。15Notes5Actually
10、,thereareusuallytwocablessoadapterscanloopbacktoremarktheringifthereisabreak.译文:实际上,通常会有两条电缆,这样适配器就会在网络中出现故障时,可以沿环路返回重新构成环。本句的“soadapterscanloopbacktoremarkthering”是目的状语,而“ifthereisabreak”是条件状语。16ReadingMaterialOpticalCommunicationnOpticalcommunicationsystemsusehighcarrierfrequenciesinthevisibleorne
11、ar-infraredregionoftheelectromagneticspectrum.Theyaresometimescalledlight-wavesystemstodistinguishthemfrommicrowavesystems,whosecarrierfrequencyistypicallysmallerbyfiveordersofmagnitude(1GHz).nOpticalcommunicationsystemsdifferinprinciplefrommicrowavesystemsonlyinthefrequencyrangeofthecarrierwaveused
12、tocarrytheinformation.17nTheapplicationofopticalfibercommunicationsisingeneralpossibleinanyareathatrequirestransferofinformationfromoneplacetoanother.However,fiber-opticcommunicationsystemshavebeendevelopedmostlyfortelecommunicationsapplications.nThetelecommunicationapplicationscanbebroadlyclassifie
13、dintotwocategories,long-haulandshort-haul,dependingonwhethertheopticalsignalistransmittedoverrelativelylongorshortdistancescomparedwithtypicalintercitydistances(100km).185.2InformationSecuritynSecuritythreatstoanetworkcanbedividedintothosethatinvolvesomesortofunauthorizedaccessandallothers.Oncesomeo
14、negainsunauthorizedaccesstothenetwork,therangeofthingstheycandoislarge.nActiveattacksincludealteringmessagecontents,masqueradingassomeoneelse,denialofservice,andplantingviruses.19Main Contents of the TextnManagementsresponsibilityThenetworksecuritypolicyismanagementsstatementoftheimportanceandtheirc
15、ommitmenttonetworksecurity.Thepolicyneedstodescribeingeneraltermswhatwillbedone,butdoesnotdealwiththewaytheprotectionistobeachieved.20nThe network security policy needs to clearly statemanagements position about the importance ofnetworksecurityandtheitemsthataretobeprotected.nManagement must underst
16、and that there is no suchthingasaperfectlysecurenetwork.nFurthermore,networksecurityisaconstantlymovingtarget because of advances in technology and thecreativityofpeoplewhowouldliketobreakintoanetworkoritsattachedcomputers.21nAttackpreventionDifferentsecuritymechanismscanbeusedtoenforcethesecuritypr
17、opertiesdefinedinagivensecuritypolicy.Attackpreventionisaclassofsecuritymechanismsthatcontainswaysofpreventingordefendingagainstcertainattacksbeforetheycanactuallyreachandaffectthetarget.Animportantelementinthiscategoryisaccesscontrol,amechanismwhichcanbeappliedatdifferentlevelssuchastheoperatingsys
18、tem,thenetwork,ortileapplicationlayer.22nAccesscontrollimitsandregulatestheaccesstocriticalresources.nThisisdonebyidentifyingorauthenticatingthepartythatrequestsaresourceandcheckingitspermissionsagainsttherightsspecifiedforthedemandedobject.nAfirewallisanimportantaccesscontrolsystematthenetworklayer
19、.nThefirewallisacentralchokepointthatallowsenforcementofaccesscontrolforservicesthatmayrunattheinsideoroutside.23nAttackavoidanceSecuritymechanismsinthiscategoryassumethatanintrudermayaccessthedesiredresourcebuttheinformationismodifiedinawaythatmakesitunusablefortheattacker.Themostimportantmemberint
20、hiscategoryiscryptography,whichisdefinedasthescienceofkeepingmessagesecure.24nTheoriginalmessageiscalledplaintext.nThe process of converting this message through theapplicationofsometransformationrulesintoaformatthathidesitssubstanceiscalledencryption.nThe corresponding disguised message is denoted
21、asciphertext,and the operation of turning it back intoplaintextiscalleddecryption.nItisimportanttonoticethattheconversionfromplaintociphertext has to be lossless in order to be able torecover the original message at the receiver under allcircumstances.25nThetransformationrulesaredescribedbyacryptogr
22、aphicalgorithm.Thefunctionofthisalgorithmisbasedontwomainprinciples:substitutionandtransposition.nMostsystemsinvolvemultiplestepsoftranspositionandsubstitutiontobemoreresistantagainstcryptanalysis.26KeyWordsanticipate预料,预测brute暴力的,粗暴的choke要塞,拥塞ciphertext密文creativity创造力,创新cryptographic加密的,密码的decode译码
23、denial否认,拒绝denote表示,意味着disguise伪装,借口eavesdrop偷听,窃听27KeyWordsencryption加密hostile敌人,敌对分子interference冲突,干扰intruder闯入者,侵入者lossless无损的observation观察,观测overt公开的,公然的,明显的plaintext明文separation分离,隔离,隔开upgrade升级,提高28Notes1Thatrequiresfollowthroughandcommunicationwithallemployeessothattheyunderstand the emphasis
24、 and importanceseniormanagementisplacingonsecurity.译文:这需要后续通过与所有员工的沟通,使他们认识到高层管理人员在安全上布置的重点和重要性。本句的“sothat”引导目的状语从句。29Notes2Themostcommonformofaccesscontrolusedinmulti-usercomputersystemsareaccesscontrollistsforresourcesthatarebasedontheuserandgroupidentityoftheprocessthatattemptstousethem.译文:在多用户计算
25、机系统中,最常用的访问控制形式是资源访问控制清单。清单是建立在进程中想要使用这些资源的用户和群的身份基础上的。本句的“usedinmulti-usercomputersystems”作定语,修饰“accesscontrol”,“thatarebased”是修饰“accesscontrollists”的定语。30Notes3Whenaresourceshouldbeaccessed,thesystem looks up the user and group in theaccesscontrollistandgrantsordeniesaccessasappropriate.译文:当一个资源被请
26、求访问时,系统会在访问控制清单中查找用户和群并适当授权访问或拒绝访问。本句的“When”引导时间状语从句,“in theaccesscontrollist”作定语。31Notes4Thefirewallpreventsattacksfromtheoutsideagainstthemachinesintheinsidenetworkbydenyingconnectionattempts from unauthorized parties located outside,inaddition,afirewallmayalsobeutilizedtopreventusersbehind the fi
27、rewall from using certain services that areoutside.译文:防火墙通过拒绝来自外部的未授权方的连接企图,从而防止来自外部的对内部网络中的机器的攻击。除此之外,防火墙还可以用来阻止墙内用户使用外部服务。这是一个长句,由“inaddition”连接起两个并列子句,“by denying connection attempts from unauthorizedpartieslocatedoutside”是方式状语,“behindthe”作定语。32Notes5The information is preprocessed at thesender b
28、efore it is transmitted over thecommunicationchannelandpost-processedatthereceiver.译文:信息在通信渠道中传播之前由发送者进行了预处理,并且接收者收到信息后也要进行处理。本句采用被动语态,主语是“Theinformation”,谓 语 为“preprocessed”和“post-processed”,构成并列句,“beforeitistransmittedoverthecommunicationchannel”是时间状语。33ReadingMaterialTechniquesforInternetSecurity
29、NetworkFirewallsnThepurposeofanetworkfirewallistoprovideashellaroundthenetworkthatwillprotectthesystemsconnectedtothenetworkfromvariousthreats.Thetypesofthreatsafirewallcanprotectagainstinclude:UnauthorizedaccesstonetworkresourcesDenialofserviceMasquerading34Fig.5-3 Network structure example35Digita
30、lCertificateandAuthenticationnDigitalcertificateisanidentitycardcounterpartinthecomputersociety.nAuthenticationisanimportantpartofeverydaylife.Thelackofstrongauthenticationhasinhibitedthedevelopmentofelectroniccommerce.36DigitalSignaturenAdigitalsignatureisanelectronicsignaturethatcanbeusedtoauthent
31、icatetheidentityofthesenderofamessageorthesignerofadocument,andpossiblytoensurethattheoriginalcontentofthemessageordocumentthathasbeensentisunchanged.nAdigitalsignatureisastringofbitsattachedtoanelectronicdocument,whichcouldbeawordprocessingfileoranE-mailmessage.375.3WirelessNetworksnWirelesstechnol
32、ogies,inthesimplestsense,enableoneormoredevicestocommunicatewithoutphysicalconnectionswithoutrequiringnetworkorperipheralcabling.nWirelessnetworksserveasthetransportmechanismbetweendevicesandamongdevicesandthetraditionalwirednetworks(enterprisenetworksandtheInternet).38Main Contents of the TextnWire
33、lesslocalareanetworks(WLAN)nBluetoothnWirelessnetworkhavemanyusesnsecureyourwirelessnetworknWirelessaccesspoints39nAnaccesspointcommunicateswithdevicesequippedwithwirelessnetworkadaptors;itconnectstoawiredEthernetLANviaanRJ-45port.nAccesspointdevicestypicallyhavecoverageareasofupto300feet(approximat
34、ely100meters).nThis coverage area is called a cell or range.Usersmovefreelywithinthecellwiththeirlaptoporothernetworkdevice.nAccess point cells can be linked together to allowusers to even“roam”within a building or betweenbuildings.40nInrecentyears,wirelessnetworkinghasbecomemoreavailable,affordable
35、,andeasytouse.nWirelessnetworkhavemanyuses.Forexample,youcansendE-mail,receivetelephonecallsandfaxesandreadremotedocumentsinyourtravel.nIfyouareusingwirelesstechnology,orconsideringmakingthemovetowireless,youshouldknowaboutthesecuritythreatsyoumayencounter.41nSo,ifyourneighborhoodiscloselysettled,or
36、ifyouliveinanapartmentorcondominium,failuretosecureyourwirelessnetworkcouldpotentiallyopenyourInternetconnectiontoasurprisingnumberofusers.nDoingsoinvitesanumberofproblems:ServiceviolationsBandwidthshortagesAbusebymalicioususersMonitoringofyouractivityDirectattackonyourcomputer42nWireless access poi
37、nts can announce theirpresence to wireless-enabled computers.Thisisreferredtoas“identifierbroadcasting”.nManypublicaccesspointsarenotsecured,andthetraffictheycarryisnotencrypted.nThiscanputyoursensitivecommunicationsortransactionsatrisk.43KeyWordsabuse欺骗affordable负担得起Bluetooth蓝牙cellular蜂窝的,多孔的cordle
38、ss无绳的,不用电线的coverage范围,规模disaster灾害,天灾diverse多种多样的,不同的fashion方式,风格headphone耳机inability无能,无能为力44KeyWordsinfrastructure基站,基础设施laptop微型便携式(电脑)fleet船队,车队malicious有恶意的,蓄意的nickname诨名,绰号repairperson维修人员roam漫游savvy精明的,有见识的unpredictable无法预言的violation侵害,违犯wavelength波长wireless无线的,无线电的45Notes1Wirelesstechnologie
39、srangefromcomplexsystems,suchaswirelesslocalareanetworks(WLAN)andcellphonestosimple devices such as wireless headphones,microphones,andotherdevicesthatdonotprocessorstoreinformation.译文:无线电技术的范围从复杂的系统如无线局域网和手机到简单的设备如无线耳机、麦克风以及其他不用来处理或储存信息的设备。本句有两处由“such as”引导的同位语结构,“thatdo”作定语。46Notes2Unlikeatraditio
40、nalLAN,whichrequiresawiretoconnectauserscomputertothenetwork,aWLANconnectcomputersandothercomponentstothenetworkusinganaccesspointdevice.译文:与需要一根线把用户的计算机与网络连接的传统局域网不同,无线局域网使用一个接入点装置把计算机和其他组成部分连接到网络。本句中“UnlikeatraditionalLAN”作状语,“which”引导的是非限定性定语从句,修饰“atraditionalLAN”,“usinganaccesspointdevice”作方式状语。
41、47Notes3Ifyoufailtosecureyourwirelessnetwork,anyonewithawireless-enabled computer within range of your wirelessaccesspointcanhopafreerideontheInternetoveryourwirelessconnection.译文:如果你不能确保你的无线网络的安全,任何拥有一台能激活无线网络的计算机的人只要在你的无线接口范围之内就能通过你的无线连接免费上互联网。本句中“If”引导的是条件状语从句,“withawireless-enabledcomputerwithin
42、rangeofyourwirelessaccesspoint”作定语,修饰主语“anyone”。48Notes4Whenyouuseawirelessrouteroraccesspointtocreateahomenetwork,youtradewiredconnectivityforconnectivitydeliveredviaaradiosignal.译文:当你使用一个无线路由器或接入点去建立一个家庭网络时,你用有线连接交换到由无线电信号传送的连接。本句由“When”引导时间状语从句。49Notes5 Because your connection is being transmitte
43、d“in theclear”,malicious users can use“sniffing”tools to obtainsensitive information such as passwords,bank accountnumbers,andcreditcardnumbers.译文:由于你的连接被畅通无阻地传送出去,恶意用户能够使用“嗅探”工具来获得敏感信息,诸如密码、银行帐号以及信用卡号。本句由“Because”引导原因状语从句,“suchas”后面的部分作为“sensitiveinformation”的同位语。50ReadingMaterialInternetApplicatio
44、nsnE-mailreferstothetransmissionofmessagesovercommunicationsnetworks.nE-mailusestheofficememoparadigminwhichamessagecontainsaheaderthatspecifiesthesender,recipients,andsubject,followedbyabodythatcontainsthetextofthemessage.nAnE-mailaddressisastringdividedintotwopartsbythecharacter(pronouncedas“at”).
45、Thefirstpartisamailboxidentifier,andthesecondstandsforthenameofthecomputeronwhichthemailboxresides.51nAsearchtoolisacomputerprogramthatperformssearches.nAsearchmethodisthewayasearchtoolrequestsandretrievesinformationfromitsWebsite.nAsearchbeginsataselectedsearchtoolsWebsite,reachedbymeansofitsaddres
46、sorURL.nEachsearchenginehasitsownwayofassigningrelevance.Higherweightingisnormallygiventotermsinthetitleandthefirstfewwordsinadocument.52nThemobileWebreferstoaccesstotheWorldWideWeb,i.e.theuseofbrowser-basedInternetservices,fromahandheldmobiledevice,suchasasmartphoneorafeaturephone,connectedtoamobil
47、enetworkorotherwirelessnetwork.nMobileWebaccesstodaystillsuffersfrominteroperabilityandusabilityproblems.53nMobileInternetreferstoaccesstotheInternetviaacellulartelephoneserviceprovider.nItiswirelessaccessthatcanhandofftoanotherradiotowerwhileitismovingacrosstheservicearea.nAmobilephone,suchasasmart
48、phone,thatconnectstodataorvoiceserviceswithoutgoingthroughthecellularbasestationisnotonmobileInternet.545.4 专业英语应用模块专业英语应用模块5.4.1 Self-Introduction5.4.2 Self-Recommendation55n自我介绍是向别人展示自己的一个重要手段,这个环节直接关系到你给别人的第一印象。自我介绍也是一种说服的手段和艺术。n自我介绍的时间不长,一般谈谈学历、个人基本情况、工作经历、社会实践、对于应聘职位和行业的看法等。n自我介绍的原则:开门见山,简明扼要,一
49、般最好不要超过三分钟。实事求是,不可吹得天花乱坠。突出长处,但要与申请的职位有关。善于用具体生动的实例来证明自己,说明问题。介绍完后,要问面试官还想知道关于自己的什么事情。5657n自荐信与你的履历表一样重要,一份好的自荐信能为你赢得一个面试机会。履历表告诉别人你的经历和你的技能,而自荐信告诉别人你能为雇佣者做些什么。1.自我介绍和你是如何得知该职位的招聘信息的示例如下:Iamthefourthyearsstudent,majorincomputerscience.IwillgraduateinJuly.Iamgladtoknowyourcompanyishiringwebsitedesign
50、ers,acustomerofyourcompanyrecommendedme.582.自我推荐n简短地叙述自己的才能,特别是这些才能将满足公司的需要。n该自荐信应促使招聘者想进一步阅读你的简历。示例如下:Iwasrewardedasmyactivityandcreation,duringIworkedforBlueSkyNetworkcompanyasacomputernetworkmaintainer.593.致谢及进一步行动的要求n信的结尾部分不仅仅只是对你的雇主花时间读你的信表示感谢,还要表明你的下一步计划。示例如下:Iwillconnectwithhumanresourcedepartmentintwoweeks,itisconvenienttoarrangethetimetocheckmyqualification.
- 温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。