密歇根大学的网络课程Internet history---第一周视频学习笔记

喜你入骨 提交于 2019-12-04 02:30:39

Internet History

This material mainly introduces the following parts:

- Some outstanding figures in the history of Internet development
- Several important stages in the history of the Internet
Phone Line Networking 电话网络
  • Dial-Up Access 拨号访问
  • Data Transfer with Leased Lines 使用租用线路进行数据传输

    Store and Forward Networking 存储和转发网络
  • Typically specialized in Mail
  • E-Mail could make it across the country in six hours to about 2 days

then some valuable questions about research networks were raised during 1960-1980’s

came up with the following solution:

Efficient Message Transmission: Packet Switching 分组交换
  • Challenge: in a simple approach, like store-and-forward, large messages block small ones
  • Break each message into packets 消息拆分成包
  • Can allow the packets from a single message to travel over different paths, dynamically adjusting for use 在不同路径上传输
  • Use special-purpose computers, called routers, for the traffic control

    Shared Network 共享网络
  • Supercomputers 超级计算机
  • NSF Net 美国国家科学基金会资助的一个网络以使得研究人员能够共享他们的研究成果
  • CERN 欧洲核子研究组织

    The Explosive Growth of the Web 网络的爆炸式增长
  • Mosaic - Netscape - Mozilla - Firefox
  • Netscape, JavaScript and FireFox
  • World-Wide-Web Consortium

Security

I learned briefly from this information:
  • Some people will want to benefit from your information
  • "Perfect security" is unachievable

    下面介绍了一些术语(Terminology)
  • Confidentiality 保密
    -- Prevent unauthorized viewing of private information
  • Integrity 完整性
    -- Information is from who you think it is from and has not been modified since it was sent
  • Plaintext (明文) is a message that will be put into secret form.
  • Ciphertext (密文) is a transformed version of plaintext that is unintelligible to anyone without the means to decrypt
  • The transformation of plaintext to ciphertext is referred to as encryption(加密).
  • Returning the ciphertext back to plaintext is referred to as decryption(解密).
    The strength of a cryptosystem is determined by the encryption and decryption techniques and the length of the key.
  • Two basic types of cryptosystems exist, secret-key(秘钥)and public-key(公钥).
  • In a secret-key scheme, the key used for encryption must be the same key used for decryption. Also called symmetric-key cryptosystem.
  • Secret-key cryptosystems have the problem of secure key distribution to all parties using the cryptosystem.

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!