A. 英語專業畢業論文
英語專業畢業論文
大學生活在不經意間即將結束,畢業生要通過最後的畢業論文,畢業論文是一種有準備、有計劃、比較正規的、比較重要的檢驗大學學習成果的形式,那麼什麼樣的畢業論文才是好的呢?以下是我幫大家整理的英語專業畢業論文,僅供參考,大家一起來看看吧。
淺析商務英語教學中計算機網路利弊
摘要: 本文通過分析計算機網路在商務英語中的利與弊,探討計算機網路在商務英語教學中的作用,指出隨著信息技術的發展,計算機網路的作用早已遠遠超出其輔助功能。培養復合型涉外商務英語人才,應打破傳統的商務英語教學模式,建立新的以學生為中心的教學模式,強調商務環境下的語言訓練。同時,學生不僅要掌握商務英語知識和技能,也要掌握計算機方面的知識和技能。
關鍵詞: 商務英語教學;計算機輔助;教學模式
隨著全球經濟一體化和我國對外經貿的迅速發展,社會需要越來越多既懂英語,又懂商務的高素質復合型人才。在培養復合型涉外商務英語人才的過程中,商務英語起到了重要作用。通過商務英語教學,一方面,學生可以掌握國際貿易主要術語和必要的商務知識,熟悉經貿業務流程,提高聽、說、讀、寫、譯方面的基本能力;另一方面,學生還能掌握商務基本禮儀、經濟、貿易等基礎理論知識,提高跨文化交際能力,從而最終能夠勝任用英語進行對外經貿活動的工作,成為復合型涉外商務英語人才。
一、計算機網路對商務英語教學環境的改善。
商務工作的過程實質上是一種交際過程。商務英語的教學目標是培養在國際商務環境中用英語進行溝通的能力。傳統的商務英語教學環境基本上局限在教室和課本上,給學生提供的是零商務環境,導致學生在走上工作崗位時極有可能遭遇「環境休克」,難以將所學知識應用到實際工作中去。
計算機輔助語言學習在我國已經得到重視和應用,並使許多新的教育理念在英語教學中得以實現。
(一)計算機網路能夠營造自主學習環境。
Henri Holec提出,學校應該設立兩個教學目標:一是幫助學生獲得語言和交際能力;二是幫助學生獲得自主學習能力。
在商務英語教學過程中,計算機網路使學生能夠利用多媒體課件和網路豐富的學習資源進行自學,而不受時間、地點的限制。學生可以根據自身需求和興趣愛好,自主選擇學習內容,調控學習進度,探索學習方法,掌握與商務英語相關的經濟、貿易、金融等知識,不斷在自身原有經驗的基礎上建構其對新知識的理解並發展其認知結構。
除了豐富的商務知識外,計算機網路還為學生提供了大量的語言資料,使學生可以不必依賴教師和教材。
各種媒體資源及專門的商務英語教學網站為學生提供了豐富的資源,學生可以自主選擇閱讀或通過原聲電影、英文歌曲、英文廣播等多種手段,提高商務英語的聽、說、讀、寫、譯基本能力。
以計算機網路為媒介,學生還可以通過電子郵件( e- mail) 、聊天室( chatroom) ,或者MOO (multiuser domainobject oriented)進行一人對一人、一人對多人,或多人對多人的共時( synchronous) ,或非共時交流( asynchronous) ,解決自主學習時遇到的困難。
(二)多信息通道的配合使用有利於改善信息的識記效果。
喬姆斯基(Avram Noam Chomsky)曾指出:「我們大概應該努力為正常人本身擁有的本能的直觀判斷能力創造一個豐富的語言環境。」人類自然接受信息是通過人的各種感官來進行的,其中包括視覺、聽覺、觸覺、嗅覺和味覺等,其中視覺和聽覺起著最重要的作用。
多媒體技術在商務英語教學中,可以提供豐富的畫面、視頻、影像和文字,使學生在學習過程中視聽結合,圖像和聲音信息同步輸入,有效刺激大腦皮層,提高記憶能力,從而比傳統的、單一的以語言為主的教學方式達到更好的教學效果。
(三)大量真實的商務英語材料使語言輸入有足夠的「重復率」。
Van Patten在談到語言吸收時認為:「能夠被吸收的語言知識在語言輸入中必須有足夠的『重復率』( frequen2cy) 和『凸顯性』( salience) 」。計算機、網路和商務英語教學的有機結合,將商務活動方方面面的情景真實地展現在學生面前。學生不僅可以通過計算機、網路找到關於接待、談判、會議、詢盤、發盤、裝運、保險等各種商務活動的文字材料,也可以找到相關的聽力、視頻、音像資料。
就商務活動的某一主題而言,比如詢盤,學生可以在網上找到多種對話資料、聽力資料、閱讀資料、寫作資料及文化背景資料。多種資料中商務術語、商務知識的重復出現,使學生潛移默化地提高了語言運用能力,擴大了自己的知識層面。另外,通過計算機網路,教師可指導學生通過網上實時進行國際貿易業務實訓,或通過教學軟體進行貿易流程的訓練。這種真實的商務英語材料不受課本知識的局限,能夠激發學生的學習興趣和熱情,將學生的理論知識和真實的商務環境連接起來,幫助學生有效地克服「環境休克」現象。
二、商務英語教學中計算機網路應用的'誤區。
與傳統的商務英語教學相比,計算機網路的應用使商務英語教學朝著個性化學習和自主式學習的方向發展。
但是,在許多高校的商務英語教學課堂上,教學的本質並未發生改變,還是一種傳統的以教師為中心的教學模式。
與傳統的黑板+粉筆+錄音機的教學形式相比,只是多了光碟、計算機和網路,商務英語課堂教學仍是教師講、學生聽的局面。以商務英語教學中的課文講解為例,一方面,教師過度依賴課件。教師往往將課本內容完全照搬到多媒體課件中,然後藉助課件進行講解。即使學生課後上網學習和網路版的內容也基本是課本內容的重復,意義不大。在這種情況下,要激發學生的學習潛能,促進學生自主化學習和突出學生的個性化學習之中,就顯得非常困難。另一方面,計算機其及網路自身客觀上存在局限性,多媒體教學固然生動,但是教師往往在教學過程中給學生提供過大的信息量,而忽視了學生的個體差異。學生在短時間內獲得大量的教學信息,在一定程度上抑制了學生的想像力,不利於其解決問題、分析問題能力的發展。
由此可見,在許多高校的商務英語課堂上,普遍認為計算機作為輔助工具用於教學的目的是要幫助教師提高教學手段,其特點是:第一,輔助教師的演示工具(輔助教授難點或重點) ;第二,教學內容基於課本;第三,學生是被灌輸知識的對象;第四,不改變教學內容和教學結構;第五,以教師為中心的教學結構。教學上使用的計算機被認為能夠增強教師所傳授的信息,因為信息被放大在屏幕上。因此,計算機作為一種技術只能起到增強教學效果的輔助作用,而不能真正成為人們用以解決實際問題的工具(Morrison and Lowther, 2005) 。
當今時代,隨著信息技術的發展,計算機網路的作用早已遠遠超出其輔助功能。尤其是在商務領域,人和計算機已經成為一個整體,不能分離。商務活動中,許多具體業務都必須通過計算機及其網路來完成。比如,在電子商務( e - business)中,詢盤、發盤、談判、簽訂合同等都需要通過電子郵件( e - mail) 、網路聊天等方式來完成。
如果單把計算機網路看做是輔助的工具,是遠遠不夠的。
因為計算機輔助大大削弱了計算機網路本身的功能和作用,不能夠從根本上幫助培養復合型涉外商務英語人才,因此需要打破傳統的商務英語教學模式,建立新的以學生為中心的教學模式,使學生的知識來源可以擴大到教育網站、資料庫、電子書、音像製品、學習課件、報刊雜志、電視廣播、教科書、虛擬圖書館、學習軟體、網路交流平台及其它材料,教師不再是課堂上的「知識灌輸者」,學生變成知識的主動構建者。同時,學生也要在學習商務英語知識、技能的同時,掌握計算機方面的知識和技能。
參考文獻:
[ 1 ]陳堅林。 大學英語教學新模式下計算機網路與外語課程的有機整合———對計算機「輔助」外語教學概念的生態學考察[ J ]. 外語電化教學, 2006, (12) : 23.
[ 2 ]黃秀紅。 商務英語自主學習環境的構建策略[ J ]. 教育傳播與技術, 2006, (2) : 15.
[ 3 ]肖芳菲。 多媒體網路環境下的大學英語教學芻議[ J ]. 瓊州大學學報, 2007, (2) : 37.
[ 4 ] Holec H. Autonomy and Foreign Language Learning[M ]. Oxford: Pergamon, 1981.
[ 5 ]Morrison, G. R and Lowther, D. L. Integrating Comput2er Technology into the Classroom [M ]. Pearson EcationAsia L imited, 2005.
;B. 計算機網路安全英語論文及翻譯求助
Computer network security and to guard against
Abstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system.
Key words: computer; network; security; prevent
In the information age, information can help groups or indivials so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable.
First, the concept of computer network security
International Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not e to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications.
In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new challenges.
Second, computer network security status quo
Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control proceres to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security challenge.
Third, computer network security precautions
1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources.
On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus.
2, network firewall technology
Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks.
3, security encryption technology
Encryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know.
4, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.
In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security instry is a future with the development of new technologies and the continuous development of instry.
References:
[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).
[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.
[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.
[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Instry, 2003.
[5]孫小剛, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.
僅供參考,請自借鑒。
希望對您有幫助。
補充:您可以隨時找我,我會幫你翻譯好發過去,隨時歡迎您的咨詢。
C. 計算機網路論文的摘要翻譯(漢譯英)/謝絕用機器翻譯,謝謝!
在Internet飛速發展的今天,互聯網成為人們快速獲取、發布和傳遞信息的重要渠道,它在人們政治、經濟、生活等各個方面發揮著重要的作用。 Today, Internet is developed at full speed, Internet becomes people and obtains, releases and transmits the important channel of information fast, it is playing an important role on such all respects as people's politics, economy, living,etc.. 校園網是利用現代網路技術、多媒體技術及Internet技術等建立起來的學校內部管理和通信應用網路。 Campus network utilizes modern network technology, multimedia technology and Internet technology,etc. Dr.eye: inside the school set up management and communication use the network. 信息化校園就是以校園網和必要的信息服務設備為載體,有豐富的共享軟體和方便的工具支持,並包含有相當數量的教育信息資源,集教、學、管理、娛樂為一體的新型信息化的工作、學習、生活的網路環境。 The information-based campus regards campus network and essential information service equipment as carriers, abundant shared software and convenient tool are supported, include a great deal of ecation information resources, network environment of new-type and informationalized work, study and life of incorporating teach, study, the management, amusement into an organic whole.
本設計重點闡述了校園計算機網路系統的設計和實現方法,包括系統設計原則、網路技術選擇、綜合布線系統、網路拓撲結構及設備選型,本設計可以實現各個模塊的基本功能,滿足校園內部各部門的需求,最終設計成一個簡潔、花費少、效果好的實用型校園網。Originally design the design explaining the computer network system of the campus especially and implementation method, including systematic design principle, network technology are chosen, comprehensive wiring system, topological structure of the network and equipment selecting type, originally design the basic function that can realize each mole, meet every department's within the campus demands, design one succinct spending few, effectual practical campus network finally.
D. 關於計算機方面的英語論文 急需!!!!1000字
內容提要:本文就機房管理中如何最大限度給學生提供個性化學習空間,如何更高效地管理機房計算機介紹了七種實用技術方法。
關鍵詞:硬碟拷貝、 硬碟還原、 網路拷貝、 多重引導、 虛擬光碟機、終端服務、桌面共享
摘 要: 機械制圖與計算機輔助設計CAD整合式教學具有學用結合、提高教學效果及繪圖效率、培養的人才適應社會需要等優點。本文就機械制圖與計算機輔助設計CAD兩門課程整合的教學改革進行探討和研究。……
關鍵詞: 機械制圖、計算機輔助設計CAD、教學改革、二維繪圖、三維繪圖
E. 高分跪求計算機英語論文
【英文篇名】 Switch Router Operating System Based on a General Operating System
【下載頻次】 ☆
【作者】 潘登; 徐佩霞;
【英文作者】 PAN Deng; XU Pei xia (Department of Electronic Engineering and Information Science; University of Science and Technology of China; Hefei; 230027; China);
【作者單位】 中國科學技術大學電子工程與信息科學系; 230027;
【文獻出處】 數據採集與處理 , Journal of Data Acquisition & Processing, 編輯部郵箱 2003年 04期
期刊榮譽:中文核心期刊要目總覽 ASPT來源刊 CJFD收錄刊
【中文關鍵詞】 交換式路由器; 通用操作系統; 路由器操作系統;
【英文關鍵詞】 switch router; general operating system; router operating system;
【摘要】 提出了一種將通用操作系統及其上層路由軟體移植到交換式路由器平台上的方案。此方案可以向上屏蔽交換式路由器與傳統的路由器體系結構上的區別 ,從而把通用操作系統及其上層路由軟體移植到交換式路由器的平台上 ;同時兼顧數據通信和管理維護方面的需求 ,為上層路由軟體提供了與傳統路由器相同的介面 ,從而使基於通用操作系統的路由軟體可以在不損失可升級性的條件下快速移植到交換式路由器上。實際應用證實了該方案具有良好的靈活性和兼容性
【英文摘要】 A new solution to port general operating systems and their routing software to switch router is presented. The solution shields the architecture difference between traditional router and switch router to application level software, thus it may support general operating system and their routing software on switch router platform. The solution is also considered as requirements of both data communication and control functions. And same ways of the access and control of the router are provied as traditional ro...
【基金】 國家 8 63計劃 ( 863 -3 1 7-0 1 -99)資助項目
【DOI】 CNKI:SUN:SJCJ.0.2003-04-017
【分類號】 TN915.05
【正文快照】 引 言路由器最重要的工作是根據 IP包頭和路由、過濾規則轉發 IP包。其他功能還包括路由表的維護與路由器系統的維護。實際上路由器可以看成是一種針對 IP網路路由需求而設計的專用計算機。隨著網際網路所承載的業務的演進 ,網際網路對於路由器性能的要求也日漸提高。在交換式路
看看這一篇
文章編號: 100429037 (2003) 0420450205
一種基於通用操作系統的交換式路由器操作系統實現
潘 登, 徐佩霞
(中國科學技術大學電子工程與信息科學系, 合肥, 230027)
摘要: 提出了一種將通用操作系統及其上層路由軟體移植到交換式路由器平台上的方案。此方案可以向上屏蔽
交換式路由器與傳統的路由器體系結構上的區別, 從而把通用操作系統及其上層路由軟體移植到交換式路由器
的平台上; 同時兼顧數據通信和管理維護方面的需求, 為上層路由軟體提供了與傳統路由器相同的介面, 從而使
基於通用操作系統的路由軟體可以在不損失可升級性的條件下快速移植到交換式路由器上。實際應用證實了該
方案具有良好的靈活性和兼容性。
關鍵詞: 交換式路由器; 通用操作系統; 路由器操作系統
中圖分類號: TN 915105; TP393 文獻標識碼:A
基金項目: 國家863 計劃(8632317201299) 資助項目
收稿日期: 2003203229; 修訂日期: 2003206215
Switch Router Operating System Based on
a General Operating System
PA N D eng , X U P ei2x ia
(Department of Elect ronic Engineering and Info rmat ion Science,
U niversity of Science and Techno logy of Ch ina, Hefei, 230027,Ch ina)
Abstract: A new so lu t ion to po rt general operat ing system s and their rou t ing sof tw are to
sw itch rou ter is p resen ted. The so lu t ion sh ields the arch itectu re difference betw een t radit ional
rou ter and sw itch rou ter to app licat ion level sof tw are, thu s it may suppo rt general operat ing
system and their rou t ing sof tw are on sw itch rou ter p latfo rm. The so lu t ion is also con sidered as
requ iremen t s of bo th data commun icat ion and con t ro l funct ion s. A nd same w ays of the access
and con t ro l of the rou ter are p rovied as t radit ional rou ter, so rou t ing sof tw are of the general
operat ing system may be po rted to sw itch rou ter p latfo rm rap idly w ith the upgradeab le
f lex ib ility. P ract ical design app roves that the so lu t ion has a good compat ib ility and f lex ib ility.
Key words: sw itch rou ter; general operat ing system; rou ter operat ing system
引 言
路由器最重要的工作是根據IP 包頭和路由、
過濾規則轉發IP 包。其他功能還包括路由表的維
護與路由器系統的維護。實際上路由器可以看成是
一種針對IP 網路路由需求而設計的專用計算機。
隨著網際網路所承載的業務的演進, 網際網路對於路由
器性能的要求也日漸提高。在交換式路由器中, 包
轉發等絕大多數處理已經轉移到以埠為中心的
硬體中完成, 只有路由規則的生成與維護、網路管
理和系統維護等比較復雜的工作仍由軟體部分完
成。
實用中路由器所採用的操作系統可分為三大
類: (1) 以Cisco 的IO S 為代表的專用操作系統, 常
見於網路骨幹節點; (2) 以V xWo rk s 為代表的嵌
入式系統, 常見於小型辦公ö家用接入設備上; (3)
採用通用操作系統的則在骨幹節點和用戶接入設
備上都有這類設備。例如Jun iper 的路由產品就采
用L inux 作為操作系統。通用操作系統上的各種路
由、網管軟體的開發已經有相當長時間, 其功能、性
能、穩定性和升級靈活性都很優秀, 但這些軟體仍
第18卷第4期
2003 年12 月
數據採集與處理
Journal of Data A cquisit ion & P rocessing
Vo l. 18 No. 4
Dec. 2003
然是針對傳統路由器體系結構開發的, 無法直接應
用於新的路由器體系結構。本文提出在通用操作系
統的驅動棧中插入一個中間層, 這樣對系統內核及
和運行在其上的路由、網管等上層軟體屏蔽了下層
硬體的特殊性, 從而把上層軟體和高速硬體平台結
合起來。該方案已經應用於高速邊緣路由器中, 並
表現出了良好的實用性和可擴展性。
1 交換式路由器與傳統路由器在體
系結構上的差別
路由器工作在網路的第三層, 其處理工作主要
涵蓋七層模型中的下三層, 包括: 物理介面處理、數
據鏈路層處理、網路層的路由查找、轉發以及隊列
管理等[1 ]。在傳統的路由器體系結構中, 硬體部分
只實現物理層的處理, 其餘工作需要消耗系統計算
資源完成: 包括CPU 周期、內存容量和匯流排帶寬
等, 因此性能也受限於這些資源。而在交換式路由
器中, 路由處理機僅處理系統維護、路由表維護等
少量工作, 數據流的處理都由相對獨立的硬體完
成, 不再受限於系統計算資源, 因此其性能遠優於
傳統路由器[2 ]。如圖1 所示。
(a) 傳統路由器體系結構
(b) 交換式路由器體系結構
圖1 路由器的邏輯結構
傳統路由器和交換式路由器在體系結構方面
有明顯的區別: 在傳統路由器中, 所有的物理介面
直接掛接在匯流排上, 內核可以通過匯流排直接訪問這
些介面; 而在交換式路由器中, 只有控制卡是直接
掛接在匯流排上的, 內核必須通過控制卡間接訪問各
個介面。這導致操作系統內核中代表網路介面的驅
動對象的區別: 在傳統路由器中, 內核存在若干網
絡設備驅動對象實例, 每個實例通過匯流排直接維護
一個埠, 為內核及其上面的上層軟體提供基本操
作支持。而在交換式路由器中, 普通的網路設備驅
動對象無法直接維護埠, 也無法支持系統內核和
上層軟體操作。因此, 交換式路由器體系結構的特
殊性使得通用操作系統和上層軟體無法直接應用。
針對這個問題有兩種解決辦法: (1) 大量修改內核
和各種相關軟體的源代碼以適應新的體系結構。這
種做法存在開發工作量大、周期長、局限性強的缺
點, 喪失了使用通用操作系統的靈活性; (2) 在驅動
棧中增加一個中間層, 支持普通網路驅動對象所能
支持的一切操作, 這樣系統內核和上層軟體基本上
不必修改就可以運行在交換式路由器上。這就是本
文所提出的中間層方案。這種方案克服了第一種方
法的復雜性, 在保持靈活性的基礎上, 可以快速地
把通用操作系統及上層軟體移植到交換式路由器
的硬體平台上。
2 中間層設計
中間層功能包括數據通信和控制兩個方面。從
數據通信方面考慮, 每個埠的功能都等效於傳統
路由器中的一個網路介面, 所以每個物理埠在內
核中都應有對應的網路驅動實例。這樣才能支持各
種上層軟體運行, 滿足數據通信功能的需要。
從控制功能方面考慮, 對上要把每一種可能的
邏輯操作映射成硬體操作; 對下要能夠和多個設備
通信。上層應用包括系統維護、路由軟體、網管軟
件; 下層設備包括處理引擎和埠。控制功能的具
體實現和硬體平台有關。考慮到多種應用可能同時
操作一個硬體設備, 一種應用也可能同時操作多個
設備, 在實現時必須考慮到對於多並發操作的支
持。
基於上述考慮, 中間層由控制卡驅動模塊和若
干網路驅動實例組成。在圖2 (a, b) 中分別給出了
傳統路由器的結構與驅動方式以及本文所提出的
中間層所處的位置與驅動方式。
第4 期潘 登, 等: 一種基於通用操作系統的交換式路由器操作系統實現451
圖2 中間層的位置與驅動方式
控制卡驅動模塊作為中間層的核心, 維護控制
卡上所有的埠、內存映射、中斷和循環緩沖隊列
資源。它實現了數據通道和控制通道。對下直接驅
動控制卡、與各個埠、處理引擎通信; 對上, 一方
面通過內核調用陷阱方式提供控制通道介面; 另一
方面向虛擬網路驅動實例提供數據通道介面。虛擬
網路驅動實例在操作系統內核為各個物理埠實
現網路驅動實例。它們工作在控制卡驅動模塊的基
礎上, 並不直接控制硬體, 故稱為虛擬網路驅動實
例。虛擬網路驅動實例封裝控制卡驅動模塊提供的
數據傳輸功能, 並為內核和上層軟體提供與普通網
絡驅動實例相同的調用介面。下面分別給出數據通
道和控制通道的實現方案。
211 數據通道的功能與實現
虛擬網路驅動實例和物理埠是一一對應的。
內核數據收發的功能包括3 個方面:
(1) 發往某虛擬網路驅動實例的數據包應該由
其對應埠輸出;
(2) 這個埠所收到的包也通過該虛擬網路驅
動實例向系統內核提交;
(3) 中間層也可以對虛擬網路驅動實例進行流
控操作, 以避免因擁塞導致數據丟失。
注意到圖2 (b) 中的交換結構以定長信元交換
數據, 其格式如圖3 所示, 其中信元頭佔4 位元組, 包
括處理引擎號和埠號域。對於收ö發信元, 處理引
擎號和埠號分別為該信元的源埠的和目的端
口的對應值。
根據圖2 (b) 所示的系統結構可知: 由處理引
擎號和埠號可以確定埠的物理位置。控制卡驅
動模塊在其內部的驅動信息數組中維護虛擬網路
驅動實例和埠之間的對應關系。
圖3 數據信元結構
發送數據時, 虛擬網路驅動實例從內核網路部
分獲取待發送的數據, 偕同指向該實例自己的指針
一起提交給控制卡驅動模塊。一方面, 控制卡驅動
模塊通過這個指針可以對虛擬網路驅動實例進行
流控設置; 另一方面, 控制卡驅動模塊根據虛擬網
絡驅動實例指針查驅動信息表得到目標埠物理
位置信息, 包括處理引擎號和埠號。埠物理位
置信息將被填充到所有用來承載待發送數據包的
信元頭中。控制卡驅動模塊通過控制卡把信元送到
交換結構, 而交換結構和處理引擎分別根據處理引
擎號和埠號將信元轉發到到目標埠。最後埠
從接收到的信元中恢復出原始數據發出。
接收數據時, 埠也會將數據拆分到若干信元
中逐級上傳。考慮到交換結構的循環優先機制, 一
個數據包上傳的過程可能被來自其他埠的數據
搶斷。所以控制卡驅動模塊對於接收到的信元按源
埠位置信息(包括處理引擎號和埠號) 保存到
不同的緩沖區中。當接收到該數據包相關的全部信
元, 控制驅動模塊即可重組該數據, 並根據源埠
位置信息查驅動信息表以得到指向該埠對應虛
擬網路驅動實例的指針, 進而激活該虛擬網路驅動
實例接收數據。虛擬網路驅動實例從控制卡驅動模
塊中獲取數據後, 按照網路驅動的常規方式調用
net if- rx 介面向內核提交數據。數據收發實現結構
如圖4 所示。
值得注意的是, 在交換式路由器中, 處理引擎
通過交換結構交換的是IP 包; 而通用操作系統中
452 數據採集與處理第18 卷
圖4 數據收發實現結構
網路驅動通常處理鏈路層的幀。即控制卡驅動模塊
數據通道對上對下的數據格式是不同的。因此, 在
發送數據時控制卡驅動模塊需要從得到的鏈路幀
中提取IP 包再轉發到埠; 而接收數據時則對來
自埠的IP 包進行鏈路幀封裝再向上提交。以以
太網為例, 需要恢復的包括源和目標站的物理地
址、載荷類型和幀校驗[3 ]。對於承載IP 包的以太
幀, 顯然其目標站物理地址和載荷類型[4 ]都是已知
的。實現時採用的操作系統是L inux, 通過在虛擬
網路驅動源代碼中進行設置可以使內核不進行幀
校驗[5 ]。所以只有源站物理地址未知。如果要求硬
件給出真實的源站物理地址, 則增加了硬體的復雜
度; 而若在控制卡驅動模塊中偽造源物理地址, 則
可能導致內核的ARP 管理混亂。為簡化硬體設
計, 實現時採用了在控制卡驅動模塊中偽造源物理
地址的辦法, 同時修改虛擬網路驅動源代碼, 重載
幀頭處理函數[6 ]。這樣內核ARP 表就不受偽造地
址的影響, 其獲取和刷新通過查詢埠ARP 記錄
實現。
212 控制通道的功能與實現
控制功能的通信也是基於信元的, 其操作包括
維護管理和表同步兩類。維護管理主要是進行各種
查詢, 通常通過若干次雙向通信完成。每次通信有
效載荷都只有幾個位元組, 由一個信元即可承載。而
表同步則是將上層軟體維護的表復制到相關硬體
中, 包括ARP 表、路由和分類表等。表同步操作涉
及大量數據傳輸, 需要由多個信元承載。控制功能
都是針對設備進行的, 所以在控制ö反饋信元中也
必須包括目標設備的物理位置信息。
在實際運行期間, 所有的上層應用和設備之間
的控制通信復用控制通道, 其特點為:
(1) 不同的應用可能同時訪問同一設備;
(2) 一個應用也可能同時訪問多個設備;
(3) 同一應用對於同一個設備的操作一般都是
順序的。
為支持這種復用操作, 所有承載控制信息和反
饋信息的頭部除包括目標硬體的物理位置和操作
指令外, 還包括命令類型、應用類型信息。控制ö反
饋用信元結構如圖5 所示。
圖5 控制ö反饋信元結構
圖5 中: 處理引擎號和埠號, 確定設備的物
理位置; 收ö發信元分別為該信元的源埠的和目
的埠的對應值; 命令碼在設備和應用之間定義。
每種可能的操作分配一個代碼; 應用碼在控制卡驅
動模塊和上層應用之間預定義。每種可能的應用分
配一個代碼。這些應用包含網管、路由維護、硬體維
護和ARP 信息獲取等。
上層應用通過內核調用陷井( IOCTL ) 發起控
制通道操作, 同時給出目標設備物理位置、命令類
型代碼和應用類型代碼。控制卡驅動模塊把這些信
息填充到控制信元中再將其發往設備。設備把這些
代碼直接復制到反饋信元中, 再在後面追加上反饋
信息。控制卡驅動模塊為每一種應用分配一個循環
緩沖區, 把收到的反饋根據應用類型排入相應隊列
中。上層應用從其所對應的循環緩沖區中讀取反饋
信元, 然後根據信元中的物理位置信息、命令碼就
可以確定該反饋對應的原始命令, 從而對反饋數據
進行適當處理。這樣就實現了各種控制功能對控制
通道的復用。如圖6 所示。
第4 期潘 登, 等: 一種基於通用操作系統的交換式路由器操作系統實現453
圖6 控制通信實現結構
3 結 論
鑒於傳統路由器體系結構和交換式路由器體
系結構的區別, 通用操作系統及在其上開發的路由
軟體無法直接應用於交換式路由器。本文提出的中
間層方案可以有效地解決這個問題。該方案全面考
慮了數據通信和管理維護方面的需求, 為上層提供
了與原有模型基本相同的介面, 並使得路由軟體在
不損失其靈活性和可升級性的條件下直接應用於
交換式路由器中。雖然該方案只是在特定的平台和
特定的操作系統上得到了實現, 但是不難看出, 這
種思路對操作系統並沒有特殊的依賴性, 完全可以
移植到其他通用操作系統上。本文提出的方案已經
在國家863 項目實用化綜合接入系統的高速邊緣
路由器的研製中取得了良好的實際效果。本文為國
產高性能路由器的軟體開發提出了一種高效快捷
的解決方案, 該方案具有良好的應用前景。
參考文獻:
[1 ] Kuro se J F, Ro ss KW. Computer netwo rk ing: a top2
dow n app roach featuring the internet [M ]. A ddison
W esley Longman′s P ress, 2001. 332~ 341.
[ 2 ] 梁阿磊, 等. 路由器體系結構及其發展[J ]. 小型微型
計算機系統, 2001, 8: 943~ 945.
[3 ] M edia access cont ro l frame st ructure [S ]. IEEE Std
80213, 1998. 36~ 40.
[ 4 ] Charles Ho rnig. RFC 894: a standard fo r the t rans2
m ission of IP datagram s over Ethernet netwo rk s[S ].
198411~ 2.
[5 ] Bovet D P. U nderstanding L inux kernel[M ]. O reil2
ley P ress, 2002. 683~ 685
[ 6 ] Rubini A. L inux device drivers. 2nd edit ion [M ].
O r2eilley P ress, 2001. 455~ 458
作者簡介: 潘 登(19772) , 男, 博士研究生, 研究方向: 網路
體系結構、網路安全, E2mail: pandeng@mail. ustc. e. cn;
徐佩霞(19412) , 女, 教授, 博士生導師, 研究方向: 音頻視頻
編碼、非線性處理、下一代網路。
454 數據採集與處理第18 卷
F. 跪求一遍關於計算機網路的英語作文..字數在1200以上的..
Computer networks
Now every almost have computers, and computer good does have its downside - it depends on how you use. If you want to ask me: I on the computer do what, I can tell you, I will do a lot of things in the computer. May first and have out-of-town relatives chat, then can check information, listening to music, watching movies, paint... My favorite on the computer music and watching movies, because it very relaxing my mood.But the most people used compter to surf the internet.Now Let us know about the computer network
Ⅰ.Introction
Computer networks,the wide spread sharing of information among groups of computers and their users,are a central part of the information age.The popular adoption of the personal computer(PC)
and the local area network (LAN) ring the 1980s has led to the capacity to access information on a distant database;download an application from overseas;send a message to a friend country;and share files with a colleague-all from a personal computer.
The network that allow all this to be done so easily are sophisticated and complex entities.They rely for their effectiveness on many cooperating computers.The design and deployment of the wordwide computer network can be viewed as one of the great technological wonders of recent decades. Nowadays Intemet is very popular all over the world, especially in some big cities. Do you know when the Intemet was first established? Built in 1960s, the Internet was a crude network of a few computers which shared information. If one of the computers broke down, the whole networks would be unable to work, causing continual problems. At first, just the government had access to the Internet, using it for communications among different branches. However, by 1970s the Internet had been used in universities, banks, and hospitals. At the beginning of 1990s computers became affordable for common people and this affordability increased the use of the Internet by people,It is said that each day tens of millions of people log off, making it the most important part of people's life.
Ⅱ.Local Area Network
One of the most dramatic events in computer networking has been the introction and rapid growth of local area network(LAN) as a way to standardize the system of linking computers used in office systems.As the name suggests,this is a means of connecting a number of computing elements together.At the simplest level,a LAN provides no more more than a shared medium (such as a coaxial cable to which all computers and printers are connected) along with a set of rules that govern the access to that medium.The most widely used LAN,Ethernet,used a mechanism called Carrier Sense Multiple Access-Collosion Detect(CSMA-CD).This means that each connected device can only use the cable when it has established that each connected device is using it.If there is contention, the device looking for a connection backs off and tries again later.The Ethernet transfers data at 10M bits/sec,which is fast enough to make the distance between devices insignificant.They appeat to be connected directly to their destination.
There are many different layouts(such as bus ,star,ring,see Figure 6A-2)and a number of different access protocols for LANs.Despire this variety,all LANs share the feature that they are limited in range (typically they cover one building) and are fast enough to make the connecting network invisible to the devices that use it.
In addition to providing shared access,modern LANs can also give users a wide range of sophisticated facilities.Managenment software packages are available to control the way in which devices are configured on the local area network (LAN),how users are administered,and how network resources are controlled.A widely adopted structure o local network is to have a number of servers that are available to a (usuallu much greater) nember of clients.The former,usually powerful computers,provide service such as print control,file sharing,and mail to the latter,which are usually personal computers.
Ⅲ.Routers and brideges
The facilities on most local area network (LAN) are very powerful.Most organizatonns do not wish to have small isolated islands of computing facilities.They usually want to extend facilities over a wider area so that groups can wok wtthout having to be located.Routers and bridges arespecialized devices that allow two or more local area network (LAN) to be connected.The bridges is the more basic device and can only connect local area network (LAN) of the same type.The router is a more intelligent component that can interconnent many different types of computer network.
Many large companies have corporate adta network that are founded on a collection of local area network (LAN) and routers.From the user』s point of view,this arrangement provides them with a physically diverse network that looks like one coherent resource.
Ⅳ.Wide Area Networks
At some point,it becomes impractical to extend a local area network (LAN) any further.Physical limitation sometimes drives this,but more often than not there are more concenient or cheaper ways to extend a computer network.Two major components in most real computer networks are the public telephone and data networks.These provide long-distance links that extend a local area network (LAN) into a wide area network (WAN).Nearly all of the national network operators offer services for the interconnection of computer networks.These services range from simple, low speed data links that work over the public telephone network to sophisticaied high speed data services that are ideally suited to the interconnection of LANs.These high speed data services are usually referred to as broadband connection.It is anticiopated that they will provide the necessary links between LANs that make what is called the information superhighway a reality.