1. The traffic between Internet devices in the world will exceed the traffic between people. Internet will develop from a simple large-scale data center to a smarter and highly intelligent network, and will become an advanced regulator between people and information. Among them, the personal website copy function will constantly predict people's information needs and preferences, and users can filter websites through the website copy function to filter out irrelevant information and display the required information in the best format. At the same time, individuals and enterprises will also get a lot of personalized services. These services will be implemented by software designers on an open platform. Intelligent network technology and wireless technology driven by software will make the network reach any corner that people can reach, and at the same time allow people to choose the form of receiving information themselves.
2. The cost of bandwidth will become very low, even negligible. With the breakthrough of bandwidth bottleneck, future network charges will come from services rather than bandwidth. Interactive services, such as electronic games, electronic newspapers and magazines, will become the main body of future network value.
3. In the near future, wireless networks will become more and more popular, among which cnet: short-range wireless networks have bright prospects. The short-range wireless communication standards Zigbee and UWB will be completed soon, and the short-range wireless network environment will be built together with Bluetooth in the future, and the shipments of related products including Bluetooth, Zigbee and UWB will increase greatly. With the promulgation of IEEE 802.15 personal area network (WPAN) standard, the development trend of the new generation of short-range wireless communication is gradually determined. Besides Bluetooth (802. 15. 1), Zigbee (802.5438+05.4) and UWB (802.02).
With the rapid development of computer network, security issues can not be ignored. After more than 20 years of development, network security has developed into a comprehensive science that spans many disciplines, including communication technology, network technology, computer software, hardware design technology, cryptography, network security and computer security technology.
Theoretically, network security is based on cryptography and network security protocols. Cryptography is the core of network security. It is more reliable to use cryptographic technology to encrypt information transmission, encrypt storage, data integrity authentication and user identity authentication. Compared with the traditional simple access control and authorization technology. Encryption algorithms are formulas and rules that specify the conversion mode between plaintext and ciphertext. Due to the openness of encryption algorithm and the development of decryption technology, as well as the export restrictions of key encryption algorithms in developed countries, various countries are constantly committed to developing and designing new encryption algorithms and encryption mechanisms.
Technically speaking, network security depends on two aspects: hardware and software of network equipment. Network security is achieved through the cooperation of software and hardware of network equipment. However, because network security is a value-added service provided by the network for the information on it, people often find that the processing speed of software becomes the bottleneck of the network. Therefore, it will still be a main direction of network security development to realize the cryptographic algorithm and security protocol of network security with hardware and realize the safe processing of line speed.
With the continuous development of security technology, comprehensively strengthening the application of security technology is also an important content of network security development. Because even with the theoretical basis of network security, it is useless to talk about network security without a deep understanding of network security and its wide application in the network. At the same time, network security is not only a firewall, nor a simple stack of anti-virus, intrusion detection, firewall, identity authentication, encryption and other products, but an organic combination of relatively complete and systematic security products from system to application and from equipment to service.
In short, the network is no longer just a tool in the future development process, and it is no longer an unreachable technology patent belonging to only a few people. It will become a kind of culture, a kind of life integrated into all fields of society.