abstract
2 1 century is the era of information economy, and it is a representative technology, computer network technology. It is getting old, developing at the fastest speed, and creatively and continuously entering people's work, life and research. Therefore, it seems more important to control this technology. Now I mainly introduce the application of some new network technologies in reality.
key word
Grid storage of network digital authentication digital wallet
1. Introduction
The network is 36 years old and the work is still unfinished.
A few years later, using the gray cable of 15 feet, 36 connected two huge computers at UCLA, and tested a new method of exchanging data in the network, which will eventually become the unfinished work of the Internet.
University researchers are trying to increase its capacity and speed. Programmers try to instill intelligence into web pages. This work is rebuilding the network to reduce sending the same message to multiple newsgroups (mailing promotional materials) and security problems.
Threats are always imminent: critics warn that commercial, legal and political pressures may hinder internet innovation like today.
Stephen Crocker and Vinton Cerf joined the graduate students of Professor Ryan Kleinrock of UCLA in the engineering laboratory on September 2, 1969, because meaningless test data flowed silently between two computers. 1 month ago, three other knots joined the nestling net.
A few years later, e-mail appeared in the late 1970s. The core communication protocol is called TCP/IP. 1990 the domain name system and the world wide web were used in the 1980s-after e-mail, they are now widely used. Internet has expanded from the initial military and educational fields to enterprises and families all over the world.
Today, Crocker continues to work on the Internet, designing better cooperation tools. When the key of the Internet ignores the safety of the body, he tries to defend the core addressing system threatened by the outside.
He admitted that he helped to set up a store, which was far away from the established Internet and adapted to the increasing multimedia demand. Internet providers are now "doing their best" to transmit data packets, Crocker said, and now better guarantees are needed to prevent video jumping and stuttering.
CERF, now MCI, said he hoped he might have designed an embedded secure Internet. Microsoft, Yahoo! and AOL are currently trying to transform their networks so that e-mail senders can be authenticated, thus reducing spam sent with fake addresses.
Many functions developed today will be impossible, given the slow computing speed and the narrow Internet channel or broadband at birth, CERF said.