CHAPTER 1

CHAPTER 1 Computer Networks and the Internet

Today’s Internet is arguably (adv.按理说 )the largest engineered system ever created by mankind(人类,男子 [mænˈkaɪnd]),with hundreds of millions of (数亿台)connected computers,communication links(通信链路) ,with billions of users(拥有数十亿的用户) who connect via laptops, tablets(平板电脑), and smartphones(智能手机);and with an array of(一系列) new Internet-connected devices (设备)such as sensors(传感器), Web cams,game consoles, picture frames, and even washing machines. Given(prep. (表示原因)考虑到) that the Internets so large and has so many diverse components and uses, is there any hope of understanding how it works?(有希望了解它是如何工作的吗?) Are there guiding principles (n. 原则)and structure that can provide a foundation(n.基础) for understanding such an amazingly(adv. 令人惊奇地) large and complex(adj. 复杂的; 难懂的; 复合的;) system? And if so(如果有), is it possible that it actually could be both interesting andfun to learnabout computer networks? Fortunately, the answers to all of these questions is aresounding YES! (所有这些问题的答案听起来是是的!)**Indeed,(**事实上) it’s our aim in this book to provide you with a modern introduction to the dynamic field of computer networking, giving you the principle-sand practical insights(n.洞察力( insight的名词复数 ) you’ll need to understand not only today’s networks, but tomorrow’s as well.
This first chapter presents a broad overviewn( 概观; 总的看法 )of computer networking and the Internet. Our goal here is to paint a broad picture and set the context(n.上下文; ) for the rest of this book, to see the forest through the trees. We’ll cover a lot of ground in this introductoryadj.引导的 chapter and discuss a lot of the pieces of a computer network, without los-ing sight of the big picture.

一、单词和短语默写:

1、arguably adv.按理说 [ˈɑ:gjuəbli]
2、mankindn 人类,男子 [mænˈkaɪnd]
3、Given prep. (表示原因)考虑到
4、array of 一系列
5、hundreds of millions of 数亿台
6、sensors传感器
7、foundation n.基础
8、complex adj. 复杂的; 难懂的; 复合
9、indeed 事实上
10、overview n. 概观; 总的看法
11、context n.上下文;
12、 discuss 讨论,vt

二、句子和语法

the answers to all of these questions is aresounding YES! 所有这些问题的答案听起来是是的!
hundreds of millions of 成千上万
Is there any hope of understanding how it works?有希望了解它是如何工作的吗?
a lot of the pieces of a computer network 一个计算机网络中的很多部分
①at the sight of一看见……就……
②at sight of在看得见……之处

communication links(通信链路)

We’ll structure our overview of computer networks in this chapter as follows.(我们将在本章中构建计算机网络概述,如下)After introducing some basic terminology and concepts,(在介绍了一些基本术语和概念之后) we’ll first examine the basic hardware and software components that make up a network. 我们将首先检查组成网络的基本硬件和软件组件。We’ll begin at the network’s edge (我们将开始在网络边缘)and look at the end systems and network applications running in the network. (了解网络中运行的终端系统和网络应用程序。)We’ll then explore the core of a computer network, (然后,我们将探索计算机网络的核心)examining the links and the switches that transport data,(检查传输数据的连接和交换机) as well as the access networks and physical media that connect end systems to the network core. (以及连接终端系统和网络核心的接入网络和电话媒体)We’ll learn that the Inter-net is a network of ,(我们将了解到互联网是一个网络网络) and we’ll learn how these networks connect with each other.(并学习这些网络如何与其他网络连接)After having completed this overview of the edge and core of a computer net-work,(完成计算机网络边缘和核心的概述之后,) we’ll take the broader and more abstract view in the second half of this chapter.(我们将在本章节的后半段采取更广泛、更抽象的观点) We’ll examine delay, loss, (我们将检查计算机网络中数据的延迟、丢失和吞吐量,)and through put of data in a computer network and provide simple quantitative models for end-to-end throughput and delay:(并通过将数据放到计算机网络中,并为端到端吞吐量和延迟提供简单的定量模型 ) models that take into account transmission, propagation, and queuing delays. (考虑到传输、传播和排队延迟的模型。)We’ll then introduce some of the key architectural principles in computer networking, namely,protocol layering and service models. (然后,我们将介绍计算机网络中的一些关键体系架构原则,即协议分层服务模型。)We’ll also learn that computer networks are vulner able to many different types of attacks; we’ll survey some of these attacks and consider how computer networks can be made more secure. Finally, we’ll close this chapter with a brief history of computer networking.(我们还将了解到计算机网络能够抵御许多不同类型的攻击;我们将调查其中一些这些攻击,并考虑如何使计算机网络更加安全。最后,我们将以计算机网络的简要历史结束本一章。 )
1、 terminology 术语
2、examine 检查
3、explore 探索
4、延迟
5、quantitative 定量的
6、architectural 建筑学的
7、secure 安全

  • as follows 列举如下 造句:The structure of the paper is as follows.这张纸的内容如下。
  • in the second half of 下半部分 In the second half of April we were to
  • experience a temporary success.4月下半月我们会获得一次 暂时 的胜利.
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值