首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Keeping the Net Secure On September 11 traditional telephone providers did a heroic job of struggling to restore service. Wh
Keeping the Net Secure On September 11 traditional telephone providers did a heroic job of struggling to restore service. Wh
admin
2013-06-02
60
问题
Keeping the Net Secure
On September 11 traditional telephone providers did a heroic job of struggling to restore service. When the World Trade Center towers fell, they severely damaged a Verizon central office with 350,000 voice lines and 3.5 million data circuits carrying the financial information that is the lifeblood of Wall Street firms. Verizon employees and those of many other telecommunications carders worked night and day, alongside the firemen, the police, and volunteers, at their own recovery job. In about a week they had rerouted some two million data circuits, restored switches, and installed temporary power supplies. The other 1.5 million circuits originated in buildings that no longer exist.
In the days after the attack the number of voice calls in the five boroughs of New York City doubled, from the normal 115 million a day to more than 230 million. For the next six days Verizon waived charges for its pay phones in Manhattan. On a single day following the disaster residents placed some 22,000 local calls free of charge from regular sidewalk pay phones below Canal Street, and Williams Communications switched five million voice calls in the metropolitan area-three times the average daily volume. AT&T’s long-distance volume jumped from a weekday average of about 300 million domestic voice calls to more than 431 million on September 11, the busiest weekday ever across AT&T’s domestic voice network.
But despite the efforts to keep them in operation, under the extraordinary pressure of September 11 the traditional voice-telecommunications systems in the New York area and the Washington, D.C. area--both wire and wireless--were significantly overtaxed. In East Coast cities cell-phone networks could not keep up with demand. Many long-distance calls inbound to New York City were blocked, in part to reserve circuits for outgoing calls. On that day the Internet proved its value as an essential part of the modem communications system.
More than half of America now uses the Internet. Globally, users number more than 300 million. Virtually all large businesses use the public Internet or private versions of the same technology to conduct their most important activities. So it was not surprising--although it was staggering--to see that on September 11 more than 1.2 billion instant messages were sent by AOL users alone. Slipping past the congested voice networks onto the PC screens of friends and family around the globe were the ties that bind us in the modem world: "R U OK?" "ALRIGHT? “ “U THERE?"
As voice networks blocked incoming calls to New York in order to relieve congestion, some carders pushed their voice traffic over the Internet. ITXC, which specializes in Internet voice services, saw its domestic wholesale business double on September 11 as carriers searched for new channels of communication; Yahoo’s PC to Phone calling service increased by 59 percent. The performance of these voice-over-IP services suggests that in only a handful of years most voice traffic is likely to be carded on the Internet.
Why did the Internet work so well in the face of huge volume? Because its "distributed" technology is inherently robust. "Normal" phone connections, whether by means of wired line networks or by wireless cellular networks, open a specific circuit, or channel, connecting the person who is called and the caller. Just as if a superhighway lane were opened for one car only, the circuit remains dedicated to the conversation even if no one is speaking at the moment. If too many circuits are requested at one time, the system blocks calls.
In contrast, Internet messages don’t travel on designated circuits. Instead, the messages are coded in is and Os, and then disassembled into packets of data. The packets go out from the PC down the phone line and into the maze of interconnected fibers that envelops every metropolitan area of every developed country in the world. Like cars on a superhighway, packets share lanes on the Net.
Each packet contains a destination address. As the packet moves into the maze, it encounters a router that selects the next step in the network. If the router senses congestion on one route, it selects another. The AOL instant-message packets could work their way around the jams and outage of the voice network and find their destinations in seconds.
One lesson from September 11 is that in order to maintain an effective communications system in the face of any calamity, we should promote and protect the Internet as a primary network, encouraging the private sector and using the resources of the public sector to make it faster, more robust, ubiquitous, and better integrated with other media. This policy would be consistent with the Internet’s original development as an aspect of national security.
Not many creators of Internet technology or leaders of Internet companies have been seriously interested in world affairs. Indeed, only yesterday many people imagined, naively, that the rise of the medium meant the end of government, the triumph of libertarian visions, and the dawning of a new age of spontaneous self-organization. In the long run the Net’s emphasis on liberty can be fused with the needs of a civil equitable, ordered state. But in the short run we need practical steps to help keep the Internet secure. The world’s citizens, businesses, and governments should come together to take two actions.
First, Internet access should be made truly global. In less developed countries this means expanding communications systems so that more people have exposure to and access to information from the outside world. Obviously, communications technology does not by itself end conflict or convert nations to democracy. But it helps, and those goals are easier to reach with a modem communications system than without one. However our current war against terrorism ends, along the way the United States and its allies will undoubtedly make a variety of economic promises to the Central Asian states whose support we need. It would be better to direct aid toward thought-out goals than to grant it slapdash. A $ 10 billion investment fund for communications improvements throughout the developing world, managed by an independent board and funded half by private institutions and half by governments, would be a wise use of our resources.
In developed countries universal access means ensuring that businesses and citizens can all get high-speed connections to the Internet, much as they now have universal dial-tone access to the traditional telephone system. The United States has a long history of subsidizing the growth of a democratically available communications system. In keeping with the established universal service policy, business and suburban customers of telephone services are "overcharged" some $ 30 billion each year in order to subsidize basic telephone rates for rural customers. Diverting $ 10 billion of this universal-service funding could eventually make broadband service available on a near universal basis. Consumers could draw on a federal fund for whichever competing service they chose. The fund would pay a high proportion of the total cost for poor and rural users, a low one or none at all for rich users. Andy Grove, the chairman of Intel, recently called for a similar investment plan.
Second, the Internet’s defenses need to be strengthened. The networks that compose its backbone should be encouraged with strong incentives to develop redundant interconnection points and diverse paths. The Internet’s conceptual design makes it inherently resilient, but its physical structure and hardware need to be more secure than they are now. The one or two dozen essential crossroads of the Internet are basically collections of computers in buildings. These are vital nodes of our national security, and they ought to be as carefully protected as our military installations. The Internet has a rising number of co-location facilities where many fiber cables are aggregated. If any of them goes down, traffic can be interrupted for long periods. This became clear last summer in Baltimore, when a train derailment damaged a substantial fiber link and affected the flow of Internet traffic around the globe.
Every essential node should have a backup. Internet messages are now carried mainly on fiber-optic systems. These systems should be backed up by microwave and satellite-transmission systems.
The terrorists did not directly target our communications networks, but those networks are an integral part of the democratic capitalism that they did attack. And we can use those networks to help fight back.
In all coastal cities, cell phone net works could not keep up with demand.
选项
A、Y
B、N
C、NG
答案
B
解析
文章第三段中只提到在东部沿海城市移动电话网络满足不了需求。
转载请注明原文地址:https://kaotiyun.com/show/d767777K
0
大学英语六级
相关试题推荐
Four-year-oldchildrenambeingtestedfortheirabilitytorecognizesimplewordsandlettersinthe【B1】______.Theyarealsob
Itisamazingthatsomanypeople______(愿为社区的利益做义务工作).
A、Chewingthefish.B、Slashingpeoplenearthem.C、Grabbingtheanimals.D、Cuttingthepreyintopieces.D细节推断题。短文指出,残暴的、肉食类鲨鱼拥有
A、Becauseitservesonlyafewspecialties.B、Becauseit’stoocrowded.C、Becauseit’stoocostly.D、Becausetheserviceistoo
A、Itconfirmsthetraditionalopinion.B、Itisn’tacceptedbythepublic.C、Itisanadditiontoformerstudies.D、Itbreakscon
A、Johnwasdisappointedathismathscore.B、Johndidbetterthanhethoughthewasableto.C、Johndidn’tpass,althoughhehad
Musicians-fromkaraokesingerstoprofessionalcelloplayers-arebetterabletoheartargetedsoundsinanoisyenvironment,
A、OnApril26,1611.B、OnApril23,1611.C、OnApril26,1616.D、OnApril23,1616.D综合推断题。文章第一段开头指出,WilliamShakespearewaschr
EverySundaymorningmillionsofIndianssettledownwithacupofteaandthespecialweekendissuesoftheirnewspapers,just
Althoughinteriordesignhasexistedsincethebeginningofarchitecture,itsdevelopmentintoaspecializedfieldisreallyqui
随机试题
男性,61岁,近1个月来,间断多次少量咯血,应高度怀疑()
女,27岁,劳累后心悸、气短5年,近1周间断咯血,无发热。查体:双颊紫红,口唇轻度发绀,颈静脉无怒张。两肺未闻干、湿啰音。心浊音界在胸骨左缘第3肋间向左扩大,心尖部局限性舒张期隆隆样杂音,第一心音亢进。肝脏不肿大,下肢无水肿。本病最易发生的心律失常是
常用于工作压力不超过1.3MPa,介质温度不超过200℃的直径较大的管道一般选用()。
城建系统各专业管理部门形成的具备长期保存价值的业务管理和技术档案应()。
根据《建设工程质量管理条例》的规定,设计单位应当参与建设工程()分析,并提出相应的技术处理方案。【2009年考试真题】
A有限责任公司由甲、乙、丙、丁四人依法设立。公司经营了一段时间后,甲因急于出国深造拟将其持有的A公司20%的股权全部转让给股东乙,并将该事项依法通知了丙和丁。公司章程对股权转让事项未作约定。根据我国公司法律制度的规定,下列选项的表述中,不正确的有(
某公司准备上一个新的生产项目,项目的经济寿命为20年。项目固定资产投资:厂房为80万元,购置设备为80万元,流动资金净增加额为50万元。采用直线法折旧,无残值项目终结时建筑物按40万元售出。每年固定成本(不包括折旧)增加45万元,变动成本总额增加100万元
【2014上】小琼十分内向,不爱说话,无论在陌生的环境,还是在家里,都少言寡语。这表明人格具有()。
刑法分则某条文规定:犯A罪的,“处三年以下有期徒刑,并处或者单处罚金”。被告人犯A罪,但情节较轻,且其身无分文。对此,下列哪一判决符合该条规定?()
Thediagnosisofthebrother’scancercaughtthefamilyoffguard.
最新回复
(
0
)