gaziantep university informatics section 2010-2011

Transkript

gaziantep university informatics section 2010-2011
GAZIANTEP UNIVERSITY
INFORMATICS SECTION
2010-2011-2 SEMETER
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
1


firewall is software or hardware
that checks information coming
from the Internet, allow to pass
depending on your firewall
settings.
Firewall can help prevent gaining
access to your computer through
the network or the Internet an
attacker or malicious software
(such as worms). Also prevents to
send to your computer the
malware from other computers.
1-Your computer
2-Firewall
3-Internet
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
2

The virus is a program that copies itself. It
spread By making copies of the virus on the
computer, or computer code of the program
or operating system files. Viruses damage
files or computers all time, and usually
affects performance of the computer and
stability. For a virus to infect a computer or
to spread, you usually have to do something,
such as open an infected e-mail.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
3

The Worm is computer code that spread
without user interaction. The worm on
infected computer, scans files such as
address books that contain e-mail
addresses, or temporary WebPages. The
worm uses the addresses to send infected
e-mail and often in the "from" section of
subsequent infected e-mail messages
mimics (or spoofs) someone you know .
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
4

Trojan horse; a malicious software
program that are hidden in other
programs. Enter in computer
hidden inside a legal program such
screen saver. Then, puts a code in
the operating system that provides
access to the infected computer, a
computer hijacker. Trojan horses
do not spread by themselves;
spread with viruses, worms, or
downloaded software.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
5

The amount of information sent from a link. In data
communication networks the sending data specify
maximum speed of data flowing. The unit of measure
is bps (bits per second).
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
6

The program that displays Web pages. The main
browsers are; Internet Explorer, Mozilla, Opera and
Safari.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
7



web sites that are similar to the log
create by the users that issues their
own problems as they want
without requiring Technical
information .
Blog service web pages are as
follows:
www.blogcu.com,ww.blogspot.com
, www.blogger.com.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
8


A vector graphics program can
run on Windows and Mac OS
operating systems that buying by
Adobe firm from Macromedia
company .
a favorite of the Internet surfers
and web site administrators.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
9




Combine of two protocols used to transfer data in the
network media:
Transmission Control Protocol (TCP).
Internet Protocol (IP).
Determines the rules for data communication
between computers on the TCP/IP protocols.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
10

This packet is uses for exchange of information and
file transmission between computers. By using this
Protocol, it is possible that the information and
software packets on the computers connected to the
internet network can be transferred to each other.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
11




One of the most common Internet protocols.
This Protocol provides the display and editing of web
pages on the internet.
The use of this protocol has increased in parallel with
The Web's development .
Allows users to surf easily in the Internet area.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
12

The devices are connected to the Internet use this
address to send data that they use to each other over
the network. Every computer is assigned an IP
address that connects to the Internet, other computers
communicate with this computer by this address on
the network. as general views the number consists
from 4 parts separated from each other by dots (each
one part 0-255) . Each machine on the Internet are
returned a IP address separated by periods of 4
number, such as 195.142.130.1.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
13


More than one computer connected to the each other
that allows sharing of hardware and software is
known as network. data communication provides
through data networks. the most beautiful example of
information transmission are telephones which we
use in our homes.
There are a number of the phone itself, used in the
reach of each. Computer networks known as data
network. Network system, can occurs such as the two
personal computers also may occur from thousands
of workstation.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
14
14
FIBER OPTIC CABLE
In 1966 Charles Kao and George Hock
ham made idea that the transmitting data
over Fiber glass is possible. during Next
periods , loss rates on the fiber most
downloads according to copper . The most
important feature of Fiber is that it not
affected from electromagnetic fields.
It is therefore these cables use in very far
distances .
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
15


10BaseT twisted-pair (unshielded twisted pair) : 10
Mbit speed on the Unprotected cables.
T the sign determine cable type (twisted pair) and
also referred as Fast Ethernet .
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
16
16
NETWORK DEVICE
for a small Office's internet connection or a internet home network
set up the following hardware are required:
•Ethernet LAN
•Modem
•Line (the phone line, ISDN, ADSL or leased line)
•Internet account
Ethernet Cards :These cards
are used in the binding
Computers and other devices
to the network .
is also referred to as
Network card NIC (Network
Interface Card)
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
17
17


Ethernet Working
Basis
Before releasing the
data, it checks the line
even the Ethernet card.
If the line is being used
by someone data that
contains the Mac
addresses of the sender
and recipient is
delivered by ethernet
card.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
18
18
hubs :
it is network adepter that connect elements with a each
other. The most simple network element. The hub not
sent the incoming information to Where necessary , but
move the information from the Hub all computers
connected to the ports. Hubs produced as 4, 8, 12, 16, 24
ports .
Connect to the hub with UTP cable and each connection
cannot be longer than 100 meters .
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
19




switch Device :
Switch is a smart hub device.
It works same as hubs but does not rush network.
At the same time provides more than one
transmission on the network.
Looking at the computers that connect to switch
ports by MAC addresses.
Connections of switch
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
20
20
Firewall
 Internet connectivity brings with it Some problems
in terms of IT. The attacks from the outside, to
inside of network is a problem. Also Send the
information to unauthorized persons outside from
the inside must be prevented.
 as a result of the system in "dangerous areas" going
around the internet, the virus infection.
 In the navigation of the internet by unauthorized
users.
 Firewall controls the computer and the network
internet traffic with many different filtering feature
of the incoming and outgoing packets.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
21
21
ADSL (Asymmetric Digital Subscriber Line)
Today, the most used connection
technique for internet connection . ADSL
modems operate 99% use digital coding
technique with phone lines. Connection
is not busy phone line with using
separator device.
The connections provides on the computer With Ethernet ports.
For this reason, there must be an Ethernet card on your computer.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
22
22
USB ADSL Modems: Connection to the computer via the
USB port. In the case of the power off of the computer ,USB
modem also closes down.
Wireless Modems: At the same
time by connecting to the network and
distributing Internet on computers
with cable and in the same
environment, including the wireless
network card, computers with Internet
access to this network.
In indoor spaces, especially in the barriers such as wall (or even more
are affecting plaster) with 3 walls or the Cabinet (attention for metals)
followed by the weak signal strength up to 35 meters wide, in a field
that can link to internet.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
23
23

com- commercial
edu – education
gov – government
org – organization

mil – military



tr = Turkey
uk = United kingdom
it = Italy
de = Germany
jp = Japan
fr = France
il = İsrail
gr = Greek
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
24
DHCP


it provides Central and automatically IP assignment for
computers with configuration and management of TCP/IP
information.
DHCP implementation solve some TCP&IP problems that
occur due to manually resolved.
Local Area Networks (LAN)

created within a campus or institution close for outdoor
networks. As an example: in homes or workplaces created
networks . Usually use of the internet, or to share the simple
realization, multiuser games or multiuser programs.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
25
25
Wide Area Networks (WAN)
Creates connections for remote local networks to communicate
with each other easily.
(WAN – Wide Area Network) networks connection provide
through optical fiber cable as well as satellites.
This is different from technologies used in LAN networks.
Router and Multiplexer (repeater), as well as network elements
must be used.
The stations spread over a wide geographic area.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
26



Internal network (intranet)
It is a private communication network based on TCP/IP
Protocol and web standards and technologies.
Basically, the Protocol and services used on the intranet not
open to everyone, is based on the use of premises special
purpose. Institutions internal networks which they can
connect to the Internet through a firewall. so access to
internet from indoor of institution is provided. Access from
the outside can be allowed under certain limitations.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
27
SERVER:
computer or programs Users for service of users is called
severs.
USER
Another computers or programs that is called the service
demand are named users.
INFORMATION TECHNOLOGY
02 Haziran 2011 Perşembe
28
28

Benzer belgeler