gaziantep university informatics section 2010-2011
Transkript
gaziantep university informatics section 2010-2011
GAZIANTEP UNIVERSITY INFORMATICS SECTION 2010-2011-2 SEMETER INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 1 firewall is software or hardware that checks information coming from the Internet, allow to pass depending on your firewall settings. Firewall can help prevent gaining access to your computer through the network or the Internet an attacker or malicious software (such as worms). Also prevents to send to your computer the malware from other computers. 1-Your computer 2-Firewall 3-Internet INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 2 The virus is a program that copies itself. It spread By making copies of the virus on the computer, or computer code of the program or operating system files. Viruses damage files or computers all time, and usually affects performance of the computer and stability. For a virus to infect a computer or to spread, you usually have to do something, such as open an infected e-mail. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 3 The Worm is computer code that spread without user interaction. The worm on infected computer, scans files such as address books that contain e-mail addresses, or temporary WebPages. The worm uses the addresses to send infected e-mail and often in the "from" section of subsequent infected e-mail messages mimics (or spoofs) someone you know . INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 4 Trojan horse; a malicious software program that are hidden in other programs. Enter in computer hidden inside a legal program such screen saver. Then, puts a code in the operating system that provides access to the infected computer, a computer hijacker. Trojan horses do not spread by themselves; spread with viruses, worms, or downloaded software. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 5 The amount of information sent from a link. In data communication networks the sending data specify maximum speed of data flowing. The unit of measure is bps (bits per second). INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 6 The program that displays Web pages. The main browsers are; Internet Explorer, Mozilla, Opera and Safari. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 7 web sites that are similar to the log create by the users that issues their own problems as they want without requiring Technical information . Blog service web pages are as follows: www.blogcu.com,ww.blogspot.com , www.blogger.com. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 8 A vector graphics program can run on Windows and Mac OS operating systems that buying by Adobe firm from Macromedia company . a favorite of the Internet surfers and web site administrators. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 9 Combine of two protocols used to transfer data in the network media: Transmission Control Protocol (TCP). Internet Protocol (IP). Determines the rules for data communication between computers on the TCP/IP protocols. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 10 This packet is uses for exchange of information and file transmission between computers. By using this Protocol, it is possible that the information and software packets on the computers connected to the internet network can be transferred to each other. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 11 One of the most common Internet protocols. This Protocol provides the display and editing of web pages on the internet. The use of this protocol has increased in parallel with The Web's development . Allows users to surf easily in the Internet area. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 12 The devices are connected to the Internet use this address to send data that they use to each other over the network. Every computer is assigned an IP address that connects to the Internet, other computers communicate with this computer by this address on the network. as general views the number consists from 4 parts separated from each other by dots (each one part 0-255) . Each machine on the Internet are returned a IP address separated by periods of 4 number, such as 195.142.130.1. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 13 More than one computer connected to the each other that allows sharing of hardware and software is known as network. data communication provides through data networks. the most beautiful example of information transmission are telephones which we use in our homes. There are a number of the phone itself, used in the reach of each. Computer networks known as data network. Network system, can occurs such as the two personal computers also may occur from thousands of workstation. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 14 14 FIBER OPTIC CABLE In 1966 Charles Kao and George Hock ham made idea that the transmitting data over Fiber glass is possible. during Next periods , loss rates on the fiber most downloads according to copper . The most important feature of Fiber is that it not affected from electromagnetic fields. It is therefore these cables use in very far distances . INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 15 10BaseT twisted-pair (unshielded twisted pair) : 10 Mbit speed on the Unprotected cables. T the sign determine cable type (twisted pair) and also referred as Fast Ethernet . INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 16 16 NETWORK DEVICE for a small Office's internet connection or a internet home network set up the following hardware are required: •Ethernet LAN •Modem •Line (the phone line, ISDN, ADSL or leased line) •Internet account Ethernet Cards :These cards are used in the binding Computers and other devices to the network . is also referred to as Network card NIC (Network Interface Card) INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 17 17 Ethernet Working Basis Before releasing the data, it checks the line even the Ethernet card. If the line is being used by someone data that contains the Mac addresses of the sender and recipient is delivered by ethernet card. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 18 18 hubs : it is network adepter that connect elements with a each other. The most simple network element. The hub not sent the incoming information to Where necessary , but move the information from the Hub all computers connected to the ports. Hubs produced as 4, 8, 12, 16, 24 ports . Connect to the hub with UTP cable and each connection cannot be longer than 100 meters . INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 19 switch Device : Switch is a smart hub device. It works same as hubs but does not rush network. At the same time provides more than one transmission on the network. Looking at the computers that connect to switch ports by MAC addresses. Connections of switch INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 20 20 Firewall Internet connectivity brings with it Some problems in terms of IT. The attacks from the outside, to inside of network is a problem. Also Send the information to unauthorized persons outside from the inside must be prevented. as a result of the system in "dangerous areas" going around the internet, the virus infection. In the navigation of the internet by unauthorized users. Firewall controls the computer and the network internet traffic with many different filtering feature of the incoming and outgoing packets. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 21 21 ADSL (Asymmetric Digital Subscriber Line) Today, the most used connection technique for internet connection . ADSL modems operate 99% use digital coding technique with phone lines. Connection is not busy phone line with using separator device. The connections provides on the computer With Ethernet ports. For this reason, there must be an Ethernet card on your computer. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 22 22 USB ADSL Modems: Connection to the computer via the USB port. In the case of the power off of the computer ,USB modem also closes down. Wireless Modems: At the same time by connecting to the network and distributing Internet on computers with cable and in the same environment, including the wireless network card, computers with Internet access to this network. In indoor spaces, especially in the barriers such as wall (or even more are affecting plaster) with 3 walls or the Cabinet (attention for metals) followed by the weak signal strength up to 35 meters wide, in a field that can link to internet. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 23 23 com- commercial edu – education gov – government org – organization mil – military tr = Turkey uk = United kingdom it = Italy de = Germany jp = Japan fr = France il = İsrail gr = Greek INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 24 DHCP it provides Central and automatically IP assignment for computers with configuration and management of TCP/IP information. DHCP implementation solve some TCP&IP problems that occur due to manually resolved. Local Area Networks (LAN) created within a campus or institution close for outdoor networks. As an example: in homes or workplaces created networks . Usually use of the internet, or to share the simple realization, multiuser games or multiuser programs. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 25 25 Wide Area Networks (WAN) Creates connections for remote local networks to communicate with each other easily. (WAN – Wide Area Network) networks connection provide through optical fiber cable as well as satellites. This is different from technologies used in LAN networks. Router and Multiplexer (repeater), as well as network elements must be used. The stations spread over a wide geographic area. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 26 Internal network (intranet) It is a private communication network based on TCP/IP Protocol and web standards and technologies. Basically, the Protocol and services used on the intranet not open to everyone, is based on the use of premises special purpose. Institutions internal networks which they can connect to the Internet through a firewall. so access to internet from indoor of institution is provided. Access from the outside can be allowed under certain limitations. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 27 SERVER: computer or programs Users for service of users is called severs. USER Another computers or programs that is called the service demand are named users. INFORMATION TECHNOLOGY 02 Haziran 2011 Perşembe 28 28