Download Apple store and it`s networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

AppleTalk wikipedia , lookup

Airborne Networking wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wireless security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Apple Store
MISY 3312: Introduction to
Telecommunications
Fall 2011-2012
Section 201
Members:
Heba AL-Owayeed
ID: 200900569
Lujayn Tahlawi
ID: 200900797
Fatima A. Mohammed
ID: 200801340
Farah AL-Shreef
ID: 200900901
Team project
Outline:
• Introduction
• Network Transmission Media
• Apple store and it's networks ( based on physical
scope
• Net Work Classification
• Basic Hardware Components:
• Network security
•
History of Mac OS
• Mac Security Issues:
• Conclusion
• Recommendation
• References
Introduction:
• Apple corporation :
▫ Consumer electronics, computer software, and personal computers.
▫ Software.
▫ Established in 1st of April 1976 in California, USA
▫ By Steve Jobs, Steve Wozniak and Ronald Wayne.
▫ Nowadays it is the largest publicly traded company in the world by
market capitalization.
▫ Has around 375 retail stores around the world plus on-line stores.
Con.
• Applications.
• Jailbreak.
The initial screen of JailbreakMe.com
• Cydia.
Network transmission media
• What is transmission media?
Transmission media is the pathway or medium that connects the
computers and other electronic devices of an organization
together where the information is transmitted from one place to
another
• The transmission media types:
1. guided (wired)
2. unguided (wireless)
Con.
•Guided
Wired
twisted
pair
coaxial
cable
optical
fiber
•Unguided
Wireless
Terrestria
l
Satellites
Wireless
LANs
Con.
AppleTalk:
The transmission medium: Twisted pair
transmission medium
Usage: Telephone system
Why?
 Run several kilometers without any kind of amplification
 Considered the simplest and the most suitable for different
uses
Con.
Apple Inc. :
The transmission medium: A wireless (LAN )
wireless local area network
Usage: Send and share data rapidly
Why?
 Flexibility of radio coverage
 The strength of wireless networks
 No need for planning unlike wired networks
Apple store and it's networks ( based
on physical scope) :
1- LAN
• Download application
• Keep your devices connected to one account
2- virtual private network ( VPN )
• links between nodes that are carried by open
connections or virtual circuits in some larger
network (e.g., the Internet) instead of by
physical wires.
3- Internet network
• Commonly used to access the app store in the
first place and to download the applications.
Backbone network
• There also to allow the devices to exchange
information between networks .
Overlay network
• Virtual computer network that is built on top of
another network
•Classification definition
•Client/Server Architecture
•The database application and the database
are separated into a client/server architecture
-Network topology definition
-Topologies may be physical or logical
• The study of network topology recognizes eight basic
topologies:
•Point-to-point
•Ring or circular
•Bus
•Tree
•Star
•Hybrid
•Mesh
•Daisy chain
meshed networks
•-Its
consist of
•-Bridges
•Network interface cards
•-Bridges come in three
•Repeaters
basic types:
•Hubs
•1- Local bridges
•Bridges
•2- Remote bridges
•Switches
•3- Wireless bridges
•Routers
Network security
• History of Mac OS
Mac Security Issues
1. Scams and fraud:
▫
Online scams, retail and auction fraud, and identity-theft.
2. User error:
▫
Using poor passwords, downloading risky files.
3. Mobile threats
▫
Theft
4. Online hazards:
▫
Viruses and risky files.
Recommendation:
• Important tips:
1.
Hide files and folders from the prying eyes of other
people using your Mac
2. Protect files and folders by using strong passwords.
3. Send e-mail messages and attachments encrypted
with a password
4. Switch on Your Firewall
5. Antivirus/Antispyware Software
Jailbreak Issue:
• Another thing that they can do is to deal
and try to attract Jailbreak producers to
be in their side by paying fees or giving
commissions.
References:
• Application and Networking Architecture. (n.d.). Oracle Documentation. from
http://en.wikipedia.org/wiki/Computer_
• Application and Networking Architecture. (n.d.). Oracle Documentation.from
http://en.wikipedia.org/wiki/Classification
• Application and Networking Architecture. (n.d.). Oracle Documentation.from
http://docs.oracle.com/cd/E11882_01/server.112
• Classification - Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free encyclopedia. from
http://en.wikipedia.org/wiki/Network_topology
• Creating I tunes account. (n.d.). Retrieved from http://support.apple.com/kb/ht2534
• Costello, S. (n.d.). What is jailbreaking. Retrieved from
http://ipod.about.com/od/iphonesoftwareterms/g/jailbreak-definition.htm
• Conroy, D. (2010, October 18). Patent US8041848 - Media processing method and device Google Patents. Google. Retrieved May 5, 2012, from
http://www.google.com/patents/US8041848
• Figure 1, Jailbreak. (n.d.). Retrieved from http://www.jailbreak.com/
• Mogull, R. (2010, January 5). Mac security: reality check. Retrieved from
http://www.macworld.com/article/1145438/macsecurityreality.html
• Protect your mac. (n.d.). Retrieved from
http://www.getsafeonline.org/nqcontent.cfm?a_id=1165
• Schramm, M. (2007, June 26). History of the apple store. Retrieved from
http://www.tuaw.com/2007/06/26/history-of-the-apple-store/
• Tips to protect your mac . (n.d.). Retrieved from http://www.apimac.com/mac/mac-dataprotection/
• *Note:
• The slides were used as references