|
العلوم وتكنولوجيا الاتصالات ويضم اخر المبتكرات التكنولوجية .. الستالايت والموبايلات وغيرها |
![]() |
|
خيارات الموضوع | طريقة العرض |
|
#1
|
||||
|
||||
بجد يا innerpeace456
معلومات جامدة
__________________
حكمة اليوم احنا ليش نستورد المعكرونه من الخارج ممكن نزرعها فى بلادنا العربيه احد الحكام العرب Mind Utter Devastation
|
#2
|
||||
|
||||
Networking Terminology
كويس يااسمايل ان الموضوع عجبك .. تابع بقى الباقى
___________________________ Wide-area networks (WANs)
This page will explain the functions of a WAN. WANs interconnect LANs, which then provide access to computers or file servers in other locations. Because WANs connect user networks over a large geographical area, they make it possible for businesses to communicate across great distances. WANs allow computers, printers, and other devices on a LAN to be shared with distant locations. WANs provide instant communications across large geographic areas. Collaboration software provides access to real-time information and resources and allows meetings to be held remotely. WANs have created a new class of workers called telecommuters. These people never have to leave their homes to go to work. WANs are designed to do the following: Operate over a large and geographically separated area Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, Internet, file transfer, and e-commerce services Some common WAN technologies include the following: Modems Integrated Services Digital Network (ISDN) Digital subscriber line (DSL) Frame Relay T1, E1, T3, and E3 Synchronous Optical Network (SONET)
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
#3
|
||||
|
||||
Networking Terminology
Metropolitan-area networks (MANs) This page will explain how MANs are used. Wireless bridge technologies that send signals across public areas can also be used to create a MAN. A MAN usually consists of two or more LANs in a common geographic area. For example, a bank with multiple branches may utilize a MAN. Typically, a service provider is used to connect two or more LAN sites using private communication lines or optical services. A MAN can also be created using wireless bridge technology by beaming signals across public areas.
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
#4
|
||||
|
||||
Networking Terminology
Storage-area networks (SANs)
This page will discuss the features of SANs. A storage-area network (SAN) is a dedicated, high-performance network used to move data between servers and storage resources. Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers. ![]() SAN technology allows high-speed server-to-storage, storage-to-storage, or server-to-server connectivity. This method uses a separate network infrastructure that relieves any problems associated with existing network connectivity. SANs offer the following features: Performance – SANs allow concurrent access of disk or tape arrays by two or more servers at high speeds. This provides enhanced system performance. Availability – SANs have built-in disaster tolerance. Data can be duplicated on a SAN up to 10 km (6.2 miles) away. Scalability – A SAN can use a variety of technologies. This allows easy relocation of backup data, operations, file migration, and data replication between systems.
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
#5
|
||||
|
||||
Networking Terminology
Virtual private network (VPN) This page will explain what a VPN is and how it is used. A vitual private network (VPN) is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can remotely access the network of the company headquarters. ![]() Through the Internet, a secure tunnel can be built between the PC of the telecommuter and a VPN router at the company headquarters.
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
#6
|
||||
|
||||
Networking Terminology
Benefits of VPNs
This page will introduce the three main types of VPNs and explain how they work. A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. VPNs maintain the same security and management policies as a private network. The use of a VPN is the most cost-effective way to establish a point-to-point connection between remote users and an enterprise network. The following are the three main types of VPNs: Access VPNs provide remote access for mobile and small office, home office (SOHO) users to an Intranet or Extranet over a shared infrastructure. Access VPNs use analog, dialup, ISDN, DSL, mobile IP, and cable technologies to securely connect mobile users, telecommuters, and branch offices. Intranet VPNs use dedicated connections to link regional and remote offices to an internal network over a shared infrastructure. Intranet VPNs differ from Extranet VPNs in that they allow access only to the employees of the enterprise. Extranet VPNs use dedicated connections to link business partners to an internal network over a shared infrastructure. Extranet VPNs differ from Intranet VPNs in that they allow access to users outside the enterprise.
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
#7
|
||||
|
||||
Networking Terminology
Intranets and extranets
This page will teach you about intranets and extranets. One common configuration of a LAN is an intranet. Intranet Web servers differ from public Web servers in that the public must have the proper permissions and passwords to access the intranet of an organization. Intranets are designed to permit users who have access privileges to the internal LAN of the organization. Within an intranet, Web servers are installed in the network. Browser technology is used as the common front end to access information on servers such as financial, graphical, or text-based data. Extranets refer to applications and services that are Intranet based, and use extended, secure access to external users or enterprises. This access is usually accomplished through passwords, user IDs, and other application-level security. An extranet is the extension of two or more intranet strategies with a secure interaction between participant enterprises and their respective intranets. ![]()
__________________
لا تضلوا. لا زناة ولا عبدة اوثان ولا فاسقون ولا سارقون ولا طماعون ولا سيكرون يرثون ملكوت الله (1 كورنثوس 6: 9، 10) |
![]() |
عدد الأعضاء الذي يتصفحون هذا الموضوع : 1 (0 عضو و 1 ضيف) | |
|
|