Basit öğe kaydını göster

dc.contributor.advisorAksen, Ahmeten_US
dc.contributor.authorBüyüktopçu, Hakanen_US
dc.contributor.otherIşık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programıen_US
dc.date.accessioned2019-05-28T03:41:02Z
dc.date.available2019-05-28T03:41:02Z
dc.date.issued2003-07
dc.identifier.citationBüyüktopçu, H. (2003). 21 st century university campus internetworking infrastructure. İstanbul: Işık Üniversitesi Fen Bilimleri Enstitüsü.en_US
dc.identifier.urihttps://hdl.handle.net/11729/1595
dc.descriptionText in English ; Abstract: English and Turkishen_US
dc.descriptionIncludes bibliographical references (leaves 149)en_US
dc.descriptionXV, 152 leavesen_US
dc.description.abstractIn the thesis, we study emerging technologies for a University Campus Internetworking Infrastructure including wireless communication standards. Basicly, Internetworking is a collection of data networking technologies including Local Area Network (LAN), Wide Area Network (WAN) and Data Network Security. A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers and other devices. LANs offer computer users mmany advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications.Wireless LAN (WLAN) is an emerging technology providing mobility and efficiency. A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. WAN includes several protocols and technologies. WAN also covers wired and wireless transmission methods. With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely avaliable has increased that concern. Because of this increased focus on network security, several security issues(Firewall, IDS, Virus Protection, URL Filtering etc...) that arise when connecting a private network to the Internet are developed. All core practices and the proposed ones are applied to the Case Study for Işık University new Sile Campus Internetworking Infrastructure Design.en_US
dc.description.abstractBu çalışma ile, günümüz şartlarında ideal bir Üniversite kampüsünün ağ teknolojileri altyapısının nasıl olması gerektiği ve yeni teknolojilerin entegrasyonu konusu detaylı olarak irdelenmiştir. Genel olarak tümleşik bir ağ yapısı üç ana başlık altında incelenir; yerel alan şebekesi geniş alan şebekesi ve ağ yapıları güvenliği. Yerel alan şebekesi coğrafi olarak birbirine çok yakın ya da aynı lokasyondaki ağ kullanıcıları arasında oluşturulan bir yapı olup kişisel bilgisayar, yazıcı, sunucu gibi aktif cihazları içerir. Yerel alan şebekeleri içerisinde değişik iletim metodları, topolojiler ve cihazlar yer alır. Son yıllarda kablosuz yerel alan şebeke teknolojisinde önemli ilerlemeler kaydedilmiş ve buna bağlı olarak hem ağ içerisinde esneklik sağlanmış hem de verimlilik artışı olmuştur. Geniş alan şebekeleri coğrafi bakımdan çok uzak mezafelerdeki ağları birbirine bağlar. IEEE ağ standardı olan OSI katman yapısının ilk üç katmanında yer almaktadır. Point-to-Point, Frame Relay, X.25, ATM, ISDN, xDSL, VOIP gibi çok değişik protokol ve teknolojileri içerir. Kablolu ve kablosuz iletim teknolojilerini içerrmektedir. Internet'in çok hızlı gelişimiyle birlikte tüm dünyada kurumsal ağ yapılarının güvenliği konusu büyük önem kazandı. Buna paralel olarak da Firewall, IDS, Virus Protection, URL Filtering gibi çok çeşitli ağ güvenliği araçları geliştirildi ve saldırı biçimine bağlı olarak bunlara hergün yenileri eklenmekte. Bu tez çalışmasının sonucu olarak bütün bu bahsi geçen teknolojiler ve uygulamalar biraraya getirilerek Işık Üniversitesi yeni Sile kampüsü ağ alt yapısı tasarımı detaylarıyla planlanarak proje taslağı halinde sunuldu.en_US
dc.description.tableofcontentsThe birth ofthe Interneten_US
dc.description.tableofcontentsWireless Communicationen_US
dc.description.tableofcontentsWireless Networksen_US
dc.description.tableofcontentsData Network Securityen_US
dc.description.tableofcontentsConclusionen_US
dc.description.tableofcontentsWIRELESS COMMUNICATION FUNDAMENTALSen_US
dc.description.tableofcontentsDifferent Wireless Mobile (Personal Communication) Applicationsen_US
dc.description.tableofcontentsPaging Systemsen_US
dc.description.tableofcontentsCordless Telephone Systemen_US
dc.description.tableofcontentsMobile Telephonesen_US
dc.description.tableofcontentsCellular Telephone Systemen_US
dc.description.tableofcontentsDifferent Cellular Systemsen_US
dc.description.tableofcontentsFirst Generationen_US
dc.description.tableofcontentsSecond Generationen_US
dc.description.tableofcontentsThird Generationen_US
dc.description.tableofcontentsAn Overview of the GSM Systemen_US
dc.description.tableofcontentsGENERAL INTERNETWORKING TECHNOLOGIESen_US
dc.description.tableofcontentsIntroduction to LAN Protocolsen_US
dc.description.tableofcontentsWhat Is a LAN?en_US
dc.description.tableofcontentsLAN Protocols and the OSI Reference Modelen_US
dc.description.tableofcontentsLAN Transmission Methodsen_US
dc.description.tableofcontentsLAN Topologiesen_US
dc.description.tableofcontentsLAN Devicesen_US
dc.description.tableofcontentsIntroduction to WAN Technologiesen_US
dc.description.tableofcontentsWhat Is a WAN?en_US
dc.description.tableofcontentsPoint-to-Point Linksen_US
dc.description.tableofcontentsCircuit Switchingen_US
dc.description.tableofcontentsPacket Switchingen_US
dc.description.tableofcontentsWAN Virtual Circuitsen_US
dc.description.tableofcontentsWAN Dialup Servicesen_US
dc.description.tableofcontentsIntegrated Services Digital Networken_US
dc.description.tableofcontentsIntroductionen_US
dc.description.tableofcontentsISDN BRI Serviceen_US
dc.description.tableofcontentsISDN PRI Serviceen_US
dc.description.tableofcontentsISDN Servicesen_US
dc.description.tableofcontentsDigital Subscriber Lineen_US
dc.description.tableofcontentsIntroductionen_US
dc.description.tableofcontentsSummary of Additional DSL Technologiesen_US
dc.description.tableofcontentsFrame Relayen_US
dc.description.tableofcontentsFrame Relay Devicesen_US
dc.description.tableofcontentsFrame Relay Virtual Circuitsen_US
dc.description.tableofcontentsSwitched Virtual Circuitsen_US
dc.description.tableofcontentsPermanent Virtual Circuitsen_US
dc.description.tableofcontentsData-Link Connection Identifieren_US
dc.description.tableofcontentsAsynchronous Transfer Mode (ATM) Switchingen_US
dc.description.tableofcontentsATM Devices and the Network Environmenten_US
dc.description.tableofcontentsATM Quality of Serviceen_US
dc.description.tableofcontentsVoice/Data Integration Technologiesen_US
dc.description.tableofcontentsStandardsen_US
dc.description.tableofcontentsTechnologyen_US
dc.description.tableofcontentsNetwork Performanceen_US
dc.description.tableofcontentsEconomic Advantagesen_US
dc.description.tableofcontentsAdvances in Applicationsen_US
dc.description.tableofcontentsSDH (Syncronous Digital Hierarchy)en_US
dc.description.tableofcontentsA Brief History of Transmission Systemsen_US
dc.description.tableofcontentsPrinciples of Plesiochronous Operationen_US
dc.description.tableofcontentsLimitations ofthe Plesiochronous Digital Hierarchyen_US
dc.description.tableofcontentsOrigins ofthe SDHen_US
dc.description.tableofcontentsPrinciples ofthe Synchronous Digital Hierarchyen_US
dc.description.tableofcontentsBenefits of a Synchronous Digital Hierarchyen_US
dc.description.tableofcontentsNetwork Simplificationen_US
dc.description.tableofcontentsSurvivabilityen_US
dc.description.tableofcontentsSoftware Controlen_US
dc.description.tableofcontentsBandwidth On Demanden_US
dc.description.tableofcontentsFuture-Proof Networkingen_US
dc.description.tableofcontentsStandardizationen_US
dc.description.tableofcontentsThe Impact of Synchronousen_US
dc.description.tableofcontentsNetwork Management Basicsen_US
dc.description.tableofcontentsWhat Is Network Management?en_US
dc.description.tableofcontentsA Historical Perspectiveen_US
dc.description.tableofcontentsNetwork Management Architectureen_US
dc.description.tableofcontentsISO Network Management Modelen_US
dc.description.tableofcontentsPerformance Managementen_US
dc.description.tableofcontentsConfiguration Managementen_US
dc.description.tableofcontentsAccounting Managementen_US
dc.description.tableofcontentsFault Managementen_US
dc.description.tableofcontentsSecurity Managementen_US
dc.description.tableofcontentsDATA NETWORK SECURITYen_US
dc.description.tableofcontentsSecurity Technologiesen_US
dc.description.tableofcontentsSecurity Issues When Connecting to the Interneten_US
dc.description.tableofcontentsProtecting Confidential Informationen_US
dc.description.tableofcontentsNetwork Packet Sniffersen_US
dc.description.tableofcontentsIP Spoofing and Denial-of-Service Attacksen_US
dc.description.tableofcontentsPassword Attacksen_US
dc.description.tableofcontentsDistribution of Sensitive Informationen_US
dc.description.tableofcontentsMan-in-the-Middle Attacksen_US
dc.description.tableofcontentsProtecting Your Network: Maintaining Internal Network System Integrityen_US
dc.description.tableofcontentsNetwork Packet Sniffersen_US
dc.description.tableofcontentsIP Spoofingen_US
dc.description.tableofcontentsPassword Attacksen_US
dc.description.tableofcontentsDenial-of-Service Attacksen_US
dc.description.tableofcontentsApplication Layer Attacksen_US
dc.description.tableofcontentsTrusted, Untrusted, and Unknown Networksen_US
dc.description.tableofcontentsTrusted Networksen_US
dc.description.tableofcontentsUntrusted Networksen_US
dc.description.tableofcontentsUnknown Networksen_US
dc.description.tableofcontentsEstablishing a Security Perimeteren_US
dc.description.tableofcontentsPerimeter Networksen_US
dc.description.tableofcontentsDeveloping Your Security Designen_US
dc.description.tableofcontentsKnow Your Enemyen_US
dc.description.tableofcontentsCount the Costen_US
dc.description.tableofcontentsIdentify Any Assumptionsen_US
dc.description.tableofcontentsControl Your Secretsen_US
dc.description.tableofcontentsHuman Factorsen_US
dc.description.tableofcontentsKnow Your Weaknessesen_US
dc.description.tableofcontentsLimit the Scope of Accessen_US
dc.description.tableofcontentsUnderstand Your Environmenten_US
dc.description.tableofcontentsLimit Your Trusten_US
dc.description.tableofcontentsRemember Physical Securityen_US
dc.description.tableofcontentsMake Security Pervasiveen_US
dc.description.tableofcontentsSummaryen_US
dc.description.tableofcontentsWIRELESS LAN TECHNOLOGYen_US
dc.description.tableofcontentsIEEE Standards And Wireless Networksen_US
dc.description.tableofcontentsThe Wireless Networken_US
dc.description.tableofcontentsIntroductionen_US
dc.description.tableofcontentsWireless Networks Topologyen_US
dc.description.tableofcontentsWireless Network's Typesen_US
dc.description.tableofcontentsWireless LANsen_US
dc.description.tableofcontentsFixed Wireless WANsen_US
dc.description.tableofcontentsThe small dish satellite TVen_US
dc.description.tableofcontentsMobile Wirelessen_US
dc.description.tableofcontentsPersonal Area Networks (PANs)en_US
dc.description.tableofcontentsIntegrating Both Mobile and Fixeden_US
dc.description.tableofcontentsBluetoothen_US
dc.description.tableofcontentsIrDAen_US
dc.description.tableofcontentsHomeRFen_US
dc.description.tableofcontentsWECA (Wi-Fi)en_US
dc.description.tableofcontentsThe Future of Communications : Wireless Networkingen_US
dc.description.tableofcontentsWireless LAN Internal Board Specificationsen_US
dc.description.tableofcontentsDESIGN EVALUATIONS for WIRELESS LANsen_US
dc.description.tableofcontentsOverviewen_US
dc.description.tableofcontentsBenefits of WLANsen_US
dc.description.tableofcontentsEvaluation of Needs and Requirementsen_US
dc.description.tableofcontentsOrganizational Purposeen_US
dc.description.tableofcontentsCurrent Networken_US
dc.description.tableofcontentsGrowth Estimateen_US
dc.description.tableofcontentsDevelopment & Considerationsen_US
dc.description.tableofcontentsRange/Coverageen_US
dc.description.tableofcontentsThroughputen_US
dc.description.tableofcontentsMultipath Effectsen_US
dc.description.tableofcontentsIntegrityen_US
dc.description.tableofcontentsInteroperability with Wired Infrastructureen_US
dc.description.tableofcontentsInteroperability with Wireless Infrastructureen_US
dc.description.tableofcontentsInterference and Coexistenceen_US
dc.description.tableofcontentsSimplicity/Ease of Useen_US
dc.description.tableofcontentsSecurityen_US
dc.description.tableofcontentsCosten_US
dc.description.tableofcontentsScalabilityen_US
dc.description.tableofcontentsBattery Life for Mobile Platformsen_US
dc.description.tableofcontentsSafetyen_US
dc.description.tableofcontentsA CAMPUS INTERNETWORK DESIGN APPROACH FOR ISIK UNIVERSITYen_US
dc.description.tableofcontentsA Brief History of ISIK Universityen_US
dc.description.tableofcontentsPhysical Details of Sile Campusen_US
dc.description.tableofcontentsArrival to Sile Campusen_US
dc.description.tableofcontentsCampus MAPen_US
dc.description.tableofcontentsDesign Evaluationsen_US
dc.description.tableofcontentsWAN Planningen_US
dc.description.tableofcontentsMaslak Campus Connectionen_US
dc.description.tableofcontentsInternet Connectionen_US
dc.description.tableofcontentsVoice over IPen_US
dc.description.tableofcontentsData Network Securityen_US
dc.description.tableofcontentsFirewallen_US
dc.description.tableofcontentsURL Filteringen_US
dc.description.tableofcontentsIDS (Intrusion Detection System)en_US
dc.description.tableofcontentsVirus Protectionen_US
dc.description.tableofcontentsLAN Planningen_US
dc.description.tableofcontentsGigabit Ethernet Switch Planningen_US
dc.description.tableofcontentsWireless LAN Integrationen_US
dc.description.tableofcontentsProposed Topologyen_US
dc.description.tableofcontentsInternet Connectionen_US
dc.description.tableofcontentsInternet Service Provideren_US
dc.description.tableofcontentsInternet Modemsen_US
dc.description.tableofcontentsInternet Routeren_US
dc.description.tableofcontentsMaslak Campus Connectionen_US
dc.description.tableofcontentsLeased Lineen_US
dc.description.tableofcontentsRouteren_US
dc.description.tableofcontentsVOIPen_US
dc.description.tableofcontentsSecurityen_US
dc.description.tableofcontentsLocal Area Network (LAN)en_US
dc.description.tableofcontentsGigabit Ethernet Technologyen_US
dc.description.tableofcontentsWireless LAN (WLAN)en_US
dc.description.tableofcontentsPossible Campus Applicationsen_US
dc.description.tableofcontentse-mailen_US
dc.description.tableofcontentsFile Serveren_US
dc.description.tableofcontentsCampus Onlineen_US
dc.description.tableofcontentsLibrary Onlineen_US
dc.description.tableofcontentsE-Learningen_US
dc.description.tableofcontentsSecurity Smart Carden_US
dc.description.tableofcontentsVideo Cameraen_US
dc.description.tableofcontentsFire Sensorsen_US
dc.description.tableofcontentsVPNen_US
dc.description.tableofcontentsVoice Over IPen_US
dc.description.tableofcontentsEntire Network Topologyen_US
dc.language.isoengen_US
dc.publisherIşık Üniversitesien_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectLANen_US
dc.subjectSecurityen_US
dc.subjectWANen_US
dc.subjectWLANen_US
dc.subjectAğ güvenliğien_US
dc.subjectGeniş alan şebekesien_US
dc.subjectKablosuz yerel alan şebekesien_US
dc.subjectŞile kampüs ağ altyapısı tasarımıen_US
dc.subjectYerel alan şebekesien_US
dc.subject.lccLB1044.87 .B89 2003
dc.subject.lcshEducation, Higher -- Computer network resources.en_US
dc.subject.lcshEducation, Higher -- Effect of technological innovations on.en_US
dc.subject.lcshLocal area networks (Computer networks)en_US
dc.subject.lcshWireless LANs.en_US
dc.subject.lcshWide area networks (Computer networks)en_US
dc.title21 st century university campus internetworking infrastructureen_US
dc.typemasterThesisen_US
dc.contributor.departmentIşık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programıen_US
dc.relation.publicationcategoryTezen_US
dc.contributor.institutionauthorBüyüktopçu, Hakanen_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/closedAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/closedAccess