21 st century university campus internetworking infrastructure
dc.contributor.advisor | Aksen, Ahmet | en_US |
dc.contributor.author | Büyüktopçu, Hakan | en_US |
dc.contributor.other | Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı | en_US |
dc.date.accessioned | 2019-05-28T03:41:02Z | |
dc.date.available | 2019-05-28T03:41:02Z | |
dc.date.issued | 2003-07 | |
dc.department | Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı | en_US |
dc.description | Text in English ; Abstract: English and Turkish | en_US |
dc.description | Includes bibliographical references (leaves 149) | en_US |
dc.description | XV, 152 leaves | en_US |
dc.description.abstract | In the thesis, we study emerging technologies for a University Campus Internetworking Infrastructure including wireless communication standards. Basicly, Internetworking is a collection of data networking technologies including Local Area Network (LAN), Wide Area Network (WAN) and Data Network Security. A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers and other devices. LANs offer computer users mmany advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications.Wireless LAN (WLAN) is an emerging technology providing mobility and efficiency. A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. WAN includes several protocols and technologies. WAN also covers wired and wireless transmission methods. With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely avaliable has increased that concern. Because of this increased focus on network security, several security issues(Firewall, IDS, Virus Protection, URL Filtering etc...) that arise when connecting a private network to the Internet are developed. All core practices and the proposed ones are applied to the Case Study for Işık University new Sile Campus Internetworking Infrastructure Design. | en_US |
dc.description.abstract | Bu çalışma ile, günümüz şartlarında ideal bir Üniversite kampüsünün ağ teknolojileri altyapısının nasıl olması gerektiği ve yeni teknolojilerin entegrasyonu konusu detaylı olarak irdelenmiştir. Genel olarak tümleşik bir ağ yapısı üç ana başlık altında incelenir; yerel alan şebekesi geniş alan şebekesi ve ağ yapıları güvenliği. Yerel alan şebekesi coğrafi olarak birbirine çok yakın ya da aynı lokasyondaki ağ kullanıcıları arasında oluşturulan bir yapı olup kişisel bilgisayar, yazıcı, sunucu gibi aktif cihazları içerir. Yerel alan şebekeleri içerisinde değişik iletim metodları, topolojiler ve cihazlar yer alır. Son yıllarda kablosuz yerel alan şebeke teknolojisinde önemli ilerlemeler kaydedilmiş ve buna bağlı olarak hem ağ içerisinde esneklik sağlanmış hem de verimlilik artışı olmuştur. Geniş alan şebekeleri coğrafi bakımdan çok uzak mezafelerdeki ağları birbirine bağlar. IEEE ağ standardı olan OSI katman yapısının ilk üç katmanında yer almaktadır. Point-to-Point, Frame Relay, X.25, ATM, ISDN, xDSL, VOIP gibi çok değişik protokol ve teknolojileri içerir. Kablolu ve kablosuz iletim teknolojilerini içerrmektedir. Internet'in çok hızlı gelişimiyle birlikte tüm dünyada kurumsal ağ yapılarının güvenliği konusu büyük önem kazandı. Buna paralel olarak da Firewall, IDS, Virus Protection, URL Filtering gibi çok çeşitli ağ güvenliği araçları geliştirildi ve saldırı biçimine bağlı olarak bunlara hergün yenileri eklenmekte. Bu tez çalışmasının sonucu olarak bütün bu bahsi geçen teknolojiler ve uygulamalar biraraya getirilerek Işık Üniversitesi yeni Sile kampüsü ağ alt yapısı tasarımı detaylarıyla planlanarak proje taslağı halinde sunuldu. | en_US |
dc.description.tableofcontents | The birth ofthe Internet | en_US |
dc.description.tableofcontents | Wireless Communication | en_US |
dc.description.tableofcontents | Wireless Networks | en_US |
dc.description.tableofcontents | Data Network Security | en_US |
dc.description.tableofcontents | Conclusion | en_US |
dc.description.tableofcontents | WIRELESS COMMUNICATION FUNDAMENTALS | en_US |
dc.description.tableofcontents | Different Wireless Mobile (Personal Communication) Applications | en_US |
dc.description.tableofcontents | Paging Systems | en_US |
dc.description.tableofcontents | Cordless Telephone System | en_US |
dc.description.tableofcontents | Mobile Telephones | en_US |
dc.description.tableofcontents | Cellular Telephone System | en_US |
dc.description.tableofcontents | Different Cellular Systems | en_US |
dc.description.tableofcontents | First Generation | en_US |
dc.description.tableofcontents | Second Generation | en_US |
dc.description.tableofcontents | Third Generation | en_US |
dc.description.tableofcontents | An Overview of the GSM System | en_US |
dc.description.tableofcontents | GENERAL INTERNETWORKING TECHNOLOGIES | en_US |
dc.description.tableofcontents | Introduction to LAN Protocols | en_US |
dc.description.tableofcontents | What Is a LAN? | en_US |
dc.description.tableofcontents | LAN Protocols and the OSI Reference Model | en_US |
dc.description.tableofcontents | LAN Transmission Methods | en_US |
dc.description.tableofcontents | LAN Topologies | en_US |
dc.description.tableofcontents | LAN Devices | en_US |
dc.description.tableofcontents | Introduction to WAN Technologies | en_US |
dc.description.tableofcontents | What Is a WAN? | en_US |
dc.description.tableofcontents | Point-to-Point Links | en_US |
dc.description.tableofcontents | Circuit Switching | en_US |
dc.description.tableofcontents | Packet Switching | en_US |
dc.description.tableofcontents | WAN Virtual Circuits | en_US |
dc.description.tableofcontents | WAN Dialup Services | en_US |
dc.description.tableofcontents | Integrated Services Digital Network | en_US |
dc.description.tableofcontents | Introduction | en_US |
dc.description.tableofcontents | ISDN BRI Service | en_US |
dc.description.tableofcontents | ISDN PRI Service | en_US |
dc.description.tableofcontents | ISDN Services | en_US |
dc.description.tableofcontents | Digital Subscriber Line | en_US |
dc.description.tableofcontents | Introduction | en_US |
dc.description.tableofcontents | Summary of Additional DSL Technologies | en_US |
dc.description.tableofcontents | Frame Relay | en_US |
dc.description.tableofcontents | Frame Relay Devices | en_US |
dc.description.tableofcontents | Frame Relay Virtual Circuits | en_US |
dc.description.tableofcontents | Switched Virtual Circuits | en_US |
dc.description.tableofcontents | Permanent Virtual Circuits | en_US |
dc.description.tableofcontents | Data-Link Connection Identifier | en_US |
dc.description.tableofcontents | Asynchronous Transfer Mode (ATM) Switching | en_US |
dc.description.tableofcontents | ATM Devices and the Network Environment | en_US |
dc.description.tableofcontents | ATM Quality of Service | en_US |
dc.description.tableofcontents | Voice/Data Integration Technologies | en_US |
dc.description.tableofcontents | Standards | en_US |
dc.description.tableofcontents | Technology | en_US |
dc.description.tableofcontents | Network Performance | en_US |
dc.description.tableofcontents | Economic Advantages | en_US |
dc.description.tableofcontents | Advances in Applications | en_US |
dc.description.tableofcontents | SDH (Syncronous Digital Hierarchy) | en_US |
dc.description.tableofcontents | A Brief History of Transmission Systems | en_US |
dc.description.tableofcontents | Principles of Plesiochronous Operation | en_US |
dc.description.tableofcontents | Limitations ofthe Plesiochronous Digital Hierarchy | en_US |
dc.description.tableofcontents | Origins ofthe SDH | en_US |
dc.description.tableofcontents | Principles ofthe Synchronous Digital Hierarchy | en_US |
dc.description.tableofcontents | Benefits of a Synchronous Digital Hierarchy | en_US |
dc.description.tableofcontents | Network Simplification | en_US |
dc.description.tableofcontents | Survivability | en_US |
dc.description.tableofcontents | Software Control | en_US |
dc.description.tableofcontents | Bandwidth On Demand | en_US |
dc.description.tableofcontents | Future-Proof Networking | en_US |
dc.description.tableofcontents | Standardization | en_US |
dc.description.tableofcontents | The Impact of Synchronous | en_US |
dc.description.tableofcontents | Network Management Basics | en_US |
dc.description.tableofcontents | What Is Network Management? | en_US |
dc.description.tableofcontents | A Historical Perspective | en_US |
dc.description.tableofcontents | Network Management Architecture | en_US |
dc.description.tableofcontents | ISO Network Management Model | en_US |
dc.description.tableofcontents | Performance Management | en_US |
dc.description.tableofcontents | Configuration Management | en_US |
dc.description.tableofcontents | Accounting Management | en_US |
dc.description.tableofcontents | Fault Management | en_US |
dc.description.tableofcontents | Security Management | en_US |
dc.description.tableofcontents | DATA NETWORK SECURITY | en_US |
dc.description.tableofcontents | Security Technologies | en_US |
dc.description.tableofcontents | Security Issues When Connecting to the Internet | en_US |
dc.description.tableofcontents | Protecting Confidential Information | en_US |
dc.description.tableofcontents | Network Packet Sniffers | en_US |
dc.description.tableofcontents | IP Spoofing and Denial-of-Service Attacks | en_US |
dc.description.tableofcontents | Password Attacks | en_US |
dc.description.tableofcontents | Distribution of Sensitive Information | en_US |
dc.description.tableofcontents | Man-in-the-Middle Attacks | en_US |
dc.description.tableofcontents | Protecting Your Network: Maintaining Internal Network System Integrity | en_US |
dc.description.tableofcontents | Network Packet Sniffers | en_US |
dc.description.tableofcontents | IP Spoofing | en_US |
dc.description.tableofcontents | Password Attacks | en_US |
dc.description.tableofcontents | Denial-of-Service Attacks | en_US |
dc.description.tableofcontents | Application Layer Attacks | en_US |
dc.description.tableofcontents | Trusted, Untrusted, and Unknown Networks | en_US |
dc.description.tableofcontents | Trusted Networks | en_US |
dc.description.tableofcontents | Untrusted Networks | en_US |
dc.description.tableofcontents | Unknown Networks | en_US |
dc.description.tableofcontents | Establishing a Security Perimeter | en_US |
dc.description.tableofcontents | Perimeter Networks | en_US |
dc.description.tableofcontents | Developing Your Security Design | en_US |
dc.description.tableofcontents | Know Your Enemy | en_US |
dc.description.tableofcontents | Count the Cost | en_US |
dc.description.tableofcontents | Identify Any Assumptions | en_US |
dc.description.tableofcontents | Control Your Secrets | en_US |
dc.description.tableofcontents | Human Factors | en_US |
dc.description.tableofcontents | Know Your Weaknesses | en_US |
dc.description.tableofcontents | Limit the Scope of Access | en_US |
dc.description.tableofcontents | Understand Your Environment | en_US |
dc.description.tableofcontents | Limit Your Trust | en_US |
dc.description.tableofcontents | Remember Physical Security | en_US |
dc.description.tableofcontents | Make Security Pervasive | en_US |
dc.description.tableofcontents | Summary | en_US |
dc.description.tableofcontents | WIRELESS LAN TECHNOLOGY | en_US |
dc.description.tableofcontents | IEEE Standards And Wireless Networks | en_US |
dc.description.tableofcontents | The Wireless Network | en_US |
dc.description.tableofcontents | Introduction | en_US |
dc.description.tableofcontents | Wireless Networks Topology | en_US |
dc.description.tableofcontents | Wireless Network's Types | en_US |
dc.description.tableofcontents | Wireless LANs | en_US |
dc.description.tableofcontents | Fixed Wireless WANs | en_US |
dc.description.tableofcontents | The small dish satellite TV | en_US |
dc.description.tableofcontents | Mobile Wireless | en_US |
dc.description.tableofcontents | Personal Area Networks (PANs) | en_US |
dc.description.tableofcontents | Integrating Both Mobile and Fixed | en_US |
dc.description.tableofcontents | Bluetooth | en_US |
dc.description.tableofcontents | IrDA | en_US |
dc.description.tableofcontents | HomeRF | en_US |
dc.description.tableofcontents | WECA (Wi-Fi) | en_US |
dc.description.tableofcontents | The Future of Communications : Wireless Networking | en_US |
dc.description.tableofcontents | Wireless LAN Internal Board Specifications | en_US |
dc.description.tableofcontents | DESIGN EVALUATIONS for WIRELESS LANs | en_US |
dc.description.tableofcontents | Overview | en_US |
dc.description.tableofcontents | Benefits of WLANs | en_US |
dc.description.tableofcontents | Evaluation of Needs and Requirements | en_US |
dc.description.tableofcontents | Organizational Purpose | en_US |
dc.description.tableofcontents | Current Network | en_US |
dc.description.tableofcontents | Growth Estimate | en_US |
dc.description.tableofcontents | Development & Considerations | en_US |
dc.description.tableofcontents | Range/Coverage | en_US |
dc.description.tableofcontents | Throughput | en_US |
dc.description.tableofcontents | Multipath Effects | en_US |
dc.description.tableofcontents | Integrity | en_US |
dc.description.tableofcontents | Interoperability with Wired Infrastructure | en_US |
dc.description.tableofcontents | Interoperability with Wireless Infrastructure | en_US |
dc.description.tableofcontents | Interference and Coexistence | en_US |
dc.description.tableofcontents | Simplicity/Ease of Use | en_US |
dc.description.tableofcontents | Security | en_US |
dc.description.tableofcontents | Cost | en_US |
dc.description.tableofcontents | Scalability | en_US |
dc.description.tableofcontents | Battery Life for Mobile Platforms | en_US |
dc.description.tableofcontents | Safety | en_US |
dc.description.tableofcontents | A CAMPUS INTERNETWORK DESIGN APPROACH FOR ISIK UNIVERSITY | en_US |
dc.description.tableofcontents | A Brief History of ISIK University | en_US |
dc.description.tableofcontents | Physical Details of Sile Campus | en_US |
dc.description.tableofcontents | Arrival to Sile Campus | en_US |
dc.description.tableofcontents | Campus MAP | en_US |
dc.description.tableofcontents | Design Evaluations | en_US |
dc.description.tableofcontents | WAN Planning | en_US |
dc.description.tableofcontents | Maslak Campus Connection | en_US |
dc.description.tableofcontents | Internet Connection | en_US |
dc.description.tableofcontents | Voice over IP | en_US |
dc.description.tableofcontents | Data Network Security | en_US |
dc.description.tableofcontents | Firewall | en_US |
dc.description.tableofcontents | URL Filtering | en_US |
dc.description.tableofcontents | IDS (Intrusion Detection System) | en_US |
dc.description.tableofcontents | Virus Protection | en_US |
dc.description.tableofcontents | LAN Planning | en_US |
dc.description.tableofcontents | Gigabit Ethernet Switch Planning | en_US |
dc.description.tableofcontents | Wireless LAN Integration | en_US |
dc.description.tableofcontents | Proposed Topology | en_US |
dc.description.tableofcontents | Internet Connection | en_US |
dc.description.tableofcontents | Internet Service Provider | en_US |
dc.description.tableofcontents | Internet Modems | en_US |
dc.description.tableofcontents | Internet Router | en_US |
dc.description.tableofcontents | Maslak Campus Connection | en_US |
dc.description.tableofcontents | Leased Line | en_US |
dc.description.tableofcontents | Router | en_US |
dc.description.tableofcontents | VOIP | en_US |
dc.description.tableofcontents | Security | en_US |
dc.description.tableofcontents | Local Area Network (LAN) | en_US |
dc.description.tableofcontents | Gigabit Ethernet Technology | en_US |
dc.description.tableofcontents | Wireless LAN (WLAN) | en_US |
dc.description.tableofcontents | Possible Campus Applications | en_US |
dc.description.tableofcontents | en_US | |
dc.description.tableofcontents | File Server | en_US |
dc.description.tableofcontents | Campus Online | en_US |
dc.description.tableofcontents | Library Online | en_US |
dc.description.tableofcontents | E-Learning | en_US |
dc.description.tableofcontents | Security Smart Card | en_US |
dc.description.tableofcontents | Video Camera | en_US |
dc.description.tableofcontents | Fire Sensors | en_US |
dc.description.tableofcontents | VPN | en_US |
dc.description.tableofcontents | Voice Over IP | en_US |
dc.description.tableofcontents | Entire Network Topology | en_US |
dc.identifier.citation | Büyüktopçu, H. (2003). 21 st century university campus internetworking infrastructure. İstanbul: Işık Üniversitesi Fen Bilimleri Enstitüsü. | en_US |
dc.identifier.uri | https://hdl.handle.net/11729/1595 | |
dc.institutionauthor | Büyüktopçu, Hakan | en_US |
dc.language.iso | en | en_US |
dc.publisher | Işık Üniversitesi | en_US |
dc.relation.publicationcategory | Tez | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | LAN | en_US |
dc.subject | Security | en_US |
dc.subject | WAN | en_US |
dc.subject | WLAN | en_US |
dc.subject | Ağ güvenliği | en_US |
dc.subject | Geniş alan şebekesi | en_US |
dc.subject | Kablosuz yerel alan şebekesi | en_US |
dc.subject | Şile kampüs ağ altyapısı tasarımı | en_US |
dc.subject | Yerel alan şebekesi | en_US |
dc.subject.lcc | LB1044.87 .B89 2003 | |
dc.subject.lcsh | Education, Higher -- Computer network resources. | en_US |
dc.subject.lcsh | Education, Higher -- Effect of technological innovations on. | en_US |
dc.subject.lcsh | Local area networks (Computer networks) | en_US |
dc.subject.lcsh | Wireless LANs. | en_US |
dc.subject.lcsh | Wide area networks (Computer networks) | en_US |
dc.title | 21 st century university campus internetworking infrastructure | en_US |
dc.type | Master Thesis | en_US |
dspace.entity.type | Publication |