Download presentation
Presentation is loading. Please wait.
1
MISY 3312: Introduction to Telecommunications
Apple Store MISY 3312: Introduction to Telecommunications Fall Section 201 Members: Heba AL-Owayeed ID: Lujayn Tahlawi ID: Fatima A. Mohammed ID: Farah AL-Shreef ID: Team project
2
Outline: Introduction Network Transmission Media
Apple store and it's networks ( based on physical scope Net Work Classification Basic Hardware Components: Network security History of Mac OS Mac Security Issues: Conclusion Recommendation References
3
Introduction: Apple corporation :
Consumer electronics, computer software, and personal computers. Software. Established in 1st of April 1976 in California, USA By Steve Jobs, Steve Wozniak and Ronald Wayne. Nowadays it is the largest publicly traded company in the world by market capitalization. Has around 375 retail stores around the world plus on-line stores.
4
Con. Applications. Jailbreak. Cydia.
The initial screen of JailbreakMe.com
5
Network transmission media
What is transmission media? Transmission media is the pathway or medium that connects the computers and other electronic devices of an organization together where the information is transmitted from one place to another The transmission media types: guided (wired) unguided (wireless)
6
Con. Guided Unguided Wired twisted pair coaxial cable optical fiber
Wireless Terrestrial Satellites Wireless LANs
7
Con. AppleTalk: The transmission medium: Twisted pair transmission medium Usage: Telephone system Why? Run several kilometers without any kind of amplification Considered the simplest and the most suitable for different uses
8
Con. Apple Inc. : The transmission medium: A wireless (LAN ) wireless local area network Usage: Send and share data rapidly Why? Flexibility of radio coverage The strength of wireless networks No need for planning unlike wired networks
9
Apple store and it's networks ( based on physical scope) :
1- LAN Download application Keep your devices connected to one account
10
2- virtual private network ( VPN )
links between nodes that are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires.
11
3- Internet network Commonly used to access the app store in the first place and to download the applications.
12
Backbone network There also to allow the devices to exchange information between networks .
13
Overlay network Virtual computer network that is built on top of another network
14
Net Work Classification
Classification definition Client/Server Architecture The database application and the database are separated into a client/server architecture
15
Mesh Network topology definition Topologies may be physical or logical
The study of network topology recognizes eight basic topologies: Point-to-point Bus Star Mesh Ring or circular Tree Hybrid Daisy chain meshed networks
16
Basic Hardware Components:
-Its consist of Network interface cards Repeaters Hubs Bridges Switches Routers -Bridges -Bridges come in three basic types: 1- Local bridges 2- Remote bridges 3- Wireless bridges
17
Network security History of Mac OS
18
Mac Security Issues Scams and fraud: User error: Mobile threats
Online scams, retail and auction fraud, and identity-theft. User error: Using poor passwords, downloading risky files. Mobile threats Theft Online hazards: Viruses and risky files.
19
Recommendation: Important tips:
Hide files and folders from the prying eyes of other people using your Mac Protect files and folders by using strong passwords. Send messages and attachments encrypted with a password Switch on Your Firewall Antivirus/Antispyware Software
20
Jailbreak Issue: Another thing that they can do is to deal and try to attract Jailbreak producers to be in their side by paying fees or giving commissions.
21
THANK YOU FOR LISTENING
22
References: Application and Networking Architecture. (n.d.). Oracle Documentation. from Application and Networking Architecture. (n.d.). Oracle Documentation.from Application and Networking Architecture. (n.d.). Oracle Documentation.from Classification - Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free encyclopedia. from Creating I tunes account. (n.d.). Retrieved from Costello, S. (n.d.). What is jailbreaking. Retrieved from Conroy, D. (2010, October 18). Patent US Media processing method and device - Google Patents. Google. Retrieved May 5, 2012, from Figure 1, Jailbreak. (n.d.). Retrieved from Mogull, R. (2010, January 5). Mac security: reality check. Retrieved from Protect your mac. (n.d.). Retrieved from Schramm, M. (2007, June 26). History of the apple store. Retrieved from Tips to protect your mac . (n.d.). Retrieved from protection/ *Note: The slides were used as references
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.