Студопедия

КАТЕГОРИИ:

АстрономияБиологияГеографияДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРиторикаСоциологияСпортСтроительствоТехнологияФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника


INTERNET TECHNOLOGY




АНГЛИЙСКИЙ ДЛЯ ИЗУЧАЮЩИХ

ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ

 

 

ENGLISH FOR IT STUDENTS

 

 

Методическое пособие

 

по совершенствованию навыков чтения и говорения

на английском языке для студентов ФКСиС и ФИТиУ

дневной формы обучения

В 2-х частях

 

Часть 2

 

Минск БГУИР 2009

УДК 811.111(075.8)

ББК 81.2Англ я73

М 54

 

 

Составители:

Н.Г. Касперович, Е.В. Барановская, Н.И. Дубовец, Е.Д. Лысенок,

Р.Т. Максимчук, О.В. Пинчук, Л.Е. Синкевич, И.Г. Субботкина,

Н.Г. Украинец, Е.Н. Щекотович

 

М 54
Английский для изучающих информационные технологии: методическое пособие по совершенствованию навыков чтения и говорения на английском языке для студентов ФКСиС и ФИТиУ дневной формы обучения. В 2 ч. Ч. 2. / Сост. Н.Г. Касперович [и др.] Минск: БГУИР, 2009 - 77 с.

 

Настоящее методическое пособие предназначено для студентов ФКСиС и ФИТиУ дневной формы обучения. Содержит специализированные технические тексты по современным информационным технологиям и специально созданный комплекс заданий, направленных на совершенствование навыков чтения и говорения на английском языке. Содержание языкового и речевого материала подобрано в полном соответствии с программой неязыковых вузов и включает языковые явления, предназначенные для активного усвоения.

Вторая часть включает четыре темы для чтения, овладения активной лексикой и обсуждения в аудитории. Предполагается, что данный материал может стать базой для формирования совершенствования речевых навыков чтения аутентичных текстовых материалов по специальности и навыков ведения беседы по профессиональной тематике.

 

УДК 811.111(075.8)

ББК 81.2 Англ я73

ISBN 978-985-488-290-1

 

© УО «Белорусский государственный университет

информатики и радиоэлектроники», 2009

Unit 5. internet and lan TECHNOLOGY

Text A

Pre-reading. Match the terms with the appropriate definitions.

ProtocolsFunctions

HTTP(Hypertext Transfer Protocol) - responsible for address packets

FTR (File Transfer Protocol) - breaks a message or file into packets

POP (Post Office Protocol) - allows users who are logged on to one host to access another host

TCP (Transmission Control Protocol) - provides secure data transfer over the

Internet

IP (Internet Protocol) - transfer mail from an e-mail server to a

client Inbox

SMTP (Simple Mail Transfer Protocol) - exchanges information over the Web

IMAP (Internet Mail Access Protocol) - transfers e-mail messages from client

computers to an e-mail server

TELNET (Telecommunication Network) - transfers files between local and remote

host computers

SSL ( Secure Sockets Layer) - an alternative to POP

 

Reading. Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary.

INTERNET TECHNOLOGY

In 1969 was developed a project called APRANET designed to help scientists communicate and share valuable computer resources.Educators and scientists used primitive command-line user interfaces to send e-mail, transfer files and run scientific calculations on Internet supercomputers. At that time finding the information was not easy. Only in the early 1990s software developers сreated new user-friendly Internet access tools and Internet became available to anyone. Although exact figure cannot be determined, it is estimated that with approximately 200 nodes and 500 million users, Internet traffic exceeds 100 terabytes each week.

The Internet is not “owned” or operated by any single corporation or government. It’s a data communication network that grew over time in a somewhat haphazard configuration as networks connected to other networks.

The Internet backbone consists of high-speed fiber-optic links connecting high-capacity routers that direct network traffic. Backbones links and routers are maintained by network service providers (NSPs). NSP equipment and links are tied together bynetwork access points (NAPs).

Large ISPs connect directly to backbone routers. Smaller ISPs typically connect to a larger ISP to gain Internet access and supply it to their customers.

You can track the route of data you send using Internet utilities, such as Pingand Traceroute. An Internet utility called Ping (Packet Internet Groper) sends a signal to a specific Internet address and waits for a reply. If a reply arrives, Ping reports that the computer is online and displays the elapsed time for the round-trip message. Ping is useful for finding out if the site is up and running. Ping is also useful for determining whether a connection offers adequate speed for videoconferencing or online computer games.

Ping also shows whether packets were lost in transmission. Packets can become lost when signal interference or network congestion overwhelms Internet servers and routers. Too many lost packets during an online gaming session can cause the game to stutter or stall. And if packets don’t arrive in the correct order, your game character might seem to act randomly for a few seconds.

A utility called Traceroute records a packet’s path-including intermediate routers-from your computer to its destination.

An ISP operates network devices that handle the physical aspects of transmitting and receiving data from your computer. Many ISPs operate e-mail servers to handle incoming and outgoing mail for their subscribers and some also have Web servers for subscriber Web sites. ISPs can also maintain servers for chat groups, instant messaging, music file sharing, FTR (File Transfer Protocol) and other file transfer services.

Computer connects to the Internet in one of two ways: it can link directly to ISP using a device such as a voiceband modem, cable modem, satellite dish, or DSL modem. Or, if your computer is part of a LAN, an Internet connection can be provided by a LAN link.

A local area network is called an intranet. Intranets are popular with businesses that want to store information as Web pages but not provide them for public access. An intranet that provides external access is called extranet.

A computer can have a permanently assigned static IP address or a temporally assigned dynamic IP address. As a general rule, computers on the Internet that act as servers use static IP address. Typically, ISPs, web sites, web hosting services, and e-mail servers are constantly connected to the Internet and require static addresses.

Although IP addresses work for communication between computers, people find it difficult to remember long string of numbers. Therefore, many Internet servers also have an easy-to-remember name, i. e. nike.com . The official term for this name is “fully qualified domain name” (FQDN), but most people just refer to it as a domain name. Every domain name corresponds to a unique IP address that has been entered into a huge database called the Domain Name System( DNS).Computers that host this database are referred to as domain name servers. A domain name, such as travelocity.com, must be converted into an IP address before any packets can be routed to it.

The Domain Name System is based on a distributed database. This database is not stored as a whole in any single location; instead, it exists in parts all over the Internet. Your Internet connection is set up to access one of the many domain servers that reside on the Internet. Some domain names are not currently in use, but they are reserved. Internet entrepreneurs have made a business of registering high-profile domain names with the intention of reselling them.

Comprehension check. Mark the following statements as True or False.

 

1. The Internet backbone consists of high-speed fiber-optic links.

2. A local area network is called extranet.

3. A computer must have a permanently assigned static IP address.

4. The Internet is not “owned” by any single corporation or government.

5. Computer connects to the Internet only by linking directly to ISP.

6. You can track the route of data you send using Internet utilities, such as Ping and Traceroute.

 


Поделиться:

Дата добавления: 2015-09-13; просмотров: 68; Мы поможем в написании вашей работы!; Нарушение авторских прав





lektsii.com - Лекции.Ком - 2014-2024 год. (0.012 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты