Protection Technology
Bluetooth has the protection technology of the transmitted data which ha\e been built-in m protocol. Depending on carried out tasks, three modes of protection in which are stipulated can there is a device.
Security mode 1 (non secure), the device can not independently initiate protective procedures.
Security mode 2 (service level enforced security), the device does not initiate protective procedures yet is not established and the connection is not adjusted After the connection is established, the procedures of protection are obligatory, and are defined i determined) by a type and requirements of used services.
Security mode 3 (link level enforced security), the protective procedures are initiated during an establishment and tuning of connection. If the removed device can not fulfill the requirements of protection, the connection is not established.
Of course, that Security mode 3 and 2 can be used together, that is at first protected connection is established, and then it is protected according to the requirements and opportunities of a concrete service
Basis of Bluetooth safety system, used in Security mode 3, is the concept of a session key, or Bond. The session key generates during connection of two devices, and is used for identification and enciphering of the transmitted data. For a key generation most various components, both meanings, beforehand known for both devices, and physical addresses of devices can be bining protection at a level of connection with protection at a level of the applications (where any of existing on today systems of protection of the data can be used absolute) it is possible to create the reliably enough protected connections. But from the point of view of protected connection's construction, obvious weakness of Bluetooth stay an opportunity of interception of the traffic, and for this purpose will not necessary to use specific equipment. However, this problem is not new, and now often it is necessary to use open networks, like the Internet, where the interception of the traffic is possible, care of the closed data.
Digital house
If competent use Bluetooth technologies, it can really turn human life. Already now at exhibitions the printers with Bluetooth are demonstrated which should not be connected to the computer, enough to bring it in a room to switch on in the socket, and it is possible to begin to print. Same correctly and in the return order, enough enter a room with notebook equipped Bluetooth in hands, and at once it is possible to use the printer, enter a local network for an exchange of files and documents, to use the Internet connection. RJ-45 is socket for notebook, which can be met in some planes and airports soon should depart in the past. Some illustrations with an exhibition Comdex Fall: Toshiba.
Headphones, Video Camera, Microphone, Commutator As Clock.
The systems hands tree with use Bluetooth become so simple in use, as far as it only is possible Enough that the mobile telephone with Bluetooth by the interface simply would be somewhere inside the automobile, and its connection to hands free to system will take place automatically. Standardization used in Bluetooth, will allow making wireless mice, keyboard, video-game machine and game pads which will suit any PC, and for what begin work with requisite device-it will enough to approach to computer, instead of to switch off it, and climp under a table with wires. Due to same standardization, it is possible in some years we get rid of heap of remote consoles on a sofa separate for the TV, separate for the video recorder, separate for music centre, separate for DVD - player, separate for the conditioner, and so on, and we shall operate all engineering in an apartment by means of mobile telephone, which besides and will be PDA. But it is not a limit. Recently is much spoken about the concept "of a digital house ". Some, well known and serious corporation literally were mad about it. The technology Bluetooth can lift this idea on new height. Imagine, you have trinket (bracelet, ring, everything), with Bluetooth by the device capable to accept \our vote and to pass it on the central computer in the house. The powerful server identifies a vote, distinguishes a sound command, and by menace Bluetooth will give a command for any periphery scattered in the house. Thus, the voice commands will be possible given for all things m the house, TVs, bulbs, curtains, conditioners, microwave oven, waste tank in a toilet, eventually! And thus there will be no necessity that this entire periphery would have sufficient computing power. There is enough of powerful computer in the house for vote recognition. Besides, will not come to care of that what a new refrigerator, for example, to connect and to adjust under your home network, it is enough only to be convinced, that the refrigerator has Bluetooth interlace Moreover, rule by the house it will be possible through the mobile telephone, practically from any point of globe. It is all certainly conveniently, but here as well as in any network can appear burglar. Already now it is possible to think up about ten measures, which strongly will complicate life of burglar, but as was spoken above, the counteraction of the reservation both shell proceeds, and end to this process will be never But as, all it can be conveniently, if we do not notice "little technical malfunctions''. It is in the future. And today, Bluetooth devices can be met basically only at exhibitions, or on sale, but for the prices, which can not promote their wide expansion. Besides, majority of Bluetooth devices demonstrated today are not universality, that it is far from being always can find out each other or to use given services, if beforehand is not stipulated that particularly THIS device should work with concrete THIS. But it is only beginning, and both technology, and software will continue to be improved. Sometime, can even be absolutely speed, that today becomes seems by a wild fantasy by a reality.
THE LANGUAGE OF E-MAIL
E-mail is the simplest and most immediate function of the Internet for many people. Run through a list of questions that new e-mail users ask most and some snappy answers to them.
What is electronic mail? Electronic mail, or e-mail as it's normally shortened to, is just a message that is composed, sent and read electronically (hence the name). With regular mail you write out your message (letter, postcard, whatever) and drop it off at the post office. The postal service then delivers the message and the recipient reads it. E-mail operates basically the same-way except that everything happens electronically. You compose your message using e-mail software, send it over the lines that connect the Internet's networks and the recipient uses an e-mail program to read the message.
How does e-mail know how to get where it's going? Everybody who's connected to the Internet is assigned a unique e-mail address. In a way, this address is a lot like the address of your house or apartment because it tells everyone else your exact location on the Net. So anyone who wants to send you an e-mail message just tells the e-mail program the appropriate address and runs the Send command. The Internet takes over from there and makes sure the missive arrives safely.
What's this netiquette stuff I keep hearing about? The Net is a huge, unwieldy mass with nо "powers-that-be" that can dictate content or standards. This is, for the most part, a good thing because it means there's no censorship and no one can wield authority arbitrarily. To prevent this organized chaos from descending into mere anarchy, however, a set of guidelines has been put together over the years. These guidelines are known collectively as netiquette (network etiquette) and they offer suggestions on the correct way to interact with the Internet's denizens. To give you a taste of netiquette, here are some highlights to consider.
What's a flame? The vast majority of e-mail correspondence is civil and courteous, but with millions of participants all over the world, it's inevitable that some folks will rub each other the wrong way. When this happens, the combatants may exchange emotionally charged, caustic, often obscene messages called flames. When enough of these messages exchange hands, an out-and-out flame war develops. These usually burn themselves out after a while, and then the participants can get back to more interesting things.
Is e-mail secure? In a word, no. The Net's open architecture allows programmers to write interesting and useful new Internet services, but it also allows unscrupulous snoops to lurk where they don't belong. In particular, the e-mail system has two problems: it's not that hard for someone else to read your e-mail, and it's fairly easy to forge an e-mail address. If security is a must for you, then you'll want to create an industrial strength password for your home directory, use encryption for your most sensitive messages, and use an anonymous remailer when you want to send something incognito.
INTERNET
One of the main differences of the Internet from all rest, that is connected to computers, is that for successful work with it (him), generally speaking, it is not necessary of any books. Internet can serve both directory, and tutorial, and encyclopedia itself. However on the initial stage, as it seems, the advantage(benefit) of the book, distinctly and is accessible of a stating basis, can be rather ch book I also have tried to write. But before you will get acquainted to it(her) more close, let's try to answer on the most important question, which, probably, you already set to yourselves: The Internet: that it, at last, such more or less scientific definition of the Internet, which the books and clauses on this subject are filled, certainly with, have the value. But the simplest explanation suffices for our purposes while: the Internet is a set of computers connected with each other by channels of communication (connection), plus a set of standard rules, on which they exchange by the information. Thus channels of communication (connection), perhaps, even are less important, than rule of data transfer on them, named in the Internet by the protocols. If even two computers cooperate on one of such protocols is already present Internet.
|
Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 |


