Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

If Architects Had to Work Like Programmers

Читайте также:
  1. Training of Architects Abroad

Please design and build me a house. I am not sure of what I need; you should use your discretion. My house should have between two and forty-five bedrooms. Just make sure the plans are such that the bedrooms can be easily added or deleted. When you bring the blueprints to me, I will make the final decision of what I want. Also bring me the cost breakdown for each configuration so I can arbitrarily pick one. Keep in mind that the house I ultimately choose must cost less than the one I am currently living in. Make sure, however, that you correct all the deficiencies that exist in my current house (the floor of my kitchen vibrates when I walk across it and the walls don't have nearly enough insulation in them.)

As you design, also keep in mind that I want to keep yearly maintenance cost as low as possible. This should mean the incorporation of extra-cost features like aluminum, vinyl, or composite siding. (If you chose not to specify aluminum, be prepared to explain your decision in detail.)

Please take care that the modern design practices and the latest materials are used in the construction of the house, as I want it to be a showplace for the most up-to-date ideas and methods. Be alerted however, that the kitchen should be designed to accommodate, among other things, my 1952 Gibson refrigerator.

To insure that you are building the correct house for my entire family, make certain that you contact each of my children and also my in-laws. My mother-in-law will have very strong feelings about how the house should be designed, since she visits us at least once a year. Make sure that you weigh all these options carefully and come to the right decision. I, however, retain the right to overrule any choices you make.

Please don't bother me with small details right now. Your job is to develop the overall plans for the house, get the big picture. At this time, for example, it is not appropriate to be choosing the color of the carpet. Keep in mind, however that my wife likes blue.

Also do not worry at this time about acquiring the resources to build the house itself. Your first priority is to develop detailed plans and specifications. Once I approve these plans, however, I would expect the house to be under construction within 48 hours.

While you are designing this house specifically for me, keep in mind that sooner or later I will have to sell it to someone else. It therefore should appeal to a wide variety of potential buyers. Please make sure before you finalize the plans that there is a consensus of the population in my area that they like the features this house has.

I can advise you to run up and look at my neighbor's house he constructed last year. We like it a great deal. It has many of the features that we would also like in our new home, particularly the 75-foot swimming pool. With careful engineering, I believe that you can design this into our new house without impacting the final cost.

Please prepare a complete set of blueprints. It is not necessary at this time to do the real design, since they will be used for construction bids. Be advised, however, that you will be held accountable for any increase of construction costs as a result of later design changes.

You must be thrilled to be working on as interesting a project as this! To be able to use the latest techniques and materials and to be given such freedom in your designs is something that can't happen very often. Contact me as soon as possible with your complete ideas and plans.

PS My wife has just told me that she disagrees with many of the instructions I've given you in this letter. As architect, it is your responsibility to resolve these differences. I have tried in the past and have been unable to accomplish this. If you can't handle the responsibility, I will have to find another architect.

PPS Perhaps what I need is not a house at all, but a travel trailer. Please advise me as soon as possible if this is the case.

Some useful words and word-combinations

Unixoid: Orthodox Unixoid -a believer in Solaris and other BSD style OSes. Heavy user of VI. Usually hates Java and suspects that the best language in C.

Linuxoid - mutant that believes mainly in Linux Penguin sexual appeal. Slashdot fan. Promiscuous as for editors choice. Usually hate FreeBSD out of political correctness it somebody compare it to Linux. But sometimes can say nice word about Solaris it is not compared with Linux directly and because of Gnome. Supports Transmeta because of Linux Torvalds although usually understand nothing about microprocessor design.

Renegat - unixoid or linuxoid who recently became a fan of Windows.

Part III

Check yourself.

I. True or false?

1. The system administrator generally has an administrator account.

2. Some file types are readable on more than one OS.

3. Handheld computers do not contain an OS.

4. An OS manages resources for applications.

5. There are five basic types of software.

6. To share files across operating system platforms, you can use solutions involving hardware, software, and data. For example, saving data or work files in the Rich Text Format means that most other operating systems can read the file.

7. An operating system sets limitations to protect itself and the data on the computer. The operating system grants permission to you to perform some task but prevents you from performing others according to your user rights.

8. The system administrator has unrestricted access to make system-wide changes to the computer, including those that affect other users. Without administrative rights, you cannot make changes such as system modifications, installing software, or changing network settings.

9. Typical operating system problems include file incompatibility, file corruption, and disk crashes.

 

LESSON 3

Network Fundamentals. The Internet.

The World Wide Web URL (Uniform Resource Locator) - an Internet address of a document on a computer begin with http://.

HTTP stands for Hypertext Transfer Protocol - the protocol that allows Web browsers to communicate with Web servers

Task 1 Can you say? Let’s do it!

I. Pronunciation drills

apple -sample oberon- interferon
Pentium - centrum unix-linux
Macintosh - tosh mainframe - same
bassinette - diskette red hat – white cat
illiterate - stimulate black berry – blue cherry

II. Tongue twister

Hush little baby don't you fret Hush little baby don't be glum

Papa can't use a computer yet Papa's gonna buy you a Pentium

How it hurts me to confess And if that Pentium should crash

Mama don't have no email address Mama's gonna buy you a Macintosh

 

Don't you worry, don't be alarmed We'll put a screen in your bassinette

We'll get you online before you're harmed Ain't raisin' no computer illiterate

We'll place a mouse in your wee hand

Before you can walk, or even stand

III. Pronunciation practice

grow and purchase, advantageous to connect, share software and hardware, connect to employees, suppliers, and customers, fairly complicated, regardless of size or type, government-owned voice-oriented systems, benefits of a network, authorized user, instant messaging, combining the power and capabilities, diverse equipment and software, personal productivity, frequently used peripherals, updating software, instantaneous delivery, computer network design, scope or scale, utilize leased lines,

gradually emerged, technology evolution, topologies such as bus, ring and star, type of architecture, peer-to-peer network, to download simultaneously, point of view of data flow, handbooks and employee manuals, newsletters, employment forms.

IV. Which word is different? Part of speech. Make up three more word lines.

1. purchase, acquisition, buying, obtaining, procurement, securing, simultaneously, consumption;

2. to reach, arrive at, get to, attain, make, achieve, accomplish, utilization, turn up, show

3. utilize, use, make use of, apply, exploit, make the most of, employ, operate, consume, application, develop

4. combined, linked, amalgamated, merged, united, fused, separated, joined, joinery

Task 2 Can you translate and explain? Let’s do it!

I. Do you remember the meaning of the following words? Fill in the table.

  verb translation noun adjective synonym
1. to allow        
2. to apply        
3. to collaborate        
4. to depend        
5. to designate        
6. to emerge        
7. to flow        
8. to identify        
9. to increase        
10. to join        
11. to link        
12. to locate        
13. to manage        
14. to occur        
15. to own        
16. to perform        
17. to purchase        
18. to reach        
19. to remain        
20. to support        
21. to transfer        
22. to update        
23. to utilize        

II. Which word is different? Synonyms.

1. link, connect, relate, separate, associate, bring together, link up, network, join, combine, couple, conjoin;

2. let, permit, agree, consent, forbid, tolerate, countenance, sanction;

3. locate, place, put, remove, position, situate, fix, station, post, set, establish;

4. increase, upsurge, surge, rise, growth, intensification, decrease, escalation, proliferation, upturn, spread, expansion, multiplication, buildup;

5. do, carry out, achieve, make, act upon, complete, accomplish, execute, implement, present, act, play, put on, stage, do, enact, impersonate, function, work, behave, act, go, run, operate, react, perform, manage, fail.

 

III. Find the meaning of the following words.

1. b to support a to recognize and name; consider as same
2. to identify b to provide assistant with computer system
3. to remain c to handle and control something
4. to transfer d to have smth. as property
5. to own e to copy a design or image from a piece of paper onto a different material
6. to designate f to provide new information
7. to update g to mark or indicate smth.
8. to manage h to continue in a particular state without changing

IV. Guess the word. The meaning is given to you.

1. to be designed to allow smth. (a specific type of software, computer device or programming language, to operate with it –

2. to work with other person or group oin order to achieve smth.-

3. to vary according to a circumstances –

4. to arise, appear or occur –

5. to use something to achieve a result –

6. to happen, exist, come about, be present –

V. Choose the core word.

Flow chart, flow cytometry, flow diagram, flow karyotyping, flow rack, flow sheet, flow statistics -

VI. Guess the sentence encoded.

gjljhThertthcxwebjhfdesitegdwbbcis;kjhgupdatedyfrwfvevery;khgdsmonthkfssl.

Task 3 Can you read and understand? Let’s try!

I. a) Read the following text, draw in your notebook and complete the table by filling the columns with the underlined words according to the part of speech they are in the text and by forming all possible parts of speech. The example is given.

verb translation noun adjective/ adverb synonym
to effect впливати, ефективно effect effectively efficiently, successfully, well
         
         

b) Study the text, give your own title to it, try to encounter types of networks and explain how they are set up physically. By the end of this reading you should be able to answer the following questions: What is (Computer) Networking? What is a WAN? How are the Networks classified?

Part I

As companies grow and purchase more computers, they often find it advantageous to connect those computes through a network, a group of two or more computers linked together. This allows users to share software and hardware such as printers, scanners, and other devices. In addition to using a local network, organizations use more far-reaching networks to connect to employees, suppliers, and customers nationally and even internationally.The locations can be in the same city or in different locations all over the world.

Most people think of networks as fairly complicated. However, at the lowest level, networks are not that complex. In fact, a network is simply a group of two or more computers linked together. As the size of a network increases and more devices are added, installing devices and managing the network becomes more technical. Even so, networking concepts and terminology basically remain the same regardless of size or type.

Different types of networks. Different types of networks transfer different types of data.

 Computer network – you can transfer text, images, video, and audio files.

 Telephone network – similar in makeup to a computer network, though its transfers voice data.

 Public Switched Telephone Networks (PSTN) supports telephone service and is the world’s collection of interconnected commercial and government-owned voice-oriented systems. Digital, mobile, and standard telephones are supported through this network.

Identifying the Benefits of a Network. To identify the benefits of a network, you might think first about the biggest network of all – the Internet. Consider some of the many changes that have occurred in our society in the last few years because of the Internet. One profound change is electronic mail. A network provides instant communication, and e-mail messages are delivered almost immediately.

Information sharing. Authorized users can access computers on the network to share information, data, and other resources. People share information through special group projects, newsgroups, databases, blogs, FTP (file transfer protocol), Internet telephony (ex. Skype), instant messaging, social media, and so on. Users around the world can connect to each other to access, share, and exchange information.

Collaborative environment. A shared environment enables users to exchange files and collaborate on group projects by combining the power and capabilities of diverse equipment and software, thus increasing personal productivity.

Hardware sharing. It is not necessary to purchase a printer or a scanner or other frequently used peripherals for each computer. Instead, one device connected to a network can serve the needs of many users.

Software sharing. Instead of purchasing and installing software on every computer, it can be installed on the server. All of the users can then access the program from this one central location. Software sharing save s money because companies can purchase a site license for their users. This practice is less expensive than purchasing individual software packages, and updating software on the server is much easier and more efficient than updating it on individual computers.

Enhanced communications. Electronic mail, text messages, social media, and other electronic communication have changed the way the world interacts. One advantage is the almost instantaneous delivery of e-mail. The cost for e-mail does not depend on the size of the message or the distance the message has to travel.

In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a combination of computer hardware and computer software.

Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:

LAN - Local Area Network

WLAN - Wireless Local Area Network

WAN - Wide Area Network. The world's most popular WAN is the Internet. Some segments of the Internet, like VPN-based extranets, are also WANs in themselves. Finally, many WANs are corporate or research networks that utilize leased lines.

MAN - Metropolitan Area Network

SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network

CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network

PAN - Personal Area Network

DAN - Desk Area Network

LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution.

Note that these network types are a separate concept from network topologies such as bus, ring and star.

Part II

The design of a network, including how it is set up physically, is called its architecture. Client/Server Network. In this type of architecture, one or more computers on the network acts as a server. The server manages network resources. Depending on the size of the network, several servers might be connected. A print server manages the printing and database server manages a large database. In most instances, a server is a high-speed computer with considerable storage space. The network operating system software and network versions of software applications are stored on the server. All the other computers on the network are called clients. They share the server resources and other peripheral such as hub s, firewalls, and route rs.

Hub. Is a small, simple, inexpensive device that joins multiple computers together. Users access the server by entering a user name and password. Some networks use a switch, which performs the same tasks as a hub and is much faster.

Peer-to-Peer Network. In a peer-to-peer (P2P) network, all the computes are equal. No computer is designated as the server. People on the network each determine what files on their computer they share with others on the network. This type of network is much easier to set up and manage. Many small offices use P2P networks. Some types of P2P networks allow you to download different parts of file s imultaneously from several computes at the same time. Using this format, you can potentially get much faster downloads and get larger files more quickly.

A network topology represents its layout or structure from the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring networks and mesh networks.

Classification of Networks. Networks are also classified by the type of technology they use to share information. Most networks use the Internet Protocol (IP) technology to share data and resources. Intranet. Is designed for the exclusive use of people within an organization. Many businesses have implemented intranets. Documents such as handbooks and employee manuals, newsletters, employment forms, and other relevant company documents are the types of files stored on an intranet server. Extranet. Is similar to an intranet, but allows specific users outside of the organization to access internal information systems. Like the Internet, intranets and extranets use and support Web technologies, such as hyperlinks and Web pages coded in hypertext markup language (HTML). Internet. Is a worldwide system composed of thousands of smaller networks. This global network allows computers worldwide to connect and exchange information.The Web and electronic mail are two of the more popular components of the Internet.

The popularity of computer networks sharply increased with the creation of the World Wide Web (WWW) in the 1990s. Public Web sites, peer to peer (P2P) file sharing systems, and various other services run on Internet servers across the world.

II. Translate the following word combinations.

Part I: to connect through a network, to share software and hardware, to connect to employees, suppliers, and customers, to install device, to manage the network, to remain the same, to transfer different types of data, to support telephone service, to identify the benefits, to consider changes, to be delivered immediately, to provide communication, to share information, to enable users, to exchange files, to increase productivity, to purchase a printer, to serve the needs, to access the program, to purchase individual software packages, to update software, to change the way of interaction, to depend on the size, to define the type;

Part II: to act as a server, to manage network resources, to be stored on the server, to manage the printing and database server, to be called clients, to share the server resources, to access the server, to use a switch, to perform the same tasks, to determine the files, to allow to download, to represents layout or structure, to flow through one centralized device, to share information, data and resources, to have implemented intranets, to include bus, star, ring and mesh networks, to be designed for the exclusive use, to be stored on an intranet server, to access internal information systems

 

III. Put the sentences into the right order and read the text.

1. typically span /Local area networks (LANs)/ a single home, /school, /or small office building.

2. states,/ Wide area networks /(WANs), /reach across cities, / or even across the world.

3. largest /The Internet/ public/ is the world's/ WAN.

4. can be either/ Transmission / physical/ media / or wireless.

5. is/The best way / to/ effectively/ to protect data/ control /the access to it.

6. the responsibility/ Generally,/ this protection is/ and security personnel./ of the network administrators

7. they may obtain/ If unauthorized persons/ to data,/ gain access/ valuable information/ or trade secrets.

8. into computer systems/ Hackers /are people / to steal services/ who break/ and information.

9. communications/ A modem a type of / / is/ device.

10. and forwarding /A hub/ is/ the incoming/ a device that controls/ of data.

11. directs traffic/ A router/ or on multiple/ on the Internet / connected networks.

IV. As with any technology, you should consider the disadvantages of using a network along with the benefits. For instance, data insecurity and the vulnerability to unauthorized access are primary weaknesses of many networks. The security of a computer network is challenged every day by equipment malfunctions, system failures, computer hackers, and virus attacks. Find information given below, choose the title for every paragraph from given below and prepare an oral report in which evaluate the risk of networked computing and disadvantages of networks.

Hackers and viruses, Privacy, Disadvantages of Networks,

Malfunctions and failures.

__________________ Equipment malfunctions and system failures are caused by a number of factors, including natural disasters such as floods or storms, fires, and electrical disturbances such as brownouts or blackouts. Server malfunctions or failures mean users temporarily lose access to network resources, such as printers, drivers, and information.

_______________________Computer hackers and viruses present a great risk to networked environments. Hackers are people who break into computer systems to steal services and information, such as credit card numbers, passwords, personal data, and even national security information. Hackers can also delete data. Other people threaten network and data creating viruses andother types of malicious software, which are particularly dangerous to networked computers because these programs usually are designed to sabotage shared files.

______________________Individual loss of autonomy: Networks can play a part in taking away an individual’s autonomy (independence) by controlling which software programs are accessible, and keeping a record of how the computer is used and what sites are accessed.

- Malicious code: Compared to stand alone computers, networks are more vulnerable to viruses, worms, Trojan horses, e-mail bombs, and spyware.

- Network faults: Networks equipment problems can result in loss of data and resources.

- Setup and management cost: Setting up a network requires an investment in hardware and software; ongoing maintenance and management of the network requires the care and attention of at least one IT professional.

__________________ - Lack of privacy: For example, e-mail is not necessarily private. - Messages travel through a number of systems and networks and provide opportunities for others to intercept or read the messages.- Junk e-mail also can become a problem. - On the other hand, a stand alone system is not vulnerable to many of these risks because it does not share connections with other computers.

V. Fill in the gaps with prepositions via, on, in, of, to, by, with, within, through, for (…) and pronouns all, these, their, other, each other (____)

1. Residences typically employ one LAN and connect … the Internet WAN … an Internet Service Provider (ISP) using a broadband modem.

2. The ISP provides a WAN IP address … the modem, and ________ … the computers … the home network use LAN (so-called private) IP addresses.

3. ________ computers … the home LAN can communicate directly … __________ but must go … a central gateway, typically a broadband router, to reach the ISP.

4. While ________ types … networks are built and maintained … engineers, home networks belong to ordinary homeowners, people often … little or no technical background.

5. Various manufacturers produce broadband router hardware designed … simplification … home network setup.

6. Home broadband routers allow devices … different rooms … efficiently share a broadband Internet connection, enable people … more easily share ___________ files and printers … the network, and help with overall network security.

7. Home networks have increased … capability … each generation … new technology.

8. Years ago, people commonly set up __________ home network just to connect a few PCs, share some documents and perhaps a printer.

9. Now it’s common … households to utilize network game consoles, digital video recorders, and smartphones… streaming sound and video.

10. Home automation systems have also existed … many years, but _________ too have grown … popularity more recently … practical systems … controlling lights, digital thermostats and appliances.

VI. Find information on The Twelve Networking Truths by R. Callon And.

1. It Has To Work.

2. No matter how hard you push and no matter what the priority, you can't increase the speed of light. (2a) (corollary). No matter how hard you try, you can't make a baby in much less than 9 months. Trying to speed this up *might* make it slower, but it won't make it happen any quicker.

3. With sufficient thrust, pigs fly just fine. However, this is not necessarily a good idea. It is hard to be sure where they are going to land, and it could be dangerous sitting under them as they fly overhead.

4. Some things in life can never be fully appreciated nor understood unless experienced firsthand. Some things in networking can never be fully understood by someone who neither builds commercial networking equipment nor runs an operational network.

5. It is always possible to aglutenate multiple separate problems into a single complex interdependent solution. In most cases this is a bad idea.

6. It is easier to move a problem around (for example, by moving the problem to a different part of the overall network architecture) than it is to solve it. It is always possible to add another level of indirection.

7. It is always something Good, Fast, Cheap: Pick any two (you can't have all three).

8. It is more complicated than you think.

9. For all resources, whatever it is, you need more. Every networking problem always takes longer to solve than it seems like it should.

10. One size never fits all.

11. Every old idea will be proposed again with a different name and a different presentation, regardless of whether it works.

12. In protocol design, perfection has been reached not when there is nothing left to add, but when there is nothing left to take away.

VII. Fill in the Blanks Complete the following sentences by writing the correct word.

1. ______________, which consists of special hardware and software, protect internal networks from external networks.

2. A(n)_____________ converts analog signals to digital and vice versa.

3. A(n) _____________ ______________ is a type of fiber-optic telephone line.

4. The ______________ is a worldwide system composed of thousands of smaller networks.

5. In a client/server network, the _____________ manages network resources.

Task 4 Can you write? Let’s do it!

I. Rewrite the extract filling in the missing letters.

Identifying Network Types. Netwo…ks can be catego…ized by size as local a…ea netwo…ks (LANs) or wide are netwo…ks (WANs). They can also be clas…ified by t…pe, which incl…des client/se…ver, peer-to-peer, int…anet, ext…anet, and the Inte…net.

Local Area Networks (LAN). Most LANs connect pe…sonal compute…s, wo…kstations, and other dev…ces such as p…inters and scan…ers in a lim…ted geograp…ical a…ea, such as an of…ice bu…lding, sc…ool, or home. E…ch devi…e on the net…ork is called a no…e, and each node gene…ally sha…es resou…ces such as a p…inter, prog…ams, and other ha…dware.

Wireless LAN (WLAN). A wi…eless LAN (WLAN) is a va…iation of the LAN that uses few if any p…ysical wi…es to con…ect devi…es. To com…unicate on a WLAN, the comp…ter and other devi…es that ac…ess the net…ork must each cont…in a wi…eless dev…ce such as a ne…work ca…d, fla…h ca…d, PC ca…d, USB net…ork adap…er, or other t…pe of bu…lt-in wi…eless cap…bility or a wi…eless net…ork ca…d.

Wide Area Networks (WAN). A WAN cove…s a large geog…aphical a…ea and can cont…in com…unication lin…s acro…s met…opolitan, reg…onal, or nat…onal bou…daries. The com…unications area might be as la…ge as a st…te, count…y, or even the wo…ld. The la…gest WAN is the Inte…net. Most WANs con…ist of two or more LANs and are conne…ted by ro…ters, which dire…t traf…ic on the Internet or on m…ltiple con…ected netwo…ks. Communi…ations c…annels can incl…de telep…one systems, fiberopti…s, satell…tes, micro…aves, or any combin…tions of these.

II. Dictate the following text to your group mate. Check it together.

In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a combination of computer hardware and computer software. Server Operating System (OS). Server Operating systems are hi-end programs designed to provide network control and include special functions for connecting computers and other devices into a network. Three of the more popular server OS are Microsoft windows, Mac OS X, and UNIX/Linux. The selection of an OS is determined by how the server will be accessed, security issues, whether the serve will host a database, whether forms will be processed, whether programs such as Microsoft Expression Web or Adobe Dreamweaver will be used, and other individual factors. Client access to the server can be through desktop or notebook computers, handheld devices, game systems, and other similar electronic devices.

III. Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are: MAN, CAN, WLAN, LAN, PAN, WAN, SAN, DAN. Fill in the following table with these abbreviations.


Дата добавления: 2015-10-29; просмотров: 108 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
II. Read the sentences and choose the necessary word.| Network Switcher

mybiblioteka.su - 2015-2024 год. (0.042 сек.)