Firewall 1

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

SECURITY

Firewall & its functions


• A firewall is hardware device(routers) or a software
program running on a secure host network .actually it
is an interface between two or more networked systems.
• Its function is to protects networked computers from
Intruders .
• it requires at least two network interfaces .
• a firewall sits at the junction point between the two
networks .
• The term firewall comes from the fact that by
segmenting a network into different physical sub
networks, they limited the damage that could spread
from one sub net to another just like firedoors or
firewalls.
Hardware Firewall
Software Firewall
Who Needs Firewall ?
• Anyone who is responsible for a private
network that is connected to a public
network needs firewall protection.

• Anyone who connects so much as a single


computer to the Internet via modem should
have personal firewall software.
Basic firewall operation
Advantages
• Firewalls protect private local area
networks from hostile intrusion from the
Internet.

• Firewalls allow network administrators to


offer access to specific types of Internet
services to selected LAN users.
Disadvantages
• The firewall is an integral part of any security
program, but it is not a security program in and
of itself.

• Firewalls only address the issues of data


integrity, confidentiality and authentication of
data that is behind the firewall.
FUTURE
ASPECTS AND
INSRUMENTS
Future ubiquitous instruments
• Near-Future Ubiquitous Networking Devices
Visualized by Designers.

• By the development of ubiquitous technology,


hardware is becoming smaller, thinner, and less
visible than ever before.

• In the near future, IT devices that judge situations to


meet user’s needs, and interfaces that let users access
unlimited information as naturally as breathing.
NGN: an effective response to
heterogeneous future needs
Services Services Services

• Packet transfer
Mediation
Profile
Call control

• interfaces

NB Radio

BB
Radio Packet transfer
BB wireline

 Faster service design and deployments


Gumi – Ubiquitiuos Media Chip
• Ubiquitous media chip.
The chips are covered in a
gummy capsule, and are
edible after use..

• Can be display through


wireless LAN, users can also
enjoy visual contents.

• The chips are sold in


packages just like candies.
Flacon- virtual storage bottle
• flacon:
Virtual storage bottle.

The means to store a
massive amount of images
in our various devices.

• The images emerge on an


inorganic
electroluminescent
display.
P-ISM- Pen Style Personal
• P-ISM :
Networking
A Pen-style Personal Networking
Gadget Package

• P-ISM is a gadget package


including five functions: a pen-style
cellular phone with a handwriting
data input function, virtual
keyboard, a very small projector,
camera scanner and atm cards.

• P-ISMs are connected with one


another through short-range
wireless technology.

• The whole set is also connected to


the Internet through the cellular
phone function.
Tag-Shoft Shell Mobile Phone
• tag:
Soft-shell mobile phone.
"tag" is a new, malleable,
casual communicator .

• Shape-memorizing material
and multiple pressure
sensors allow the phone to
change its shape according
to the mode.
Wacca – Visual memory in
bracelet
• Looking into the
landscape through an
opening, this bracelet will
capture visual images in
the angles adapting to the
distance from the viewers'
faces through distance
sensors installed in the
device.
Duo-pc & Duo phone
• duo-pc:
a laptop PC will have more
flexibility just like paper.
This mobile PC has a
multiple-layer hinge structure
that allows users to open it as
one large display on the desk
and to use it as a tablet PC
and a book browser for
mobile use.

duo-phone:
. It is a next-generation
cellular telephone that can be
also used as a "duo-pc"
mouse and remote control.
“Fast Track” Demonstration
Problem: Retained Instruments
 Estimated 1500 cases / year in the US
 Account for over 50% of malpractice claims
 Average of $60,000 compensation fees
• Total hospital loss – about double
 Several past cases of death
 Hospital reputation
implication
It’s a Real Problem
 2/3 of incidents occurred even though equipment
was counted before and after procedure
 Most were sponges and needles, but also metal
clamps, electrodes and retractors
 Most (70%) patients needed additional surgery to
remove object

Incidents
Incidents are
are rare
rare –– but
but have
have aa huge
huge impact
impact
VISITS – how is it used?
• Scan additional trays during surgery, as required
VISITS – how is it used?
 Take snapshot image of instruments on trays
prior to surgery
VISITS in the Operating Room
Mount cameras on ceiling
or wall above tray tables
and above operation bed

Install UI screen
BIBLIOGRAPHY

•INTERNET
•BOOKS BY
1.BEHROUZ FOROUZAN
2.PRAKASH C GUPTA
3.EMILIO RAMOS

• GUIDE OF NETWORKING
by BRUCE HALLSBERG

You might also like