WIRELESS AND WIRED NETWORKS

Part A

Word List

accomplish /q'kPmplIS/ выполнять, совершать
bandwidth /'bxndwidT/ полоса частот, полоса пропускания, ширина полосы
branch /brQ:ntS/ отделение, филиал, подразделение
forgo /fO:'gqu/ отказываться, воздерживаться
deploy /dI'plPI/ развертывать, использовать
dial-up /'daIqlAp/ дисковый набор
eliminate /I'lImIneIt/ устранять, исключать
emerge /Imq:dZ/ появляться, возникать
foot the bill /'futDq'bIl/ брать расходы на себя, расплачиваться
gobble /'gPbl/ поглощать
intercept /'Intqsept/ перехватывать (сигнал), добывать незаконным путем (информацию)
intrude /In'tru:d/ вторгаться
linger /'lINgq/ засиживаться, задерживаться
obstruction /qb'strAkSqn/ препятствие, затруднение
outlet /'autlet/ торговая точка, магазин
power drain /'pauq'dreIn/ потребление мощности
sophisticated /sq'fIstIkeItId/ сложный, современный, передовой
stall /stO:l/ останавливаться, стопориться
tech-savvy /'tek'sxvI/ сообразительный, находчивый, смышленый
vendor /'vendO:/ продавец, торговец
Wi-Fi hot sport   точка беспроводного доступа в Интернет

 

1. A. Complete the parts of the table where you see dots (…).

Verb Noun Noun agent Adjective
to connect ...
supporter
productive
installation  
subscriber  
to apply  
encryption  
employer
to deploy deployment  
provider  
to receive
intrusion  
to intercept
maintainable

B. Complete the table below.

accomplish  
  operation
construct  
  decryption
add  
involve  
  emergence
allow  
require  
  prevention

 

2. Translate the following sentences paying attention to the words in bold type.

1. Virtual Private Networks (VPNs) also prevent the data from being intercepted by unauthorized third parties.

2. Small businesses can install either a software-based VPN on their servers or an appliance that requires minimal IT skills for installation and maintenance.

3. Some vendors offer easy-to-use plug-n-play appliances that don't require sophisticated skills to install and maintain them.

4. You are using VPNs because you want round-the-clock access to your company data.

5. Subscribing to VPN services also eliminates the need for any internal IT staff to manage the VPNs.

 

3. Find out the equivalents to the following words and word combinations in paragraphs 2 and 3 of the text below.

Кодирование, удаленный, обеспечивать, рентабельный, сеть общего пользования, вторжение, предрасположенный, дорогостоящий, выполнять, дополнительный уровень, поэтому.

 

4. Match the words with their definitions.

1) VPN a) a new network technology that supports

2) remote access multiprotocol virtual networks;

3) encrypting b) to copy or transfer (data or a program) into the

4) download memory of one's own computer from another

5) firewall computer or the Internet;

6) tunneling protocol c) a network that uses the Internet to transfer

information using secure methods;

d) a computer system that isolates another computer

from the Internet in order to prevent unauthorized

access;

e) an access to a computer from a physically separate

terminal;

f) putting (a message) into code.

 

5. Read the text and find the definition of a VPN.

6. Read the subtitles and name the key points raised in the text.

 

What is a VPN?

1. As prices come down, virtual private networks are becoming a good small business option to connect remote employees. It’s easy to spend half the time out on the road these days. But to do business, you need access to applications and documents back on the company network. And you need them via remote access that won't compromise security or break the bank.

2. Thankfully, secure, cost-effective remote communication can be accomplished via a virtual private network (VPN). A VPN is a private network that connects a remote computer to the home network via a public network such as the Internet. Using a public network like this makes the operation much less costly and therefore more affordable for small or mid-size businesses than constructing a private network.

3. Yet even on the Internet, which is prone to intrusion and hacking, VPNs ensure privacy via encryption technology, tunneling protocols, and security procedures. “In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a ‘tunnel’ that cannot be ‘entered’ by data that is not properly encrypted,” says Paul Stamp, of Forrester Research, a Cambridge, Mass. research firm. “An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses”.