SlideShare a Scribd company logo
1 of 34
Network Structure presentation backgrounds
Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development  Center (iDEC) UPM  Email 172.16.240.200 Proxy Server UPM  Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized  user outside UPM campus.
From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
Proxy server ,[object Object]
 A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
The proxy server evaluates the request according to its filtering rules      ( filter traffic by IP address or protocol)
If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server ,[object Object]
Router ,[object Object]
Routers utilize routing tables and headers to settle the finest passageway for the package to follow
Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
Routers join networks that are not attached directly to one another   ,[object Object]
Switch ,[object Object]
Switches allow dozens of devices to connect.
Switches keep traffic between two devices from getting in the way of your other devices using the same network.
Switches allow control of who has access to various parts of the network.
Switches allow you to monitor usage.
Switches allow communication (within your network) that's even faster than the Internet.,[object Object]
GSM have fix 6 wireless modem which Provided to student to access through their laptop .    Hardware : Used Dlink wireless modem    Software : Access Point Manager
Question 3 Firewall ,[object Object]
 A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
There are both hardware and software firewall; Hardware firewall is a physical piece of equipment that sits between the network and your computer, but software firewalls must be installed as a program on your computer .,[object Object]
The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
Using WinGate, all of the computers on your network can share the Internet simultaneously.,[object Object]
AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
Features include:
 proactive management
modem configuration, security
diagnostics and statistics gathering,[object Object]
Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
 Entries are commonly displayed in reverse-chronological order.

More Related Content

What's hot

POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...The University of Texas (UTRGV)
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Networkvictor okoth
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Mubashir Ali
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project designTotal Assignment Help
 
English for engineering
English for engineeringEnglish for engineering
English for engineeringQoimah Adielah
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 

What's hot (17)

Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Primch5cg
Primch5cgPrimch5cg
Primch5cg
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Technical paper
Technical paperTechnical paper
Technical paper
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 

Viewers also liked

04 the middle of genesis
04 the middle of genesis04 the middle of genesis
04 the middle of genesisTodd Patterson
 
BIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorBIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorLeeds Met FSD
 
Leeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD
 
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberFSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberLeeds Met FSD
 
Professional development solutions
Professional development solutionsProfessional development solutions
Professional development solutionsSorin Sandu
 
International literacy day - 8th September
International literacy day - 8th SeptemberInternational literacy day - 8th September
International literacy day - 8th SeptemberMohammed Ali Buharoon
 
SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2anthonytate88
 
Prakash3
Prakash3Prakash3
Prakash3rraj801
 
"Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp""Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp"lproubasta
 
Worthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For TechnologyWorthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For Technologywlcouch
 
Cable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseCable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseMichael Kareev
 
Solar system w_wtba_m
Solar system w_wtba_mSolar system w_wtba_m
Solar system w_wtba_mpateacha
 

Viewers also liked (20)

Mi Plus Ttm
Mi Plus TtmMi Plus Ttm
Mi Plus Ttm
 
05 the end of genesis
05 the end of genesis05 the end of genesis
05 the end of genesis
 
04 the middle of genesis
04 the middle of genesis04 the middle of genesis
04 the middle of genesis
 
CILC2010
CILC2010CILC2010
CILC2010
 
CILC2010
CILC2010CILC2010
CILC2010
 
BIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorBIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact Calculator
 
Leeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD Progress
Leeds Met FSD Progress
 
CILC2010
CILC2010CILC2010
CILC2010
 
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberFSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
 
CILC2010
CILC2010CILC2010
CILC2010
 
Professional development solutions
Professional development solutionsProfessional development solutions
Professional development solutions
 
International literacy day - 8th September
International literacy day - 8th SeptemberInternational literacy day - 8th September
International literacy day - 8th September
 
SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2
 
3 PR
3 PR3 PR
3 PR
 
Prakash3
Prakash3Prakash3
Prakash3
 
"Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp""Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp"
 
Worthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For TechnologyWorthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For Technology
 
Jesus
JesusJesus
Jesus
 
Cable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseCable networks in the United States and an HBO case
Cable networks in the United States and an HBO case
 
Solar system w_wtba_m
Solar system w_wtba_mSolar system w_wtba_m
Solar system w_wtba_m
 

Similar to Web Technology (20)

Network security
Network securityNetwork security
Network security
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Web Technology

  • 2. Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development Center (iDEC) UPM Email 172.16.240.200 Proxy Server UPM Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
  • 3. Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized user outside UPM campus.
  • 4. From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
  • 5.
  • 6. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
  • 7. The proxy server evaluates the request according to its filtering rules ( filter traffic by IP address or protocol)
  • 8. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
  • 9.
  • 10.
  • 11. Routers utilize routing tables and headers to settle the finest passageway for the package to follow
  • 12. Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
  • 13.
  • 14.
  • 15. Switches allow dozens of devices to connect.
  • 16. Switches keep traffic between two devices from getting in the way of your other devices using the same network.
  • 17. Switches allow control of who has access to various parts of the network.
  • 18. Switches allow you to monitor usage.
  • 19.
  • 20. GSM have fix 6 wireless modem which Provided to student to access through their laptop . Hardware : Used Dlink wireless modem Software : Access Point Manager
  • 21.
  • 22. A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
  • 23. Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
  • 24.
  • 25. The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
  • 26.
  • 27. AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
  • 28. AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
  • 32.
  • 33. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
  • 34. Entries are commonly displayed in reverse-chronological order.
  • 35.
  • 36. Usually with more restricted usage rights. Because it may be copyrighted, you may or may not be able to reuse it in programming you are developing.
  • 37.
  • 38. The search results are generally presented in a list of results and are often called hits.
  • 39. The information may consist of  web pages, images, information and other types of files.
  • 40. Some search engines also  mine data available in data or open directories.
  • 41.
  • 42. Modern email operates across the internet or other computer networks.
  • 43. Some early email systems required that the author and the recipient both be online at the same time, instant message.
  • 44. Today's email systems are based on a store-and forward model.
  • 45.
  • 46.
  • 47. FTP is built on a clientserver architecture and utilizes separate control and data connections between the client and server.
  • 48.
  • 49.
  • 50.
  • 51. A worldwide network of news discussion groups.
  • 52.
  • 53. Group members communicate, collaborate and share information with each other using the internet and email.
  • 55. to keep your group informed and up to date
  • 56. Easy to use and maintain
  • 57. Doesn't require any programming skills or software downloads
  • 58.
  • 59. it is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints/stations.
  • 60.
  • 61. the language that computers use to communicate over the Internet and many other networks; often used together with the Transport Control Protocol (TCP).
  • 62. IP supports unique addressing for computers on a network.
  • 63. Each machine, which is connected to the Internet, has its own IP address.
  • 64.
  • 65. The octets serve a purpose, They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need.
  • 66. The octets are split into two sections: Net and Host.
  • 67. The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
  • 68.
  • 69. It is the phone book of the Internet; DNS maps the human-readable hostname (www.about.com) with the responsible server's IP address (207.241.148.80).
  • 70. DNS allows you to connect to another networked computer or remote service by using its user-friendly domain name rather than its numerical IP address.
  • 71.
  • 72. Suffixes (also called extensions) are categories of Internet domain names, which categories serve to describe the type of company, organization, or other category that is represented.
  • 73.
  • 74. There are other top-level domain addresses available to the general public, like
  • 75. .org, which is used to denote "non-profit organization", and .net, which is
  • 76.
  • 77.
  • 78. The name is derived from education, indicating its intended use as a name space for educational institutions, primarily those in the Inited States.
  • 79. Three-letter top-level domainsare nearly always American web sites
  • 80. Two-letter domains, like .jp and .ca and .co, .uk and .my, are for other countries other than the USA
  • 81. These country TLD's indicate sites that are published from that part of the world, or that the web site owner is a citizen of that country
  • 82.
  • 83.