2. Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development Center (iDEC) UPM Email 172.16.240.200 Proxy Server UPM Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
3. Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized user outside UPM campus.
4. From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
5.
6. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
7. The proxy server evaluates the request according to its filtering rules ( filter traffic by IP address or protocol)
8. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
9.
10.
11. Routers utilize routing tables and headers to settle the finest passageway for the package to follow
12. Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
20. GSM have fix 6 wireless modem which Provided to student to access through their laptop . Hardware : Used Dlink wireless modem Software : Access Point Manager
21.
22. A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
23. Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
24.
25. The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
26.
27. AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
28. AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
33. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
34. Entries are commonly displayed in reverse-chronological order.
35.
36. Usually with more restricted usage rights. Because it may be copyrighted, you may or may not be able to reuse it in programming you are developing.
37.
38. The search results are generally presented in a list of results and are often called hits.
39. The information may consist of web pages, images, information and other types of files.
59. it is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints/stations.
60.
61. the language that computers use to communicate over the Internet and many other networks; often used together with the Transport Control Protocol (TCP).
63. Each machine, which is connected to the Internet, has its own IP address.
64.
65. The octets serve a purpose, They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need.
67. The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
68.
69. It is the phone book of the Internet; DNS maps the human-readable hostname (www.about.com) with the responsible server's IP address (207.241.148.80).
70. DNS allows you to connect to another networked computer or remote service by using its user-friendly domain name rather than its numerical IP address.
71.
72. Suffixes (also called extensions) are categories of Internet domain names, which categories serve to describe the type of company, organization, or other category that is represented.
73.
74. There are other top-level domain addresses available to the general public, like
75. .org, which is used to denote "non-profit organization", and .net, which is
76.
77.
78. The name is derived from education, indicating its intended use as a name space for educational institutions, primarily those in the Inited States.