SlideShare a Scribd company logo
1 of 34
Network Structure presentation backgrounds
Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development  Center (iDEC) UPM  Email 172.16.240.200 Proxy Server UPM  Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized  user outside UPM campus.
From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
Proxy server ,[object Object]
 A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
The proxy server evaluates the request according to its filtering rules      ( filter traffic by IP address or protocol)
If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server ,[object Object]
Router ,[object Object]
Routers utilize routing tables and headers to settle the finest passageway for the package to follow
Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
Routers join networks that are not attached directly to one another   ,[object Object]
Switch ,[object Object]
Switches allow dozens of devices to connect.
Switches keep traffic between two devices from getting in the way of your other devices using the same network.
Switches allow control of who has access to various parts of the network.
Switches allow you to monitor usage.
Switches allow communication (within your network) that's even faster than the Internet.,[object Object]
GSM have fix 6 wireless modem which Provided to student to access through their laptop .    Hardware : Used Dlink wireless modem    Software : Access Point Manager
Question 3 Firewall ,[object Object]
 A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
There are both hardware and software firewall; Hardware firewall is a physical piece of equipment that sits between the network and your computer, but software firewalls must be installed as a program on your computer .,[object Object]
The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
Using WinGate, all of the computers on your network can share the Internet simultaneously.,[object Object]
AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
Features include:
 proactive management
modem configuration, security
diagnostics and statistics gathering,[object Object]
Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
 Entries are commonly displayed in reverse-chronological order.

More Related Content

What's hot

POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...The University of Texas (UTRGV)
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Networkvictor okoth
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Mubashir Ali
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project designTotal Assignment Help
 
English for engineering
English for engineeringEnglish for engineering
English for engineeringQoimah Adielah
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 

What's hot (17)

Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Primch5cg
Primch5cgPrimch5cg
Primch5cg
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Technical paper
Technical paperTechnical paper
Technical paper
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 

Similar to Web Technology (20)

Network security
Network securityNetwork security
Network security
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

Web Technology

  • 2. Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development Center (iDEC) UPM Email 172.16.240.200 Proxy Server UPM Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
  • 3. Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized user outside UPM campus.
  • 4. From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
  • 5.
  • 6. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
  • 7. The proxy server evaluates the request according to its filtering rules ( filter traffic by IP address or protocol)
  • 8. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
  • 9.
  • 10.
  • 11. Routers utilize routing tables and headers to settle the finest passageway for the package to follow
  • 12. Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
  • 13.
  • 14.
  • 15. Switches allow dozens of devices to connect.
  • 16. Switches keep traffic between two devices from getting in the way of your other devices using the same network.
  • 17. Switches allow control of who has access to various parts of the network.
  • 18. Switches allow you to monitor usage.
  • 19.
  • 20. GSM have fix 6 wireless modem which Provided to student to access through their laptop . Hardware : Used Dlink wireless modem Software : Access Point Manager
  • 21.
  • 22. A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
  • 23. Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
  • 24.
  • 25. The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
  • 26.
  • 27. AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
  • 28. AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
  • 32.
  • 33. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
  • 34. Entries are commonly displayed in reverse-chronological order.
  • 35.
  • 36. Usually with more restricted usage rights. Because it may be copyrighted, you may or may not be able to reuse it in programming you are developing.
  • 37.
  • 38. The search results are generally presented in a list of results and are often called hits.
  • 39. The information may consist of  web pages, images, information and other types of files.
  • 40. Some search engines also  mine data available in data or open directories.
  • 41.
  • 42. Modern email operates across the internet or other computer networks.
  • 43. Some early email systems required that the author and the recipient both be online at the same time, instant message.
  • 44. Today's email systems are based on a store-and forward model.
  • 45.
  • 46.
  • 47. FTP is built on a clientserver architecture and utilizes separate control and data connections between the client and server.
  • 48.
  • 49.
  • 50.
  • 51. A worldwide network of news discussion groups.
  • 52.
  • 53. Group members communicate, collaborate and share information with each other using the internet and email.
  • 55. to keep your group informed and up to date
  • 56. Easy to use and maintain
  • 57. Doesn't require any programming skills or software downloads
  • 58.
  • 59. it is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints/stations.
  • 60.
  • 61. the language that computers use to communicate over the Internet and many other networks; often used together with the Transport Control Protocol (TCP).
  • 62. IP supports unique addressing for computers on a network.
  • 63. Each machine, which is connected to the Internet, has its own IP address.
  • 64.
  • 65. The octets serve a purpose, They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need.
  • 66. The octets are split into two sections: Net and Host.
  • 67. The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
  • 68.
  • 69. It is the phone book of the Internet; DNS maps the human-readable hostname (www.about.com) with the responsible server's IP address (207.241.148.80).
  • 70. DNS allows you to connect to another networked computer or remote service by using its user-friendly domain name rather than its numerical IP address.
  • 71.
  • 72. Suffixes (also called extensions) are categories of Internet domain names, which categories serve to describe the type of company, organization, or other category that is represented.
  • 73.
  • 74. There are other top-level domain addresses available to the general public, like
  • 75. .org, which is used to denote "non-profit organization", and .net, which is
  • 76.
  • 77.
  • 78. The name is derived from education, indicating its intended use as a name space for educational institutions, primarily those in the Inited States.
  • 79. Three-letter top-level domainsare nearly always American web sites
  • 80. Two-letter domains, like .jp and .ca and .co, .uk and .my, are for other countries other than the USA
  • 81. These country TLD's indicate sites that are published from that part of the world, or that the web site owner is a citizen of that country
  • 82.
  • 83.