SlideShare a Scribd company logo
1 of 9
B.Sc. Thesis Presentation
Title: Load Balancing Ip Table
By:
Lena Hassan
Nusaiba Abu obaida
Salma salah
Co.Supervisors:
Dr. Muhammad babiker
Dr. Fahmi Al- sadig
contents
Introduction
Problem
Objectives
Related works
Methodology
Reference
Agenda Style
Introduction
• Concept of security
• Concept of firewall as one of network technologies that
used to protect information transmit through internet .
• . Concept of high availability and its important role in
providing information.
Introduction
Problem:
firewall failures have become a common
occurrence facing organizations that use the
Internet and use firewalls to protect information,
The failure of the wall leads to an interruption of
service and the loss of necessary protection
that the organization needs and fixing the crash
may require a period of time in the meantime,
as there is no alternative to keeping its
information protected. The organization may be
exposed to the act of the hacker resulting in the
loss of important information.
.
Agenda Style
Objectives
• Develop model that solve unavailability of services.
• Ensure that the network is not interrupted, case there are cluster
firewalls if one falls the other ensures continuity of service.
• Enhanced protection, using a strong cluster firewall protect
your network from malicious incoming traffic.
• Test the model.
Objectives
Related works
Recomme
ndations
Results
Methodol
ogy
Problem+ Objecti
ve
Author + y
ear
developments f
ollow the prese
nt trend, contin
ue to combine c
onfigurable acc
ess control and
authentication
mechanisms wit
h their tradition
al functions.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Development ne
w features are c
onstantly being
add to firewall.
solve The increasing comple
xity of networks, and the ne
ed to make them more open
due to the growing emphasi
s on and attractiveness of th
e Internet as a medium for b
usiness transactions.
HABTAMU ABI J
ANUARY 2000
1
Includes extend
ing.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Use a user-frien
dly tool called “
Firewall Policy
Advisor.”
management of any generic
firewall policy written as filte
ring rules, while minimizing
network vulnerability due to
firewall rule misconfiguratio
n.
EHAB S. AL-SHA
ER and HAZEM H
. HAMED
2004
2
Methodology
Two firewalls inside one cluster links
them together. One is configured as
the master device; the other one is
configured as the backup device and
these firewalls communicate through a
heartbeat to make sure that the master
device is working. If this
communication between the two
firewalls is soaked, the pulses are cut
off, and the firewall in the reserve
sends messages to the master device.
If it does not get a response from it, the
backup device automatically works to
maintain the availability of network
communication.
Agenda Style
Reference
Reference
[1] K. Ingham, “A History and Survey of Network Firewalls,” vol. V, pp. 1–42.
[2] K. Scarfone and P. Hoffman, Guidelines on firewalls and firewall policy: recommendations of the National Instit
ute of Standards and Technology, vol. 1. 2015.
[3] E. Etuk, “CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN,” no. April, 2016.
[4] J. Partnerawx, G. Rodriguez, T. Kaur, V. Malhotra, and D. Singh, “Comparison of network security tools-Firewal
l , Intrusion Detection System and Honeypot Comparison of network security tools- Firewall , Intrusion Detection
System and Honeypot”.
[5] Proceedings of International Conference on Technology Management (ICTM 2016), no. Ictm. 2016.
[6] R. Mart, “THE HIGH AVAILABILITY OF STATEFUL FIREWALLS ADVISED BY”.
[7] M. V Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia - Procedia Comput
. Sci., vol. 48, no. Iccc, pp. 503–506, 2015, doi: 10.1016/j.procs.2015.04.126.
[8] L. Yuan and H. Chen, “FIREMAN : A Toolkit for Firewall Modeling and ANalysis,” 2006.
[9] H. Abie, “An overview of firewall technologies An Overview of Firewall Technologies”.
[10] H. Hu, S. Member, G. Ahn, and S. Member, “Detecting and Resolving Firewall Policy Anomalies”.
[11] E. Al- shaer, E. S. Al- shaer, and H. H. Hamed, “Modeling and Management of Firewall Policies Modeling and
Management of Firewall Policies”.
[12] A. S. Muntaka, “An Enhanced Integrated High Availability Cluster Model Based on Active- Active and Active-P
assive Cluster,” no. November 2018, 2020, doi: 10.13140/RG.2.2.17449.75360.
[13] B. Author, F. Wennerhult, M. Bj, and H. Bjurgren, “Evaluating high availability in the enterprise network,” 2015
[14] R. D. Oliveira, D. G. Mesquita, and P. F. Rosa, “HARP: A split brain free protocol for high availability implemen
ted in FPGA,” Adv. Int. Conf. Telecommun. AICT, vol. 2013-Janua, no. January, pp. 197–203, 2013.
[15] Y. Feng, N. Huang, S. Member, and Y. Wu, “Evaluation of TCP State Replication Methods for High-Availability
Firewall Clusters,” no. Ii, pp. 2–7, 2008.
[16] J. Ng, P. Soon, S. Hassan, and R. Abdulla, “Implementing of Virtual Router Redundancy Protocol in a Private
University,” vol. 1, no. 4, pp. 255–259, 2013, doi: 10.12720/jiii.1.4.255-259.
[17] P. Rajamohan, “An Overview of Virtual Router Redundancy Protocol Techniques and Implementation for Ente
rprise Networks,” vol. 1, no. 9, pp. 554–562, 2014.
[18] A. I. Aparicio, “A High Availability platform design using Heartbeat and integration in a production environme
nt,” 2008.
Thank you

More Related Content

Similar to press.pptx

01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]Awais Shibli
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions inIJNSA Journal
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0Awais Shibli
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010bdemchak
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolJude Rainer
 
Surname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxSurname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxmattinsonjanel
 
Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492IJRAT
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxCIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxsleeperharwell
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 

Similar to press.pptx (20)

01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
Secure final
Secure finalSecure final
Secure final
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 
Surname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docxSurname 1I attached the book for this class as a pdf as well. .docx
Surname 1I attached the book for this class as a pdf as well. .docx
 
Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
K011117277
K011117277K011117277
K011117277
 
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docxCIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
CIS505008VA0- COMMUNICATION TECHNOLOGIESWeek 2 Assignment 1 Su.docx
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 

More from Walahassan4

infection control.pptx
infection control.pptxinfection control.pptx
infection control.pptxWalahassan4
 
محاضره ١٣ البطانه.pptx
محاضره ١٣ البطانه.pptxمحاضره ١٣ البطانه.pptx
محاضره ١٣ البطانه.pptxWalahassan4
 
infection control.pptx
infection control.pptxinfection control.pptx
infection control.pptxWalahassan4
 
عملي Corynebacterium-1 (Muhadharaty).ppt
عملي Corynebacterium-1 (Muhadharaty).pptعملي Corynebacterium-1 (Muhadharaty).ppt
عملي Corynebacterium-1 (Muhadharaty).pptWalahassan4
 
Strep-and-Enterococci-Dr-Love-9.26.13.ppt
Strep-and-Enterococci-Dr-Love-9.26.13.pptStrep-and-Enterococci-Dr-Love-9.26.13.ppt
Strep-and-Enterococci-Dr-Love-9.26.13.pptWalahassan4
 
Ch 7_8_9_Professional Ethics.ppt
Ch 7_8_9_Professional Ethics.pptCh 7_8_9_Professional Ethics.ppt
Ch 7_8_9_Professional Ethics.pptWalahassan4
 
1411176830 (اليسع).pptx
1411176830 (اليسع).pptx1411176830 (اليسع).pptx
1411176830 (اليسع).pptxWalahassan4
 
Antibiotics.pptx
Antibiotics.pptxAntibiotics.pptx
Antibiotics.pptxWalahassan4
 
Corynebacterium.pptx
Corynebacterium.pptxCorynebacterium.pptx
Corynebacterium.pptxWalahassan4
 

More from Walahassan4 (15)

good-ward.ppt
good-ward.pptgood-ward.ppt
good-ward.ppt
 
lab desgn.pptx
lab desgn.pptxlab desgn.pptx
lab desgn.pptx
 
infection control.pptx
infection control.pptxinfection control.pptx
infection control.pptx
 
محاضره ١٣ البطانه.pptx
محاضره ١٣ البطانه.pptxمحاضره ١٣ البطانه.pptx
محاضره ١٣ البطانه.pptx
 
infection control.pptx
infection control.pptxinfection control.pptx
infection control.pptx
 
lab desgn.pptx
lab desgn.pptxlab desgn.pptx
lab desgn.pptx
 
عملي Corynebacterium-1 (Muhadharaty).ppt
عملي Corynebacterium-1 (Muhadharaty).pptعملي Corynebacterium-1 (Muhadharaty).ppt
عملي Corynebacterium-1 (Muhadharaty).ppt
 
Strep-and-Enterococci-Dr-Love-9.26.13.ppt
Strep-and-Enterococci-Dr-Love-9.26.13.pptStrep-and-Enterococci-Dr-Love-9.26.13.ppt
Strep-and-Enterococci-Dr-Love-9.26.13.ppt
 
Ch 7_8_9_Professional Ethics.ppt
Ch 7_8_9_Professional Ethics.pptCh 7_8_9_Professional Ethics.ppt
Ch 7_8_9_Professional Ethics.ppt
 
1411176830 (اليسع).pptx
1411176830 (اليسع).pptx1411176830 (اليسع).pptx
1411176830 (اليسع).pptx
 
Antibiotics.pptx
Antibiotics.pptxAntibiotics.pptx
Antibiotics.pptx
 
Antibiotics
AntibioticsAntibiotics
Antibiotics
 
Colysterdum
ColysterdumColysterdum
Colysterdum
 
wala strep.pptx
wala strep.pptxwala strep.pptx
wala strep.pptx
 
Corynebacterium.pptx
Corynebacterium.pptxCorynebacterium.pptx
Corynebacterium.pptx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

press.pptx

  • 1. B.Sc. Thesis Presentation Title: Load Balancing Ip Table By: Lena Hassan Nusaiba Abu obaida Salma salah Co.Supervisors: Dr. Muhammad babiker Dr. Fahmi Al- sadig
  • 3. Agenda Style Introduction • Concept of security • Concept of firewall as one of network technologies that used to protect information transmit through internet . • . Concept of high availability and its important role in providing information. Introduction
  • 4. Problem: firewall failures have become a common occurrence facing organizations that use the Internet and use firewalls to protect information, The failure of the wall leads to an interruption of service and the loss of necessary protection that the organization needs and fixing the crash may require a period of time in the meantime, as there is no alternative to keeping its information protected. The organization may be exposed to the act of the hacker resulting in the loss of important information. .
  • 5. Agenda Style Objectives • Develop model that solve unavailability of services. • Ensure that the network is not interrupted, case there are cluster firewalls if one falls the other ensures continuity of service. • Enhanced protection, using a strong cluster firewall protect your network from malicious incoming traffic. • Test the model. Objectives
  • 6. Related works Recomme ndations Results Methodol ogy Problem+ Objecti ve Author + y ear developments f ollow the prese nt trend, contin ue to combine c onfigurable acc ess control and authentication mechanisms wit h their tradition al functions. Helping to provi ding more powe rful and flexible protection for n etworks to mak e them secure. Development ne w features are c onstantly being add to firewall. solve The increasing comple xity of networks, and the ne ed to make them more open due to the growing emphasi s on and attractiveness of th e Internet as a medium for b usiness transactions. HABTAMU ABI J ANUARY 2000 1 Includes extend ing. Helping to provi ding more powe rful and flexible protection for n etworks to mak e them secure. Use a user-frien dly tool called “ Firewall Policy Advisor.” management of any generic firewall policy written as filte ring rules, while minimizing network vulnerability due to firewall rule misconfiguratio n. EHAB S. AL-SHA ER and HAZEM H . HAMED 2004 2
  • 7. Methodology Two firewalls inside one cluster links them together. One is configured as the master device; the other one is configured as the backup device and these firewalls communicate through a heartbeat to make sure that the master device is working. If this communication between the two firewalls is soaked, the pulses are cut off, and the firewall in the reserve sends messages to the master device. If it does not get a response from it, the backup device automatically works to maintain the availability of network communication.
  • 8. Agenda Style Reference Reference [1] K. Ingham, “A History and Survey of Network Firewalls,” vol. V, pp. 1–42. [2] K. Scarfone and P. Hoffman, Guidelines on firewalls and firewall policy: recommendations of the National Instit ute of Standards and Technology, vol. 1. 2015. [3] E. Etuk, “CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN,” no. April, 2016. [4] J. Partnerawx, G. Rodriguez, T. Kaur, V. Malhotra, and D. Singh, “Comparison of network security tools-Firewal l , Intrusion Detection System and Honeypot Comparison of network security tools- Firewall , Intrusion Detection System and Honeypot”. [5] Proceedings of International Conference on Technology Management (ICTM 2016), no. Ictm. 2016. [6] R. Mart, “THE HIGH AVAILABILITY OF STATEFUL FIREWALLS ADVISED BY”. [7] M. V Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia - Procedia Comput . Sci., vol. 48, no. Iccc, pp. 503–506, 2015, doi: 10.1016/j.procs.2015.04.126. [8] L. Yuan and H. Chen, “FIREMAN : A Toolkit for Firewall Modeling and ANalysis,” 2006. [9] H. Abie, “An overview of firewall technologies An Overview of Firewall Technologies”. [10] H. Hu, S. Member, G. Ahn, and S. Member, “Detecting and Resolving Firewall Policy Anomalies”. [11] E. Al- shaer, E. S. Al- shaer, and H. H. Hamed, “Modeling and Management of Firewall Policies Modeling and Management of Firewall Policies”. [12] A. S. Muntaka, “An Enhanced Integrated High Availability Cluster Model Based on Active- Active and Active-P assive Cluster,” no. November 2018, 2020, doi: 10.13140/RG.2.2.17449.75360. [13] B. Author, F. Wennerhult, M. Bj, and H. Bjurgren, “Evaluating high availability in the enterprise network,” 2015 [14] R. D. Oliveira, D. G. Mesquita, and P. F. Rosa, “HARP: A split brain free protocol for high availability implemen ted in FPGA,” Adv. Int. Conf. Telecommun. AICT, vol. 2013-Janua, no. January, pp. 197–203, 2013. [15] Y. Feng, N. Huang, S. Member, and Y. Wu, “Evaluation of TCP State Replication Methods for High-Availability Firewall Clusters,” no. Ii, pp. 2–7, 2008. [16] J. Ng, P. Soon, S. Hassan, and R. Abdulla, “Implementing of Virtual Router Redundancy Protocol in a Private University,” vol. 1, no. 4, pp. 255–259, 2013, doi: 10.12720/jiii.1.4.255-259. [17] P. Rajamohan, “An Overview of Virtual Router Redundancy Protocol Techniques and Implementation for Ente rprise Networks,” vol. 1, no. 9, pp. 554–562, 2014. [18] A. I. Aparicio, “A High Availability platform design using Heartbeat and integration in a production environme nt,” 2008.