SlideShare a Scribd company logo
1 of 22
Download to read offline
Configure Network
Services
By. ROBERT V. DANGLE
Opening Prayer
Checking of Attendance
Reading Definition of Terms
Network Services
 The term network services is used to describe a wide range of software and
connectivity tools that are managed by a central group and distributed to the
networked computers. A networked computer environment occurs when
multiple computers are connected to each other or a central server. The
computers are able to access shared files and utilities from a central location.
There are several advantages to this type of environment, ranging from
increased quality control to performance and issue management.
 Network Services include IP addressing, Domain Name System (DNS), primary
domain email service, Internet access, web content filtering, security
products such as firewalls, VPN termination and intrusion prevention systems
(IPS), and the necessary tools and staff to support these services.
What are the different Network
services?
 IP Addressing
 Domain Name System(DNS)
 Primary Domain Email Service
 Internet Access
 Web Content Filtering
 Security Products Such as Firewalls, Anti Virus Software
 VPN termination and intrusion prevention systems (IPS)
 Necessary tools and staff to support these services
IP Address/Internet Protocol Address
 IP address stands for internet protocol address; it is an identifying number
that is associated with a specific computer or computer network. When
connected to the internet, the IP address allows the computers to send and
receive information.
Domain Name System(DNS)
Domain Name System(DNS)
 is a hierarchical and distributed naming system for computers, services, and other
resources in the Internet or other Internet Protocol (IP) networks. It associates various
information with domain names assigned to each of the associated entities. Most
prominently, it translates readily memorized domain names to the numerical IP
addresses needed for locating and identifying computer services and devices with the
underlying network protocols.[1] The Domain Name System has been an essential
component of the functionality of the Internet since 1985.
 In the world of networking, computers do not represent by names like humans do, they
represent by numbers because that is how computers and other similar devices talk and
identify with each other over a network, which is by using numbers such as IP addresses.
 Humans on the other hand are accustomed to using names instead of numbers, whether is
talking directly to another person or identifying a country, place, or things, humans identify
with names instead of numbers. So in order to bridge the communication gap between
computers and humans and make the communication of a lot easier networking engineers
developed DNS.
 DNS resolves names to numbers, to be more specific it resolves domain names to IP
addresses. So if you type in a web address in your web browser, DNS will resolve the name
to a number because the only thing computers know are numbers.
Primary Domain Email Services
 An email domain is the part of an email address that comes after the @
symbol. For personal emails, it is most often gmail.com, outlook.com or
yahoo.com.
Internet access
Internet access
 Internet access is the process of connecting to the internet using personal
computers, laptops or mobile devices by users or enterprises. Internet access
is subject to data signalling rates and users could be connected at different
internet speeds. Internet access enables individuals or organizations to avail
internet services/web-based services.
 Internet access is often provided at home, schools, workplaces, public places,
internet cafes, libraries and other locations. The internet began to gain
popularity with dial-up internet access. In a relatively short time, internet
access technologies changed, providing faster and more reliable options.
Currently, broadband technologies such as cable internet and ADSL are the
most widely used methods for internet access. The speed, cost, reliability and
availability of internet access depends on the region, internet service
provider and type of connection.
 Internet access is the ability of individuals and organizations to connect to the
Internet using computer terminals, computers, and other devices; and to
access services such as email and the World
Web Content Filtering
Web Content Filtering
 Web content filtering is a technicque that blocks and screens access to
inappropriate or unsafe web content. Uses include a company keeping
employees from visiting known spam sites or school systems restricting
students from adult content.
 Web content filtering is the practice of blocking access to web content that
may be deemed offensive, inappropriate, or even dangerous.
Security Products Such as Firewalls, Anti Virus
Software
Security Products Such as Firewalls, Anti Virus
Software
 A firewall is a security network designed to protect computer systems and
networks from malicious attacks. Antivirus is is a software utility program
designed to protect a system from internal attacks from viruses, trojan horse,
spyware etc.
 A firewall is a security network that can be either hardware or software,
or both, and is meant to protect computer systems and networks from
harmful intrusions ..
VPN termination and intrusion prevention
systems (IPS)
VPN termination and intrusion prevention
systems (IPS)
 is the network security technology that constantly monitors network traffic to
identify threats. Under the general meaning of IPS, IPS technology is also an
intrusion detection prevention system (IDPS).
 includes anti-virus/anti-malware software, firewall, anti-spoofing software,
and network traffic monitoring. Enterprises use IPS to document threats,
uncover problems with security policies, and block external or insider security
violations.
 is typically deployed “in-line” where they sit in the direct communication
path between the source and the destination, where it can analyze in real-
time all the network traffic flow along that path and take automated
preventive action.
Necessary tools and staff to support these
services
Necessary tools and staff to support these
services
 A computer networking tool is any type that assists in the creation,
maintenance, or distribution of a wireless network. Also, computer
networking tools aid in a website’s creation, maintenance, advertising,
security, and modification.
 They are responsible for the maintenance of local area networks, especially
in situations that involve dozens or hundreds of computers within the same
network.
 Computer networking tools are used for both domestic and commercial
purposes and are available on sale or for free. Every software listed in this
article is a free computer networking tool that anyone can use for any
purpose.
 Network DOS Commands like IPCONFIG, PING, DCPROMO….
Question and Answer
 What is an IP Address?
 What is the difference between Static and Dynamic IP address?
 What is IPCONFIG command?
 What is DNS?
 What is a wireless network?
 What is a Default Gateway?
 What should be the preferred DNS of the Client Computer?
 What should be the preferred DNS of the Server Computer?
 How to configure the server computer?
Application
 The class will be divided into 6 groups with a maximum of 3 members per
group. The learners will be given a chance to setup and configure a
client/server network considering the necessary Network Services, Tools and
applications.

More Related Content

Similar to Configure Network Services.pptx

Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data ManagementArmanArafatAnik
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
A Brief Note On Peer Communication And The Client Server...
A Brief Note On Peer Communication And The Client Server...A Brief Note On Peer Communication And The Client Server...
A Brief Note On Peer Communication And The Client Server...Miles Priar
 
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxRunning head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxcharisellington63520
 
The Disadvantageous Of Web Gis
The Disadvantageous Of Web GisThe Disadvantageous Of Web Gis
The Disadvantageous Of Web GisVeronica Morse
 
Week 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxWeek 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxKwadjoOwusuAnsahQuar
 
Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Sara Reed
 
What Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemAlejandra Rodriguez
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network SecurityAlison Hall
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1RaynaITSTEP
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptJOHN BABATUNDE LEE
 
Manage Network Security
Manage Network SecurityManage Network Security
Manage Network SecurityLaura Hansen
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation DowningIWCS
 
Virtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsVirtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsKristina Camacho
 
Network Networks And The Internet
Network Networks And The InternetNetwork Networks And The Internet
Network Networks And The InternetErica Smith
 

Similar to Configure Network Services.pptx (20)

Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data Management
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
A Brief Note On Peer Communication And The Client Server...
A Brief Note On Peer Communication And The Client Server...A Brief Note On Peer Communication And The Client Server...
A Brief Note On Peer Communication And The Client Server...
 
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxRunning head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
 
The Disadvantageous Of Web Gis
The Disadvantageous Of Web GisThe Disadvantageous Of Web Gis
The Disadvantageous Of Web Gis
 
Week 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxWeek 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptx
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )
 
What Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting System
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
 
Internet
InternetInternet
Internet
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Manage Network Security
Manage Network SecurityManage Network Security
Manage Network Security
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
Virtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsVirtual Private Networks Pros And Cons
Virtual Private Networks Pros And Cons
 
Network Networks And The Internet
Network Networks And The InternetNetwork Networks And The Internet
Network Networks And The Internet
 

Recently uploaded

Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2DianaGray10
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 

Recently uploaded (20)

Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 

Configure Network Services.pptx

  • 5. Network Services  The term network services is used to describe a wide range of software and connectivity tools that are managed by a central group and distributed to the networked computers. A networked computer environment occurs when multiple computers are connected to each other or a central server. The computers are able to access shared files and utilities from a central location. There are several advantages to this type of environment, ranging from increased quality control to performance and issue management.  Network Services include IP addressing, Domain Name System (DNS), primary domain email service, Internet access, web content filtering, security products such as firewalls, VPN termination and intrusion prevention systems (IPS), and the necessary tools and staff to support these services.
  • 6. What are the different Network services?  IP Addressing  Domain Name System(DNS)  Primary Domain Email Service  Internet Access  Web Content Filtering  Security Products Such as Firewalls, Anti Virus Software  VPN termination and intrusion prevention systems (IPS)  Necessary tools and staff to support these services
  • 7. IP Address/Internet Protocol Address  IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.
  • 9. Domain Name System(DNS)  is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.[1] The Domain Name System has been an essential component of the functionality of the Internet since 1985.  In the world of networking, computers do not represent by names like humans do, they represent by numbers because that is how computers and other similar devices talk and identify with each other over a network, which is by using numbers such as IP addresses.  Humans on the other hand are accustomed to using names instead of numbers, whether is talking directly to another person or identifying a country, place, or things, humans identify with names instead of numbers. So in order to bridge the communication gap between computers and humans and make the communication of a lot easier networking engineers developed DNS.  DNS resolves names to numbers, to be more specific it resolves domain names to IP addresses. So if you type in a web address in your web browser, DNS will resolve the name to a number because the only thing computers know are numbers.
  • 10. Primary Domain Email Services  An email domain is the part of an email address that comes after the @ symbol. For personal emails, it is most often gmail.com, outlook.com or yahoo.com.
  • 12. Internet access  Internet access is the process of connecting to the internet using personal computers, laptops or mobile devices by users or enterprises. Internet access is subject to data signalling rates and users could be connected at different internet speeds. Internet access enables individuals or organizations to avail internet services/web-based services.  Internet access is often provided at home, schools, workplaces, public places, internet cafes, libraries and other locations. The internet began to gain popularity with dial-up internet access. In a relatively short time, internet access technologies changed, providing faster and more reliable options. Currently, broadband technologies such as cable internet and ADSL are the most widely used methods for internet access. The speed, cost, reliability and availability of internet access depends on the region, internet service provider and type of connection.  Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World
  • 14. Web Content Filtering  Web content filtering is a technicque that blocks and screens access to inappropriate or unsafe web content. Uses include a company keeping employees from visiting known spam sites or school systems restricting students from adult content.  Web content filtering is the practice of blocking access to web content that may be deemed offensive, inappropriate, or even dangerous.
  • 15. Security Products Such as Firewalls, Anti Virus Software
  • 16. Security Products Such as Firewalls, Anti Virus Software  A firewall is a security network designed to protect computer systems and networks from malicious attacks. Antivirus is is a software utility program designed to protect a system from internal attacks from viruses, trojan horse, spyware etc.  A firewall is a security network that can be either hardware or software, or both, and is meant to protect computer systems and networks from harmful intrusions ..
  • 17. VPN termination and intrusion prevention systems (IPS)
  • 18. VPN termination and intrusion prevention systems (IPS)  is the network security technology that constantly monitors network traffic to identify threats. Under the general meaning of IPS, IPS technology is also an intrusion detection prevention system (IDPS).  includes anti-virus/anti-malware software, firewall, anti-spoofing software, and network traffic monitoring. Enterprises use IPS to document threats, uncover problems with security policies, and block external or insider security violations.  is typically deployed “in-line” where they sit in the direct communication path between the source and the destination, where it can analyze in real- time all the network traffic flow along that path and take automated preventive action.
  • 19. Necessary tools and staff to support these services
  • 20. Necessary tools and staff to support these services  A computer networking tool is any type that assists in the creation, maintenance, or distribution of a wireless network. Also, computer networking tools aid in a website’s creation, maintenance, advertising, security, and modification.  They are responsible for the maintenance of local area networks, especially in situations that involve dozens or hundreds of computers within the same network.  Computer networking tools are used for both domestic and commercial purposes and are available on sale or for free. Every software listed in this article is a free computer networking tool that anyone can use for any purpose.  Network DOS Commands like IPCONFIG, PING, DCPROMO….
  • 21. Question and Answer  What is an IP Address?  What is the difference between Static and Dynamic IP address?  What is IPCONFIG command?  What is DNS?  What is a wireless network?  What is a Default Gateway?  What should be the preferred DNS of the Client Computer?  What should be the preferred DNS of the Server Computer?  How to configure the server computer?
  • 22. Application  The class will be divided into 6 groups with a maximum of 3 members per group. The learners will be given a chance to setup and configure a client/server network considering the necessary Network Services, Tools and applications.