SlideShare a Scribd company logo
1 of 9
By: Justin Cleary
Daniel Santana
 Khadijah Hunt
OVERVIEW

 Devices on the network
 Cabling and Wireless Connections

 Exchange Server

 Proxy server

 Security

 Layout

 Questions and Answers
DEVICES AND NETWORK

 7 Desktops
 2 laptops

 2 printers

 1 LCD Television monitor

 1 server

 Wireless router
CABLING AND WIRELESSS CONNECTIONS

 UTP CAT- 5e Ethernet Cable
 RJ45 Connection

 802.11n Wireless Technology (Wi-Fi)

 USB for Printers
EXTERNAL EXCHANGE SERVER

   Setting Up an External Exchange Server will
    ensure that the users on the network will still
    be able to access their email if the Web
    server is down.
PROXY SERVER

 Works similarly as NAT redirection
 Is a computer that intercepts requests that a
  client makes of server
 Can serve as a gateway to the Internet, a
  firewall to protect the network, and way to
  restrict Internet access
SECURITY

 WPA 2
 Norton Antivirus

 Proxy Server

 Encrypted File System (EFS)
LAYOUT
QUESTIONS AND ANSWERS

More Related Content

Viewers also liked

Whats New EU 2008
Whats New EU 2008Whats New EU 2008
Whats New EU 2008
freidog
 
Treatment cross media blank
Treatment cross media blankTreatment cross media blank
Treatment cross media blank
t013378
 
Operational Readiness and Importance of Operator Training
Operational Readiness and Importance of Operator TrainingOperational Readiness and Importance of Operator Training
Operational Readiness and Importance of Operator Training
Juan Jorge
 
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
Juan Jorge
 

Viewers also liked (10)

Whats New EU 2008
Whats New EU 2008Whats New EU 2008
Whats New EU 2008
 
Treatment cross media blank
Treatment cross media blankTreatment cross media blank
Treatment cross media blank
 
Candidate feedback
Candidate feedbackCandidate feedback
Candidate feedback
 
111808
111808111808
111808
 
Doa ~ doa harian
Doa ~ doa harianDoa ~ doa harian
Doa ~ doa harian
 
111808
111808111808
111808
 
Food chain
Food chainFood chain
Food chain
 
Operational Readiness and Importance of Operator Training
Operational Readiness and Importance of Operator TrainingOperational Readiness and Importance of Operator Training
Operational Readiness and Importance of Operator Training
 
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
THE CUNENE RIVER BRIDGE IN ANGOLA (2009)
 
XML & XPath Injections
XML & XPath InjectionsXML & XPath Injections
XML & XPath Injections
 

Similar to Tech tacular

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
tsmithnasd
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 
Jeff Green April 2011 May V1
Jeff Green April 2011 May V1Jeff Green April 2011 May V1
Jeff Green April 2011 May V1
JeffGreenMichigan
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
Agora Group
 

Similar to Tech tacular (20)

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Group presentation
Group presentationGroup presentation
Group presentation
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Jeff Green April 2011 May V1
Jeff Green April 2011 May V1Jeff Green April 2011 May V1
Jeff Green April 2011 May V1
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
class30.ppt
class30.pptclass30.ppt
class30.ppt
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Tech tacular

  • 1. By: Justin Cleary Daniel Santana Khadijah Hunt
  • 2. OVERVIEW  Devices on the network  Cabling and Wireless Connections  Exchange Server  Proxy server  Security  Layout  Questions and Answers
  • 3. DEVICES AND NETWORK  7 Desktops  2 laptops  2 printers  1 LCD Television monitor  1 server  Wireless router
  • 4. CABLING AND WIRELESSS CONNECTIONS  UTP CAT- 5e Ethernet Cable  RJ45 Connection  802.11n Wireless Technology (Wi-Fi)  USB for Printers
  • 5. EXTERNAL EXCHANGE SERVER  Setting Up an External Exchange Server will ensure that the users on the network will still be able to access their email if the Web server is down.
  • 6. PROXY SERVER  Works similarly as NAT redirection  Is a computer that intercepts requests that a client makes of server  Can serve as a gateway to the Internet, a firewall to protect the network, and way to restrict Internet access
  • 7. SECURITY  WPA 2  Norton Antivirus  Proxy Server  Encrypted File System (EFS)