SlideShare a Scribd company logo
1 of 34
Network Structure presentation backgrounds
Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development  Center (iDEC) UPM  Email 172.16.240.200 Proxy Server UPM  Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized  user outside UPM campus.
From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
Proxy server ,[object Object]
 A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
The proxy server evaluates the request according to its filtering rules      ( filter traffic by IP address or protocol)
If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server ,[object Object]
Router ,[object Object]
Routers utilize routing tables and headers to settle the finest passageway for the package to follow
Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
Routers join networks that are not attached directly to one another   ,[object Object]
Switch ,[object Object]
Switches allow dozens of devices to connect.
Switches keep traffic between two devices from getting in the way of your other devices using the same network.
Switches allow control of who has access to various parts of the network.
Switches allow you to monitor usage.
Switches allow communication (within your network) that's even faster than the Internet.,[object Object]
GSM have fix 6 wireless modem which Provided to student to access through their laptop .    Hardware : Used Dlink wireless modem    Software : Access Point Manager
Question 3 Firewall ,[object Object]
 A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
There are both hardware and software firewall; Hardware firewall is a physical piece of equipment that sits between the network and your computer, but software firewalls must be installed as a program on your computer .,[object Object]
The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
Using WinGate, all of the computers on your network can share the Internet simultaneously.,[object Object]
AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
Features include:
 proactive management
modem configuration, security
diagnostics and statistics gathering,[object Object]
Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
 Entries are commonly displayed in reverse-chronological order.

More Related Content

What's hot

POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...The University of Texas (UTRGV)
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Networkvictor okoth
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Mubashir Ali
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project designTotal Assignment Help
 
English for engineering
English for engineeringEnglish for engineering
English for engineeringQoimah Adielah
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 

What's hot (17)

Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Primch5cg
Primch5cgPrimch5cg
Primch5cg
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication Lecture-5: Introduction to Networks & Data Communication
Lecture-5: Introduction to Networks & Data Communication
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Technical paper
Technical paperTechnical paper
Technical paper
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 

Viewers also liked

04 the middle of genesis
04 the middle of genesis04 the middle of genesis
04 the middle of genesisTodd Patterson
 
BIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorBIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorLeeds Met FSD
 
Leeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD
 
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberFSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberLeeds Met FSD
 
Professional development solutions
Professional development solutionsProfessional development solutions
Professional development solutionsSorin Sandu
 
International literacy day - 8th September
International literacy day - 8th SeptemberInternational literacy day - 8th September
International literacy day - 8th SeptemberMohammed Ali Buharoon
 
SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2anthonytate88
 
Prakash3
Prakash3Prakash3
Prakash3rraj801
 
"Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp""Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp"lproubasta
 
Worthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For TechnologyWorthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For Technologywlcouch
 
Cable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseCable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseMichael Kareev
 
Solar system w_wtba_m
Solar system w_wtba_mSolar system w_wtba_m
Solar system w_wtba_mpateacha
 

Viewers also liked (20)

Mi Plus Ttm
Mi Plus TtmMi Plus Ttm
Mi Plus Ttm
 
05 the end of genesis
05 the end of genesis05 the end of genesis
05 the end of genesis
 
04 the middle of genesis
04 the middle of genesis04 the middle of genesis
04 the middle of genesis
 
CILC2010
CILC2010CILC2010
CILC2010
 
CILC2010
CILC2010CILC2010
CILC2010
 
BIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact CalculatorBIILS, HILDA and the JISC infoNet Impact Calculator
BIILS, HILDA and the JISC infoNet Impact Calculator
 
Leeds Met FSD Progress
Leeds Met FSD ProgressLeeds Met FSD Progress
Leeds Met FSD Progress
 
CILC2010
CILC2010CILC2010
CILC2010
 
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder MemberFSD Strategic Technologies Group: Leeds Met, Pathfinder Member
FSD Strategic Technologies Group: Leeds Met, Pathfinder Member
 
CILC2010
CILC2010CILC2010
CILC2010
 
Professional development solutions
Professional development solutionsProfessional development solutions
Professional development solutions
 
International literacy day - 8th September
International literacy day - 8th SeptemberInternational literacy day - 8th September
International literacy day - 8th September
 
SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2SDL Trados Studio 2009 SP2
SDL Trados Studio 2009 SP2
 
3 PR
3 PR3 PR
3 PR
 
Prakash3
Prakash3Prakash3
Prakash3
 
"Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp""Fat pad" and "Little finger pulp"
"Fat pad" and "Little finger pulp"
 
Worthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For TechnologyWorthing High School’S Long Range Plan For Technology
Worthing High School’S Long Range Plan For Technology
 
Jesus
JesusJesus
Jesus
 
Cable networks in the United States and an HBO case
Cable networks in the United States and an HBO caseCable networks in the United States and an HBO case
Cable networks in the United States and an HBO case
 
Solar system w_wtba_m
Solar system w_wtba_mSolar system w_wtba_m
Solar system w_wtba_m
 

Similar to Web Technology (20)

Network security
Network securityNetwork security
Network security
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Web Technology

  • 2. Firewall/VPN UPM Website 172.16.240.132 Internet 172.xx.xxx.xxx 119.40.118.197 HUB UPM Router InfoComm Development Center (iDEC) UPM Email 172.16.240.200 Proxy Server UPM Databases 172.16.14.110 Graduate School of Management GSM GSM Website 172.18.34.1 172.18.xx.xxx 172.19.xx.xxx HUB Switch GSM System 172.18.34.6 Switch Switch Switch Switch Switch Switch
  • 3. Internet 119.40.118.197 172.xx.xxx.xxx IP given by telecom was 119.10.XX.XXX. UPM have provided firewall for internet connection and convert the IP given to the private IP which is start from 172.XX.XXX.XXX. Purpose: To ensure security for UPM network from hackers and fraud access or authorized user outside UPM campus.
  • 4. From InfoComm (iDEC) the connection goes to proxy server. Software proxy used is WinGate 6.7 Purposed : To filter all unrelated website, prohibited content.
  • 5.
  • 6. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server
  • 7. The proxy server evaluates the request according to its filtering rules ( filter traffic by IP address or protocol)
  • 8. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client
  • 9.
  • 10.
  • 11. Routers utilize routing tables and headers to settle the finest passageway for the package to follow
  • 12. Routing protocols might be utilized by routers to communicate with each other and make the most excellent path between any two nodes or hosts on a network system
  • 13.
  • 14.
  • 15. Switches allow dozens of devices to connect.
  • 16. Switches keep traffic between two devices from getting in the way of your other devices using the same network.
  • 17. Switches allow control of who has access to various parts of the network.
  • 18. Switches allow you to monitor usage.
  • 19.
  • 20. GSM have fix 6 wireless modem which Provided to student to access through their laptop . Hardware : Used Dlink wireless modem Software : Access Point Manager
  • 21.
  • 22. A firewall in computer systems is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. Therefore it will manage the relationship between one or a set of computer systems and external world.
  • 23. Firewall is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Basically, a firewall is a barrier to keep destructive forces away from your property.
  • 24.
  • 25. The Internet connection shared by WinGate can be of nearly any type, including dial up modem, ISDN, xDSL, cable modem, satellite connection, or even dedicated T1 circuits.
  • 26.
  • 27. AccessPoint-Manager automates the process of modem configuration, on-line surveillance and statistics collection. The Network Manager can pin-point terminal, modem and circuit failures immediately; determine the action to be taken before an event occurs; observe call activity; log all network events; enforce different levels of access security
  • 28. AccessPoint-Manager enables an organization to control communication costs and minimize risks associated with dial-in/dial-out access.
  • 32.
  • 33. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
  • 34. Entries are commonly displayed in reverse-chronological order.
  • 35.
  • 36. Usually with more restricted usage rights. Because it may be copyrighted, you may or may not be able to reuse it in programming you are developing.
  • 37.
  • 38. The search results are generally presented in a list of results and are often called hits.
  • 39. The information may consist of  web pages, images, information and other types of files.
  • 40. Some search engines also  mine data available in data or open directories.
  • 41.
  • 42. Modern email operates across the internet or other computer networks.
  • 43. Some early email systems required that the author and the recipient both be online at the same time, instant message.
  • 44. Today's email systems are based on a store-and forward model.
  • 45.
  • 46.
  • 47. FTP is built on a clientserver architecture and utilizes separate control and data connections between the client and server.
  • 48.
  • 49.
  • 50.
  • 51. A worldwide network of news discussion groups.
  • 52.
  • 53. Group members communicate, collaborate and share information with each other using the internet and email.
  • 55. to keep your group informed and up to date
  • 56. Easy to use and maintain
  • 57. Doesn't require any programming skills or software downloads
  • 58.
  • 59. it is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints/stations.
  • 60.
  • 61. the language that computers use to communicate over the Internet and many other networks; often used together with the Transport Control Protocol (TCP).
  • 62. IP supports unique addressing for computers on a network.
  • 63. Each machine, which is connected to the Internet, has its own IP address.
  • 64.
  • 65. The octets serve a purpose, They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need.
  • 66. The octets are split into two sections: Net and Host.
  • 67. The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
  • 68.
  • 69. It is the phone book of the Internet; DNS maps the human-readable hostname (www.about.com) with the responsible server's IP address (207.241.148.80).
  • 70. DNS allows you to connect to another networked computer or remote service by using its user-friendly domain name rather than its numerical IP address.
  • 71.
  • 72. Suffixes (also called extensions) are categories of Internet domain names, which categories serve to describe the type of company, organization, or other category that is represented.
  • 73.
  • 74. There are other top-level domain addresses available to the general public, like
  • 75. .org, which is used to denote "non-profit organization", and .net, which is
  • 76.
  • 77.
  • 78. The name is derived from education, indicating its intended use as a name space for educational institutions, primarily those in the Inited States.
  • 79. Three-letter top-level domainsare nearly always American web sites
  • 80. Two-letter domains, like .jp and .ca and .co, .uk and .my, are for other countries other than the USA
  • 81. These country TLD's indicate sites that are published from that part of the world, or that the web site owner is a citizen of that country
  • 82.
  • 83.