SlideShare a Scribd company logo
Perkongsian Maklumat Rangkaian USMNet
          Bahagian Infostruktur
             06-07/05/2008

      Ahmad Fadhlul Irham Yusoff
        E-mail: irham@usm.my
      Abdul Ghani Abdul Rahman
        E-mail: ghani@usm.my
Internet & Network Introduction
                                     Objectives Of The Class

Objectives Of The Class:

At the end of this lesson you should be able to understand:
        Network Introduction
        Type Of Network
        Network Topology
        Network Component
        How Network Operate
        Network Application & Facilities
        Network Threats & Securities
        Network Troubleshooting
        Q & A Open Session
Internet & Network Introduction
                                                      Introduction & Type


Network Introduction
 Definition – Global network connecting million of computers exchanging data.
 History     – Started in 1957 known ARPA within DoD, then being awarded
               ARPANET
 Roadmap / New Technologies
     IPv6 - Internet Protocol Version 6 is an evolutionary step from IPv4
   featuring Large address space, Efficient and hierarchical addressing and
   routing infrastructure, Built-in security, Better support for quality of service
   (QoS)

      Ultra Wideband (UWB) - MultiBand OFDM wireless using very high data
   rates and low power consumption radio signal

      Very High Bit Rate DSL (VDSL) - Aggregation up to 32 Synchronous High
   Bit Rate DSL (SHDSL) providing 10Mbits/sec bidirectionally over copper
Internet & Network Introduction
                                                    Introduction & Type

Roadmap / New Technologies (cont.)

    Ethernet Virtual Connections (EVCs) - A standard for creating ATM-like PVCs
 across Ethernet, will replace point-to-point circuits. Ethernet WANs will replace
 frame relay clouds with Virtual Private LAN Service (VPLS), a layer-2 VPN that
 will add security to EVCs to create LAN interconnect services

   HighSpeed TCP – Reworking TCP to support higher / more efficient load
Internet & Network Introduction
                                                 History of USMNet


1994 – USMNet started

      •   FDDI technology (Fiber Distributed Data Exchange)
      •   Retix Routers
      •   35 km fiber optic cable lay for 3 Campuses (Main, Kubang Kerian
          & Tronoh)
      •   All main buildings are connected with 1500 nodes.
          – especially academician, administrative and general office
      •   64Kbps access to JARING for Main Campus
      •   9.6Kbps access to JARING for Kampus Cawangan Kelantan &
          Kampus Cawangan Perak)
Internet & Network Introduction
                                                                             History of USMNet

USMNet (Penang) - 1994
                                                                PTPM                   Falak
PPTek.Ind                                Perpustakaan           Pbahasa                HEP
PPSFizik                                                        CPR
                                                                                                         Pentadbiran

                                                                                              Cent100
                                   C15
PPSKemasyarakatan
PPIKemanusiaan            Rx7000
                                                        G02                   C22
                                                                                            PTMaklumat
  PPSKomputer                                                                  PPJJ
  PPSMatematik
                                                   Rx7000            D18               BCombits
                                   JX
                                                                                                     JARING
PPSFarmasi                                       FDDI
Jpembangunan     ONLine
Pinovasi                                                                                        64Kbps
PPDadah                   FOIRL                                                     Cisco


               F03                                                                  D37

                                                                                            ONLine
PPSKimia
                 ONLine           PPSKajihayat
PIslam                                                                                                     PPPBang&
                                                                                    PPIPendidikan          Perancang
                                                              Pkomputer
                                                              PPPengurusan
Internet & Network Introduction
                                                History of USMNet

1998 – USMNet upgrade
     •   1.5Mbps access to JARING (started on 14 July 1998)
     •   Numbers of nodes increase more than 3000:
         – 99% academician, administrative & general office
         – Lab at school
     •   Locally connected from main campus to branch campus
         (Kelantan & Tronoh) through Celcom Microwave 256kbps.
     •   9.6kbps access to jaring for branch campus was terminated.
     •   No of users:
         – Academic:                       1,200
         – Administative:                    500
         – Student:                       20,000
Internet & Network Introduction
                                                                                History of USMNet
USMNet - before 2000
                                         Perpustakaan               PTPM                     Falak
PPTekInd                                                            Pbahasa                  HEP
PPSFizik                                                            CPR
                                                                                                                Pentadbiran

PPSKemasy.
PPIKem.                           C15                                                            CB3500
                         Rx7000
                                                          G02                  C22
                                                                                               PTMaklumat
   PPSKomp                                                                           PPJJ
   PPSMath
                                  JX                 Rx7000            D18                   BCombits       JARING
                                                                                                          1536Kbps
                                              FDDI
PPSFarmasi      ONLine
Jpembangunan                                                                                            256Kbps
PInovasi                 FOIRL                                                              W/Fleet
                                                                                                                    KCK
PPDadah                                 NetBuilder
                                                                                                      256Kbps
               F03                                                                     D37

                                                                                                ONLine
                                                                                                                KCP
PPSKimia                                                                                                  PPPBang&
                ONLine
Pislam                            PPSKajihayat                                                            Pembangunan
                                                                                        PPIPend
                                                                Pkomputer               PPKomunikasi
                                                                PPPengurusan
Internet & Network Introduction
                                               History of USMNet


2000 – USMNet Upgrading
     •   FDDI was replaced with gigabit technology
     •   2x2Mbps access to JARING
     •   2Mbps access to JARING for Engineering Campus and Medical
         Campus
     •   Connection within campus (Main to Engineering/Medical) are
         connected locally through 2x2Mbps (2002)
     •   Data, Video and Voice in one network (2002)
     •   Wireless technology implemented in Desasiswa
Internet & Network Introduction
USMNet - 2003                           History of USMNet
Internet & Network Introduction
USMNet - 2007                           History of USMNet
Internet & Network Introduction
Case Study – USMNet 2008             History of USMNet
Internet & Network Introduction
                                        Components-Case Study
Case Study – USMnet Penang WIFI



      JARING




        USMNet           Antenna /
                         Access point

                       DESASISWA




                  Pejabat Desasiswa
Internet & Network Introduction
                                         Introduction & Type
Type Of Network
 LAN (Local Area Network)
      • Ethernet, Token Ring
      • Hub & Switches
      • UTP Cat. 5E & 6, Fiber Optic
      • Novell, Win NT,Win 2K, Win
       XP,Win Vista, Unix, Linux
 MAN (Metropolitan Area Network)
      • Fiber Optic Cable
      • Routers & Switches
      • Network Admin
 WAN (Wide Area Network)
      • PSTN, ISDN,Frame
        Relay,ATM,Satellite
      • Routers & Switches
      • Internet
Internet & Network Introduction
                                                            Topology

Network Topology

                                                       Client   Printer
  Bus Topology
  - A bus consists of a wire and shield         Client
    (coaxial), which electrically constitute a
    single circuit. At either end of a bus is a
    terminator, which is essentially a resistor
                                                                                   Client
    and connected through a T Connector.                                  Client
                                                                Client
                                                  Printer
Internet & Network Introduction
                                                         Topology
Network Topology (cont.)
  Star Topology
  - This is a star configuration and it is
    found in Ethernet networks that use
    twisted pair cable such as Cat 5, Cat
                                             UTP Cat 5
    5E, Cat 6 and Fiber Optic.               Cabling         8 Port
                                                             Workgroup Hub
  - The twisted pair cable uses RJ-45
    connectors that connect directly to
    the NIC on the device end, and to
    the hub on the other end while the
    Fiber use LX, FX, SC, ST Connectors
    to connect between network devices.
Internet & Network Introduction
                                                            Topology
Network Topology (cont.)
   Ring Topology
   - A pure ring is a collection of separate point-to-point links, arranged to
     make a ring which propagate a signals received on the input
     connection and passed immediately to the output connection by
     “repeater” circuitry in each node.
   - The most common type of cabling used in ring topologies is fiber optic
     cable.
                                          Client


                                      Data
                                      Flow
                         Client                    Client


                                        Client
Internet & Network Introduction
                                                          Topology
Network Topology (cont.)
   Hybrid (Star Ring) Topology
   - The hybrid topology is a type of network topology that is composed of
     one or more interconnections of two or more networks that are based
     upon different physical topologies
Internet & Network Introduction
                                                Components - Devices


Networks Components
 Devices
     Terminal(Computers/Servers)
     Network Card / Modem
     Network Cabling
     Including all UTP (Cat 5, Cat 5e, Cat 6,
     Cat 6a, Cat 7), Fiber Optics

     Bridge (Broadcast & Collision Domain)
     A device that connects two local-area
     networks (LANs), or two segments of the
     same LAN that use the same protocol,
     such as Ethernet or Token-Ring.
Internet & Network Introduction
                                                   Components - Devices

Devices (cont.)
    Hub/Switches (Broadcast & Collision Domain)
    A common connection point for devices in a network. Hubs are commonly
    used to connect segments of a LAN. A hub contains multiple ports. When a
    packet arrives at one port, it is copied to the other ports so that all
    segments of the LAN can see all packets. A switching hub or Switches,
    actually reads the destination address of each packet and then forwards the
    packet to the correct port.
Internet & Network Introduction
                                                Components-Devices

Devices (cont.)
     Router
     A device that forwards data packets along networks. A router is
     connected to at least two networks, commonly two LANs or WANs
     or a LAN and its ISP’s network
Internet & Network Introduction
                                                  Components-Devices
Devices (cont.)
     Firewall
     According to the National Computer Security Association, a firewall is “a
     system or combination of systems that enforces a boundary between two
     or more networks.” It is a controlled gateway between one network and
     another, typically between a private network and the Internet.




                     -21
                  FTP




                     P -8 0
                  HTT
                                             337
                                    fic e-31
                              k O ri
                        Bac
                                           5
                                     SMTP-2
Internet & Network Introduction
                                                    Components-Devices
Devices (cont.)
   IDS (Intrusion Detection System)
   provide the inspection all inbound and outbound network activity and
   identifies suspicious patterns that may indicate a network or system attack
   from someone attempting to break into or compromise a system. An IDS
   evaluates a suspected intrusion once it has taken place and signals an
   alarm. An IDS also watches for attacks that originate from within a system.


                                                         Attack
                                                       Detected !!

                   et
               R es


                                                             Internet
Internet & Network Introduction
                                                       Components-Devices
Devices (cont.)
    IPS (Intrusion Prevention System)
   device that monitors network and/or system activities for malicious or
   unwanted behavior and can react, in real-time, to block or prevent those
   activities. Will operate in-line to monitor all network traffic for malicious
   code or attacks. When an attack is detected, it can drop the offending
   packets while still allowing all other traffic to pass.

                    Network          • Block Attacks
                                     • Throttle P2P Downloads
                    Policies         • Block P2P Uploads



              Dirty                                    Clean
             Traffic                                   Traffic

                        Worms
                        Trojans
                        Viruses
                            P2P
                                    Intelligence Updates:
                       Spyware       Digital Vaccine®
Internet & Network Introduction
                                                   Components-Devices
Devices (cont.)
    UTM (Unified threat management)
    network firewalls that have many features in one box, including e-mail
    spam filtering, anti-virus capability, an (IDS or IPS), and World Wide Web
    content filtering , along with the traditional activities of a firewall.
Internet & Network Introduction
                                                     Components-Devices
Devices (cont.)
    Traffic shaper
    WAN optimization/acceleration allows network pros to speed performance
    across the WAN with compression, caching, protocol shaping, and other
    techniques. It also lets network managers allot dedicated amounts of
    bandwidth to certain types of traffic to ensure that they are not competing
    with other traffic for space in the pipe.
Internet & Network Introduction
                                                     Components-Devices
Devices (cont.)
     AP (Access Point)
     A hardware device or a computer's software (NetBuddy) that acts as a
     communication hub for users of a wireless device to connect to a wired
     LAN.
     - Fat AP
       In the autonomous architecture, the APs completely implement and
       terminate the 802.11 function so that frames on the wired LAN are
       802.3 frames. Each AP can be independently managed as a separate
       network entity on the network.
     - Thin AP
       The centralized architecture is a hierarchical architecture that involves
       a WLAN controller that is responsible for configuration, control, and
       management of several APs. The WLAN controller is also known as the
       Access Controller (AC). The 802.11 function is split between the AP and
       the AC.
      - Fit AP
Internet & Network Introduction
                                                  Components-Devices
Devices (cont.)
     WiSM (Wireless Services Module)
     unparalleled security, mobility, redundancy, and ease of use for business-
     critical wireless LANs (WLANs). It allows network managers and operators
     to control and manage their wireless networks easily.
Internet & Network Introduction
                                                    Components-Servers
Servers
    DNS (Domain Name System or Service)
    A Server that translates domain names into IP
    addresses.
    - Internal DNS
    - External DNS
    For example,
       the domain name www.usm.my
       might translate to 10.202.1.4   - internal DNS
                         202.170.56.73 - external DNS
    - DNS server USM 10.202.1.6/10.202.1.27
                         202.170.56.75/202.170.56.155
Internet & Network Introduction
                                                       Components-Servers

Servers (cont.)
    DHCP (Dynamic Host Configuration Protocol )
    A server that provide an assigning dynamic IP addresses to devices on a
    network. With dynamic addressing a device can have a different IP address
    every time it connects to the network.

    Proxy vs NAT (Network Address Translation) / Masquerade
    A server that sits between a client application, such as a Web browser, and a
    real server. It intercepts all requests to the real server to see if it can fulfill
    the requests itself. If not, it forwards the request to the real server.
    (Http, Https, Ftp)




      nat static                   nat dynamic                     nat overload
Internet & Network Introduction
                                              Components-Servers


Servers (cont.)
  WINS (Windows Internet Naming Service )
  A server that provide a distributed database that is automatically
  updated with the names of computers currently available and the IP
  address assigned to each one.

  DDNS (Dynamic DNS)
  dynamic Domain Name System, a method of keeping a domain name
  linked to a changing IP address as not all computers use static IP
  addresses. A dynamic DNS service provider uses a special program that
  runs on the user's computer, contacting the DNS service each time the IP
  address provided by the ISP changes and subsequently updating the DNS
  database to reflect the change in IP address.
Internet & Network Introduction
                                                 Components-Servers

Servers (cont.)

    Web Cache / Content Engine
    On the Internet, content delivery
    (sometimes called content distribution,
    content distribution delivery, or content
    caching) is the a server or appliance that
    provide a service of copying the pages of a Web site to geographically
    dispersed servers and, when a page is requested, dynamically identifying
    and serving page content from the closest server to the user, enabling
    faster delivery.

    AAA (Authentication, Authorization & Accounting) – IEEE 802.1x
    A system in IP-based networking to control what computer resources
    users have access to and to keep track of the activity of users over a
    network.
Internet & Network Introduction
                                                 Components-Servers

Servers (cont.)
  Radius
  Short for Remote Authentication Dial-In User Service, a server that provide
  an authentication and accounting system used by many Internet Service
  Providers (ISPs). When you dial in to the ISP you must enter your
  username and password. This information is passed to a RADIUS server,
  which checks that the information is correct, and then authorizes access to
  the ISP system.

  LDAP / NTLM
  Short for Lightweight Directory Access Protocol, a server that provide a set
  of protocols for accessing information directories.LDAP supports TCP/IP,
  which is necessary for any type of Internet access. Although not yet widely
  implemented, LDAP should eventually make it possible for almost any
  application running on virtually any computer platform to obtain directory
  information, such as email addresses and public keys. Because LDAP is an
  open protocol, applications need not worry about the type of server hosting
  the directory.
Internet & Network Introduction
                                                   Components-Servers

Servers (cont.)
  PKI
  Short for public key infrastructure, a server that provide a system of digital
  certificates, Certificate Authorities, and other registration authorities that
  verify and authenticate the validity of each party involved in an Internet
  transaction. PKIs are currently evolving and there is no single PKI nor even
  a single agreed-upon standard for setting up a PKI. However, nearly
  everyone agrees that reliable PKIs are necessary before electronic
  commerce can become widespread. A PKI is also called a trust hierarchy.
Internet & Network Introduction
                                               Components-Software
Software
    Servers Software
      - Web (Apache, IIS)
      - Proxy/Web Cache (Squid, WinGate)
      - Email (Sendmail, Qmail, Lotus Notes)
      - DHCP (dhcpd)
      - DNS (Bind)
      - Firewall (IPtables)
      - Traffic Utilization (MRTG, Cacti)
    NOS – Network Operating System
      - Cisco IOS
      - 3Com Network Agent
    NMS (Network Management System)
      - 3Com Network Supervisor
      - HP OpenView
      - Ciscoworks LMS
      - Cisco Network Analysis Module
      - Tivoli
      - Websense
      - Fluke Agent
Internet & Network Introduction
                                      Interoperation-OSI

How Network Operate
  Open System Interconnection
  (OSI) Architecture
   - Physical layer
   - Data Link Layer
   - Network Layer
   - Transport Layer
   - Session Layer
   - Presentation Layer
   - Application Layer
Internet & Network Introduction
                                                     Interoperation-OSI
How Network Operate

  IP Address
     IP Address (Local & Public)
     IP specifies the format of packets, also called datagrams, and the
     addressing scheme. Most networks combine IP with a higher-level protocol
     called Transmission Control Protocol (TCP), which establishes a virtual
     connection between a destination and a source.The current version of IP is
     IPv4. A new version, Called IPv6.

     IP Address Examples
          Version 4 – Public : 202.170.56.73 / 255.255.255.255
                      Local : 10.202.1.4 / 255.255.255.255
          Version 6 – Public : 2001:328:400:2::22
Internet & Network Introduction
                                              Interoperation-OSI

VLSM / CIDR

- Variable-Length Subnet Mask - allocating IP addressing resources to
  subnets according to their individual need rather than some general
  network-wide rule.Used in the IP routing protocols supported by OSPF,
  Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes.

- Classless Inter-Domain Routing, an IP addressing scheme that replaces
  the older system based on classes A, B, and C. With CIDR, a single IP
  address can be used to designate many unique IP addresses. A CIDR IP
  address looks like a normal IP address except that it ends with a slash
  followed by a number, called the IP network prefix
Internet & Network Introduction
                                               Interoperation-OSI
Port Number (2-16 )
- The port numbers are divided into three ranges: the Well
   Known Ports, the Registered Ports, and the Dynamic and/or
   Private Ports.
- The Well Known Ports are those from 0 through 1023 (system
  services)
- The Registered Ports are those from 1024 through 49151
- The Dynamic and/or Private Ports are those from 49152 through
   65535

VLAN (Virtual Lan)
Virtual LAN, group of devices on one or more LAN that are configured
(using management software) so that they can communicate as if they
were attach to the same wire, when in facts they are located on a
number of different LAN segments.
Internet & Network Introduction
                                                   Troubleshooting-Tips
Network Technologies
 Wired Network
 Wireless Network
     802.11b
     - Enhancement to 802.11 that added higher data rate modes to the DSSS
       (Direct Sequence Spread Spectrum) already defined in the original
       802.11 standard
     - Boosted data speed to 11 Mbps
     - 22 MHz Bandwidth yields 3 non-overlaping channels in the frequency
       range of 2.400 GHz to 2.4835 GHz
     - Beacons at 1 Mbps, falls back to 5.5, 2, or 1 Mbps from 11 Mbps max
     802.11a
     - Specifies a PHY that operates in the 5 GHz U-NII band in the US - initially
       5.15-5.35 AND 5.725-5.85 - since expanded to additional frequencies
     - Uses Orthogonal Frequency-Division Multiplexing
     - Enhanced data speed to 54 Mbps
     - Ratified after 802.11b
Internet & Network Introduction
Network Technologies                               Troubleshooting-Tips
 Wireless Network (cont.)
     802.11g
     - Extends the maximum data rate of WLAN devices that operate in the 2.4
       GHz band, in a fashion that permits interoperation with 802.11b devices
     - Uses OFDM Modulation (Orthogonal FDM)
     - Operates at up to 54 megabits per second (Mbps)
     802.11n
     - Multiple-In, Multiple-Out (MIMO), a radio technique that increases the
       range of Wi-Fi networks by sending transmissions via multiple antennas.
       Dubbed the Intelligent RF Access Point (IRAP)
     - Airespace claims it will increase the range of 802.11 networks beyond
       their usual 100-meter limit, as well as help eliminate dead zones, areas
       within range of a Wi-Fi AP where reception is poor or non-existent due to
       obstacles that block radio propagation.
     - Operates at up to 248 megabits per second (Mbps)
     Fat AP, thin AP, Light AP, MIMO, Mesh
     Broadband Wireless - WiMax
Internet & Network Introduction
                                          Interoperation–Type & Services
Type Of Network
   LAN
   MAN
   WAN

Services
    ISPs (Internet Services Provider)
     - Jaring, Tmnet, Time, Maxis
    Telco (Telecommunication Company)
     - Telekom, Teleglobe, Maxis
    Network Admin
     - (NOC – Network Operating Center)
Internet & Network Introduction
                                                   Interoperation–Internet & Medium
Understand The Internet
   Definition
- Global Community                                                         Internet Cloud
                                                           Modem/DSL
   Protocol as standard communication
- TCP/IP (Transmission Control                 Computer                                                 VConf
                                            Home User
  Protocol / Internet Protocol)
                                                                  Leased line
                                                                                                       Multiplexer

                                                                                 UTP Cat6
     Connection Medium                                                                         PBX

-   UTP (Cat 5E, Cat 6)                        DAMA/FDMARouter                                        UTP Cat6
-   Leased Line (E1, T1)
-   Satellite - KU-Band (C-Band:SCPC, DAMA, FDMA)
                                        Satellite
                                            S a te llite
                                                                                UTP Cat6
                                                                                                     USMNet
-   Broadband (ISDN, DSL)
                                                                                                      LAN
-   Modem (V.90) (PPP / SLIP)                                                         Firewall
                                                                                        Firewall
                                    Where are u in
                                      the picture?
Internet & Network Introduction
                                       Interoperation–Function Explanation
Function Explanation
- Networking concept through OSI 7 Layers only happen when data
   travel from source to destination.
- Data from any sources will be transferred to the destination through mutual
  handshaking.
- OSI 7 Layers manipulate and ensured that the data are safely transferred.
- All the network devices such as switches, routers, firewall etc involve
   to ensure the data transmission.
- During the transmission, data will be monitored ,checked and rectified
   through checksum mechanism to ensure the validity and integrity.
Internet & Network Introduction
Network Application & Facilities    Application & Facilities
 Application Method
  – Freeware
  – Shareware
  – Paid
 Application Category
  - Database (SQL, Oracle, Sybase)
  - Monitoring Tools (Tivoli, NMS, NMap)
  - File Transfer (FTP, Gopher, WAIS)
  - Instant Messaging / Chat (IRC, ICQ, YM, Jabber)
  - Mail And Collaboration Tools (SMTP, IMAP, POP3, Lotus Notes)
  - Network OS (Telnet, FTP, SSH, NTP, LDAP, Finger, NFS, ident, daytime)
  - P2P File Sharing (Kazaa, Imesh, Gnutella, Skype)
  - Remote Access (pcAnywhere, VNC, Terminal Service, Citrix)
  - Streaming Media (Liquid Audio, RTSP, Windows Media)
  - Web (HTTP, HTTPS)
  - E-Learning – Lotus Notes
  - Others (NNTP, Internet Telephony, Video Conferencing, Personnel Network
    Storage, Spyware, Adware)
Internet & Network Introduction
                                                     Threats & Securities
Network Threats & Securities

 Network security specialists classify these
 threats as follows:
     Hackers
     Whereas crackers sole aim is to break into secure systems, hackers are
     more interested in gaining knowledge about computer systems and possibly
     using this knowledge for playful pranks. Although hackers still argue that
     there's a big difference between what they do and what crackers do, the
     mass media has failed to understand the distinction, so the two terms –
     hack and crack -- are often used interchangeably.

     Trojan horses
     A destructive program that masquerades as a benign application. Unlike
     viruses, Trojan horses do not replicate themselves but they can be just as
     destructive. One of the most insidious types of Trojan horse is a program
     that claims to rid your computer of viruses but instead introduces
     viruses onto your computer.
Internet & Network Introduction
                                                 Threats & Securities
Viruses
Fast, systematic, and self-replicating destructive programs designed to
damage systems and networks by eroding executable programs until they
are unusable


Worms
A program or algorithm that replicates itself over a computer network and
usually performs malicious actions, such as using up the computer's
resources and possibly shutting the system down.

Spam
Electronic junk mail or junk newsgroup postings. Some people define spam
even more generally as any unsolicited e-mail. Real spam is generally e-mail
advertising for some product sent to a mailing list or newsgroup. In addition
to wasting people's time with unwanted e-mail, spam also eats up a lot of
network bandwidth. However, some online services have instituted policies
to prevent spammers from spamming their subscribers.
Internet & Network Introduction
                                                Threats & Securities


Spyware
Also called adware, spyware is any software that covertly gathers user
information through the user's Internet connection without his or her
knowledge, usually for advertising purposes. Spyware applications are
typically bundled as a hidden component of freeware or shareware
programs that can be downloaded from the Internet. Once installed, the
spyware monitors user activity on the Internet and transmits that
information in the background to someone else. Spyware can also gather
information about e-mail addresses and even passwords and credit card
numbers.

Bandits
insiders seeking unauthorized information for personal gain
Internet & Network Introduction
                                         Threats & Securities-Protection

For protection against these risks, network and system managers
tasked with security responsibilities evaluate and examine
alternatives, which are based on hardware and software, or policies
    Endpoint Security Suite
    Access Control List
    Network Monitoring & Filtering Software & Tools
      - Firewall
      - IDS / IDP
      - Proxy
      - Websense
      - LDAP / NTLM
      - PKI
      - AAA
Internet & Network Introduction
                                                      Troubleshooting
Network Troubleshooting

Every user are encourage to learn and now day become compulsory to gain
knowledge to identify simple or common network problem due to high
dependency on it in daily communication/task. Thumb rule in any
troubleshooting, check the physical connection at first.

    Common Problems.                                         Where
      Can’t surf internet.                                     to
      Can’t read E-mail.                                     start?
      Can’t find other computer/server.(usmadmin)
      Can’t connect to Lotus Notes server.
      Can’t see other computer through
       network neighborhood.
      Can’t use local application (e-cuti).
      Can’t access outside server.(ftp,telnet,ssh)
      Personnel server can’t serve appropriately.
Internet & Network Introduction
                                         Troubleshooting-Compulsory Steps
Compulsory Steps :
   Steps 1: Check the Modem status. (Dial-up & DSL)
     - Check the phone line connection.
     - Check the modem driver & configuration.
     - Check the dial application configuration.
     - Capture the error message and ask the ISP.

    Steps 2: Check the NIC signals, whether there is a light/color/blinking. This
    is to ensure the NIC is function and some NIC product shows the speed of
    connection. If not
      - Check the cable connection from your Network/Ethernet adapter to
         the wall jack
      - Check the NIC driver
      - Verify and/or reinstall your network Ethernet and TCP/IP settings
      - Reboot your pc.
      - Change NIC if above steps taken and NIC still don’t blink.

 * Some product provide diagnose tool. Use it to troubleshoot the problem.
Internet & Network Introduction
                                        Troubleshooting-Problem Solution
    Steps 3: Check the IP Address.
      - Use: winipcfg, ipconfig, ifconfig. Rectifying the IP, Gateway and Name
         Server.
      - Identify either static ip / dynamic ip used at TCP/IP settings.
      - Use ping, tracert, nslookup, dig tools.
      - Capture the error message and ask Network Admin if dynamic IP could
         not be retrieve after above steps taken.
      - Make sure virus free

Common Problems Solution:
   For Internet browsing problem
     - Follow the Compulsory Steps.
     - Identify the IP type either Public or Local.
     - For local IP should use proxy server. Test the Proxy server
        availability and proxy configuration.
     - Capture the error message and ask the Network Administrator.
Internet & Network Introduction
                                    Troubleshooting-Problem Solution
For E-mail problem
  - Follow the Compulsory Steps.
  - Test the e-mail server availability.
  - Understand the e-mail client type (IMAP, POP3, HTTP) and rectify the
    e-mail client configuration.
  - Capture the error message and ask the Server & Network Administrator.

Can’t find other computer/server (Lotus Notes/usmadmin)
  - Follow the Compulsory Steps.
  - Make sure target computer/ server are up/active.
  - Rectify the searching method. Test the server availability.
  - Capture the error message and ask the Server Administrator.

Can’t use local application (e-cuti).
  - Follow the Compulsory Steps.
  - Make sure target computer/ server are up/active.
  - Rectify the application configuration at client site.
  - Capture the error message and ask the Application Administrator.
Internet & Network Introduction
                                          Troubleshooting-Tools & Technique
    Can’t access outside server.(ftp,telnet,ssh)
      - Follow the Compulsory Steps.
      - Make sure the IP Address used is the public one (P2P connection)

    Personnel server can’t serve appropriately (Personnel Web-Server)
      - Follow the Compulsory Steps.
      - Make sure all the necessary steps needs by server have been taken.
      - Capture the error message and ask the Network Administrator.

Some tools / technique could be use which is available in every OS:
   Ping
   Ping is used to test network connectivity respond
   between two computers on a network using
   ICMP protocol.
   Eg: ping your.ip.address
        ping your.ip.gateway
        ping your.ip/name.target

    Ipconfig/Ifconfig
Internet & Network Introduction
                                               Troubleshooting-Tips
Traceroute
Traceroute is use to test a lag in a communication
or the point of network failure on a network
(intranet / internet) resulting poor or no communication
which is testing every network routing known as Hop.
Eg: tracert jaring.com.my

Nslookup
Nslookup can be use in situation where a
computer can ping an IP Address
but not the computer name. This is to
determine whether the DNS server
can resolve the alias of the IP Address
Eg: nslookup jaring.com.my

Netstat
Netstat is use to show all the open port,
protocols statistics and current
TCP/IP connection at the user terminal.
Eg: netstat –a
Internet & Network Introduction
                                                Troubleshooting-Tips
Troubleshooting Tips
    Make sure virus free.
    Understand network related facilities used (IP Address, network servers,
    network structure, application dependencies)
    Check the physical connection at first.
    Understand the problem.
    Capture the error message.
    Ask the Network Administrator if problem un-solve after appropriate action
   has been taken.

Q & A Session
Perkongsian Maklumat Rangkaian USMNet
          Bahagian Infostruktur


             Thanks

More Related Content

What's hot

Service Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley SeminarService Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley Seminar
Xelerated
 
High density fiber optic cabling system 2017
High density fiber optic cabling system 2017High density fiber optic cabling system 2017
High density fiber optic cabling system 2017
Jerry Liu
 
Study for FIBRE-BR Backbone Network Architecture
Study for FIBRE-BR Backbone Network ArchitectureStudy for FIBRE-BR Backbone Network Architecture
Study for FIBRE-BR Backbone Network Architecture
FIBRE Testbed
 
Power Saving Methods in EPON
Power Saving Methods in EPONPower Saving Methods in EPON
Power Saving Methods in EPON
IEEE Standards Association (IEEE SA)
 
High density fiber optic cabling system apr. 2018
High density fiber optic cabling system apr. 2018High density fiber optic cabling system apr. 2018
High density fiber optic cabling system apr. 2018
Jerry Liu
 
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
Gruppo TIM
 
5G
5G5G
Infocom03 rajiv
Infocom03 rajivInfocom03 rajiv
Infocom03 rajiv
zt5169
 
10 fn s01
10 fn s0110 fn s01
10 fn s01
Scott Foster
 
Cbs5000 Base Station (quantumwimax.com)
Cbs5000 Base Station (quantumwimax.com)Cbs5000 Base Station (quantumwimax.com)
Cbs5000 Base Station (quantumwimax.com)
Ari Zoldan
 
Symmetry MX 10.5 GHz (quantumwimax.com)
Symmetry MX 10.5 GHz (quantumwimax.com)Symmetry MX 10.5 GHz (quantumwimax.com)
Symmetry MX 10.5 GHz (quantumwimax.com)
Ari Zoldan
 
Sae Archetecture
Sae ArchetectureSae Archetecture
Sae Archetecture
Deepak Sharma
 
IP-optical convergence: a complete solution
IP-optical convergence: a complete solutionIP-optical convergence: a complete solution
IP-optical convergence: a complete solution
Ericsson
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plan
sangusajjan
 

What's hot (14)

Service Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley SeminarService Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley Seminar
 
High density fiber optic cabling system 2017
High density fiber optic cabling system 2017High density fiber optic cabling system 2017
High density fiber optic cabling system 2017
 
Study for FIBRE-BR Backbone Network Architecture
Study for FIBRE-BR Backbone Network ArchitectureStudy for FIBRE-BR Backbone Network Architecture
Study for FIBRE-BR Backbone Network Architecture
 
Power Saving Methods in EPON
Power Saving Methods in EPONPower Saving Methods in EPON
Power Saving Methods in EPON
 
High density fiber optic cabling system apr. 2018
High density fiber optic cabling system apr. 2018High density fiber optic cabling system apr. 2018
High density fiber optic cabling system apr. 2018
 
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...
 
5G
5G5G
5G
 
Infocom03 rajiv
Infocom03 rajivInfocom03 rajiv
Infocom03 rajiv
 
10 fn s01
10 fn s0110 fn s01
10 fn s01
 
Cbs5000 Base Station (quantumwimax.com)
Cbs5000 Base Station (quantumwimax.com)Cbs5000 Base Station (quantumwimax.com)
Cbs5000 Base Station (quantumwimax.com)
 
Symmetry MX 10.5 GHz (quantumwimax.com)
Symmetry MX 10.5 GHz (quantumwimax.com)Symmetry MX 10.5 GHz (quantumwimax.com)
Symmetry MX 10.5 GHz (quantumwimax.com)
 
Sae Archetecture
Sae ArchetectureSae Archetecture
Sae Archetecture
 
IP-optical convergence: a complete solution
IP-optical convergence: a complete solutionIP-optical convergence: a complete solution
IP-optical convergence: a complete solution
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plan
 

Viewers also liked

La basilique notre dame de fourvière
La basilique notre dame de fourvièreLa basilique notre dame de fourvière
La basilique notre dame de fourvièrecoubimamoune
 
Los nacionalismos en el siglo XIX
Los nacionalismos en el siglo XIXLos nacionalismos en el siglo XIX
Los nacionalismos en el siglo XIX
Llalli Medina
 
Presentacion ANIEI2016
Presentacion ANIEI2016Presentacion ANIEI2016
Presentacion ANIEI2016
mayii76
 
10 Consigli per un Sito Mobile
10 Consigli per un Sito Mobile10 Consigli per un Sito Mobile
10 Consigli per un Sito Mobile
Antonio Maresca
 
2011 0523-nagoyageekbar
2011 0523-nagoyageekbar2011 0523-nagoyageekbar
2011 0523-nagoyageekbar
touchRL
 
Diapo photo twestival 2011
Diapo photo twestival 2011Diapo photo twestival 2011
Diapo photo twestival 2011
ZekyZek
 
Utp & fiber 1
Utp & fiber 1Utp & fiber 1
Utp & fiber 1
Welcome MyWeblog
 
Reputazione on Line per un Hotel
Reputazione on Line per un HotelReputazione on Line per un Hotel
Reputazione on Line per un Hotel
Antonio Maresca
 
Tweet Book #pisablog12 [si...parte 2]
Tweet Book #pisablog12 [si...parte 2]Tweet Book #pisablog12 [si...parte 2]
Tweet Book #pisablog12 [si...parte 2]
Antonio Maresca
 
Mobile Marketing per le Destinazioni Turistiche
Mobile Marketing per le Destinazioni TuristicheMobile Marketing per le Destinazioni Turistiche
Mobile Marketing per le Destinazioni Turistiche
Antonio Maresca
 
Financial Standard (Commercial Bank)
Financial Standard (Commercial Bank)Financial Standard (Commercial Bank)
Financial Standard (Commercial Bank)
bankfs
 
Historical and cultural institutions
Historical and cultural institutionsHistorical and cultural institutions
Historical and cultural institutions
DecemberLange
 
2012 0324-abc2012 spring
2012 0324-abc2012 spring2012 0324-abc2012 spring
2012 0324-abc2012 springtouchRL
 
Proyecto la Forma de Vida en
Proyecto la Forma de Vida enProyecto la Forma de Vida en
Proyecto la Forma de Vida en
Llalli Medina
 
Harry c arthur Deposition by Andy Vickery Attorney at Law
Harry c arthur Deposition by Andy Vickery Attorney at LawHarry c arthur Deposition by Andy Vickery Attorney at Law
Harry c arthur Deposition by Andy Vickery Attorney at Law
Louis Charles Hamilton II
 
Come diventare un H.I.M.E. - WebReevolution
Come diventare un H.I.M.E. - WebReevolutionCome diventare un H.I.M.E. - WebReevolution
Come diventare un H.I.M.E. - WebReevolution
Antonio Maresca
 

Viewers also liked (20)

La basilique notre dame de fourvière
La basilique notre dame de fourvièreLa basilique notre dame de fourvière
La basilique notre dame de fourvière
 
Los nacionalismos en el siglo XIX
Los nacionalismos en el siglo XIXLos nacionalismos en el siglo XIX
Los nacionalismos en el siglo XIX
 
Presentacion ANIEI2016
Presentacion ANIEI2016Presentacion ANIEI2016
Presentacion ANIEI2016
 
10 Consigli per un Sito Mobile
10 Consigli per un Sito Mobile10 Consigli per un Sito Mobile
10 Consigli per un Sito Mobile
 
2011 0523-nagoyageekbar
2011 0523-nagoyageekbar2011 0523-nagoyageekbar
2011 0523-nagoyageekbar
 
Diapo photo twestival 2011
Diapo photo twestival 2011Diapo photo twestival 2011
Diapo photo twestival 2011
 
Utp & fiber 1
Utp & fiber 1Utp & fiber 1
Utp & fiber 1
 
Reputazione on Line per un Hotel
Reputazione on Line per un HotelReputazione on Line per un Hotel
Reputazione on Line per un Hotel
 
Tweet Book #pisablog12 [si...parte 2]
Tweet Book #pisablog12 [si...parte 2]Tweet Book #pisablog12 [si...parte 2]
Tweet Book #pisablog12 [si...parte 2]
 
Mobile Marketing per le Destinazioni Turistiche
Mobile Marketing per le Destinazioni TuristicheMobile Marketing per le Destinazioni Turistiche
Mobile Marketing per le Destinazioni Turistiche
 
viaje a orlando
viaje a orlandoviaje a orlando
viaje a orlando
 
Airmechanics1
Airmechanics1Airmechanics1
Airmechanics1
 
Financial Standard (Commercial Bank)
Financial Standard (Commercial Bank)Financial Standard (Commercial Bank)
Financial Standard (Commercial Bank)
 
Viaje a Orlando
Viaje a Orlando Viaje a Orlando
Viaje a Orlando
 
Historical and cultural institutions
Historical and cultural institutionsHistorical and cultural institutions
Historical and cultural institutions
 
Bbl ๘
Bbl ๘Bbl ๘
Bbl ๘
 
2012 0324-abc2012 spring
2012 0324-abc2012 spring2012 0324-abc2012 spring
2012 0324-abc2012 spring
 
Proyecto la Forma de Vida en
Proyecto la Forma de Vida enProyecto la Forma de Vida en
Proyecto la Forma de Vida en
 
Harry c arthur Deposition by Andy Vickery Attorney at Law
Harry c arthur Deposition by Andy Vickery Attorney at LawHarry c arthur Deposition by Andy Vickery Attorney at Law
Harry c arthur Deposition by Andy Vickery Attorney at Law
 
Come diventare un H.I.M.E. - WebReevolution
Come diventare un H.I.M.E. - WebReevolutionCome diventare un H.I.M.E. - WebReevolution
Come diventare un H.I.M.E. - WebReevolution
 

Similar to Perkongsian Maklumat

Lte network chart_poster
Lte network chart_posterLte network chart_poster
Lte network chart_poster
DipeshHShah
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport Networks
Infinera
 
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
Jayani Technologies Ltd
 
MPLS-TP (MPLS Transport Profile)
MPLS-TP (MPLS Transport Profile)MPLS-TP (MPLS Transport Profile)
MPLS-TP (MPLS Transport Profile)
Shivlu Jain
 
RFCONNEXT\’s HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
RFCONNEXT\’s  HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONSRFCONNEXT\’s  HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
RFCONNEXT\’s HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
rfconnex
 
RNP 5th J-PAS 11-Nov-2012
RNP 5th J-PAS 11-Nov-2012RNP 5th J-PAS 11-Nov-2012
RNP 5th J-PAS 11-Nov-2012
Alex Moura
 
Open Idea
Open IdeaOpen Idea
Open Idea
carlosmgaraujo
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center Networking
Infinera
 
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
Jayani Technologies Ltd
 
GPON Optical Lan Overview November 5, 2014
GPON Optical Lan Overview November 5, 2014GPON Optical Lan Overview November 5, 2014
GPON Optical Lan Overview November 5, 2014
AFCEA Alaska Chapter
 
Unified MPLS
Unified MPLSUnified MPLS
40G QSFP+ Transceiver Data Sheet By JTOPTICS
40G QSFP+ Transceiver Data Sheet By JTOPTICS40G QSFP+ Transceiver Data Sheet By JTOPTICS
40G QSFP+ Transceiver Data Sheet By JTOPTICS
Jayani Technologies Ltd
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
TELKOMNIKA JOURNAL
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
Scott Foster
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
Scott Foster
 
Transformation of the Enterprise Network using Passive Optical LAN
Transformation of the Enterprise Network using Passive Optical LANTransformation of the Enterprise Network using Passive Optical LAN
Transformation of the Enterprise Network using Passive Optical LAN
ARolen
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET Journal
 
Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей. Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
Cisco Russia
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
John Loughney
 
High Performance Network Infrastructure for Future Internet - Julio Oliveira
High Performance Network Infrastructure for Future Internet - Julio OliveiraHigh Performance Network Infrastructure for Future Internet - Julio Oliveira
High Performance Network Infrastructure for Future Internet - Julio Oliveira
CPqD
 

Similar to Perkongsian Maklumat (20)

Lte network chart_poster
Lte network chart_posterLte network chart_poster
Lte network chart_poster
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport Networks
 
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
400G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
 
MPLS-TP (MPLS Transport Profile)
MPLS-TP (MPLS Transport Profile)MPLS-TP (MPLS Transport Profile)
MPLS-TP (MPLS Transport Profile)
 
RFCONNEXT\’s HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
RFCONNEXT\’s  HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONSRFCONNEXT\’s  HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
RFCONNEXT\’s HIGH SPEED INTERCONNECT TECHNOLOGIES AND APPLICATIONS
 
RNP 5th J-PAS 11-Nov-2012
RNP 5th J-PAS 11-Nov-2012RNP 5th J-PAS 11-Nov-2012
RNP 5th J-PAS 11-Nov-2012
 
Open Idea
Open IdeaOpen Idea
Open Idea
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center Networking
 
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
800G QSFP-DD Optical Transceiver Data Sheet By JTOPTICS
 
GPON Optical Lan Overview November 5, 2014
GPON Optical Lan Overview November 5, 2014GPON Optical Lan Overview November 5, 2014
GPON Optical Lan Overview November 5, 2014
 
Unified MPLS
Unified MPLSUnified MPLS
Unified MPLS
 
40G QSFP+ Transceiver Data Sheet By JTOPTICS
40G QSFP+ Transceiver Data Sheet By JTOPTICS40G QSFP+ Transceiver Data Sheet By JTOPTICS
40G QSFP+ Transceiver Data Sheet By JTOPTICS
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
 
Transformation of the Enterprise Network using Passive Optical LAN
Transformation of the Enterprise Network using Passive Optical LANTransformation of the Enterprise Network using Passive Optical LAN
Transformation of the Enterprise Network using Passive Optical LAN
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей. Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей.
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
 
High Performance Network Infrastructure for Future Internet - Julio Oliveira
High Performance Network Infrastructure for Future Internet - Julio OliveiraHigh Performance Network Infrastructure for Future Internet - Julio Oliveira
High Performance Network Infrastructure for Future Internet - Julio Oliveira
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Perkongsian Maklumat

  • 1. Perkongsian Maklumat Rangkaian USMNet Bahagian Infostruktur 06-07/05/2008 Ahmad Fadhlul Irham Yusoff E-mail: irham@usm.my Abdul Ghani Abdul Rahman E-mail: ghani@usm.my
  • 2. Internet & Network Introduction Objectives Of The Class Objectives Of The Class: At the end of this lesson you should be able to understand: Network Introduction Type Of Network Network Topology Network Component How Network Operate Network Application & Facilities Network Threats & Securities Network Troubleshooting Q & A Open Session
  • 3. Internet & Network Introduction Introduction & Type Network Introduction Definition – Global network connecting million of computers exchanging data. History – Started in 1957 known ARPA within DoD, then being awarded ARPANET Roadmap / New Technologies IPv6 - Internet Protocol Version 6 is an evolutionary step from IPv4 featuring Large address space, Efficient and hierarchical addressing and routing infrastructure, Built-in security, Better support for quality of service (QoS) Ultra Wideband (UWB) - MultiBand OFDM wireless using very high data rates and low power consumption radio signal Very High Bit Rate DSL (VDSL) - Aggregation up to 32 Synchronous High Bit Rate DSL (SHDSL) providing 10Mbits/sec bidirectionally over copper
  • 4. Internet & Network Introduction Introduction & Type Roadmap / New Technologies (cont.) Ethernet Virtual Connections (EVCs) - A standard for creating ATM-like PVCs across Ethernet, will replace point-to-point circuits. Ethernet WANs will replace frame relay clouds with Virtual Private LAN Service (VPLS), a layer-2 VPN that will add security to EVCs to create LAN interconnect services HighSpeed TCP – Reworking TCP to support higher / more efficient load
  • 5. Internet & Network Introduction History of USMNet 1994 – USMNet started • FDDI technology (Fiber Distributed Data Exchange) • Retix Routers • 35 km fiber optic cable lay for 3 Campuses (Main, Kubang Kerian & Tronoh) • All main buildings are connected with 1500 nodes. – especially academician, administrative and general office • 64Kbps access to JARING for Main Campus • 9.6Kbps access to JARING for Kampus Cawangan Kelantan & Kampus Cawangan Perak)
  • 6. Internet & Network Introduction History of USMNet USMNet (Penang) - 1994 PTPM Falak PPTek.Ind Perpustakaan Pbahasa HEP PPSFizik CPR Pentadbiran Cent100 C15 PPSKemasyarakatan PPIKemanusiaan Rx7000 G02 C22 PTMaklumat PPSKomputer PPJJ PPSMatematik Rx7000 D18 BCombits JX JARING PPSFarmasi FDDI Jpembangunan ONLine Pinovasi 64Kbps PPDadah FOIRL Cisco F03 D37 ONLine PPSKimia ONLine PPSKajihayat PIslam PPPBang& PPIPendidikan Perancang Pkomputer PPPengurusan
  • 7. Internet & Network Introduction History of USMNet 1998 – USMNet upgrade • 1.5Mbps access to JARING (started on 14 July 1998) • Numbers of nodes increase more than 3000: – 99% academician, administrative & general office – Lab at school • Locally connected from main campus to branch campus (Kelantan & Tronoh) through Celcom Microwave 256kbps. • 9.6kbps access to jaring for branch campus was terminated. • No of users: – Academic: 1,200 – Administative: 500 – Student: 20,000
  • 8. Internet & Network Introduction History of USMNet USMNet - before 2000 Perpustakaan PTPM Falak PPTekInd Pbahasa HEP PPSFizik CPR Pentadbiran PPSKemasy. PPIKem. C15 CB3500 Rx7000 G02 C22 PTMaklumat PPSKomp PPJJ PPSMath JX Rx7000 D18 BCombits JARING 1536Kbps FDDI PPSFarmasi ONLine Jpembangunan 256Kbps PInovasi FOIRL W/Fleet KCK PPDadah NetBuilder 256Kbps F03 D37 ONLine KCP PPSKimia PPPBang& ONLine Pislam PPSKajihayat Pembangunan PPIPend Pkomputer PPKomunikasi PPPengurusan
  • 9. Internet & Network Introduction History of USMNet 2000 – USMNet Upgrading • FDDI was replaced with gigabit technology • 2x2Mbps access to JARING • 2Mbps access to JARING for Engineering Campus and Medical Campus • Connection within campus (Main to Engineering/Medical) are connected locally through 2x2Mbps (2002) • Data, Video and Voice in one network (2002) • Wireless technology implemented in Desasiswa
  • 10. Internet & Network Introduction USMNet - 2003 History of USMNet
  • 11. Internet & Network Introduction USMNet - 2007 History of USMNet
  • 12. Internet & Network Introduction Case Study – USMNet 2008 History of USMNet
  • 13. Internet & Network Introduction Components-Case Study Case Study – USMnet Penang WIFI JARING USMNet Antenna / Access point DESASISWA Pejabat Desasiswa
  • 14. Internet & Network Introduction Introduction & Type Type Of Network LAN (Local Area Network) • Ethernet, Token Ring • Hub & Switches • UTP Cat. 5E & 6, Fiber Optic • Novell, Win NT,Win 2K, Win XP,Win Vista, Unix, Linux MAN (Metropolitan Area Network) • Fiber Optic Cable • Routers & Switches • Network Admin WAN (Wide Area Network) • PSTN, ISDN,Frame Relay,ATM,Satellite • Routers & Switches • Internet
  • 15. Internet & Network Introduction Topology Network Topology Client Printer Bus Topology - A bus consists of a wire and shield Client (coaxial), which electrically constitute a single circuit. At either end of a bus is a terminator, which is essentially a resistor Client and connected through a T Connector. Client Client Printer
  • 16. Internet & Network Introduction Topology Network Topology (cont.) Star Topology - This is a star configuration and it is found in Ethernet networks that use twisted pair cable such as Cat 5, Cat UTP Cat 5 5E, Cat 6 and Fiber Optic. Cabling 8 Port Workgroup Hub - The twisted pair cable uses RJ-45 connectors that connect directly to the NIC on the device end, and to the hub on the other end while the Fiber use LX, FX, SC, ST Connectors to connect between network devices.
  • 17. Internet & Network Introduction Topology Network Topology (cont.) Ring Topology - A pure ring is a collection of separate point-to-point links, arranged to make a ring which propagate a signals received on the input connection and passed immediately to the output connection by “repeater” circuitry in each node. - The most common type of cabling used in ring topologies is fiber optic cable. Client Data Flow Client Client Client
  • 18. Internet & Network Introduction Topology Network Topology (cont.) Hybrid (Star Ring) Topology - The hybrid topology is a type of network topology that is composed of one or more interconnections of two or more networks that are based upon different physical topologies
  • 19. Internet & Network Introduction Components - Devices Networks Components Devices Terminal(Computers/Servers) Network Card / Modem Network Cabling Including all UTP (Cat 5, Cat 5e, Cat 6, Cat 6a, Cat 7), Fiber Optics Bridge (Broadcast & Collision Domain) A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol, such as Ethernet or Token-Ring.
  • 20. Internet & Network Introduction Components - Devices Devices (cont.) Hub/Switches (Broadcast & Collision Domain) A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A switching hub or Switches, actually reads the destination address of each packet and then forwards the packet to the correct port.
  • 21. Internet & Network Introduction Components-Devices Devices (cont.) Router A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network
  • 22. Internet & Network Introduction Components-Devices Devices (cont.) Firewall According to the National Computer Security Association, a firewall is “a system or combination of systems that enforces a boundary between two or more networks.” It is a controlled gateway between one network and another, typically between a private network and the Internet. -21 FTP P -8 0 HTT 337 fic e-31 k O ri Bac 5 SMTP-2
  • 23. Internet & Network Introduction Components-Devices Devices (cont.) IDS (Intrusion Detection System) provide the inspection all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system. Attack Detected !! et R es Internet
  • 24. Internet & Network Introduction Components-Devices Devices (cont.) IPS (Intrusion Prevention System) device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. Will operate in-line to monitor all network traffic for malicious code or attacks. When an attack is detected, it can drop the offending packets while still allowing all other traffic to pass. Network • Block Attacks • Throttle P2P Downloads Policies • Block P2P Uploads Dirty Clean Traffic Traffic Worms Trojans Viruses P2P Intelligence Updates: Spyware Digital Vaccine®
  • 25. Internet & Network Introduction Components-Devices Devices (cont.) UTM (Unified threat management) network firewalls that have many features in one box, including e-mail spam filtering, anti-virus capability, an (IDS or IPS), and World Wide Web content filtering , along with the traditional activities of a firewall.
  • 26. Internet & Network Introduction Components-Devices Devices (cont.) Traffic shaper WAN optimization/acceleration allows network pros to speed performance across the WAN with compression, caching, protocol shaping, and other techniques. It also lets network managers allot dedicated amounts of bandwidth to certain types of traffic to ensure that they are not competing with other traffic for space in the pipe.
  • 27. Internet & Network Introduction Components-Devices Devices (cont.) AP (Access Point) A hardware device or a computer's software (NetBuddy) that acts as a communication hub for users of a wireless device to connect to a wired LAN. - Fat AP In the autonomous architecture, the APs completely implement and terminate the 802.11 function so that frames on the wired LAN are 802.3 frames. Each AP can be independently managed as a separate network entity on the network. - Thin AP The centralized architecture is a hierarchical architecture that involves a WLAN controller that is responsible for configuration, control, and management of several APs. The WLAN controller is also known as the Access Controller (AC). The 802.11 function is split between the AP and the AC. - Fit AP
  • 28. Internet & Network Introduction Components-Devices Devices (cont.) WiSM (Wireless Services Module) unparalleled security, mobility, redundancy, and ease of use for business- critical wireless LANs (WLANs). It allows network managers and operators to control and manage their wireless networks easily.
  • 29. Internet & Network Introduction Components-Servers Servers DNS (Domain Name System or Service) A Server that translates domain names into IP addresses. - Internal DNS - External DNS For example, the domain name www.usm.my might translate to 10.202.1.4 - internal DNS 202.170.56.73 - external DNS - DNS server USM 10.202.1.6/10.202.1.27 202.170.56.75/202.170.56.155
  • 30. Internet & Network Introduction Components-Servers Servers (cont.) DHCP (Dynamic Host Configuration Protocol ) A server that provide an assigning dynamic IP addresses to devices on a network. With dynamic addressing a device can have a different IP address every time it connects to the network. Proxy vs NAT (Network Address Translation) / Masquerade A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. (Http, Https, Ftp) nat static nat dynamic nat overload
  • 31. Internet & Network Introduction Components-Servers Servers (cont.) WINS (Windows Internet Naming Service ) A server that provide a distributed database that is automatically updated with the names of computers currently available and the IP address assigned to each one. DDNS (Dynamic DNS) dynamic Domain Name System, a method of keeping a domain name linked to a changing IP address as not all computers use static IP addresses. A dynamic DNS service provider uses a special program that runs on the user's computer, contacting the DNS service each time the IP address provided by the ISP changes and subsequently updating the DNS database to reflect the change in IP address.
  • 32. Internet & Network Introduction Components-Servers Servers (cont.) Web Cache / Content Engine On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the a server or appliance that provide a service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery. AAA (Authentication, Authorization & Accounting) – IEEE 802.1x A system in IP-based networking to control what computer resources users have access to and to keep track of the activity of users over a network.
  • 33. Internet & Network Introduction Components-Servers Servers (cont.) Radius Short for Remote Authentication Dial-In User Service, a server that provide an authentication and accounting system used by many Internet Service Providers (ISPs). When you dial in to the ISP you must enter your username and password. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access to the ISP system. LDAP / NTLM Short for Lightweight Directory Access Protocol, a server that provide a set of protocols for accessing information directories.LDAP supports TCP/IP, which is necessary for any type of Internet access. Although not yet widely implemented, LDAP should eventually make it possible for almost any application running on virtually any computer platform to obtain directory information, such as email addresses and public keys. Because LDAP is an open protocol, applications need not worry about the type of server hosting the directory.
  • 34. Internet & Network Introduction Components-Servers Servers (cont.) PKI Short for public key infrastructure, a server that provide a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. PKIs are currently evolving and there is no single PKI nor even a single agreed-upon standard for setting up a PKI. However, nearly everyone agrees that reliable PKIs are necessary before electronic commerce can become widespread. A PKI is also called a trust hierarchy.
  • 35. Internet & Network Introduction Components-Software Software Servers Software - Web (Apache, IIS) - Proxy/Web Cache (Squid, WinGate) - Email (Sendmail, Qmail, Lotus Notes) - DHCP (dhcpd) - DNS (Bind) - Firewall (IPtables) - Traffic Utilization (MRTG, Cacti) NOS – Network Operating System - Cisco IOS - 3Com Network Agent NMS (Network Management System) - 3Com Network Supervisor - HP OpenView - Ciscoworks LMS - Cisco Network Analysis Module - Tivoli - Websense - Fluke Agent
  • 36. Internet & Network Introduction Interoperation-OSI How Network Operate Open System Interconnection (OSI) Architecture - Physical layer - Data Link Layer - Network Layer - Transport Layer - Session Layer - Presentation Layer - Application Layer
  • 37. Internet & Network Introduction Interoperation-OSI How Network Operate IP Address IP Address (Local & Public) IP specifies the format of packets, also called datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.The current version of IP is IPv4. A new version, Called IPv6. IP Address Examples Version 4 – Public : 202.170.56.73 / 255.255.255.255 Local : 10.202.1.4 / 255.255.255.255 Version 6 – Public : 2001:328:400:2::22
  • 38. Internet & Network Introduction Interoperation-OSI VLSM / CIDR - Variable-Length Subnet Mask - allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule.Used in the IP routing protocols supported by OSPF, Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes. - Classless Inter-Domain Routing, an IP addressing scheme that replaces the older system based on classes A, B, and C. With CIDR, a single IP address can be used to designate many unique IP addresses. A CIDR IP address looks like a normal IP address except that it ends with a slash followed by a number, called the IP network prefix
  • 39. Internet & Network Introduction Interoperation-OSI Port Number (2-16 ) - The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. - The Well Known Ports are those from 0 through 1023 (system services) - The Registered Ports are those from 1024 through 49151 - The Dynamic and/or Private Ports are those from 49152 through 65535 VLAN (Virtual Lan) Virtual LAN, group of devices on one or more LAN that are configured (using management software) so that they can communicate as if they were attach to the same wire, when in facts they are located on a number of different LAN segments.
  • 40. Internet & Network Introduction Troubleshooting-Tips Network Technologies Wired Network Wireless Network 802.11b - Enhancement to 802.11 that added higher data rate modes to the DSSS (Direct Sequence Spread Spectrum) already defined in the original 802.11 standard - Boosted data speed to 11 Mbps - 22 MHz Bandwidth yields 3 non-overlaping channels in the frequency range of 2.400 GHz to 2.4835 GHz - Beacons at 1 Mbps, falls back to 5.5, 2, or 1 Mbps from 11 Mbps max 802.11a - Specifies a PHY that operates in the 5 GHz U-NII band in the US - initially 5.15-5.35 AND 5.725-5.85 - since expanded to additional frequencies - Uses Orthogonal Frequency-Division Multiplexing - Enhanced data speed to 54 Mbps - Ratified after 802.11b
  • 41. Internet & Network Introduction Network Technologies Troubleshooting-Tips Wireless Network (cont.) 802.11g - Extends the maximum data rate of WLAN devices that operate in the 2.4 GHz band, in a fashion that permits interoperation with 802.11b devices - Uses OFDM Modulation (Orthogonal FDM) - Operates at up to 54 megabits per second (Mbps) 802.11n - Multiple-In, Multiple-Out (MIMO), a radio technique that increases the range of Wi-Fi networks by sending transmissions via multiple antennas. Dubbed the Intelligent RF Access Point (IRAP) - Airespace claims it will increase the range of 802.11 networks beyond their usual 100-meter limit, as well as help eliminate dead zones, areas within range of a Wi-Fi AP where reception is poor or non-existent due to obstacles that block radio propagation. - Operates at up to 248 megabits per second (Mbps) Fat AP, thin AP, Light AP, MIMO, Mesh Broadband Wireless - WiMax
  • 42. Internet & Network Introduction Interoperation–Type & Services Type Of Network LAN MAN WAN Services ISPs (Internet Services Provider) - Jaring, Tmnet, Time, Maxis Telco (Telecommunication Company) - Telekom, Teleglobe, Maxis Network Admin - (NOC – Network Operating Center)
  • 43. Internet & Network Introduction Interoperation–Internet & Medium Understand The Internet Definition - Global Community Internet Cloud Modem/DSL Protocol as standard communication - TCP/IP (Transmission Control Computer VConf Home User Protocol / Internet Protocol) Leased line Multiplexer UTP Cat6 Connection Medium PBX - UTP (Cat 5E, Cat 6) DAMA/FDMARouter UTP Cat6 - Leased Line (E1, T1) - Satellite - KU-Band (C-Band:SCPC, DAMA, FDMA) Satellite S a te llite UTP Cat6 USMNet - Broadband (ISDN, DSL) LAN - Modem (V.90) (PPP / SLIP) Firewall Firewall Where are u in the picture?
  • 44. Internet & Network Introduction Interoperation–Function Explanation Function Explanation - Networking concept through OSI 7 Layers only happen when data travel from source to destination. - Data from any sources will be transferred to the destination through mutual handshaking. - OSI 7 Layers manipulate and ensured that the data are safely transferred. - All the network devices such as switches, routers, firewall etc involve to ensure the data transmission. - During the transmission, data will be monitored ,checked and rectified through checksum mechanism to ensure the validity and integrity.
  • 45. Internet & Network Introduction Network Application & Facilities Application & Facilities Application Method – Freeware – Shareware – Paid Application Category - Database (SQL, Oracle, Sybase) - Monitoring Tools (Tivoli, NMS, NMap) - File Transfer (FTP, Gopher, WAIS) - Instant Messaging / Chat (IRC, ICQ, YM, Jabber) - Mail And Collaboration Tools (SMTP, IMAP, POP3, Lotus Notes) - Network OS (Telnet, FTP, SSH, NTP, LDAP, Finger, NFS, ident, daytime) - P2P File Sharing (Kazaa, Imesh, Gnutella, Skype) - Remote Access (pcAnywhere, VNC, Terminal Service, Citrix) - Streaming Media (Liquid Audio, RTSP, Windows Media) - Web (HTTP, HTTPS) - E-Learning – Lotus Notes - Others (NNTP, Internet Telephony, Video Conferencing, Personnel Network Storage, Spyware, Adware)
  • 46. Internet & Network Introduction Threats & Securities Network Threats & Securities Network security specialists classify these threats as follows: Hackers Whereas crackers sole aim is to break into secure systems, hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks. Although hackers still argue that there's a big difference between what they do and what crackers do, the mass media has failed to understand the distinction, so the two terms – hack and crack -- are often used interchangeably. Trojan horses A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  • 47. Internet & Network Introduction Threats & Securities Viruses Fast, systematic, and self-replicating destructive programs designed to damage systems and networks by eroding executable programs until they are unusable Worms A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Spam Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
  • 48. Internet & Network Introduction Threats & Securities Spyware Also called adware, spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Bandits insiders seeking unauthorized information for personal gain
  • 49. Internet & Network Introduction Threats & Securities-Protection For protection against these risks, network and system managers tasked with security responsibilities evaluate and examine alternatives, which are based on hardware and software, or policies Endpoint Security Suite Access Control List Network Monitoring & Filtering Software & Tools - Firewall - IDS / IDP - Proxy - Websense - LDAP / NTLM - PKI - AAA
  • 50. Internet & Network Introduction Troubleshooting Network Troubleshooting Every user are encourage to learn and now day become compulsory to gain knowledge to identify simple or common network problem due to high dependency on it in daily communication/task. Thumb rule in any troubleshooting, check the physical connection at first. Common Problems. Where Can’t surf internet. to Can’t read E-mail. start? Can’t find other computer/server.(usmadmin) Can’t connect to Lotus Notes server. Can’t see other computer through network neighborhood. Can’t use local application (e-cuti). Can’t access outside server.(ftp,telnet,ssh) Personnel server can’t serve appropriately.
  • 51. Internet & Network Introduction Troubleshooting-Compulsory Steps Compulsory Steps : Steps 1: Check the Modem status. (Dial-up & DSL) - Check the phone line connection. - Check the modem driver & configuration. - Check the dial application configuration. - Capture the error message and ask the ISP. Steps 2: Check the NIC signals, whether there is a light/color/blinking. This is to ensure the NIC is function and some NIC product shows the speed of connection. If not - Check the cable connection from your Network/Ethernet adapter to the wall jack - Check the NIC driver - Verify and/or reinstall your network Ethernet and TCP/IP settings - Reboot your pc. - Change NIC if above steps taken and NIC still don’t blink. * Some product provide diagnose tool. Use it to troubleshoot the problem.
  • 52. Internet & Network Introduction Troubleshooting-Problem Solution Steps 3: Check the IP Address. - Use: winipcfg, ipconfig, ifconfig. Rectifying the IP, Gateway and Name Server. - Identify either static ip / dynamic ip used at TCP/IP settings. - Use ping, tracert, nslookup, dig tools. - Capture the error message and ask Network Admin if dynamic IP could not be retrieve after above steps taken. - Make sure virus free Common Problems Solution: For Internet browsing problem - Follow the Compulsory Steps. - Identify the IP type either Public or Local. - For local IP should use proxy server. Test the Proxy server availability and proxy configuration. - Capture the error message and ask the Network Administrator.
  • 53. Internet & Network Introduction Troubleshooting-Problem Solution For E-mail problem - Follow the Compulsory Steps. - Test the e-mail server availability. - Understand the e-mail client type (IMAP, POP3, HTTP) and rectify the e-mail client configuration. - Capture the error message and ask the Server & Network Administrator. Can’t find other computer/server (Lotus Notes/usmadmin) - Follow the Compulsory Steps. - Make sure target computer/ server are up/active. - Rectify the searching method. Test the server availability. - Capture the error message and ask the Server Administrator. Can’t use local application (e-cuti). - Follow the Compulsory Steps. - Make sure target computer/ server are up/active. - Rectify the application configuration at client site. - Capture the error message and ask the Application Administrator.
  • 54. Internet & Network Introduction Troubleshooting-Tools & Technique Can’t access outside server.(ftp,telnet,ssh) - Follow the Compulsory Steps. - Make sure the IP Address used is the public one (P2P connection) Personnel server can’t serve appropriately (Personnel Web-Server) - Follow the Compulsory Steps. - Make sure all the necessary steps needs by server have been taken. - Capture the error message and ask the Network Administrator. Some tools / technique could be use which is available in every OS: Ping Ping is used to test network connectivity respond between two computers on a network using ICMP protocol. Eg: ping your.ip.address ping your.ip.gateway ping your.ip/name.target Ipconfig/Ifconfig
  • 55. Internet & Network Introduction Troubleshooting-Tips Traceroute Traceroute is use to test a lag in a communication or the point of network failure on a network (intranet / internet) resulting poor or no communication which is testing every network routing known as Hop. Eg: tracert jaring.com.my Nslookup Nslookup can be use in situation where a computer can ping an IP Address but not the computer name. This is to determine whether the DNS server can resolve the alias of the IP Address Eg: nslookup jaring.com.my Netstat Netstat is use to show all the open port, protocols statistics and current TCP/IP connection at the user terminal. Eg: netstat –a
  • 56. Internet & Network Introduction Troubleshooting-Tips Troubleshooting Tips Make sure virus free. Understand network related facilities used (IP Address, network servers, network structure, application dependencies) Check the physical connection at first. Understand the problem. Capture the error message. Ask the Network Administrator if problem un-solve after appropriate action has been taken. Q & A Session
  • 57. Perkongsian Maklumat Rangkaian USMNet Bahagian Infostruktur Thanks