Upload
qoimah-adielah
View
417
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
By :
6th Group
Selamat Datang
NETWORK II
English Engineering 1
Router(Erviando M.P)
Router
Router
Kind
static router, table routing manually sets by admin.
dynamic router, table routing adapts with network traffic
firewall contains keywords walls. The function of the wall is to protect everything inside the walls. Well, the same firewall function, which is to protect your computer or network from another computer access.
Firewall(M. Ridwan)
access.
Illustration of firewall
Controlling and monitoring the flow of data packets on a network firewall, which controls the data traffic was allowed to access the private network behind a firewall.
Perform authentication to access.
Function
Application Proxy Firewall able to check out, this ability requires the firewall to be able to detect the specific application
protocol specification. Record every transaction that occurred in the firewall. It helps as a detector allows data theft.
Function
Wireless Acces Point(Qoimatul A)
Wireless Acces Point (WAP)
In computer networking, a wireless access point (WAP)
is a device that allows wireless devices to connect
to a wired network using Wi-Fi, Bluetooth or related
standards.
defeni
tion
Wireless Acces Point (WAP)
The function of a wireless access point is to allow
wireless devices such as projectors, laptops and PDAs
to access a local area network.
Functi
on
Wireless Acces Point (WAP)
D-Link
DAP-1150
D-Link DAP-1150
TP-Link TL-
MR3220
linksys WRVS4400
N
D-Link DWL-
G700AP
Tp-Link TL-MR3420
Hardware that serves as a means of communication is two-way
communication and is used for internet on the computer.
Modem(Dwi P.T)
Type of Modem
Analog modem
ADSL Modem
Type of Modem
A cable modem
Modem CDMA
Type of Modem
Modem 3GP
GSM Modem
Proxy is a third party that stands in the middle between the two parties that are interconnected and function
as intermediaries
Proxy Server(Nefi Liana)
It may be a longer process than if we directly search and retrieve their own data that we want.
Excess Operating System that uses a proxy is requested data from the client will be directed to the proxy server and then proceed to internet..
Weakness & Disadvantages
Connection Sharing Filtering Caching
Function
THANK YOU
THANK YOU
Switch(David Candra)
swicth is a networking tool that does invisible bridge (connecting partitioning (segmentation) with the
transfer of many networksswitch can be used as a computer interface on a limited area, swicth works on the data link layer, the
switch work is almost the same as bridge, but switch has a number of ports that make swicth often
called multi -port bridge
Description
receives a message from any device connected to it transmits the message only to the device for which the message was meant
Function
Turn particular port range on or off Link bandwidth and duplex settings Priority settings for ports IP Management by IP Clustering. MAC filtering and other types of "port security" features which
prevent MAC flooding Use of Spanning Tree Protocol SNMP monitoring of device and link health Port mirroring (also known as: port monitoring) Link aggregation (also known as bonding, trunking or teaming) VLAN settings 802.1X network access control
Typical Switch management features
Link aggregation allows the use of multiple
ports for the same connection achieving higher data transfer rates. Creating VLANs can serve security and performance goals by reducing the size of the broadcast domain.
Typical Switch management features