Presentation is loading. Please wait.

Presentation is loading. Please wait.

 SITI NUR SOLEHA BT ADAM -2130163-  SYAFIQAH YUSRA BT MOHAMAD -2130242-  HUMAIRA BT KHAIRUDDIN -2130213-  INTAN NORAZLINA BT HAIRUDDIN -2130159- 

Similar presentations


Presentation on theme: " SITI NUR SOLEHA BT ADAM -2130163-  SYAFIQAH YUSRA BT MOHAMAD -2130242-  HUMAIRA BT KHAIRUDDIN -2130213-  INTAN NORAZLINA BT HAIRUDDIN -2130159- "— Presentation transcript:

1  SITI NUR SOLEHA BT ADAM -2130163-  SYAFIQAH YUSRA BT MOHAMAD -2130242-  HUMAIRA BT KHAIRUDDIN -2130213-  INTAN NORAZLINA BT HAIRUDDIN -2130159-  NUR FATIN SYAMIMI BT SHAFFI -2130161-

2

3

4  Switch Use to connect the computers, printers and servers within a building or campus. A switch servers as a controller, enabling networked devices to talk to each other efficiently. The path is in existence only for the duration of the communication and is disconnected at the end. In this situation, the Semboyan Division will give an order or information Through information sharing and resource allocation, switches save businesses money and increase employee productivity.  Router Layer 3 (Network Layer) device. It forward the packet on the basis of Routed Protocols such as IP, IPv6 and etc. Generally used to communicate between two or more than two different segment, different network or LAN. Wireless router has the ability to filter the traffic, either incoming or outgoing, based on IP address of senders and receivers.

5  Fiber-Optic Communication System  Uses fiber-optic cables to transmit information via light channeled through the cable.  In this exercise, the fiber-optic line is directly connected to its recipient.  Fiber-optic cable are both smaller and lighter in diameter. They can be more easily produced and installed.  This system use significantly less energy, thus immune to many dangers associated with the electrical current used in copper lines.  Fiber-optic cables are both immune to electromagnetic interference and produce no interference when operating.  Half-duplex transmission  A transmission path can carry information in both directions but in only one direction at a time.  Wireless Local Area Network (WLAN)  Wireless computer network that links two or more devices using a wireless distribution method within a limited area.  An ad hoc network is a network where stations communicate only peer to peer. There is no base and no one gives permission to talk.

6  Microwave  These are radio waves that provides a high speed signal transmission, from one microwave station to another, which are normally located on top of buildings, towers or mountain.  Microwave signals must be transmitted in as straight line with the obstructions between microwave antennas.  Communication Satellite  This is a space station that receive microwave signals from an earth-based station, amplifies the signals, and broadcasts the signal back over a wide area to any number of earth- based station.  A transmission from earth to a satellite is called an uplink.  A transmission from satellite to an earth station is called a downlink.  Communication satellites are used in application such as air navigation, television and radio broadcast.

7  Network Management with PRTG.  The separate capabilities of network management software can be divided into :  Availability monitoring.  Activity monitoring.  Usage monitoring.  Network availability monitoring.  Network management software detects failures, system or router slowdown and automatically informs the administrator ( Ketua Unit Semboyan ) about the status of these devices.  Another part of network monitoring software is checking server and web site availability.  These notification about detected failing system can be relayed via emails, or methods such as network broadcast, text log or SMS.  Alerting the administrator in case of system errors is one of the most important functions of network monitoring software.  Network management software such as PRTG Network Monitor, monitor the systems’ up and downtimes, allowing you to immediately detect faults or system slowdown.

8  Usage and Connectivity Management.  To assure network, as well as server performance, it is important to know the overall bandwith usage, disk usage, CPU load and etc.  Once we find a performance issue caused by high usage levels, it is good to know which applications and servers/users are using up our bandwith.  Usage and bandwith monitoring based on multiple parameters such as IP address, port numbers and protocols can be performed using either SNMP, Packet Sniffing or NetFlow.  IPHost Network Monitor  A network monitoring tool for Microsoft Windows.  This software is for availability and performance monitoring of web sites servers, intranet/internet applications, mail servers, database servers, and other network resources.  Standard SNMP ( Simple Network Management Protocol ) can be used to monitor performance and other server parameters (Unix/Linux/Mac/Windows) and network equipment such as routers and printers.  Uses multi-functional alerting system which provides notifications by means of SMS, e-mail and instant messengers.

9  Physical security.  Installing network computers with a lock that has to be opened before people can even log on.  Installing network computers that have no floopy disks or CD drivers.  Set up surveillance.  Protect the portable. Laptops and handheld computers pose special physical security risks. A thief can easily steal the entire computer, including any data stored on its disk as well as network logon passwords.  Pack up the backups. Backing up important data is an essential element in disaster recovery.  Increasing the complexity of network communication speeds up.  Increase the amount of data user can share.


Download ppt " SITI NUR SOLEHA BT ADAM -2130163-  SYAFIQAH YUSRA BT MOHAMAD -2130242-  HUMAIRA BT KHAIRUDDIN -2130213-  INTAN NORAZLINA BT HAIRUDDIN -2130159- "

Similar presentations


Ads by Google