2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.

Slides:



Advertisements
Similar presentations
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Advertisements

An Introduction to System Administration Chapter 1.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
The Internet Useful Definitions and Concepts About the Internet.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
1  Teacher : KIM Bunthoeurn  Group 3  Group members: o ENG Phally o CHHENG Sounly o POV Sopheap o SRORNG Voleak o NGET Phanny  Topic: Company description.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Test Review. What is the main advantage to using shadow copies?
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Virtual Company Group 8 Presentation Date: June /04/2017
Chapter 7: Using Windows Servers to Share Information.
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Chapter 9: Novell NetWare
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
University of South Asia Course Name: Distributed System
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Page PearsonAccess™ Technology Training Online Test Configuration.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Administering Windows Server Pass Any Exam By The Help Of Exams4sure Study Material Pass Administering Windows Server.
Chapter 7: Using Windows Servers
Internet Business Associate v2.0
Securing the Network Perimeter with ISA 2004
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
TYPES OF SERVER. TYPES OF SERVER What is a server.
Welcome To : Group 1 VC Presentation
Unit 27: Network Operating Systems
An Introduction to Computer Networking
Design Unit 26 Design a small or home office network
AbbottLink™ - IP Address Overview
An Introduction to System Administration
Presentation transcript:

2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN Channy

3  Introduction about Virtual Company(VC)  Organization chart  Purpose of VC(Virtual Company)  Network Infrastructure  Service of VC(Virtual Company)  Security of VC (Virtual Company)  Difficulty Task  NON-Completed Tasks  Experiences From VC(Virtual Company)  Conclusion  Question and Answer

4  VC (Virtual Company) is a program that provide students can test what they have learnt in class with the real machine and apply soft skills like the real company.

5 Organization Chart of Group4

6  Provide students with Technical Skill  Network Infrastructure  New Operation System  Network services installation  Network security

7  Provide students with soft skill  Task Management  To do list  Communication skill  Team work  Reporting  Documentation

8

9  Domain Controller is a server that responds to security authentication requests (login, checking permissions, etc.)  DNS (Domain Name Server) is a standard technology for mapping from IP address to Domain name.  DHCP(Dynamic Host Configuration Protocol) is a network configuration protocol for hosts on IP networks and assign IP automatic to DHCP Client when DHCP Client request.

10 File Server is a computer responsible for the central storage and management of data file so that other computer on the same network can access the files. Disk Quota is a limit set by a system administrator and restrict certain aspects of file system that is available to you in your account.

11 Network Monitoring is the tool that describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via or other alarms) in case of outages.  Nagios is a type of network monitoring which monitor on Network services and Host resources.  Ntop is a type of network monitoring which monitor on Network traffic and Report IP protocol usage sorted by protocol type.

12 Proxy Server is a server that acts as an intermediary for requests from clients seeking resources from other servers. It is used to limit the bandwidth for user and store caching. Firewall is security software or hardware that runs on a computer, server, router. It is used to define the Policy both incoming and outgoing of Network.

13 Web Server is a program that helps to deliver web content that can be accessed through the internet. FTP Server is standard network protocol used to transfer file from one host to other host over a TCP-base network such as the internet. It is often used to upload webpage and other documents from a private development machine to a public web hosting server.

14 Mail Server is an application that receives incoming from local user and remote sender and forward outgoing for delivery.  Postfix is a free and open source mail transfer agent (MTA) that routes and deliver mail. It is intended as a fast easier to administer and secure alternative to the widely used sendmail.  Dovecot is a open source IMAP and POP3 server. It is used to download and receive .

15 Backup is processing of making copies of data which may be used to restore the original after the data lose event. VPN (virtual Private Network) is a private network that interconnect remote network through primarily communication infrastructure such as the internet.  Openvpn Point to Point (Remote Access VPN) is enabling user working at home or on the road access a server on private network using the infrastructure provide by a public network such as the internet.

16  Backup whole system and configuration file  Install Antivirus in Server  Authentication and Certificate with Mail and Web Server  Firewall and Proxy Server  Permission for File Server  Using strong password

17  Error with the machines  Difficult collection the information from internet  Unfamiliar with the new Operating System  Difficult to choose or select which is the best choice while discussing in group  Difficult solve the problem  Not enough material during work  Difficult to manage the time to complete the task

18  Backup Mail, FTP and Web Server  Hosting Web site  Hosting Mail Server  Configure Central DNS Server

19  How to manage the task  Work in group  Team Leader  How to decide the best choice during discussion  Know how to configure with real machines  Know about the new Operating System

20  Have more confidential before internship  Communication skill  Reporting to supervisor  Know how to solve the problem by yourself

21  During Virtual Company we are so happy all together who can make a good communication and can work well in group together. We can work with the real materials and new things. We can get more new knowledge and share to each other around class.

22