SlideShare a Scribd company logo
Selamat Datang
Router
(Erviando M.P)
Router
Router


 static router, table
  routing manually sets by
  admin.
 dynamic router, table
  routing adapts with
  network traffic
Firewall
                      (M. Ridwan)



firewall contains keywords walls. The
function of the wall is to protect everything
inside the walls. Well, the same firewall
function, which is to protect your computer
or network from another computer access.
Illustration of firewall
access.
Function

Controlling and monitoring the flow of
data packets on a network firewall, which
controls the data traffic was allowed to
access the private network behind a
firewall.

Perform authentication to access.
Function

 Application Proxy Firewall able to check
out, this ability requires the firewall to be
able to detect the specific application
protocol specification.
 Record every transaction that occurred
in the firewall. It helps as a detector allows
data theft.
Wireless Acces Point
       (Qoimatul A)
Wireless Acces Point
              (WAP)


  In computer networking, a
wireless access point (WAP) is a
 device that allows wireless
 devices to connect to a wired
network using Wi-Fi, Bluetooth
    or related standards.
Wireless Acces Point
             (WAP)


  The function of a wireless
   access point is to allow
   wireless devices such as
projectors, laptops and PDAs
    to access a local area
           network.
Wireless Acces Point
       (WAP)



  Tp-Link TL-MR3420
Modem
                  (Dwi P.T)




 Hardware that serves as a means of
     communication is two-way
communication and is used for internet
         on the computer.
Type of Modem

 Analog modem




 ADSL Modem
Type of Modem


A cable modem



Modem CDMA
Type of Modem

Modem 3GP



GSM Modem
Proxy Server
                  (Nefi Liana)




 Proxy is a third party that stands in
 the middle between the two parties
that are interconnected and function
           as intermediaries
Weakness & Disadvantages

 It may be a longer process than if we directly
  search and retrieve their own data that we
  want.
 Excess Operating System that uses a proxy
  is requested data from the client will be
  directed to the proxy server and then proceed
  to internet..
Function


 Connection Sharing
     Filtering
     Caching
English for engineering
English for engineering
Switch
(David Candra)
Description
swicth is a networking tool that does invisible bridge
    (connecting partitioning (segmentation) with the
               transfer of many networks
  switch can be used as a computer interface on a
 limited area, swicth works on the data link layer, the
     switch work is almost the same as bridge, but
 switch has a number of ports that make swicth often
                 called multi -port bridge
Function
receives a message from any device
connected to it transmits the message
only to the device for which the message
was meant
Typical Switch
                   management features
   Turn particular port range on or off
   Link bandwidth and duplex settings
   Priority settings for ports
   IP Management by IP Clustering.
   MAC filtering and other types of "port security" features which
    prevent MAC flooding
   Use of Spanning Tree Protocol
   SNMP monitoring of device and link health
   Port mirroring (also known as: port monitoring)
   Link aggregation (also known as bonding, trunking or teaming)
   VLAN settings
   802.1X network access control
Typical Switch
          management features

Link aggregation allows the use of multiple
ports for the same connection achieving
higher data transfer rates. Creating VLANs
can serve security and performance goals by
reducing the size of the broadcast domain.

More Related Content

PPTX
Firewall management introduction
PPTX
WLAN:VPN Security
PPTX
Firewall and vpn
DOCX
PPT
Lecture 11 wifi security
PPTX
Wireless LAN Security
PPTX
Firewall and Types of firewall
PPSX
Firewall & its Services
Firewall management introduction
WLAN:VPN Security
Firewall and vpn
Lecture 11 wifi security
Wireless LAN Security
Firewall and Types of firewall
Firewall & its Services

What's hot (20)

PPSX
physical and hardware security(http://4knet.ir)
PPTX
Firewall Basing
PDF
What Technology Lies Behind VPN
PPT
Wireless LAN security
PDF
session7 Firewalls and VPN
PPTX
Network configuration and simulation
PPTX
Types Of Firewall Security
PPTX
Types of firewall
PPT
Firewalls
PPT
Presentation, Firewalls
PPT
Site to Site VPN Using TMG Firewall. University Final Presentation.
PPTX
VLAN & WAP
PPTX
Banking and ATM networking reports
PPTX
Firewall - Failover & Transparent Firewall
PPT
Wireless lan
DOC
Firewall
 
PPTX
Firewall presentation
PPTX
Cloud computing (IT-703) UNIT 1 & 2
PPT
Wireless router
physical and hardware security(http://4knet.ir)
Firewall Basing
What Technology Lies Behind VPN
Wireless LAN security
session7 Firewalls and VPN
Network configuration and simulation
Types Of Firewall Security
Types of firewall
Firewalls
Presentation, Firewalls
Site to Site VPN Using TMG Firewall. University Final Presentation.
VLAN & WAP
Banking and ATM networking reports
Firewall - Failover & Transparent Firewall
Wireless lan
Firewall
 
Firewall presentation
Cloud computing (IT-703) UNIT 1 & 2
Wireless router
Ad

Viewers also liked (20)

PPTX
The importance of english in engineering
PDF
A Great Book - Technical English Vocabulary and Grammar
PDF
English in technical engineering
PDF
A study of needs, problems and wants of using english of engineering students...
PPTX
Technical english language
PPTX
Technical English
PDF
3 technical english_student_39_s_book_1_a
PDF
WHAT / WHY / HOW WE’RE ENGINEERING AT SMARTSTUDY (English)
PPTX
Input output
PPTX
Alat pelindung diri (apd) lengkap untuk operasi
PDF
04a rm-tata tertib rsu. karya husada-ok
PDF
Simplified Technical English (STE) - Dozuki Workshop Series
PPTX
ASUHAN KEPERAWATAN PENYAKIT UVEITIS MATA
PPT
Alat pelindung Diri - K3
DOCX
Makalah keperawatan anak terapi oksigen
PPTX
Alat pelindung diri
DOC
2. spo penggunaan apd
PDF
Dasar Ergonomi
PDF
Detektor dan Alarm
PPT
5. alat pelindung diri
The importance of english in engineering
A Great Book - Technical English Vocabulary and Grammar
English in technical engineering
A study of needs, problems and wants of using english of engineering students...
Technical english language
Technical English
3 technical english_student_39_s_book_1_a
WHAT / WHY / HOW WE’RE ENGINEERING AT SMARTSTUDY (English)
Input output
Alat pelindung diri (apd) lengkap untuk operasi
04a rm-tata tertib rsu. karya husada-ok
Simplified Technical English (STE) - Dozuki Workshop Series
ASUHAN KEPERAWATAN PENYAKIT UVEITIS MATA
Alat pelindung Diri - K3
Makalah keperawatan anak terapi oksigen
Alat pelindung diri
2. spo penggunaan apd
Dasar Ergonomi
Detektor dan Alarm
5. alat pelindung diri
Ad

Similar to English for engineering (20)

PPTX
Network devices
DOCX
Common network devices
PPTX
internet network for o level
PPTX
Networking devices
PPTX
PPTX
Tech Blast: Networks
PPTX
Tech Blast: Networks
PPT
Networking devices
PPSX
Basic Concepts of Networking
PPTX
Web Technology
PPTX
Web Technology
PPTX
Web Technology
PDF
Power point presentation
PPTX
network implementation in College
PPTX
SOFTWARE DEFINED NETWORKING
DOCX
Computer network note
PPTX
Networking.pptx
PPTX
Basic Networking
PPTX
CP102_Chapter03_Common_Netwojrk in basic
PPT
Network-20210426203825.ppt
Network devices
Common network devices
internet network for o level
Networking devices
Tech Blast: Networks
Tech Blast: Networks
Networking devices
Basic Concepts of Networking
Web Technology
Web Technology
Web Technology
Power point presentation
network implementation in College
SOFTWARE DEFINED NETWORKING
Computer network note
Networking.pptx
Basic Networking
CP102_Chapter03_Common_Netwojrk in basic
Network-20210426203825.ppt

More from Qoimah Adielah (7)

PDF
Laporan praktikum DPK1
DOC
Ta bip. finish
PDF
Trend it untuk edukasi
PPTX
Penyesuaian diri pada remaja
PDF
Makalah pendidikan karakter
PPTX
PPT APD - K3
PDF
Makalah k3 alat pelindung diri
Laporan praktikum DPK1
Ta bip. finish
Trend it untuk edukasi
Penyesuaian diri pada remaja
Makalah pendidikan karakter
PPT APD - K3
Makalah k3 alat pelindung diri

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Introduction to Building Materials
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
1_English_Language_Set_2.pdf probationary
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Computing-Curriculum for Schools in Ghana
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Indian roads congress 037 - 2012 Flexible pavement
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Introduction to Building Materials
Unit 4 Computer Architecture Multicore Processor.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1_English_Language_Set_2.pdf probationary
Weekly quiz Compilation Jan -July 25.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
History, Philosophy and sociology of education (1).pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Computing-Curriculum for Schools in Ghana

English for engineering

  • 4. Router  static router, table routing manually sets by admin.  dynamic router, table routing adapts with network traffic
  • 5. Firewall (M. Ridwan) firewall contains keywords walls. The function of the wall is to protect everything inside the walls. Well, the same firewall function, which is to protect your computer or network from another computer access.
  • 7. Function Controlling and monitoring the flow of data packets on a network firewall, which controls the data traffic was allowed to access the private network behind a firewall. Perform authentication to access.
  • 8. Function  Application Proxy Firewall able to check out, this ability requires the firewall to be able to detect the specific application protocol specification.  Record every transaction that occurred in the firewall. It helps as a detector allows data theft.
  • 9. Wireless Acces Point (Qoimatul A)
  • 10. Wireless Acces Point (WAP) In computer networking, a wireless access point (WAP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards.
  • 11. Wireless Acces Point (WAP) The function of a wireless access point is to allow wireless devices such as projectors, laptops and PDAs to access a local area network.
  • 12. Wireless Acces Point (WAP) Tp-Link TL-MR3420
  • 13. Modem (Dwi P.T) Hardware that serves as a means of communication is two-way communication and is used for internet on the computer.
  • 14. Type of Modem  Analog modem  ADSL Modem
  • 15. Type of Modem A cable modem Modem CDMA
  • 16. Type of Modem Modem 3GP GSM Modem
  • 17. Proxy Server (Nefi Liana) Proxy is a third party that stands in the middle between the two parties that are interconnected and function as intermediaries
  • 18. Weakness & Disadvantages  It may be a longer process than if we directly search and retrieve their own data that we want.  Excess Operating System that uses a proxy is requested data from the client will be directed to the proxy server and then proceed to internet..
  • 19. Function  Connection Sharing  Filtering  Caching
  • 23. Description swicth is a networking tool that does invisible bridge (connecting partitioning (segmentation) with the transfer of many networks switch can be used as a computer interface on a limited area, swicth works on the data link layer, the switch work is almost the same as bridge, but switch has a number of ports that make swicth often called multi -port bridge
  • 24. Function receives a message from any device connected to it transmits the message only to the device for which the message was meant
  • 25. Typical Switch management features  Turn particular port range on or off  Link bandwidth and duplex settings  Priority settings for ports  IP Management by IP Clustering.  MAC filtering and other types of "port security" features which prevent MAC flooding  Use of Spanning Tree Protocol  SNMP monitoring of device and link health  Port mirroring (also known as: port monitoring)  Link aggregation (also known as bonding, trunking or teaming)  VLAN settings  802.1X network access control
  • 26. Typical Switch management features Link aggregation allows the use of multiple ports for the same connection achieving higher data transfer rates. Creating VLANs can serve security and performance goals by reducing the size of the broadcast domain.