Connections To Remote Site
Connections To Remote Site
1. Network architecture
The network architecture of the Internet is predominantly expressed by its use of the Internet
Protocol Suite, rather than a specific model for interconnecting networks or nodes in the
network, or the usage of specific types of hardware links.
Client-server
In Client-server architecture, architecture of a computer network in which many clients (remote
processors) request and receive service from a centralized server (host computer). Client
computers provide an interface to allow a computer user to request services of the server and to
display the results the server returns.
The client-server model describes how a server provides resources and services to one or more
clients. Examples of servers include web servers, mail servers, and file servers. Each of these
2. Network applications
E-mail
Electronic mail is a method of exchanging messages between people using electronic devices.
Invented by Ray Tomlinson, email first entered limited use in the 1960s and by the mid-1970s
had taken the form now recognized as email. Email operates across computer networks, which
today is primarily the Internet
Web
The World Wide Web, commonly known as the Web, is an information system where documents
and other web resources are identified by Uniform Resource Locators, which may be interlinked
by hypertext, and are accessible over the Internet
Instant messaging
Instant messaging technology is a type of online chat that offers real-time text transmission over
the Internet. A LAN messenger operates in a similar way over a local area network. Short
messages are typically transmitted between two parties, when each user chooses to complete a
thought and select "send".
Remote login
Rlogin (remote login) is a UNIX command that allows an authorized user to login to other
UNIX machines (hosts) on a network and to interact as if the user were physically at the host
computer. Rlogin is similar to the better known Telnet command.
P2P file sharing
Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer
networking technology. P2P file sharing allows users to access data by using the following file
sharing application softwares Xunlei, Bittorrent, uTorrent, BitComet, Vuze and Transmission,
Azureus, Emule and eDonkey, Gnutella, LimeWire and Cabos, Flashget, Foxy, Goboogy,
Google Talk (file-transfer), Manolito, Msn (file-transfer), Mute, Neonet, Openft, Pando,
Peerenabler, Perfect-dark, Poco, Soribada, Yahoo-IM (file-transfer), etc.
PREPARED BY CHARLES S. BERICKSON 3
Multi-user network games
Multi user games are games where you play online with other online gamers. For example you
can play your component online; you can be playing an opponent which is sitting on the other
side of the earth.
The future of multi-user networked games lies among others in networking mobile games.
Currently there exists a multi-player mobile network real time game called “Multi-User
Dungeon”, which is a text-based MUD story. This is a popular game used by over 50.000 users.
Streaming stored video clips
Streaming video is content sent in compressed form over the Internet and displayed by the
viewer in real time. With streaming video or streaming media, a Web user does not have to
wait to download a file to play it.
Internet telephone
Internet telephony is a type of communications technology that allows voice calls and other
telephony services like fax, SMS and other voice-messaging applications to be transmitted using
the Internet as a connection medium. Internet telephony is also called IP telephony or
broadband telephony.
While a traditional phone service uses outdated telephone lines, Internet phone uses the
Internet to connect your phone calls to the public phone network. Internet phone services
utilize a technology called "packet switching". First, your Internet phone has to convert your
voice into data packets with the ATA adapter.
3. Network protocols
Bluetooth is a standardized protocol for sending and receiving data via a 2.4GHz wireless link.
It's a secure protocol, and it's perfect for short-range, low-power, low-cost, wireless
transmissions between electronic devices. Some Bluetooth protocols are Logical link control and
adaptation protocol (L2CAP), Bluetooth network encapsulation protocol (BNEP), Radio
frequency communication (RFCOMM), Service discovery protocol (SDP), Telephony control
protocol (TCS), Audio/video control transport protocol (AVCTP)
Fiber Channel Protocol (FCP) is the SCSI interface protocol utilizing an underlying Fiber
Channel connection.
The Fiber Channel standards define a high-speed data transfer mechanism that can be used
to connect workstations, mainframes, supercomputers, storage devices and displays.
Fiber Channel is designed to transport many protocols, such as FDDI, serial HIPPI, SCSI,
IPI, and many more that will be listed in the section describing the FC-4 layer. The transfer
rates of Fiber Channel are currently (133 Mbps,266 Mbps,530 Mbps, and 1 Gbps).
Fiber Distributed Data Interface, a set of ANSI protocols for sending digital data over
fiber optic cable. FDDI networks are token-passing networks, and support data rates of
up to 100 Mbps (100 million bits) per second. FDDI networks are typically used as
backbones for wide-area networks.
The Internet protocol suite is the conceptual model and set of communications protocols
used in the Internet and similar computer networks. It is commonly known as TCP/IP because
the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the
Internet Protocol (IP). It is occasionally known as the Department of Defense (DoD) model
because the development of the networking method was funded by the United States
Department of Defense through DARPA.
The Internet protocol suite provides end-to-end data communication specifying how data
should be packetized, addressed, transmitted, routed, and received. This functionality is
organized into four abstraction layers, which classify all related protocols according to the
scope of networking involved. From lowest to highest, the layers are the link layer, containing
communication methods for data that remains within a single network segment (link); the
internet layer, providing internetworking between independent networks; the transport layer,
handling host-to-host communication; and the application layer, providing process-to-process
data exchange for applications.
The technical standards underlying the Internet protocol suite and its constituent protocols are
maintained by the Internet Engineering Task Force (IETF). The Internet protocol suite
OSI protocols
The OSI protocol stack works on a hierarchical form, from the hardware physical layer to the
software application layer. There are a total of seven layers. Data and information are received
by each layer from an upper layer.
1. Layer 1, the Physical Layer: This layer deals with the hardware of networks such as
cabling. The major protocols used by this layer include Bluetooth, PON, OTN, DSL,
IEEE.802.11, IEEE.802.3, L431 and TIA 449.
2. Layer 2, the Data Link Layer: This layer receives data from the physical layer and
compiles it into a transform form called framing or frame. The protocols are used by the
Data Link Layer include: ARP, CSLIP, HDLC, IEEE.802.3, PPP, X-25, SLIP, ATM,
SDLS and PLIP.
3. Layer 3, the Network Layer: This is the most important layer of the OSI model, which
performs real time processing and transfers data from nodes to nodes. Routers and
switches are the devices used for this layer. The network layer assists the following
protocols: Internet Protocol (IPv4), Internet Protocol (IPv6), IPX, AppleTalk, ICMP,
IPSec and IGMP.
4. Layer 4, the Transport Layer: The transport layer works on two determined
communication modes: Connection oriented and connectionless. This layer transmits data
from source to destination node. It uses the most important protocols of OSI protocol
family, which are: Transmission Control Protocol (TCP), UDP, SPX, DCCP and SCTP.
5. Layer 5, the Session Layer: The session layer creates a session between the source and
the destination nodes and terminates sessions on completion of the communication
process. The protocols used are: PPTP, SAP, L2TP and NetBIOS.
6. Layer 6, the Presentation Layer: The functions of encryption and decryption are defined
on this layer. It converts data formats into a format readable by the application layer. The
following are the presentation layer protocols: XDR, TLS, SSL and MIME.
Routing protocols
A routing protocol specifies how routers communicate with each other, distributing
information that enables them to select routes between any two nodes on a computer network.
Routers perform the "traffic directing" functions on the Internet; data packets are forwarded
through the networks of the internet from router to router until they reach their destination
computer
Examples of Routing Protocols are RIP (Routing Information Protocol), EIGRP (Enhanced
Interior Gateway Routing Protocol) and OSPF (Open Shortest Path First).
VPN protocols
VPN is a Virtual Private Network that allows a user to connect to a private network over the
Internet securely and privately. VPN creates an encrypted connection, known as VPN tunnel, and
all Internet traffic and communication is passed through this secure tunnel. Thus, keeping the
user data secure and private.
There are two basic VPN types which are explained below
Remote access VPN allows a user to connect to a private network and access its services and
resources remotely. The connection between the user and the private network happens through
the Internet and the connection is secure and private.
Remote Access VPN is useful for business users as well as home users.
A corporate employee, while traveling, uses a VPN to connect to his/her company’s private
network and remotely access files and resources on the private network.
PREPARED BY CHARLES S. BERICKSON 9
Home users, or private users of VPN, primarily use VPN services to bypass regional restrictions
on the Internet and access blocked websites. Users conscious of Internet security also use VPN
services to enhance their Internet security and privacy.
A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in the corporates.
Companies, with offices in different geographical locations, use Site-to-site VPN to connect the
network of one office location to the network at another office location.
When multiple offices of the same company are connected using Site-to-Site VPN type, it is
called as Intranet based VPN. When companies use Site-to-site VPN type to connect to the office
of another company, it is called as Extranet based VPN. Basically, Site-to-site VPN create a
virtual bridge between the networks at geographically distant offices and connect them through
the Internet and maintain a secure and private communication between the networks.
Since Site-to-site VPN is based on Router-to-Router communication, in this VPN type one router
acts as a VPN Client and another router as a VPN Server. The communication between the two
routers starts only after an authentication is validated between the two.
The above two VPN types are based on different VPN security protocols. Each of these VPN
protocols offer different features and levels of security, and are explained below:
L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined with
another VPN security protocol like IPSec to create a highly secure VPN connection. L2TP
creates a tunnel between two L2TP connection points and IPSec protocol encrypts the data and
handles secure communication between the tunnel.
PPTP or Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the data packet. It
uses a Point-to-Point Protocol (PPP) to encrypt the data between the connection. PPTP is one of
the most widely used VPN protocol and has been in use since the time of Windows 95. Apart
from Windows, PPTP is also supported on Mac and Linux.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN connection where
the web browser acts as the client and user access is restricted to specific applications instead of
entire network. SSL and TLS protocol is most commonly used by online shopping websites and
service providers. Web browsers switch to SSL with ease and with almost no action required
from the user, since web browsers come integrated with SSL and TLS. SSL connections have
https in the beginning of the URL instead of http.
5. OpenVPN:
OpenVPN is an open source VPN that is useful for creating Point-to-Point and Site-to-Site
connections. It uses a custom security protocol based on SSL and TLS protocol.
Secure Shell or SSH creates the VPN tunnel through which the data transfer happens and also
ensures that the tunnel is encrypted. SSH connections are created by a SSH client and data is
transferred from a local port on to the remote server through the encrypted tunnel.
ADSL technologies
ADSL requires a special ADSL modem and subscribers must be in close geographical locations
to the provider's central office to receive ADSL service. Typically this distance is within a radius
of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known
as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream
rate).
Networks devices
Networking hardware, also known as network equipment or computer networking devices, are
electronic devices which are required for communication and interaction between devices on a
computer network. Specifically, they mediate data transmission in a computer network.
PREPARED BY CHARLES S. BERICKSON 13
Examples are Hub, Switch, Router, Bridge, Gateway, Modem, Repeater, Access Point.
Networks nodes
In a communications network, a network node is a connection point that can receive, create,
store or send data along distributed network routes.
LEARNING OUTCOME 1.3: IDENTIFY SECURITY REQUIREMENTS
Network technology
Communication devices
A portable communications device is a hand-held or wearable device. For example, the walkie-
talkie is a device that is hand-held when in use, and wearable when not in use. Portable
telephones are also carried, or worn, on a belt, or in a pocket. Portable devices have also become
usable when worn.
Below is a full listing of all the different types of communications devices you may
encounter when dealing with a computer.
Bluetooth devices.
Infrared devices.
Modem (over phone line)
Network card (using Ethernet)
Smartphone.
Wi-Fi devices (using a Wi-Fi router);
smart phones
laptops
tablets
VOIP/Internet telephony
intranet
social networks
forums
messenger apps
chatbots
email
blogs
tracking software
Equipment
Router: A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a
web page or email, is in the form of data packets.
Switch: A network switch is networking hardware that connects devices on a computer network by
using packet switching to receive and forward data to the destination device. A network switch is a
multiport network bridge that uses MAC addresses to forward data at the data link layer of the OSI
model.
Cables
PC
Server: In computing, a server is a computer program or a device that provides functionality for
other programs or devices, called "clients". This architecture is called the client–server model, and a
single overall computation is distributed across multiple processes or devices.
1. WAN Devices
Router: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data sent
through the internet, such as a web page or email, is in the form of data packets.
Switch: A network switch is networking hardware that connects devices on a computer
network by using packet switching to receive and forward data to the destination device.
A network switch is a multiport network bridge that uses MAC addresses to forward data
at the data link layer of the OSI model.
Modem (CSU/DSU): A CSU/DSU (Channel Service Unit/Data Service Unit) is a
hardware device about the size of an external modem that converts a digital data frame
from the communications technology used on a local area network (LAN) into a frame
appropriate to a wide-area network (WAN) and vice versa.
2. WAN connections types
Point-to-Point technologies
In telecommunications, a point-to-point connection refers to a communications
connection between two communication endpoints or nodes. An example is a telephone
call, in which one telephone is connected with one other, and what is said by one caller
can only be heard by the other. This is contrasted with a point-to-
multipoint or broadcast connection, in which many nodes can receive information
transmitted by one node. Other examples of point-to-point communications links
are leased lines, microwave radio relay and two-way radio.
The term is also used in computer networking and computer architecture to refer to a wire or
other connection that links only two computers or circuits, as opposed to other network
topologies such as buses or crossbar switches which can connect many communications devices.
Point-to-point is sometimes abbreviated as P2P. This usage of P2P is distinct
from P2P meaning peer-to-peer in the context of file sharing networks.
PREPARED BY CHARLES S. BERICKSON 17
Circuit switched technologies: Circuit switching is a method of implementing a
telecommunications network in which two network nodes establish a dedicated
communications channel (circuit) through the network before the nodes may
communicate. ... The defining example of a circuit-switched network is the early analog
telephone network.
Packet-switched technologies: Packet-switched describes the type of network in which
relatively small units of data called packets are routed through a network based on the destination
address contained within each packet. Breaking communication down into packets allows the
same data path to be shared among many users in the network.
3. Physical Parameters for WAN Connections
Data communications equipment (DCE) and Data terminal equipment (DTE): Data
communications equipment (DCE) refers to computer hardware devices used to establish,
maintain and terminate communication network sessions between a data source and its
destination. DCE is connected to the data terminal equipment (DTE) and data
transmission circuit (DTC) to convert transmission signals.
A data circuit-terminating equipment is a device that sits between the data terminal equipment and a
data transmission circuit. It is also called data communication equipment and data carrier equipment.
Usually, the DTE device is the terminal, and the DCE is a modem.
SUB LU1
Configuration of IP parameters: The IP Configuration window configures the Internet
Protocol parameters, allowing the device to receive and send IP packets. In its factory
default configuration, the switch operates as a multiport learning bridge with network
connectivity provided by the ports on the switch.
Internet parameters configurations: Internet Config was an Internet preferences
manager and API for Mac OS Classic. ... Internet Config's purpose was to consolidate
what was, at the time, an unwieldy number of options and settings related to Internet use
that had not yet been integrated into the operating system's own control panel.
Dynamic IP Configurations: A dynamic Internet Protocol address (dynamic
IP address) is a temporary IP address that is assigned to a computing device or node
when it's connected to a network. A dynamic IP address is an automatically
configured IP address assigned by a DHCP server to every new network node.
Static IP Configurations: A static IP address is an IP address that was manually
configured for a device, versus one that was assigned by a DHCP server. It's
called static because it doesn't change. It's the exact opposite of a dynamic IP address,
which does change.
WAN protocols and technologies
HDLC: (High-level Data Link Control) is a group of protocols or rules for transmitting
data between network points (sometimes called nodes). ... HDLC is one of the most
commonly-used protocols in what is layer 2 of the industry communication reference
model called Open Systems Interconnection (OSI).
LAPB: Link Access Procedure, Balanced implements the data link layer as defined in the
X.25 protocol suite. LAPB pronounced as LAP bee is a bit-oriented protocol derived
from HDLC that ensures that frames are error free and in the correct sequence.
Frame-Relay: Frame relay is a packet-switching telecommunication service designed
for cost-efficient data transmission for intermittent traffic between local
area networks (LANs) and between endpoints in wide area networks (WANs).
DSL: Digital subscriber line is a family of technologies that are used to transmit digital
data over telephone lines. In telecommunications marketing, the term DSL is widely
understood to mean asymmetric digital subscriber line, the most commonly installed DSL
technology, for Internet access.
FTTH: Fiber to the home (FTTH), also called "fiber to the premises" (FTTP), is the
installation and use of optical fiber from a central point directly to individual buildings
such as residences, apartment buildings and businesses to provide unprecedented high-
speed Internet access.
FTTP: Fiber To The Premises (FTTP) is a fiber optic cable delivery medium that
provides Internet access directly to a user or groups of users from an Internet service
provider (ISP).
PPTP: PPTP stands for Point-to-Point Tunneling Protocol, and it's a VPN protocol that
was introduced back in 1995, though it was in development ten years prior to that date.
PPTP improved on the previous PPP standard which lacked the tunneling feature. What
PREPARED BY CHARLES S. BERICKSON 19
started out as a protocol implement in Windows systems quickly became a widespread
VPN protocol available on numerous platforms?
ATM: An automated teller machine (ATM) is an electronic telecommunications device
that enables customers of financial institutions to perform financial transactions, such as
cash withdrawals, deposits, transfer funds, or obtaining account information, at any time
and without the need for direct interaction with bank staff.
Testing WAN: If you need to know the true performance of your WAN, you must test it.
The WAN allows everyone to share resources, equipment, and information,
anything that makes an organization what it is. It’s obvious then that the WAN
must perform flawlessly.
Testing WAN connections:
When testing WAN connections, consider the following:
The simplest method to test performance over WAN connections is to have a user at a
remote location connect to a SharePoint site and perform several user actions. For
example, you can host an online meeting, talk the user through the actions, and count the
number of seconds for actions to be completed. Or, you can connect to a computer
remotely and perform the tasks.
Testing WAN speed: There are different WAN Testing tools. One of them is LAN
Speed Test. Despite its name LAN Speed Test from TotuSoft can very well be used to
test WAN connections. The tool was designed to be a simple but powerful tool for
measuring file transfer, hard drive, USB Drive, and network speeds. To test a WAN
connection, all you have to do is pick a destination on the site where you want to test the
WAN connection. Next, the tool will build a file in memory and transfer it both ways—
avoiding the misleading effects of Windows or Mac file caching—while keeping track of
the time it takes. It then does all the calculations for you.
Step 2. Open Settings Click the gear-shaped icon in the lower-left side of the Start window.
Step 3. Click Network & Internet. It's in the middle of the Settings window
Step 4. Click VPN. This tab is on the left side of the Network & Internet menu.
PREPARED BY CHARLES S. BERICKSON 21
Step 5. Click + Add a VPN connection. It's at the top of the page. A VPN form will open.
If you want to edit an existing VPN configuration, click the name of the VPN you want to
configure, click Advanced options, and click Edit in the middle of the page
Step 6. Configure your VPN's information. Enter or update any of the following information:
VPN provider — Click this drop-down box, then click the name of the VPN you want to
use.
Connection name — Add the name of the VPN on your computer.
Server name or address — Enter or change the VPN's server address.
VPN type — Enter or change the connection type.
Type of sign-in info — Select a new type of sign-in (e.g., Password) if necessary.
User name (optional) — If necessary, change the username that you use to sign into the
VPN.
Password (optional) — If necessary, change the password that you use to sign into the
VPN.
Deployment classification
Site to Site VPN: A site-to-site VPN connection lets branch offices use the internet as a
conduit for accessing the main office's intranet. HowStuffWorks. A site-to-site VPN allows
offices in multiple fixed locations to establish secure connections with each other over a public
network such as the internet.
Remote Access VPN:
A remote-access VPN connection allows an individual user to connect to a private network from
a remote location using a laptop or desktop computer connected to the internet.
Intranet VPN:
An intranet VPN links enterprise customer headquarters, remote offices, and branch offices to
an internal network over a shared infrastructure using dedicated connections. Intranet
VPNs differ from extranet VPNs in that they only allow access to the enterprise customer's
employees.
Extranet VPN:
Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate
intranet over a shared infrastructure using dedicated connections. In this example, the VPN is
often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e-commerce.
Remote VPN
A remote-access VPN connection allows an individual user to connect to a private network from
a remote location using a laptop or desktop computer connected to the internet. ... Those users
can access the secure resources on that network as if they were directly plugged in to the
network's servers.
Traditional VPN:
Traditional VPN solution uses a local VPN router to connect through the internet, with a
secure VPN tunnel to a second remote VPN router or software client (Fig. ... There is no cloud
There are many reasons why your VPN might not be providing 100% security and exposing your
private information. Here are the most common ways that your VPN could be leaking:
1. IP leak
Your IP address says a lot about you, like your location or the websites you visit. A VPN
protects you from snoopers trying to access this information, so if your original IP leaks it
defeats the purpose of using a VPN. This usually happens due to two internet
protocols, IPv4 and IPv6 and their incompatibility.
2. DNS leak
Sometimes your IP might stay hidden while your DNS address secretly reveals your
location. The DNS server changes plain text URLs into numerical IP addresses. If you’re
not using a VPN, this process is handled by your ISP and their servers, which can see
who visited what websites. If your DNS leaks, then anyone snooping on your traffic will
be able to access this information too. It could even lead to a DNS hijacking attack.
3. WebRTC leak
Web Real-Time Communication (WebRTC) is built into most popular browsers (i.e., Firefox,
Opera, Chrome, and Brave). It enables real-time communications such as voice and video chat,
but it also presents another vulnerability for VPN users.
It’s possible to prevent these leaks, but first, you have to identify them. You can do so by
running some basic tests that anyone can do. WebRTC is a free, open-source project that provides web
browsers and mobile applications with real-time communication via simple application programming
interfaces.
1. You need to find out your original IP address given by your ISP.
4. It should now show a different IP address and the country you connected your VPN to. If
the results show your original IP address, then, unfortunately, your VPN is leaking.
5. Sometimes IPLeak tests fail to detect DNS leaks, which can also reveal your identity. So
it’s advisable to check it on DNSLeakTest.
6. If your VPN is on, DNSLeakTest should show the location you’ve chosen and your new
IP.
7. Select Extended Test to dig even deeper. This test might take a few minutes.
8. If the results now show your new IP address and your chosen country, you are safe. Your
VPN isn’t leaking.
The easiest way is to change your VPN provider to one that has dedicated DNS Servers or
offers DNS leak protection, like NordVPN. Or you could manually turn IPv6 off on your device.
However, this might require some technical know-how.
1. If you haven’t already, find out your original IP address on the IPLeak website. Make a
note of it.
3. Under ‘Your IP addresses – WebRTC detection’ you should see a private IP that should
be different from your original public IP address. Note that the website showing your
private IP (usually begins with 10.xxx or 192.xxx or sometimes an alpha-numeric IPv6)
doesn’t mean that your WebRTC is leaking.
This time, changing your VPN or tinkering with your settings won’t help. However, you can:
Use a browser that doesn’t have WebRTC. You can find the full list of browsers that
exclude it on Wikipedia.
However, checking for various leaks might not be enough. There are other reasons why it might
seem that your VPN isn’t working, for example:
Your browsing speed has dropped. This might happen for several reasons. For
example, you’ve chosen a server which is on the other side of the world, the server is
overloaded, or your ISP is throttling bandwidth. However, you can check your VPN
speed and increase it with a few simple tricks.
Your ISP or your country is blocking VPN usage. In some countries, especially with
online censorship, VPN usage can be blocked or considered illegal. In China, for
example, only government-approved VPNs are legal.
Your VPN connection has dropped. Most VPNs offer an automatic kill
switch (including NordVPN), which means that if your VPN connection drops, it will
terminate your internet connection ( application-level kill switches will only terminate
individual programs). The kill switch makes sure that you don’t access the internet
outside of the encrypted VPN tunnel and that your personal information isn’t exposed if
the connection drops.If your VPN connection dropped and activated your system-level
kill switch, you will not be able to access the internet until you connect back to a VPN
server.
You’ve been hacked. You might think that your VPN isn’t working because someone
has broken into it. In reality, it’s pretty difficult to do so. It’s more likely that you’ve
visited a malicious website or fell for a phishing attack and someone has taken control of
your device. Unfortunately, if someone hacks you, a VPN can’t do much to protect you.
Verify that you can access a file server on the private network
There are many ways to make files available over the Internet. The real challenge here is finding
a secure, easy-to-use solution.
We recommend TeamViewer as the ideal solution for remotely accessing a PC, whether you’re
accessing your own PC or performing remote tech support. TeamViewer is most often used to
remotely access a PC’s desktop. However, it also has a remote file transfer feature you might not
have noticed. Just select the File transfer option when connecting to a remote PC.Another way is
to already have an SSH server running on your local network, you can use SSH tunneling to
access local network resources rather than setting up a VPN.
Here are 10 reasons why your network might not be performing to its full potential:
1. Speed Mismatch
This occurs when multiple users try to make use of the same server. In result, this causes a digital
bottleneck which slows down the network’s speed.
2. Old Equipment
Sometimes the problem is that you are using old equipment to run new programs that require
more power and processing capacities than the old equipment can handle.
3. Malware
Unless you have an effective antivirus in operation that is protecting the network, you face a
strong possibility of some virus or malware entering the system and causing damage. This is
what will result in slower speeds.
4. Imperfect Design
When designing a network, make sure to take the amount of traffic it will need to handle on a
regular basis into account. If the servers cannot process the amount of data passing through the
system, then there will be a general slowdown of speed on all of the servers.
6. Malfunctioning Equipment
8. Junk Software
These types of software are not considered to be malware, because they do not cause actual harm
to the network. However, they do pose a different kind of problem by using up precious amounts
of data for performing background activities that serve no useful purpose (which results in
slowing speeds).
9. Low Bandwidth
If you choose a low bandwidth in the beginning, but your online work increases over time, then
your old bandwidth will be unable to handle the new demand and cause a systems slowdown.
While these are some of the most common issues that can lead to poor network
performance there are other, more serious, problems that can be causing trouble as well. This is
why you want to contact an IT professional as soon as you notice and problem.
Connect one end of the DSL modem to the phone jack (RJ11)
Connect the other end of the DSL modem to a NIC installed in the computer
RJ45 type of connection is often required
Connect the power supply to the DSL modem
DSL is a wired transmission that uses traditional copper telephone lines already installed to
homes and businesses. When you connect to the Internet, you might connect through a
regular modem, through a local-area network connection in your office, through a cable
modem or through a digital subscriber line (DSL) connection. DSL is a very high-
speed connection that uses the same wires as a regular telephone line.
Proceed as needed:
• Release or renew a DHCP WAN connection
• Configure the primary WAN
• Configure a secondary WAN
If a WAN interface is configured to obtain an IP address from the ISP by using Dynamic Host
Configuration Protocol (DHCP), you can click the Release icon to release its IP address, or click
the Renew icon to obtain a new IP address.
To configure the settings for the primary WAN (WAN1), click the Edit (pencil) icon. Then use
the WAN - Add/Edit page to configure the connection. If you enabled IPv4/IPv6 routing mode,
complete both tabbed pages. Click OK to save your settings. Click Save to apply your settings to
the security appliance.
For IPv4 routing mode, enter the following information on the IPv4 tab:
• Physical Port: The physical port associated with the primary WAN.
• WAN Name: The name of the primary WAN (WAN1).
• IP Address Assignment: Depending on the requirements of your ISP, choose the
network addressing mode and complete the corresponding settings. The security
appliance supports DHCP Client, Static IP, PPPoE (Point-to-Point Protocol over
Ethernet), PPTP (Point-to-Point Tunneling Protocol), and L2TP (Layer 2 Tunneling
Protocol).
• DNS Server Source: DNS servers map Internet domain names to IP addresses. You
can get DNS server addresses automatically from your ISP or use ISP-specified
addresses.
– Get Dynamically from ISP: Choose this option if you have not been assigned a
static DNS IP address.
– Use these DNS Servers: Choose this option if you have assigned a static DNS IP
address. Also enter the addresses in the DNS1 and DNS2 fields.
• MAC Address Source: Specify the MAC (Media Access Control) address for the
primary WAN. Typically, you can use the unique 48-bit local Ethernet address of
the security appliance as your MAC address source.
– Use Default MAC Address: Choose this option to use the default MAC address.
For IPv4/IPv6 routing mode, enter the following information on the IPv6 tab:
• IP Address Assignment: Choose Static IP if your ISP assigned a fixed (static or
permanent) IP address, or choose SLAAC if you were not assigned a static IP
address. By default, your security appliance is configured to be a DHCPv6 client of
the ISP, with stateless address auto-configuration (SLAAC).
– SLAAC: SLAAC provides a convenient method to assign IP addresses to IPv6
nodes. This method does not require any human intervention from an IPv6 user. If you
choose SLAAC, the security appliance can generate its own addresses using a
combination of locally available information and information advertised by routers.
– Static IP: If your ISP assigned a static IPv6 address, configure the IPv6 WAN
connection in the following fields:
IPv6 Address: Enter the static IP address that was provided by your ISP.
IPv6 Prefix Length: The IPv6 network (subnet) is identified by the initial bits of the
address called the prefix. All hosts in the network have the identical initial bits for
their IPv6 address. Enter the number of common initial bits in the network’s
addresses. The default prefix length is 64.
Default IPv6 Gateway: Enter the IPv6 address of the gateway for your ISP. This is
usually provided by the ISP or your network administrator.
Primary DNS Server: Enter a valid IP address of the primary DNS server.
Secondary DNS Server (Optional): Optionally, enter a valid IP address of the
secondary DNS server.
To configure a secondary WAN (WAN2), click Add. Then use the WAN - Add/Edit page to
configure the connection. If you enabled IPv4/IPv6 routing mode, complete both tabbed pages,
as described for the primary WAN interface. Click OK to save your settings in the pop-up
window. Click Save to apply your settings to the security appliance. To determine how the two
ISP links are used, configure the WAN redundancy settings.
Note Confirm that you have proper network information from your ISP or a peer router to
configure the security appliance to access the Internet.
Network Configuration
Addressing
Mode
DHCP Client Connection type often used with cable modems. Choose this option if
your ISP dynamically assigns an IP address on connection.
Static IP Choose this option if the ISP provides you with a static (permanent) IP
address and does not assign it dynamically. Use the corresponding
information from your ISP to complete the following fields:
• IP Address: Enter the IP address of the WAN port that can
be accessible from the Internet.
• Subnet Mask: Enter the IP address of the subnet mask.
• Gateway: Enter the IP address of default gateway.
• MTU: The Maximum Transmission Unit is the size, in bytes,
of the largest packet that can be passed on. Choose Auto to
use the default MTU size, or choose Manual if you want to
specify another size.
• MTU Value: If you choose Manual, enter the custom MTU
size in bytes.
PPPoE PPPoE uses Point to Point Protocol over Ethernet (PPPoE) to connect to
the Internet. Choose this option if your ISP provides you with client
software, username, and password. Use the necessary PPPoE
information from your ISP to complete the PPPoE configuration.
• User Name: Enter the username that is required to log into
the ISP.
PPTP The PPTP protocol is typically used for VPN connection. Use the
necessary information from your ISP to complete
the PPTP configuration:
• IP Address: Enter the IP address of the WAN port that can
be accessible from the Internet.
• Subnet Mask: Enter the subnet mask.
• Gateway: Enter the IP address of default gateway.
• User Name: Enter the username that is required to log into
the PPTP server.
• Password: Enter the password that is required to log into the
L2TP Choose this option if you want to use IPsec to connect a L2TP (Layer 2
Tunneling Protocol) server and encrypt all data transmitted from the
client to the server. However, it does not encrypt network traffic to other
destinations. Use the necessary information from your ISP to complete
the L2TP configuration:
• IP Address: Enter the IP address of the WAN port that can
be accessible from the Internet.
• Subnet Mask: Enter the subnet mask.
• Gateway: Enter the IP address of default gateway.
• User Name: Enter the username that is required to log into
the L2TP server.
• Password: Enter the password that is required to log into the
L2TP server.
• L2TP Server IP Address: Enter the IP address of the L2TP
server.
• Secret (Optional): L2TP incorporates a simple, optional,
CHAP-like tunnel authentication system during control
connection establishment. Enter the secret for tunnel
authentication if necessary.
• Connect Idle Time: Choose this option to let the security
appliance disconnect from the Internet after a specified
1. Open a Web Browser and type the router’s IP address into the Address Bar:
192.168.22.1
2. Once the Router page comes up, click the Setup tab in the upper left hand side of the
page:
This article teaches you how to set the D-Link gaming router to configure WAN settings, Include
PPPOE and DHCP .D-Link gaming router such as DGL-4100,DGL-4300 and DGL-4500.
MTU – The MTU (Maximum Transmission Unit) determines the largest packet size (in
bytes). Contact your ISP for your MTU. Typical values are 1500 bytes for an Ethernet
connection and 1492 bytes for a PPPoE connection. If the MTU is set too high, packets
will be fragmented downstream. If the MTU is set too low, the router will fragment
packets unnecessarily and in some cases may be unable to establish connections.
Use the default MTU – Select this option to use the default MTU for your WAN
connection type.
WAN Port Speed – It is recommended leaving this at the default value of Auto.
Respond to WAN Ping – Select this option if you want the WAN interface to respond
to pings.
MAC Cloning Enabled – Select this option if you want to clone the MAC address of
the WAN port with your computer.
MAC Address – If you selected the MAC Cloning Enabled option enter the MAC
address or click Clone Your PC´s MAC Address to clone the MAC address of your PC.
Step 6: In the DHCP WAN Mode enter a Host name if this is required by your ISP.
Step 7: Click Save settings at the top to save the new settings.
Step 9: In the DHCP WAN Mode section click Renew next to DHCP Connection.
Step 1 Open a web browser and type the IP address of the gaming router in the address bar
(default is 192.168.0.1). Press Enter.
MTU – The MTU (Maximum Transmission Unit) determines the largest packet size (in
bytes). Contact your ISP for your MTU. Typical values are 1500 bytes for an Ethernet
connection and 1492 bytes for a PPPoE connection. If the MTU is set too high, packets
will be fragmented downstream. If the MTU is set too low, the router will fragment
packets unnecessarily and in some cases may be unable to establish connections.
Use the default MTU – Select this option to use the default MTU for your WAN
connection type.
WAN Port Speed – It is recommended leaving this at the default value of Auto.
Step 6 In the PPPoE WAN Mode section configure the following. If you are unsure about any of
the below settings contact your ISP or network administrator.
Step 7 Click Save Settings at the top to save the new settings.
Technical journal
Network diagram
A network diagram is a visual representation of a computer or telecommunications network. It
shows the components that make up a network and how they interact, including routers, devices,
hubs, firewalls, etc. This network diagram shows a local area network (LAN)
Configuration backup
IOS: iOS is a mobile operating system created and developed by Apple Inc. exclusively
for its hardware. It is the operating system that presently powers many of the company's
mobile devices, including the iPhone, and iPod Touch.
Configurations: a configuration of a system refers to the arrangement of each of its
functional units, according to their nature, number and chief characteristics.
Learning Outcome 3.2: Documentation of all logs issues and action taken for future
reference
Report
Logs issues:
An issue log is a documentation element of software project management that contains a list of
ongoing and closed issues of the project. While issue logs can be viewed as a way to track errors
in the project, the role it plays often extends further.
Solution implementation
Solution Implementation involves the identification, adaptation, and implementation of new
and enhanced future-proof business and technical scenarios. It is designed to separate technical
installation from business innovation and uses SAP Solution Manager to implement innovation
within the system landscape.
2) Access links: it is used for connection of customer premises to the network core of
WAN. Wired access links are also prevalent.
3) Network core: it connects access links to other links. The carrier takes of network core
and takes care of it.
…………………….END………….