0% found this document useful (0 votes)
38 views125 pages

Notes Quiz Css

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views125 pages

Notes Quiz Css

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 125

TEST

PROCEDURE
S
TEST PROCEDURES
      Atest procedure is a set of steps to
guide you through what needs to be done
to thoroughly test the installation. It is
designed to help you work more
effectively and to make sure you test
everything that needs testing.
TEST PROCEDURES

1. Gathering test information


2. Validating the test information
3. Responding to test information
4. Checking specification
•  The first step is to run the tests
GATHERING required by the procedure and find out
TEST what happens. You should record all
INFORMATIO the results of your tests in a log so that
N you know which pass and which fail,
thereby requiring further action
• The next step is to check the
VALIDATING data you gathered from the
THE TEST tests to make sure it is correct.
INFORMATIO This is usually done by running
N the tests again.
• This step is important because
you need to be able to recognize
RESPONDING when a test shows problems or is
TO TEST successful. For example, if ping is
INFORMATIO used to test a network
N connection, then ‘Request timed
out’ shows the test was not
successful
• The final step is an important end
CHECKING to testing. You need to check the
SPECIFICATIO specification for the installation
N to make sure that it has been
met.
CHECK PC
SPECIFICATIONS
DE GUZMAN, JOHN VINCENT
PONAYO, MARK
TORNO, ALAIN ANDREI
HOW TO CHECK
PC
SPECIFICATIONS
?
CHECKING SPECIFICATION
IN WINDOWS 7

• •Look for the computer icon on your desktop or in


the windows icon .
• •Right click the computer icon 
• •Click the properties
• •Here you'll see a basic list of specs, such as your
processor, available RAM, some support numbers
(depending on the PC manufacturer), and which
version of Windows you're running.
CHECKING
SPECIFICATION
IN WINDOWS 7
IF YOU NEED MORE
INFORMATION:

• •Click the device manager that


you will see on the left side of the
window
• •You can now see more PC
components
CHECKING SPECIFICATION
IN WINDOWS 8-10

• •Look for the windows icon at the bottom


left of your screen
• •After you click the windows icon look for
the System and click it
• •You will see your PC’s basic specifications
IF YOU WANT TO SEE MORE
SPECIFICATION YOU CAN ALSO
DO WHAT YOU DID IN WINDOWS
7

• •In windows 7 you looked at the


left side of the window
• •In Windows 10 look at the right
side of the window 
• •And click Device Manager
CHECKING SPECIFICATI
ON USING SHORTCUTS

• •Search for “Run” and type


“dxdiag”
• •Now you will see your system
info
YOU CAN ALSO USE
COMMAND PROMPT

• •Search for command prompt


• •Type “systeminfo” hit enter
• •There you will see all the
specific details that you needed 
YOU CAN ALSO USE COMMAND PROMPT
WHAT IS
NETWORK
ARCHITECTU
RE
WHAT IS NETWORK
ARCHITECTURE?
• IT’S BASICALLY THE PHYSICAL AND LOGICAL DESIGN WHICH
REFERS TO THE SOFTWARE,
• HARDWARE, PROTOCOLS AND THE MEDIA OF TRANSMISSION OF
DATA. SIMPLY PUT,
• IT REFERS TO HOW COMPUTERS ARE ORGANIZED AND HOW
TASKS ARE ALLOCATED
• AMONG THESE COMPUTERS. THE TWO TYPES OF WIDELY USED
NETWORK
• ARCHITECTURES ARE PEER-TO-PEER AND CLIENT/SERVER.
PEER-TO-PEER
NETWORK

• A PEER-TO-PEER NETWORK IS CREATED WHEN TWO OR


MORE PCS ARE CONNECTED AND SHARE RESOURCES
WITHOUT GOING THROUGH A SEPARATE SERVER
COMPUTER (COPE, 2002). PEER-TO-PEER NETWORK
SHARES RESOURCES WITH THE COMPUTER AND
COLLABORATE WITH THEM. IT CAN ALSO EXECUTE
TASKS AND DO SPECIFIC SERVICES. IT IS A GOOD WAY
FOR SHARING AND RECEIVING FILES FROM DIFFERENT
COMPUTERS THAT ARE CONNECTED.
PEER-TO-PEER NETWORK
(FILE SHARING)

• YOU WILL NEED:


COMPUTER 1
COMPUTER 2
LAN CABLE (CROSSOVER)
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 1.PLUG THE LAN
CABLE TO BOTH OF
THE COMPUTERS.
• 2.FOR COMPUTER 1,
RIGHT CLICK THE
NETWORK ICON, THEN
CLICK “OPEN
NETWORK AND
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 3. CLICK “CHANGE
ADAPTOR OPTIONS”,
THEN CLICK
“ETHERNET” AND GO
TO “PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 4. UNCHECK THE BOX
“INTERNET PROTOCOL
VERSION 6 (TCP/IPV6)”,
THEN CLICK“INTERNET
PROTOCOL VERSION 4
(TCP/IPV4)” AND CLICK
“PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 5. IN “PROPERTIES”, CLICK
“USE THE FOLLOWING IP
ADDRESS:”
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 6. INPUT THE FOLLOWING THEN CLICK
“OK”.
• IP ADDRESS: 192.168.1.1
• SUBNET MASK: 255.255.255.0
• DEFAULT GATEWAY: 192.168.1.2
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 7. IN NETWORK AND
INTERNET SETTINGS, CLICK
“SHARING OPTIONS”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 9. IN PC 2, DO THE SAME STEPS THAT YOU DID TO PC 1 EXCEPT FOR
THE IP ADDRESS AND DEFAULT GATEWAY. 
• FOR PC 2:
• IP ADDRESS: 192.168.1.2
• DEFAULT GATEWAY: 192.168.1.1
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 10. CREATE A FOLDER IN PC
1 OR PC 2 THEN RIGHT
CLICK THE FOLDER AND
SELECT “PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 11. GO TO “SHARING”
TAB, THEN CLICK
“SHARE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 12. CHOOSE WHO CAN
ACCESS TO YOUR FOLDER
OR FILE, THEN CLICK
“ADD”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 13. CHOOSE THE
PERMISSION LEVEL YOU
WOULD LIKE THE ADDED
COMPUTER TO HAVE.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 14. CHOOSE THE PERMISSION
LEVEL YOU WOULD LIKE THE
ADDED COMPUTER TO HAVE,
THEN CLICK “SHARE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 15. CLICK “DONE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)

• STEPS:
• 16. CHECK THE OTHER PC IF
THE FILE OR FOLDER WAS
SUCCESSFULLY SHARED.
CLIENT-
SERVER
CLIENT-SERVER

• In a client/server network, a centralized,


really powerful computer(server) acts as a
hub in which other computers
or workstations(clients) can connect to. This
server is the heart of the system, which
manages and provides resources to any client
that requests them.
Network Topology:
◎ The key in determining a network’s performance lies on its
topology.  
◎ Network topology is the way a network is arranged and
organized, which can be categorized into physical and logical
description of how links and nodes are set up to relate to each
other.
◎ Network topologies can be categorized into two: 
◎ Physical, which is the physical signal transmission
medium
◎ Logical, which is the way a data travels through the
network between devices.
Importance of
Network Topology:
• Having the right topology for your business’ operational
model increase its performance while making it easier to:
•  locate faults
•  troubleshoot errors
• effectively allocate resources across the network to
ensure desirable work health
• Proper management of network topology can increase
energy and data efficiency
Types Of Network
Topology 
TOPOLOGY
BUS TOPOLOGY
 A bus topology is a topology for a Local Area Network (LAN)
in which all the nodes are connected to a single cable. The cable
to which the nodes connect is called a "backbone". If the
backbone is broken, the entire segment fails.
 All data transmitted between nodes in the network is transmitted
over common transmission medium and is available to be
received by all nodes in the network simultaneously. 
BUS
Node 1
TOPOLOGY Node 2 Node 3

Node 4 Node 5
BUS TOPOLOGY
Advantages Disadvantages
Requires less cable length Difficult to identify the
problem if the entire network
shuts down
Suited for temporary network Limited Cable Length
Node failures does not affect Entire network shuts down if
others there is a break in the main
cable
RING TOPOLOGY
RING
topology
Node 1

Node 5 Node 2

Node 4 Node 3
RING topology
Advantages Disadvantages
Easy to manage. Due to the Uni-directional Ring, a
data packet (token) must have to
pass through all the nodes.
In this data flows in one direction It is slower in performance as
which reduces the chance of packet compared to the bus topology
collisions.
All nodes with equal access If one workstation shuts down, it
affects whole network or if a node
goes down entire network goes
down.
STAR TOPOLOGY
STAR
TOPOLOGY Node 1

Node 5 Node 2
HUB

Node 4 Node 3
STAR
TOPOLOGY
Advantages Disadvantages
No disruptions to the network Too much dependency on
when connecting or removing central device has its own
devices. drawbacks. If it fails whole
network goes down.
Easy to install and wire. Requires more cable than a
linear bus .
Centralized administration. Increased cost due to
switch/hub.
TREE
TOPOLOGY
TREE
HUB 1
TOPOLOGY
HUB 2
Node 1 Node 2

Node 3
Node 4

Node 5 Node 6
HUB 3

Node 7
Node 8
TREE
Scalable TOPOLOGY
Advantages Disadvantages
Central hub fails, network
fails
Easier maintenance and fault Heavily cabled
finding
The other nodes in a network are not Costly
affected, if one of their nodes get
damaged or not working

Point-to-point wiring for If more nodes are added,


individual segments maintenance is difficult
MESH TOPOLOGY
MESH
Node 1 TOPOLOGY Node 2

Node 4 Node 3
TWO TYPES OF MESH
TOPOLOGY
In a full mesh topology, every
computer in the network has a
In a partially-connected mesh topology, at
least two of the computers in the network
connection to each of the other have connections to multiple other
computers in that network. The computers in that network. It is an
number of connections in this inexpensive way to implement redundancy
network can be calculated using the in a network. If one of the primary
following formula (n is the number computers or connections in the network
of computers in the network): fails, the rest of the network continues to
n(n-1)/2 operate normally.
MESH
TOPOLOGY
Advantages Disadvantages
Fault tolerant Issues with broadcasting
messages

Reliable Expensive and impractical for


large networks
HYBRID TOPOLOGY
HYBRID
TOPOLOGY
Bus Topology
Ring Topology

Star Topology
TWO TYPES OF HYBRID
TOPOLOGY
A star-ring hybrid topology is a
combination of the star topology
and ring topology. Star topologies
are connected through a ring
topology, regardless of amount.

A star-bus hybrid topology is a


combination of the star topology and
bus topology. Star topologies are
connected through a bus topology,
regardless of amount.
HYBRID
Scalable TOPOLOGY
Advantages Disadvantages
Heavily cabled
Reliable Time-consuming
Effective Costly

Flexible If more nodes are added,


network and maintenance can
be affected
References:
 https://www.computerhope.com/jargon/h/hybrtopo.htm
 https://www.youtube.com/watch?v=uSKdjjw5zow
 https://www.researchgate.net/figure/Topologies-of-the-mesh-a-full-mesh-b-partial-
mesh_fig1_337959116
 https://universalteacher.com/1/advantages-and-disadvantages-of-hybrid-
topology/#:~:text=Following%20are%20the%20main%20advantages,has%20far%20better
%20fault%20tolerance.&text=Effective%3A%20The%20most%20important
%20advantage,strengths%20are%20taken%20into%20consideration
 https://www.dnsstuff.com/what-is-network-topology
 https://www.omnisci.com/technical-glossary/network-topology
Ethernet Hardware
HUB
ETHERNET HARDWARE
hub

Hubs are used for star topology


networks, but they are often used with
other configurations to make it easy to An unintelligent network device
add and remove computers without that sends one signal to all of the
bringing down the network. stations connected to it.

All computers/devices are competing


Resides on Layer 1 of the OSI model
OSI Model Layers for attention because it takes the
7 Application 6 Presentation data that comes into a port and sends
5 Session 4 Transport 3 Network it out all the other ports in the hub. 
2 Data Link 1 Physical
SWITCH
ETHERNET HARDWARE
Switch

Split large networks into small Resides on Layer 2 of the OSI model
segments, decreasing the number OSI Model Layers
of users sharing the same network 7 Application 6 Presentation
resources and bandwidth.  5 Session 4 Transport 3 Network
2 Data Link 1 Physical

Helps prevent data collisions


and reduces network congestion, Understands when two devices
increasing network want to talk to each other, and
performance. gives them a switched connection
BRIDGE
ETHERNET HARDWARE
BRIDGE

Creates an extended network in


Connects two LANs and which any two workstations on
forwards or filters data the linked LANs can share
packets between them. data.

Resides on Layer 2 of the OSI model Transparent to protocols and to higher level
OSI Model Layers devices like routers.
7 Application 6 Presentation Forward data depending on the Hardware
5 Session 4 Transport 3 Network (MAC) address, not the Network address (IP).
2 Data Link 1 Physical
REPEATER
ETHERNET HARDWARE
REPEATER

Used to boost the signal


between two cable Does not simply amplify the
segments or wireless access signal, it regenerates the
points packets and retimes them. 

Resides on Layer 1 of the OSI model


OSI Model Layers
7 Application 6 Presentation  Can not connect different network
5 Session 4 Transport 3 Network architecture.
2 Data Link 1 Physical
ROUTER
ETHERNET HARDWARE
ROUTER

A device that connects any


number of LANs. Forwards data depending on the
Uses standardized protocols to Network address (IP), not the
move packets efficiently to their Hardware (MAC) address. 
destination.

Resides on Layer 3 of the OSI model Routers are the only one of these
OSI Model Layers four devices that will allow you to
7 Application 6 Presentation share a single IP address among
5 Session 4 Transport 3 Network multiple network clients.
2 Data Link 1 Physical
 Additional Network Hardware Devices
Network Interface Cards (NICs)
∙ Puts the data into packets and transmits
packet onto the network.
∙ May be wired or wireless.
 Gateway
∙ Connects networks with different protocols like
TCP/IP network and IPX/SPX networks.
∙ Routers and Gateways often refer to the same
device. 
Proxy server
∙ Isolates internal network computers from the internet.
∙ The user first access the proxy server and the proxy
server accesses the internet and retrieves the requested
web page or document. The user then gets a copy of that
page from the proxy server.
References:

 https://www.camas.wednet.edu/chs/tech/computer_tech/info/routers_hubs_bridges.htm
 https://sourcedaddy.com/networking/ethernet-hardware.html
 https://stevessmarthomeguide.com/networking-components/
 http://www.jsu.edu/depart/psychology/sebac/fac-sch/internet/hardware-h.shtml
 https://www.tutorialspoint.com/Basic-Network-Hardware
Ethernet Switches
ETHERNET
SWITCHES

•Ethernet is a method of linking computers in a local area network, also known as a


LAN. Since the 1990s, it has been the most commonly used method of connecting
computers in LANs. Its architecture is based on the premise that many computers
can access it and submit data at any time.

•A switch is similar to a network surge protector.


ETHERNET
SWITCHES

• An Ethernet switch serves as a central station for connecting laptops, printers, and other wired
devices. To connect to the Internet, the switch is also connected to the router and modem. Wi-Fi
is Ethernet's cable counterpart.

•While stand-alone Ethernet switches can have up to 48 ports, the Ethernet switch in a wireless
router typically has just four ports. Wi-Fi and wireless router are two terms that can be used
interchangeably.
ETHERNET SWITCHES

•This is an example of 48-port ethernet switches


that are currently operating in workplaces and
major corporations.
HOW DOES ETHERNET
SWITCHES WORK?
Types Of Switches

Modular
Switches
MODULAR SWITCHES
Modular switches allow you to
install extension modules if
required, allowing you
versatility as your network's
needs shift. Expansion
modules for firewalls, wireless
networking, and network
monitoring are examples of
application-specific expansion
modules. They can also enable
the inclusion of external
interfaces, power supplies, or
cooling fans. This move gives
you the most versatility, but at
a higher cost.
Types Of Switches

Fixed-Configuration Switches
FIXED-CONFIGURATION
SWITCHES
Fixed-configuration switches
have a fixed number of ports
and are normally not
expandable, allowing them
less costly in the long run.
Unmanaged switches, smart
switches, and regulated
switches are also example of
fixed-configuration switches.
Types Of Switches

Smart Switches
SMART SWITCHES
Smart switches have some
management and
segmentation, quality of
operation, and security
features, making them a less
expensive alternative to
modular switches. They are,
however, not as scalable as
managed switches. This
switches are usually installed
at the edge of a big network,
as the infrastructure for
smaller networks, or for
networks of low complexity.
Types Of Switches

Managed
Switches
MANAGED SWITCHES
Managed switches are created
to enhance the most
comprehensive range of
features to provide the best
application experience, the
highest levels of protection,
the most detailed network
access and maintenance, and
the greatest scalability among
fixed-configuration switches.
As a result, controlled
switches are typically used as
aggregation/access switches in
very big networks or as central
switches in smaller networks.
Types Of Switches

Unmanaged Switches
UNMANAGED SWITCHES
Usually, unmanaged switches
are used to have simple
networking. They're
programmed to be plug-and-
play, with no setup needed.
When only simple switching
and connectivity are needed,
unmanaged switches are the
most powerful. They are
commonly used in home
networks or where only a few
ports are needed, such as at a
desk, in a lab, or in a
conference room.
Managed
Modular
Fixed-Configuration

Unmanaged
Smart
ETHERNET
CABLE
An Ethernet cable is
something that connects your
electronic device (computer,
smartphone, game console,
etc.) to a network, allowing
you to access the internet and
communicate with shared
network services.
ETHERNET
CABLE TYPES
•Most Ethernet cables are designed to
connect a computer to a router or switch.
Ethernet cables come in a range of types that
are defined by the Electronic Industries
Association and Telecommunications
Industry Association.

•Ethernet cable types include Category 5e


and Category 6– commonly abbreviated to
‘Cat5e’ and ‘Cat6’ respectively.
CAT5E CABLES

This is the most common kind of twisted pair Ethernet cable, and it is made up
of four pairs of copper wires. High speeds of up to 100 Mbps (megabit per
second) are possible with fifth generation twisted pair Ethernet technology.
CAT6 CABLES

This cable is the sixth generation of twisted pair Ethernet cabling, and it is
made up of four pairs of copper wires, much like the CAT 5e category.Cat6, on
the other hand, uses all four pairs of copper wire and can reach speeds of up to
1 Gbps (gigabit per second), which is double the speed of CAT 5e cables.
References:
 https://simple.wikipedia.org/wiki/Ethernet
 https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/networking/understanding-the-different-types-of-network-switches.html#~types-of-
switches
 https://www.youtube.com/watch?v=WJ_UD3R7s2I
 https://www.pcmag.com/encyclopedia/term/ethernet-switch
 https://www.comms-express.com/blog/ethernet-cables-explained-all-you-need-to-
know/#:~:text=Cat5e%20Cables,per%20second)%20to%20be%20achieved.
 https://www.firefold.com/blogs/news/what-is-an-ethernet-cable
Network Firewall
NETWORK FIREWALL
 What is Firewall
A firewall is a critical part of any system’s security
infrastructure It’s a network security device that monitors
incoming and outgoing network traffic and permits or
blocks data packets based on a set of security rules. It also
guards traffic at a computer’s entry point, called ports,
which is where information is exchanged with external
devices.
When properly configured, a firewall allows users to
access any of the resources they need while
simultaneously keeping out unwanted users, hackers,
viruses, worms or other malicious programs trying to
access the protected network.
HARDWARE & SOFTWARE
FIREWALLS
Hardware firewalls
• These firewalls are released either as standalone products
for corporate use, or more often, as a built-in component
of a router or other networking device.
• Hardware firewalls will almost always come with a
minimum of four network ports that allow connections to
multiple systems.

Software firewalls
• These are installed on a computer, or provided by an OS
or network device manufacturer.
• They can be customized, and provide a smaller level of
control over functions and protection features.
• A software firewall can protect a system from standard
control and access attempts, but have trouble with more
sophisticated network breaches.
TYPES OF NETWORK
FIREWALL
1. Packet-filtering firewalls 2. Next-generation
 It’s the most common type of firewall
firewalls (NGFW)
 Examine packets and prohibit them from  NGFW combine traditional
passing through if they don’t match an firewall technology with
established security rule set additional functionality, such as
encrypted traffic inspection,
 Checks the packet’s source and destination IP intrusion prevention systems, anti-
addresses. virus, and more
Divided into two categories
 Stateful- remember information about  Includes deep packet inspection
previously passed packets and are (DPI).
considered much more secure.
 Stateless- examine packets  Application awareness and control
independently of one another and lack to see and block risky apps
context, making them easy targets for
hackers
TYPES OF NETWORK
FIREWALL
3. Proxy firewalls 4. Network address
 filter network traffic at the application level
translation (NAT)
firewalls
 It acts an intermediary between two end
systems  NAT allow multiple devices with
independent network addresses to
 Monitor traffic for layer 7 protocols such as connect to the internet using a
HTTP and FTP, and use both stateful and single IP address, keeping
deep packet inspection to detect malicious individual IP addresses hidden.
traffic.
 Also acts as an intermediary
between a group of computers and
outside traffic.
TYPES OF NETWORK
FIREWALL
5. Stateful multilayer 6. Unified threat
Inspection (SMLI) management
firewalls (UTM)
 Filter packets at the network, transport, and  Combines, in a loosely coupled
application layers, comparing them against way, the functions of a stateful
known trusted packets. inspection firewall with intrusion
prevention and antivirus
 Like NGFW firewalls, SMLI also examine
the entire packet and only allow them to pass  UTMs focus on simplicity and
if they pass each layer individually. ease of use.
How to Allow Programs through the
Windows 7 Firewall
1. Choose Start→Control Panel→System and 2. Select the check box(es) for the program(s)
Security→Allow a Program through Windows you want to allow through the firewall.
Firewall. Allowed Programs dialog box 3. Use the check boxes to indicate the kind of
network that has to be running for the
program to get through. Click OK to accept
the settings.
Why Network Firewalls
are Important

• A firewall will stop malicious intruders


from coming into the network through
the Internet from either corrupting or
stealing your data.

• Firewalls act as a security guard would


at your front door, allowing only
authorized data to come into the
network.

• They are the first line of defense in


protecting networks from the outside
world.
They are the first line of defense in protecting
networks from the outside world.
Reference:

Barracuda networks. (n.d.). Retrieved April 15, 2021, from https://www.barracuda.com/glossary/network-firewall

Muir, N. C. (n.d.). How to Allow Programs Through the Windows 7 Firewall? Retrieved April 16, 2021, from

https://www.dummies.com/computers/operating-systems/windows-7/how-to-allow-programs-through-the-windows-7-firewall/

What is a firewall? (2021, February 02). Retrieved April 15, 2021, from

https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

What is a firewall? (2021, March 10). Retrieved April 15, 2021, from https://www.forcepoint.com/cyber-edu/firewall

Why is a firewall important? - it questions. (2017, March 03). Retrieved April 16, 2021, from https://www.getsouthern.com/it-

questions/why-is-a-firewall-important/
Virus and malware was ejected
0 threat remain

THANK YOU
Server
Server
A server is a computer or system that provides
resources, data, services, or programs to other
computers, known as clients, over a network. In
theory, whenever computers share resources with
client machines they are considered servers. There
are many types of servers, including web servers,
mail servers, and virtual servers.
HOW A SERVER WORKS
To function as a server, a device must be When a client requires data or
configured to listen to requests from functionality from a server, it sends a
clients on a network connection. This request over the network. The server
functionality can exist as part of the receives this request and responds with
operating system as an installed the appropriate information. This is the
application, role, or a combination of the request and response model of client-
two. For example, Microsoft’s Windows server networking, also known as the
Server operating system provides the call and response model. A server will
functionality to listen to and respond to often perform numerous additional tasks
client requests. Additionally installed as part of a single request and response,
roles or services increase which kinds of including verifying the identity of the
client requests the server can respond to. requestor, ensuring that the client has
In another example, an Apache web permission to access the data or
server responds to Internet browser resources requested, and properly
requests via an additional application, formatting or returning the required
Apache, installed on top of an operating response in an expected way.
system.
Types of Server

There are many types of servers that all perform different


functions. Many networks contain one or more of the common server
types:
File servers store and distribute
File Server
files. Multiple clients or users
may share files stored on a
server. In addition, centrally
storing files offers easier backup
or fault tolerance solutions than
attempting to provide security
and integrity for files on every
device in an organization. File
server hardware can be designed
to maximize read and write
speeds to improve performance.
Print Server
A print server can
manage printing
requests that both
your computer and
printing device
receive, and they’re
used in any kind of
printing operation
for businesses all
over the world.
An application server is a
mixed framework of software
that allows both the creation of
web applications and a server
environment to run them. It can
often be a complex stack of
different computational
elements running specific tasks
that need to work as one to
power multiple clouds and
web-based software and
application.
Application
Server
Domain Name System
(DNS) Server

Domain Name System (DNS)


servers are application servers
that provide name resolution to
client computers by converting
names easily understood by
humans into machine-readable
IP addresses. The DNS system
is a widely distributed database
of names and other DNS
servers, each of which can be
used to request an otherwise
unknown computer name.
Mail Servers
Mail servers are a very common type of application
server. Mail servers receive emails sent to a user and
store them until requested by a client on behalf of
said user. Having an email server allows for a single
machine to be properly configured and attached to
the network at all times. It is then ready to send and
receive messages rather than requiring every client
machine to have its own email subsystem
continuously running.
A web server is software and hardware that uses HTTP
(Hypertext Transfer Protocol) and other protocols to
respond to client requests made over the World Wide
Web. The main job of a web server is to display website
content through storing, processing and delivering
webpages to users.
Web
Server
Database Servers
Database server are used to store and
manage databases that are stored on the
server and to provide data access for
authorized users. This type of server keeps
the data in a central location that can be
regularly backed up. It also allows users and
applications to centrally access the data
across the network.
Virtual Servers

A virtual server can be defined as a web


server that shares computer resources
with other virtual servers and is not a
dedicated server. With a virtual server,
the entire computer is not dedicated to
running the server software but is split
among two or more virtual machines.
Proxy Server

A proxy server is a computer


system or router that functions as
a relay between client and server.
It helps prevent an attacker from
invading a private network and is
one of several tools used to build
a firewall.
Monitoring and Management
Servers

Some servers exist to monitor or manage other systems


and clients. There are many types of monitoring servers.
Several of them listen to the network and receive every
client request and server response, but some do not
request or respond to data themselves. In this way, the
monitoring server can keep track of all the traffic on the
network, as well as the requests and replies of clients
and servers, without interfering with those operations. A
monitoring server will respond to requests from
monitoring clients such as those run by network
administrators watching the health of the network.
References:

 https://www.paessler.com/it-explained/server
 https://www.printerland.co.uk/blog/how-does-a-print-server-work/
 https://www.google.com/amp/s/www.itpro.co.uk/strategy/29643/what-is-an-application-serv
er%3famp
 https://www.google.com/amp/s/whatis.techtarget.com/definition/Web-server%3famp=1
 https://www.sciencedirect.com/topics/computer-science/database-server
 https://www.netstandard.com/virtual-servers-work
 https://www.pcmag.com/encyclopedia/term/proxy-server

You might also like