4. Router
static router, table
routing manually sets by
admin.
dynamic router, table
routing adapts with
network traffic
5. Firewall
(M. Ridwan)
firewall contains keywords walls. The
function of the wall is to protect everything
inside the walls. Well, the same firewall
function, which is to protect your computer
or network from another computer access.
7. Function
Controlling and monitoring the flow of
data packets on a network firewall, which
controls the data traffic was allowed to
access the private network behind a
firewall.
Perform authentication to access.
8. Function
Application Proxy Firewall able to check
out, this ability requires the firewall to be
able to detect the specific application
protocol specification.
Record every transaction that occurred
in the firewall. It helps as a detector allows
data theft.
10. Wireless Acces Point
(WAP)
In computer networking, a
wireless access point (WAP) is a
device that allows wireless
devices to connect to a wired
network using Wi-Fi, Bluetooth
or related standards.
11. Wireless Acces Point
(WAP)
The function of a wireless
access point is to allow
wireless devices such as
projectors, laptops and PDAs
to access a local area
network.
17. Proxy Server
(Nefi Liana)
Proxy is a third party that stands in
the middle between the two parties
that are interconnected and function
as intermediaries
18. Weakness & Disadvantages
It may be a longer process than if we directly
search and retrieve their own data that we
want.
Excess Operating System that uses a proxy
is requested data from the client will be
directed to the proxy server and then proceed
to internet..
23. Description
swicth is a networking tool that does invisible bridge
(connecting partitioning (segmentation) with the
transfer of many networks
switch can be used as a computer interface on a
limited area, swicth works on the data link layer, the
switch work is almost the same as bridge, but
switch has a number of ports that make swicth often
called multi -port bridge
24. Function
receives a message from any device
connected to it transmits the message
only to the device for which the message
was meant
25. Typical Switch
management features
Turn particular port range on or off
Link bandwidth and duplex settings
Priority settings for ports
IP Management by IP Clustering.
MAC filtering and other types of "port security" features which
prevent MAC flooding
Use of Spanning Tree Protocol
SNMP monitoring of device and link health
Port mirroring (also known as: port monitoring)
Link aggregation (also known as bonding, trunking or teaming)
VLAN settings
802.1X network access control
26. Typical Switch
management features
Link aggregation allows the use of multiple
ports for the same connection achieving
higher data transfer rates. Creating VLANs
can serve security and performance goals by
reducing the size of the broadcast domain.