SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
RBHraCaNacRkkm<úCa
½yPUminÞPñMeBj               Cati   sasna RBHm
al½y viTüasaRsþ
akMuBüÚT½r




    eroberognigcgRkgeday

    1> Sroeurn Sophai
    2> Sok Bunthath
    ENnaMedaysaRsþacarü
    3> Ra Vichet                    Hang Vannak

    4> Huot Leaing
CMBUk 1 esckþIepþIm
CMBUk 2 Éksar nig
 RTwsþIEdlBak;B½næ
CMBUk 3 viFIsaRsþ nig
 rcnasm<½næénkarsikSa
CMBUk 4 karviPaK kareRKag
 nig karGnuvtþn_
CMBUk 1
esckþIepþIm
mUldæanénkarsikSa
   rdæelxaFikardæanmuxgarsaFarN³
KWCasßab½nkNþalmYy
EdlmantYnaTIRKb;RKgral;Bt’man
EdlTak;Tgnigm®nþIraCkarRKb;sßab½n
elIkElgEtsßab½ntulakar    nig    nitibBaØati
kñúgenaHrYmmanTaMgR)ak;
ebovtS             nigkardMeLIgzannþrs½kþi
eyageTAtamKuNsm,tþi
nigKuNvibtþirbs;m®nþIraCkarmñak;².
karkMNt;bBaðaénkarsikSa
   karbBa¢Ún nigTTYlBt’man CabBaðacMbgrbs;
rdæelxaFikardæanmuxgarsaFarN³
edIm,IerobcMsMNuM        Éksar     nwgbBa
¢ÚneTAsßab½nbnÞab;.           TnÞwmnwgenH
karrerobcMsMNuMÉksarenAkñúgsßab½nkan;Etm
ansPaB                           eRcIneLIg²
dUecñHeFVIeGaykic©karmYycMnYnRtUv)ankksÞ
H.
  eRkayBI)ancuHsYrBt’man
karkMNt;bBaðaénkarsikSa           ¬t¦
  -    Bi)akkñúgkarbBa¢ÚnÉksar dUcCakarbBa
¢ÚnmanPaByWty:aveRBaHÉksarmYycMnYnRtUv
eFVIedayéd
  -          cMNayeBlevla  nig  fvikareRcIn
edIm,IedaHRsaybBaðaeBlkuMBüÚT½rmanemeraK
   -    Bi)aknUvkarRKb;RKgeTAelIkMuBüÚT½r
Clients edaysarEtkuMBüÚT½reRbIkñúgsßab½n
CalkçN³ Workgroup.
eKalbMNgénkarsikSa
   eyageTAtamplvi)ak
nigbBaðaEdl)anekIteLIgxagelI
eTIbRkumkarsikSa)anerobcMCaKMerag
edIm,IsikSaeTAelI RbB½n§ Network
nigkarEklMGedayepþatelIeKalbMNgmYycMnY
ndUcxageRkam³
   - dMeLIg Server edIm,IRKb;RKgral; Users
nig kMuBüÚT½r
CMBUk 1
                     esckþIepþIm

TMhM nigEdnénkarsikSa
  edaysarEtkarcuHkmµsikSaenA
rdæelxaFikardæanmuxgarsaFarN³ manry³eBlxøI
dUecñaHehIy KMeragénkarEklMG nigRKb;RKgRbB½n§
Network enArdæelxaFikardæanmuxgarsaFarN³
enaHBMuTan;man lkçN³eBjeljenAeLIyeT.


   - erobcMnUv Files Server edIm,IkMnt;siTiædl; User
nimYy² nwgpþl;TMhM Space dl;m®nþIraCkar
edIm,IrkSaTukÉksareTAelIkMuBüÚT½r Server
  - GacrkSaral;Tinñn½y[mansuvtßiPaBmingay)at;bg;
CMBUk 1
                  esckþIepþIm
TMhM
 nigEdnénkarsikSa ¬t¦

  - min)andMeLIg Microsoft ISA 2004 Ca Firewall
  - cMeBaH Microsoft Exchange 2003
min)ansikSaeGaysIuCMerAelI Public Folder nig
Web Access.
CMBUk 1
                esckþIepþIm
plRbeyaCn_énkarsikSa
  eRkayBI)ansikSaeTAelIKMeragénRbB½n§
Network enAkñúg rdæelxaFikardæanmuxgarsaFarN³
mk )anpþl;GtßRbeyaCn_y:ageRcIndUcxageRkam ³

   -                gayRsYlkñúgkarRKb;RKg
m®nþIraCkarkñúgkareRbIR)as;kuMBüÚT½r
   - gayRsYlkñúgkareRbIR)as;]bkrN_rYmKña
nigpøas;bþÚrÉksareGayKñaeTAvijeTAmk
   -   eFVIeGayTinñn½ykan;EtmansuvtßiPaB
karBarBIkar)at;bg;nUvÉksarsMxan;;²
CMBUk 1
               esckþIepþIm

plRbeyaCn_énkarsikSa ¬t¦

   -
pþl;bTBiesaFn_kargarCak;EsþgkñúgsgÁm
nigyl;dwgeRcInelIEpñk Network
   - pþl;nUvcMeNHdwgBIbec©kviTüafµI²rbs;
Network TaMg Hardware nig Software

   - yl;kan;EteRcInBIKuNsm,tþi nig
KuNvibtþiBIRbB½n§ Network
   - CaÉksarsMrab;nisSit
CMBUk 2
 Éksar nig
RTwsþIEdlB
CMBUk 2
     Éksar nig RTwsþIEdlBak;B½næ

1> Éksar
   Ep¥keTAelIBt’manEdl)ansaksYr
nigÉksarEdlRbmUl)ansMrab;karRKb;RKgRb
B½n§ Network
enAkñúgrdæelxaFikardæanmuxgarsaFarN³
mandUcCa³
   - RbB½n§ Network bc©úb,nñ
enArdæelxaFikardæanmuxgarsaFarN³
   - cMnYnkuMBüÚT½r
EdlkMBugEteRbIR)as;
CMBUk 2
      Éksar nig RTwsþIEdlBak;B½næ
2>
RTwsþIBak;B½n§kñúgkardMeLIgRb
B½n§
karENnaMBIRbB½n§ Computer Network
  Computer          Network       CakartP
¢ab;rvagkuMBüÚT½rcab;BIBIr              b¤
eRcInkuMBüÚT½r              eGaysÁal;Kña
CaBiessenAkñúgenHpgEdrGñkeRbIR)as;nUv
RbB½næ Network enHGac Share Files, Printer,
b¤k¾ Share Resource eGayKñaeTAvijeTAmk.
CMBUk 2
        Éksar nig RTwsþIEdlBak;B½næ
RbePTExS
cMeBaHExSEdleRbIR)as;sMrab;TMnak;TMngrvagkM
uBüÚT½rkñúgRbB½næ Network man 3 RbePT ³
   -             ExS              Coaxial              :
KWCaExSEdlbegáIteLIgmansréscMlgcrnþenAcMkNþ
al               nig               RsTab;B½n§CMuvij
ehIysMNaj;GackarBarrlk¬crnþ¦enAeRkA. ExS Coaxial
EdleRbIR)as;enAkñúg         LAN       manBIrRbePTKW³
Thinnet Coaxial nig Thicknet Coaxial.
   -        ExS          Twisted-Pair         :
CaRbePTExSEdlmaneRcInsrésevjcUlKña
edIm,IkarBarkarrMxanBIrlk
   GKÁisnIxageRkA.             ExS          Twisted-Pair
CMBUk 2
       Éksar nig RTwsþIEdlBak;B½næ
karENnaMBI Network Topology
  Network Topology KWCa Configuration b¤ Physical
Layout énkarP¢ab;bNþaj Network enAelI LAN
EtmYy b¤ enAcenøaHBI LAN 2 b¤eRcIn.
enAkñúg Network Basic Topologies eKEbgEck
Topology cMnYn 4 FM²KW³
  - Bus Topology
  - Star Topology
  - Ring Topology
  - Mesh Topology
]bkrN_sMrab;P¢ab;enAkñúg         Network
  ]bkrN_EdleRbIsMrab;P¢ab;enAkñúgbNþaj
Network EdlsMxan;²mandUcCa³ Modem, Hubs,
CMBUk 2
        Éksar nig RTwsþIEdlBak;B½næ
Open Systems Interconnection (OSI) Reference Model
   enAqñaM 1984             OSI   Reference Model
RtUv)anbegþIteLIgedayGgÁkar              International
Standard Organization (ISO)  sMrab;eRbIelI Data
Communication TaMgGs;. OSI Reference Model Ca
Architecture EdlEbgEck Network Communication Ca 7
Layers               ehIyRKb;                  Layers
TaMgGs;mantYnaTIepSg²BIKña.
CMBUk 2
         Éksar nig RTwsþIEdlBak;B½næ
karENnaMGMBI               Microsoft Windows Server 2003
Active Directory
   Microsoft Windows Server 2003 Active Directory Ca
Directory Server cugeRkayeKbg¥s;rbs; Microsoft
ehIyvapþl;nUv               Directory          Service
EdlmanRbsiT§iPaBx<s; kñúgkaRKb;RKg Users ,
tYnaTIrbs; kuMBüÚT½r. minEtb:ueNÑaH Active
Groups nig Active Directory
Directory      pþl;nUv    Security    kñúgkareRbIR)as;
Active Directory pþl;nUvtYnaTIdUcxageRkam³
Resources enAelIRbB½n§ Network.
   - Centralizes Control of Network Resources
   - Centralizes and Decentralizes Resource Management
   - Stores Objects Security in a Logical Structure
   - Optimizes Network Traffic
CMBUk 2
      Éksar nig RTwsþIEdlBak;B½næ
karENnaMBI Domain Name System (DNS)
   DNS
mantYnaTIbkERbBIeQµaHkMuBüÚT½reTACa IP
address nigBI IP addressmkeQµaHkMuBüÚT½rvij.
CaFmµta enAeBlEdlGñkeRbIR)as;cg;P
¢ab;eTAkMuBüÚT½rdéTeTot
GñkeRbIR)as;enaHRtUvvaynUveQµaHkMuBüÚT½r
Edlcg;P¢ab;eTAenaH
bnÞab;mkkMuBüÚT½rrbs;GñkeRbIR)as;nWgTak;Tge
TAkan; DNS Server Edl Cross-Reference
eQµaHkMuBüÚT½rEdlGñkeRbIR)as;pþl;eGayeTACa
IP Address vij. IP Address
CMBUk 2
      Éksar nig RTwsþIEdlBak;B½næ


   DNS                eFVIkareTAtamdMNak;²rbs;va
Edlmann½yfaral;eBl Client mñak; Request eTAkan;
Server             EdlmanTMnak;TMngKñaCaeRcIn.
rUbxageRkambgðajBIdMeNIr Process rbs; DNS Edl
Client request eTA Web site: www.functionx.com.
CMBUk 2
       Éksar nig RTwsþIEdlBak;B½næ

   DHCP            pþl;nUv        IP           Address
edaysV½yRbvtþieTAeGaykuMBüÚT½r
ehIyvaCaEpñkmYyrbs; Boot Protocol (BOOTP) . BOOTP
GaceGay Client enAeBl Startup Gac Configure TCP/IP
edaysV½yRbvtþi. DHCP erobcMBt’manEdlTak;Tgnwgkar
Configure TCP/IP edaysV½yRbvtþikñúgkar pþl; IP Address
eTA kuMBüÚT½redayeRbI DHCP . kareRbIR)as; DHCP
GacbM)at;nUvbBaðEdl Tak;TgnwgkareRbI IP Address
Can;Kña KWl¥Cagkñúgkarpþl; IP edayéd.
CMBUk 2
           Éksar nig RTwsþIEdlBak;B½næ
kñúgkar Cofigure DHCP Client RtUvqøgkat;nUvdMNak;kar 4 xageRkam³
    - IP lease discover : dMbUg Client RtUvkMNt;BI Version rbs; TCP/IP
nigpSBVpSaynUv sMeNIsMrab;TItaMg DHCP Server nig IP Addressing
Information.
    - IP lease offer : DHCP Server TaMgGs;EdlmannUv IP Address
EdlGaceRbI)annwg epJIpþl;eTAeGay Client.
   - IP lease request : Client cab;yknUv IP Address
BIkarpþl;eGayenAelIkdMbUg ehIyva TTYl nigpSBVpSayenA message
esñIsMukñúgkarpþl; IP Address enaH enAkñúg offer vij. - IP lease

            enAeBlEdl DHCP Server
acknowledgment :

mYyEdlbegáItnUv offer edIm,IeqøIytbnwg message
enH DHCP Server epSgeTotTaMgGs;
RtUvdkecjnUvkarpþl;
CMBUk 2
          Éksar nig RTwsþIEdlBak;B½næ
Mail Server
    Ca       Server        mYyEdlmantYnaTIkñúgkar      TTYl
rkSaTuk nig epJInUv E-Mail eTAkan; User.
dMeNIrrkarénkarbBa©Ún                      nig TTYl  E-Mail
manlkçN³RsedogKñaeTAnwgdMeNIrkar                    Program
mYy dUecñaHEdr. ral;dMeNIrkarrbs; Mail Server
Mail Server Protocol
RtUvkary:agcaM)ac;nUv mYycMnYnEdleRbIkñúg
    xageRkamCa Protocol                             Protocol
mYycMnYnedIm,IFanafa E-Mail )aneTAdl;GñkTTYl
Mail Server
RbkbedayPaBRtwmRtUv.
    - Simple Mail Transfer Protocol (SMTP)

   - Post Office Protocol Version 3 (POP3)

   - Internet Mail Access Protocol (IMAP4)

   - Hypertext Transport Protocol (HTTP)
CMBUk 2
        Éksar nig RTwsþIEdlBak;B½næ
karENnaMBI Internet Security Acceleration (ISA) 2004
   ISA    RtUv)anpliteLIgsRmab;eGaydMeNIrkarelI
Window 2000 CamYynwg Service Pack cugeRkay nig
Window Server 2003. ISA CaBakükat;mkBI Internet
Security    and       Acceleration    mann½yfa
kareFVI[mansuvtißPaB nigBenøÓnkñúgkarebIknUv
Website tamry³ Internet. CamYyKñaenHEdr ISA
RtUv)an    Land     Guard     bEnßmnUv     Tools
mYycMnYneTotdUcCa³Security, Scan Virus, Firewall,
Cache .

ISA Server Work as a Proxy and Caching Server
ISA     Server    minRtwmEtmantYnaTICa          Firewall
CMBUk 3
viFIsaRsþ nig
rcnasm<½næ
  énkarsikSa
viFIsa®sþénkarsikSaRsavRCav
       karsikSaRsavRCav nig
            RbmUlÉksar
      karsikSaelIRTwsþIEdlBa
              k;B½næ
      karviPaKelIRbB½næbc©
                úb,nñ
            karviPaK nig
      sikSaelIKMeragénRbB½
                næfµI
            karGnuvtþn_
rcnasm<½n§énkarsikSa
   karsikSaRsavRCavelIKMeragRbB½n§ Network
fµIsMrab;      rdæelxaFikardæanmuxgarsaFarN³
RtUv)anEbgEckCa 5 CMBUkFM²KW³
  CMBUk 1 ³ esckþIepþIm
  CMBUk 2 ³ Éksar nig RTwsþIEdlBak;B½n§
   CMBUk 3 ³ viFIsaRsþ nig
rcnasm<½n§énkarsikSa
  CMBUk 4 ³ karviPaK kareRKag nig
karGnuvtþn_RbB½n§énkarsikSa
CMBUk 4
  karviPaK
kareRKag nig
karGnuvtþn_
rcnasm<½n§ nig
rcnasm<½næcat;taMgenAkñúgsßab½n
 karviPaK
viPaKelIrcnasm<½n§kargarbc©úb,nñ
  eRkayBIeFVIkarsaksYr                  nig
TTYlBt’manBIm®nþIraCkar
enArdæelxaFikardæanmuxgarsaFarN³
eyIgsegáteXIjfa
RbB½n§bc©úb,nñrbs;sßab½nenH
manlkçN³Ca                        Workgroup
EdlmankuMBüÚT½rcMnYn 22 eRKOg .
edaym:asuInkuMBüÚT½rnimYy²P¢ab;eTAkan;
Hub edIm,IeRbInUv Internet bu:eNÑaH .
viPaKelIKMeragRbB½n§fµI
  eyagtamkarsikSaeTAelIRbB½n§bc©úb,nñ      )
ansegáteXIjfa RbB½n§EdlmanRsab; manlkçN³min
smRsb        nig    manPaBlM)akkñúgkarEfrkSa
edaysarEtm:asuInkuMBüÚT½rTaMgGs;RtUv)anRKb
;RKgeday
ÉkraCüBImRnþIraCkarenAkñúgEpñknimYy².
edayeXIjnUvPaBlM)akdUecñaH
eTIbRkumsikSa)anerobcMKMerag       mYy
edaypøas;bþÚrRbB½n§bc©úb,nñBIlkçN³ Workgroup
eTACaRbB½n§fµIEdlmanlkçN³Ca
viPaKelIKMeragRbB½n§fµI ¬t¦
   TnÞWmnwgenH
RkumsikSak¾)ansikSaelIcMnucmYycMnYnepSgeTotdUcC
a³
RbePTkuMBüÚTr½ Server
     RbePT Hardware
   RbePT Software sMrab; configure

RbePTkuMBüÚT½r Clients
  RbePT Hardware
  RbePT Software Installlation
karGnuvtþn_ nig karerobcM
       Install Windows Server 2003 Operating System


                      Configure DNS


                  Install Active Directory


                     Configure DHCP


                        Install RIS


          Install Microsoft Exchange Server 2003


            Install Microsoft ISA Server 2004
CMBUk 5
    segçb
snñidæan nig
pþl;Gnusasn_
esckþIsMeyaK
    karsikSaeTAelIKMeragénkarpøas;bþÚrRbB½n§
Network          BI         Peer-to-Peer  (workgroup)
eTACaRbB½½n§EdlRKb;RKgedayServerBase(Server/Clie
nt)                    )anCYysMrYleGaymanPaBgayRsYl
kñúgkarRKb;RKg                      Users         nig
kareRbIR)as;Tinñn½yCaeRcIndUcCa³
    - RKb;m®nþIraCkarTaMgGs;EdlsßitenAkñúgsßab½n
RtUv)anpþl;[nUv User Account RKb;Kña
    - erobcMCa File Server
    - erobcM Printer Server
    - eRbIR)as;nUv DHCP Server
    - erobcM Mail Server
esckþIsnñidæan
  eRkayBI)ansikSakarRKb;RKgnUvRbB½n§ Network
enA rdæelxaFikardæanmuxgarsaFarN³ mk
edaysegáteXIjfakarerobcMKMeragfµI)anpþl;nUvRbeya
Cn_y:ageRcIndl;sßab½nrdæenHmandUcCa³
  - RKb;m®nþIraCkarman User Account
gayRsYleRbIR)as; nig RKb;RKgTinñn½y
  - RKb;m®nþIraCkarman E-Mail Account GacbBa
¢ÚnBt’maneTAvijeTAmk
  - kat;bnßynUvkarcMNayy:ageRcIneTAelI
m:asuIne)aHBum< (Printer)
karpþl;Gnusasn_
 • Gnusasn_cMeBaH
   rdæelxaFikardæanmuxgarsaFarN³
 - pøas;bþÚrnUvkuMBüÚT½rcas;²mYycMnYnecj
 - KYrEterobcMrcnasm<½n§ RKb;RKgelIRbB½n§
   Network
 - bNþúHbNþalm®nþIraCkarGMBIkareRbIR)as;
   nig EfrkSakuMBüÚT½r
 • Gnusasn_cMeBaH GñksikSaeRkay²
 - dak;RbB½n§suvtßiPaBenAkñúgsßab½n
   (Firewall Security)
 - sikSabEnßm[kan;EtsuICMerAeTAelI Mail Server
sUmGrKuN

Weitere ähnliche Inhalte

Was ist angesagt?

Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS Shrey Agarwal
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみたYutaka Ishizaki
 
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid Umar
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid UmarPENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid Umar
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid UmarWalid Umar
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool Pavel Odintsov
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)Pavel Odintsov
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologySagi Brody
 
NetDevOps 202: Life After Configuration
NetDevOps 202: Life After ConfigurationNetDevOps 202: Life After Configuration
NetDevOps 202: Life After ConfigurationCumulus Networks
 
Nginx Scalable Stack
Nginx Scalable StackNginx Scalable Stack
Nginx Scalable StackBruno Paiuca
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonPavel Odintsov
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sightRob Gillen
 
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaPavel Odintsov
 
Capture-HPC talk@ OSDC.tw 2009
Capture-HPC talk@ OSDC.tw 2009Capture-HPC talk@ OSDC.tw 2009
Capture-HPC talk@ OSDC.tw 2009Da-Chang Guan
 
Solving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and ProtocolsSolving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and ProtocolsNatasha Rooney
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013Tom Paseka
 

Was ist angesagt? (20)

Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみた
 
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid Umar
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid UmarPENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid Umar
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid Umar
 
Prezentacja zimowisko 2014
Prezentacja zimowisko 2014Prezentacja zimowisko 2014
Prezentacja zimowisko 2014
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
 
NetDevOps 202: Life After Configuration
NetDevOps 202: Life After ConfigurationNetDevOps 202: Life After Configuration
NetDevOps 202: Life After Configuration
 
Jon Nield FastNetMon
Jon Nield FastNetMonJon Nield FastNetMon
Jon Nield FastNetMon
 
Nginx Scalable Stack
Nginx Scalable StackNginx Scalable Stack
Nginx Scalable Stack
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sight
 
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
 
Capture-HPC talk@ OSDC.tw 2009
Capture-HPC talk@ OSDC.tw 2009Capture-HPC talk@ OSDC.tw 2009
Capture-HPC talk@ OSDC.tw 2009
 
Solving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and ProtocolsSolving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and Protocols
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
Remote VPN
Remote VPNRemote VPN
Remote VPN
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013
 

Andere mochten auch

How to create word press
How to create word pressHow to create word press
How to create word presssroeurnsophai
 
Devopenspace 2013 slides
Devopenspace 2013 slidesDevopenspace 2013 slides
Devopenspace 2013 slidesTimur Zanagar
 
Do thi co viet nam do van ninh
Do thi co viet nam   do van ninhDo thi co viet nam   do van ninh
Do thi co viet nam do van ninhIris Hoàng
 
Innovation in Educator Evaluation:Using D-SORT
Innovation in Educator Evaluation:Using D-SORTInnovation in Educator Evaluation:Using D-SORT
Innovation in Educator Evaluation:Using D-SORTzolamoore
 
Para que sirve office a los abogados
Para que sirve office a los abogadosPara que sirve office a los abogados
Para que sirve office a los abogadosAnge Sam
 
Mi Mely &lt;3
Mi Mely &lt;3Mi Mely &lt;3
Mi Mely &lt;3Diaz69
 
пояснение к презентации 5
пояснение к презентации 5пояснение к презентации 5
пояснение к презентации 5kayrat89
 
пояснение к презентации 10
пояснение к презентации 10пояснение к презентации 10
пояснение к презентации 10kayrat89
 
Proposal ulib alam makmur ulib
Proposal ulib alam makmur ulibProposal ulib alam makmur ulib
Proposal ulib alam makmur ulibsopyanudin
 
Calendarioescolar 2009 2010ciudad Real
Calendarioescolar 2009 2010ciudad RealCalendarioescolar 2009 2010ciudad Real
Calendarioescolar 2009 2010ciudad Realnakaco78
 
MaestríA Aprender 1 Siendo Trabajo
MaestríA Aprender 1  Siendo TrabajoMaestríA Aprender 1  Siendo Trabajo
MaestríA Aprender 1 Siendo TrabajoAdalberto
 
What Is Trademark
What Is TrademarkWhat Is Trademark
What Is TrademarkStartupwala
 

Andere mochten auch (20)

How to create word press
How to create word pressHow to create word press
How to create word press
 
Bhel EC
Bhel EC Bhel EC
Bhel EC
 
Devopenspace 2013 slides
Devopenspace 2013 slidesDevopenspace 2013 slides
Devopenspace 2013 slides
 
Colt Group
Colt GroupColt Group
Colt Group
 
Do thi co viet nam do van ninh
Do thi co viet nam   do van ninhDo thi co viet nam   do van ninh
Do thi co viet nam do van ninh
 
Mely
MelyMely
Mely
 
KIMIA LINGKUNGAN
KIMIA LINGKUNGAN KIMIA LINGKUNGAN
KIMIA LINGKUNGAN
 
Innovation in Educator Evaluation:Using D-SORT
Innovation in Educator Evaluation:Using D-SORTInnovation in Educator Evaluation:Using D-SORT
Innovation in Educator Evaluation:Using D-SORT
 
Para que sirve office a los abogados
Para que sirve office a los abogadosPara que sirve office a los abogados
Para que sirve office a los abogados
 
Mi Mely &lt;3
Mi Mely &lt;3Mi Mely &lt;3
Mi Mely &lt;3
 
пояснение к презентации 5
пояснение к презентации 5пояснение к презентации 5
пояснение к презентации 5
 
пояснение к презентации 10
пояснение к презентации 10пояснение к презентации 10
пояснение к презентации 10
 
Proposal ulib alam makmur ulib
Proposal ulib alam makmur ulibProposal ulib alam makmur ulib
Proposal ulib alam makmur ulib
 
ACH Payments - Banking Fraud
ACH Payments - Banking FraudACH Payments - Banking Fraud
ACH Payments - Banking Fraud
 
Zombies & emergencies
Zombies & emergenciesZombies & emergencies
Zombies & emergencies
 
Physics quiz problem
Physics quiz problemPhysics quiz problem
Physics quiz problem
 
Buletin 02 2016
Buletin 02 2016Buletin 02 2016
Buletin 02 2016
 
Calendarioescolar 2009 2010ciudad Real
Calendarioescolar 2009 2010ciudad RealCalendarioescolar 2009 2010ciudad Real
Calendarioescolar 2009 2010ciudad Real
 
MaestríA Aprender 1 Siendo Trabajo
MaestríA Aprender 1  Siendo TrabajoMaestríA Aprender 1  Siendo Trabajo
MaestríA Aprender 1 Siendo Trabajo
 
What Is Trademark
What Is TrademarkWhat Is Trademark
What Is Trademark
 

Ähnlich wie Presentation netwok year 3

Computer graphic
Computer graphicComputer graphic
Computer graphicChhay Teng
 
Autiting policy (1)
Autiting policy (1)Autiting policy (1)
Autiting policy (1)kutmdoc
 
Standard2
Standard2Standard2
Standard2kutmdoc
 
Construction design drawing practice
Construction design drawing practiceConstruction design drawing practice
Construction design drawing practiceChhay Teng
 
Kutm new accounting1
Kutm new accounting1Kutm new accounting1
Kutm new accounting1kutmdoc
 
Riks mangement policy
Riks mangement policyRiks mangement policy
Riks mangement policykutmdoc
 
Strategic plan policy
Strategic plan policyStrategic plan policy
Strategic plan policykutmdoc
 
Xvii design of two way slab
Xvii design of two way slabXvii design of two way slab
Xvii design of two way slabChhay Teng
 
Xii slender column
Xii slender columnXii slender column
Xii slender columnChhay Teng
 
Computer repair hand book
Computer repair hand bookComputer repair hand book
Computer repair hand bookRoth Tithvisal
 
Final qa policy
Final qa policyFinal qa policy
Final qa policykutmdoc
 
7.simple connections
7.simple connections7.simple connections
7.simple connectionsChhay Teng
 
Kutm hr strategic plan
Kutm hr strategic planKutm hr strategic plan
Kutm hr strategic plankutmdoc
 
socialbuddhism Mut Somoeun
socialbuddhism Mut Somoeunsocialbuddhism Mut Somoeun
socialbuddhism Mut SomoeunMut Somoeun
 
Socialbuddhism mut somoeun.pdf
Socialbuddhism mut somoeun.pdfSocialbuddhism mut somoeun.pdf
Socialbuddhism mut somoeun.pdfMut Somoeun
 
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤Vantha Kago
 
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤Vantha Kago
 
Project maha eang khut.plan sangkum thor
Project maha eang khut.plan sangkum thorProject maha eang khut.plan sangkum thor
Project maha eang khut.plan sangkum thorVen Eang Khut
 

Ähnlich wie Presentation netwok year 3 (20)

Computer graphic
Computer graphicComputer graphic
Computer graphic
 
Autiting policy (1)
Autiting policy (1)Autiting policy (1)
Autiting policy (1)
 
Standard2
Standard2Standard2
Standard2
 
Constitution khmer
Constitution khmerConstitution khmer
Constitution khmer
 
Construction design drawing practice
Construction design drawing practiceConstruction design drawing practice
Construction design drawing practice
 
Desing slab by robot
Desing slab by robotDesing slab by robot
Desing slab by robot
 
Kutm new accounting1
Kutm new accounting1Kutm new accounting1
Kutm new accounting1
 
Riks mangement policy
Riks mangement policyRiks mangement policy
Riks mangement policy
 
Strategic plan policy
Strategic plan policyStrategic plan policy
Strategic plan policy
 
Xvii design of two way slab
Xvii design of two way slabXvii design of two way slab
Xvii design of two way slab
 
Xii slender column
Xii slender columnXii slender column
Xii slender column
 
Computer repair hand book
Computer repair hand bookComputer repair hand book
Computer repair hand book
 
Final qa policy
Final qa policyFinal qa policy
Final qa policy
 
7.simple connections
7.simple connections7.simple connections
7.simple connections
 
Kutm hr strategic plan
Kutm hr strategic planKutm hr strategic plan
Kutm hr strategic plan
 
socialbuddhism Mut Somoeun
socialbuddhism Mut Somoeunsocialbuddhism Mut Somoeun
socialbuddhism Mut Somoeun
 
Socialbuddhism mut somoeun.pdf
Socialbuddhism mut somoeun.pdfSocialbuddhism mut somoeun.pdf
Socialbuddhism mut somoeun.pdf
 
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
 
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
ប្រវត្តិព្រះអសីតិមហាសាវ័ក​ ភាគ៤
 
Project maha eang khut.plan sangkum thor
Project maha eang khut.plan sangkum thorProject maha eang khut.plan sangkum thor
Project maha eang khut.plan sangkum thor
 

Kürzlich hochgeladen

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Kürzlich hochgeladen (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Presentation netwok year 3

  • 1. RBHraCaNacRkkm<úCa ½yPUminÞPñMeBj Cati sasna RBHm al½y viTüasaRsþ akMuBüÚT½r eroberognigcgRkgeday 1> Sroeurn Sophai 2> Sok Bunthath ENnaMedaysaRsþacarü 3> Ra Vichet Hang Vannak 4> Huot Leaing
  • 2. CMBUk 1 esckþIepþIm CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ CMBUk 3 viFIsaRsþ nig rcnasm<½næénkarsikSa CMBUk 4 karviPaK kareRKag nig karGnuvtþn_
  • 4. mUldæanénkarsikSa rdæelxaFikardæanmuxgarsaFarN³ KWCasßab½nkNþalmYy EdlmantYnaTIRKb;RKgral;Bt’man EdlTak;Tgnigm®nþIraCkarRKb;sßab½n elIkElgEtsßab½ntulakar nig nitibBaØati kñúgenaHrYmmanTaMgR)ak; ebovtS nigkardMeLIgzannþrs½kþi eyageTAtamKuNsm,tþi nigKuNvibtþirbs;m®nþIraCkarmñak;².
  • 5. karkMNt;bBaðaénkarsikSa karbBa¢Ún nigTTYlBt’man CabBaðacMbgrbs; rdæelxaFikardæanmuxgarsaFarN³ edIm,IerobcMsMNuM Éksar nwgbBa ¢ÚneTAsßab½nbnÞab;. TnÞwmnwgenH karrerobcMsMNuMÉksarenAkñúgsßab½nkan;Etm ansPaB eRcIneLIg² dUecñHeFVIeGaykic©karmYycMnYnRtUv)ankksÞ H. eRkayBI)ancuHsYrBt’man
  • 6. karkMNt;bBaðaénkarsikSa ¬t¦ - Bi)akkñúgkarbBa¢ÚnÉksar dUcCakarbBa ¢ÚnmanPaByWty:aveRBaHÉksarmYycMnYnRtUv eFVIedayéd - cMNayeBlevla nig fvikareRcIn edIm,IedaHRsaybBaðaeBlkuMBüÚT½rmanemeraK - Bi)aknUvkarRKb;RKgeTAelIkMuBüÚT½r Clients edaysarEtkuMBüÚT½reRbIkñúgsßab½n CalkçN³ Workgroup.
  • 7. eKalbMNgénkarsikSa eyageTAtamplvi)ak nigbBaðaEdl)anekIteLIgxagelI eTIbRkumkarsikSa)anerobcMCaKMerag edIm,IsikSaeTAelI RbB½n§ Network nigkarEklMGedayepþatelIeKalbMNgmYycMnY ndUcxageRkam³ - dMeLIg Server edIm,IRKb;RKgral; Users nig kMuBüÚT½r
  • 8. CMBUk 1 esckþIepþIm TMhM nigEdnénkarsikSa edaysarEtkarcuHkmµsikSaenA rdæelxaFikardæanmuxgarsaFarN³ manry³eBlxøI dUecñaHehIy KMeragénkarEklMG nigRKb;RKgRbB½n§ Network enArdæelxaFikardæanmuxgarsaFarN³ enaHBMuTan;man lkçN³eBjeljenAeLIyeT. - erobcMnUv Files Server edIm,IkMnt;siTiædl; User nimYy² nwgpþl;TMhM Space dl;m®nþIraCkar edIm,IrkSaTukÉksareTAelIkMuBüÚT½r Server - GacrkSaral;Tinñn½y[mansuvtßiPaBmingay)at;bg;
  • 9. CMBUk 1 esckþIepþIm TMhM nigEdnénkarsikSa ¬t¦ - min)andMeLIg Microsoft ISA 2004 Ca Firewall - cMeBaH Microsoft Exchange 2003 min)ansikSaeGaysIuCMerAelI Public Folder nig Web Access.
  • 10. CMBUk 1 esckþIepþIm plRbeyaCn_énkarsikSa eRkayBI)ansikSaeTAelIKMeragénRbB½n§ Network enAkñúg rdæelxaFikardæanmuxgarsaFarN³ mk )anpþl;GtßRbeyaCn_y:ageRcIndUcxageRkam ³ - gayRsYlkñúgkarRKb;RKg m®nþIraCkarkñúgkareRbIR)as;kuMBüÚT½r - gayRsYlkñúgkareRbIR)as;]bkrN_rYmKña nigpøas;bþÚrÉksareGayKñaeTAvijeTAmk - eFVIeGayTinñn½ykan;EtmansuvtßiPaB karBarBIkar)at;bg;nUvÉksarsMxan;;²
  • 11. CMBUk 1 esckþIepþIm plRbeyaCn_énkarsikSa ¬t¦ - pþl;bTBiesaFn_kargarCak;EsþgkñúgsgÁm nigyl;dwgeRcInelIEpñk Network - pþl;nUvcMeNHdwgBIbec©kviTüafµI²rbs; Network TaMg Hardware nig Software - yl;kan;EteRcInBIKuNsm,tþi nig KuNvibtþiBIRbB½n§ Network - CaÉksarsMrab;nisSit
  • 12. CMBUk 2 Éksar nig RTwsþIEdlB
  • 13. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ 1> Éksar Ep¥keTAelIBt’manEdl)ansaksYr nigÉksarEdlRbmUl)ansMrab;karRKb;RKgRb B½n§ Network enAkñúgrdæelxaFikardæanmuxgarsaFarN³ mandUcCa³ - RbB½n§ Network bc©úb,nñ enArdæelxaFikardæanmuxgarsaFarN³ - cMnYnkuMBüÚT½r EdlkMBugEteRbIR)as;
  • 14. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ 2> RTwsþIBak;B½n§kñúgkardMeLIgRb B½n§ karENnaMBIRbB½n§ Computer Network Computer Network CakartP ¢ab;rvagkuMBüÚT½rcab;BIBIr b¤ eRcInkuMBüÚT½r eGaysÁal;Kña CaBiessenAkñúgenHpgEdrGñkeRbIR)as;nUv RbB½næ Network enHGac Share Files, Printer, b¤k¾ Share Resource eGayKñaeTAvijeTAmk.
  • 15. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ RbePTExS cMeBaHExSEdleRbIR)as;sMrab;TMnak;TMngrvagkM uBüÚT½rkñúgRbB½næ Network man 3 RbePT ³ - ExS Coaxial : KWCaExSEdlbegáIteLIgmansréscMlgcrnþenAcMkNþ al nig RsTab;B½n§CMuvij ehIysMNaj;GackarBarrlk¬crnþ¦enAeRkA. ExS Coaxial EdleRbIR)as;enAkñúg LAN manBIrRbePTKW³ Thinnet Coaxial nig Thicknet Coaxial. - ExS Twisted-Pair : CaRbePTExSEdlmaneRcInsrésevjcUlKña edIm,IkarBarkarrMxanBIrlk GKÁisnIxageRkA. ExS Twisted-Pair
  • 16. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ karENnaMBI Network Topology Network Topology KWCa Configuration b¤ Physical Layout énkarP¢ab;bNþaj Network enAelI LAN EtmYy b¤ enAcenøaHBI LAN 2 b¤eRcIn. enAkñúg Network Basic Topologies eKEbgEck Topology cMnYn 4 FM²KW³ - Bus Topology - Star Topology - Ring Topology - Mesh Topology ]bkrN_sMrab;P¢ab;enAkñúg Network ]bkrN_EdleRbIsMrab;P¢ab;enAkñúgbNþaj Network EdlsMxan;²mandUcCa³ Modem, Hubs,
  • 17. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ Open Systems Interconnection (OSI) Reference Model enAqñaM 1984 OSI Reference Model RtUv)anbegþIteLIgedayGgÁkar International Standard Organization (ISO) sMrab;eRbIelI Data Communication TaMgGs;. OSI Reference Model Ca Architecture EdlEbgEck Network Communication Ca 7 Layers ehIyRKb; Layers TaMgGs;mantYnaTIepSg²BIKña.
  • 18. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ karENnaMGMBI Microsoft Windows Server 2003 Active Directory Microsoft Windows Server 2003 Active Directory Ca Directory Server cugeRkayeKbg¥s;rbs; Microsoft ehIyvapþl;nUv Directory Service EdlmanRbsiT§iPaBx<s; kñúgkaRKb;RKg Users , tYnaTIrbs; kuMBüÚT½r. minEtb:ueNÑaH Active Groups nig Active Directory Directory pþl;nUv Security kñúgkareRbIR)as; Active Directory pþl;nUvtYnaTIdUcxageRkam³ Resources enAelIRbB½n§ Network. - Centralizes Control of Network Resources - Centralizes and Decentralizes Resource Management - Stores Objects Security in a Logical Structure - Optimizes Network Traffic
  • 19. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ karENnaMBI Domain Name System (DNS) DNS mantYnaTIbkERbBIeQµaHkMuBüÚT½reTACa IP address nigBI IP addressmkeQµaHkMuBüÚT½rvij. CaFmµta enAeBlEdlGñkeRbIR)as;cg;P ¢ab;eTAkMuBüÚT½rdéTeTot GñkeRbIR)as;enaHRtUvvaynUveQµaHkMuBüÚT½r Edlcg;P¢ab;eTAenaH bnÞab;mkkMuBüÚT½rrbs;GñkeRbIR)as;nWgTak;Tge TAkan; DNS Server Edl Cross-Reference eQµaHkMuBüÚT½rEdlGñkeRbIR)as;pþl;eGayeTACa IP Address vij. IP Address
  • 20. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ DNS eFVIkareTAtamdMNak;²rbs;va Edlmann½yfaral;eBl Client mñak; Request eTAkan; Server EdlmanTMnak;TMngKñaCaeRcIn. rUbxageRkambgðajBIdMeNIr Process rbs; DNS Edl Client request eTA Web site: www.functionx.com.
  • 21. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ DHCP pþl;nUv IP Address edaysV½yRbvtþieTAeGaykuMBüÚT½r ehIyvaCaEpñkmYyrbs; Boot Protocol (BOOTP) . BOOTP GaceGay Client enAeBl Startup Gac Configure TCP/IP edaysV½yRbvtþi. DHCP erobcMBt’manEdlTak;Tgnwgkar Configure TCP/IP edaysV½yRbvtþikñúgkar pþl; IP Address eTA kuMBüÚT½redayeRbI DHCP . kareRbIR)as; DHCP GacbM)at;nUvbBaðEdl Tak;TgnwgkareRbI IP Address Can;Kña KWl¥Cagkñúgkarpþl; IP edayéd.
  • 22. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ kñúgkar Cofigure DHCP Client RtUvqøgkat;nUvdMNak;kar 4 xageRkam³ - IP lease discover : dMbUg Client RtUvkMNt;BI Version rbs; TCP/IP nigpSBVpSaynUv sMeNIsMrab;TItaMg DHCP Server nig IP Addressing Information. - IP lease offer : DHCP Server TaMgGs;EdlmannUv IP Address EdlGaceRbI)annwg epJIpþl;eTAeGay Client. - IP lease request : Client cab;yknUv IP Address BIkarpþl;eGayenAelIkdMbUg ehIyva TTYl nigpSBVpSayenA message esñIsMukñúgkarpþl; IP Address enaH enAkñúg offer vij. - IP lease enAeBlEdl DHCP Server acknowledgment : mYyEdlbegáItnUv offer edIm,IeqøIytbnwg message enH DHCP Server epSgeTotTaMgGs; RtUvdkecjnUvkarpþl;
  • 23. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ Mail Server Ca Server mYyEdlmantYnaTIkñúgkar TTYl rkSaTuk nig epJInUv E-Mail eTAkan; User. dMeNIrrkarénkarbBa©Ún nig TTYl E-Mail manlkçN³RsedogKñaeTAnwgdMeNIrkar Program mYy dUecñaHEdr. ral;dMeNIrkarrbs; Mail Server Mail Server Protocol RtUvkary:agcaM)ac;nUv mYycMnYnEdleRbIkñúg xageRkamCa Protocol Protocol mYycMnYnedIm,IFanafa E-Mail )aneTAdl;GñkTTYl Mail Server RbkbedayPaBRtwmRtUv. - Simple Mail Transfer Protocol (SMTP) - Post Office Protocol Version 3 (POP3) - Internet Mail Access Protocol (IMAP4) - Hypertext Transport Protocol (HTTP)
  • 24. CMBUk 2 Éksar nig RTwsþIEdlBak;B½næ karENnaMBI Internet Security Acceleration (ISA) 2004 ISA RtUv)anpliteLIgsRmab;eGaydMeNIrkarelI Window 2000 CamYynwg Service Pack cugeRkay nig Window Server 2003. ISA CaBakükat;mkBI Internet Security and Acceleration mann½yfa kareFVI[mansuvtißPaB nigBenøÓnkñúgkarebIknUv Website tamry³ Internet. CamYyKñaenHEdr ISA RtUv)an Land Guard bEnßmnUv Tools mYycMnYneTotdUcCa³Security, Scan Virus, Firewall, Cache . ISA Server Work as a Proxy and Caching Server ISA Server minRtwmEtmantYnaTICa Firewall
  • 26. viFIsa®sþénkarsikSaRsavRCav karsikSaRsavRCav nig RbmUlÉksar karsikSaelIRTwsþIEdlBa k;B½næ karviPaKelIRbB½næbc© úb,nñ karviPaK nig sikSaelIKMeragénRbB½ næfµI karGnuvtþn_
  • 27. rcnasm<½n§énkarsikSa karsikSaRsavRCavelIKMeragRbB½n§ Network fµIsMrab; rdæelxaFikardæanmuxgarsaFarN³ RtUv)anEbgEckCa 5 CMBUkFM²KW³ CMBUk 1 ³ esckþIepþIm CMBUk 2 ³ Éksar nig RTwsþIEdlBak;B½n§ CMBUk 3 ³ viFIsaRsþ nig rcnasm<½n§énkarsikSa CMBUk 4 ³ karviPaK kareRKag nig karGnuvtþn_RbB½n§énkarsikSa
  • 28. CMBUk 4 karviPaK kareRKag nig karGnuvtþn_
  • 30. viPaKelIrcnasm<½n§kargarbc©úb,nñ eRkayBIeFVIkarsaksYr nig TTYlBt’manBIm®nþIraCkar enArdæelxaFikardæanmuxgarsaFarN³ eyIgsegáteXIjfa RbB½n§bc©úb,nñrbs;sßab½nenH manlkçN³Ca Workgroup EdlmankuMBüÚT½rcMnYn 22 eRKOg . edaym:asuInkuMBüÚT½rnimYy²P¢ab;eTAkan; Hub edIm,IeRbInUv Internet bu:eNÑaH .
  • 31. viPaKelIKMeragRbB½n§fµI eyagtamkarsikSaeTAelIRbB½n§bc©úb,nñ ) ansegáteXIjfa RbB½n§EdlmanRsab; manlkçN³min smRsb nig manPaBlM)akkñúgkarEfrkSa edaysarEtm:asuInkuMBüÚT½rTaMgGs;RtUv)anRKb ;RKgeday ÉkraCüBImRnþIraCkarenAkñúgEpñknimYy². edayeXIjnUvPaBlM)akdUecñaH eTIbRkumsikSa)anerobcMKMerag mYy edaypøas;bþÚrRbB½n§bc©úb,nñBIlkçN³ Workgroup eTACaRbB½n§fµIEdlmanlkçN³Ca
  • 32. viPaKelIKMeragRbB½n§fµI ¬t¦ TnÞWmnwgenH RkumsikSak¾)ansikSaelIcMnucmYycMnYnepSgeTotdUcC a³ RbePTkuMBüÚTr½ Server RbePT Hardware RbePT Software sMrab; configure RbePTkuMBüÚT½r Clients RbePT Hardware RbePT Software Installlation
  • 33. karGnuvtþn_ nig karerobcM Install Windows Server 2003 Operating System Configure DNS Install Active Directory Configure DHCP Install RIS Install Microsoft Exchange Server 2003 Install Microsoft ISA Server 2004
  • 34. CMBUk 5 segçb snñidæan nig pþl;Gnusasn_
  • 35. esckþIsMeyaK karsikSaeTAelIKMeragénkarpøas;bþÚrRbB½n§ Network BI Peer-to-Peer (workgroup) eTACaRbB½½n§EdlRKb;RKgedayServerBase(Server/Clie nt) )anCYysMrYleGaymanPaBgayRsYl kñúgkarRKb;RKg Users nig kareRbIR)as;Tinñn½yCaeRcIndUcCa³ - RKb;m®nþIraCkarTaMgGs;EdlsßitenAkñúgsßab½n RtUv)anpþl;[nUv User Account RKb;Kña - erobcMCa File Server - erobcM Printer Server - eRbIR)as;nUv DHCP Server - erobcM Mail Server
  • 36. esckþIsnñidæan eRkayBI)ansikSakarRKb;RKgnUvRbB½n§ Network enA rdæelxaFikardæanmuxgarsaFarN³ mk edaysegáteXIjfakarerobcMKMeragfµI)anpþl;nUvRbeya Cn_y:ageRcIndl;sßab½nrdæenHmandUcCa³ - RKb;m®nþIraCkarman User Account gayRsYleRbIR)as; nig RKb;RKgTinñn½y - RKb;m®nþIraCkarman E-Mail Account GacbBa ¢ÚnBt’maneTAvijeTAmk - kat;bnßynUvkarcMNayy:ageRcIneTAelI m:asuIne)aHBum< (Printer)
  • 37. karpþl;Gnusasn_ • Gnusasn_cMeBaH rdæelxaFikardæanmuxgarsaFarN³ - pøas;bþÚrnUvkuMBüÚT½rcas;²mYycMnYnecj - KYrEterobcMrcnasm<½n§ RKb;RKgelIRbB½n§ Network - bNþúHbNþalm®nþIraCkarGMBIkareRbIR)as; nig EfrkSakuMBüÚT½r • Gnusasn_cMeBaH GñksikSaeRkay² - dak;RbB½n§suvtßiPaBenAkñúgsßab½n (Firewall Security) - sikSabEnßm[kan;EtsuICMerAeTAelI Mail Server