Professional Documents
Culture Documents
INTRODUCTION
1.1 BACKGROUND
Nowadays, human needs in the ever-increasing data access, is due to the shifting patterns
of human life towards a more evolved. With the use of computers this can be facilitated
quickly. The result will be the efficiency of time, cost and resources, so it will generate
optimum output. On the other hand the need for data access that is blocked by the presence of
distance and time, sometimes we need access to our brothers who are in different countries.
With the computer network, it can be resolved. Not only the distance but the time
difference can always be accessed. for example when we want information that has past.
Internet and World Wide Web (WWW) is very popular all over the world. Many people are
in need of Internet-based applications, such as E-Mail and Web access via the internet. So
that more and more businesses are developing applications running over the Internet.
In this paper we are called computer networks group 9 will discuss the details of the
computer network as a condition of final exams.
Page 1
2. Personal Communication
In order to get better understanding of the topic, the group has done personal
communication with colleagues who have better knowledge on the Computer Networks
Page 2
CHAPTER II
DISCUSSION
Page 3
1.
Figure I.1 Two types of broadcast networks. (a) Bus. (b) Ring
There are several kinds of topologies that can be used on a LAN broadcast. Figure
1.1 illustrates two of the existing topologies. In the bus network (ie cable liner), at a
time of a machine to act as a master and is allowed to send packets. Other machines
need to refrain from sending any. So to prevent conflict, when two or more machines
want to transmit simultaneously, then the necessary regulatory mechanisms.
Regulatory mechanism can take the form centralized or distributed. IEEE 802.3
Ethernet is popularly called a bus broadcast network with decentralized controllers
[ Brief Review on Computer Networks ]
Page 4
that operate at speeds of 10 to 100 Mbps. The computers on the Ethernet can be sent
at any time they want, when two or more packets collide, each computer then waited
enough with the random waiting time before repeating again shipping.
Other broadcast system is the ring, on the topology of each bit is sent to the
surrounding area without waiting for the complete package is received. Usually
every bit around the ring in the time required to transmit a few bits, often even
before the complete packet is sent entirely. Like the other broadcast system, some
rules have to be met simultaneously to control access to the ring. IEEE 802.5 (token
ring) is a popular ring LANs operating at speeds between 4 to 16 Mbps.
Based on the channel allocations, broadcast networks can be divided into two,
namely static and dynamic. Static allocation type can be divided based on discrete
time intervals and the round robin algorithm, which allows each machine to
broadcast only when its time slot has been received. Static allocation is often a waste
of channel capacity when an engine no longer has to be done at the time slot
allocation is received. Because the system tend to allocate most of its channel
dynamically (that is based on need).
Method for the dynamic allocation of a channel can be centralized or
decentralized. In the centralized channel allocation methods are a single entity, such
as a bus controller unit, which determines who the next turn. This packet delivery
can be made upon receipt of a turn and make decisions related to an internal
algorithm. In the decentralized method of channel allocations, there is no central
entity, each machine must be able to determine themselves whether or not to send
any.
Advantage Network LAN:
1. Exchange of files can be done easily (File Sharing).
2. Use of the printer can be done by any client (printer sharing).
3. Data files can be stored on the server, so that data can be accessed from any
client securities under the authorization of all employees, which can be made
based on the company's organizational structure so that data security is
ensured.
[ Brief Review on Computer Networks ]
Page 5
modem.
2.
Page 6
3.
Page 7
Subnet containing such principle is called subnet point-to-point, store-andforward, or packet-switched. Almost all WAN (except that use satellite) has a subnet
store-and-forward.
In the subnet using point-to-point, which is an important design issue is the choice
of interconnection topology router. Figure 1.3 describes several possible topologies.
Usually shaped symmetrical topology LAN, WAN generally bertopologi otherwise
uncertain.
Page 8
c. Documents / files are usually sent by fax or postal packet, can be sent via e-mail
and transfer files from / to the head office and branch offices with a relatively
low cost and in a very quick period of time.
d. Data Updating Data Pooling and between offices can be done every day at the
specified time.
e. Can Back up data on another computer without having to disassemble the hard
drive.
4.
Page 9
If we talk about the company's internet connection, we see that one of the
universities use the same connection for all its departments. In CAN (Campus Area
Network), such as an Internet connection, the company has been dealing with the
whole organization.
5.
6.
Internet
It is a combination of various LAN and WAN computer network located
throughout the world. Forming a network with a broader scale and global terms
Internet networks typically use TCP / IP protocol to transmit data packets coming
from the internet (interconnected networks) which means that the relationship of a
variety of computer networks in the world are integrated with each other to form a
communication global terms.
7.
Wireless Network
Mobile computers such as notebook computers and Personal Digital Assistants
(PDA), a branch of the computer industry's most rapid growth. Many types of
computer owners who actually have had desktop machines installed on a LAN or
WAN, but because it is not possible cable connections are made in a car or airplane,
so many are interested in having a computer to the network without wires.
Page 10
Wireless network has many benefits, which have been commonly known is the
portable office. People who were on their way often want to use their portable
electronic devices to send or receive telephone, fax, e-mail, read the file remotely
login to the remote machine, and so on and also want to do these things anywhere,
land, sea, air. Wireless networks is very useful to overcome the above problems.
Table 1.1 Combination of wireless networks and mobile computing
Wireless
Mobile
Aplication
No
No
No
Yes
Yes
No
Yes
Yes
Although wireless networks and computing systems that can be moved around
often closely linked, in fact not the same, as shown in table 1.1. Sometimes portable
computer using a cable as well, that is when someone who is on his way to connect
the portable computer to the phone jack in a hotel, then we have the mobility that is
not the network without wires. Conversely, there are also computers that use a
wireless network but not portable, it can happen when the computers connected to
the LAN using a wireless communications facility (radio).
Although wireless networks is quite easy to be installed, but this kind of networks
has many shortcomings. Usually wireless networks have the ability of 1-2 Mbps,
which is much lower compared to the wired network. Error rate is also often times
larger, and the transmission of different computers can interfere with each other.
The following characteristics are used to classify different types of networks:
1. Topology: Is a geometric arrangement of a computer system. Topologies include
bus, star, ring, mesh, fully connected, line, tree.
Page 11
a. BUS Topology
The first type is a bus which is the first of its kind in the Ethernet networking
technology and consists of a coaxial cable that connects to all the other computers on
a network where each computer is connected to the BNC connector type T. The
following figure shows the type of bus.
All computers communicate over the same bus, so bus is also a logical topology
as well. The bus topology is generally in need of collision detection algorithm (CD collision detection) or collision avoidance (CA - collision avoidance) because of the
nature of this bus is a broadcast to all computers that are vulnerable packet collisions.
Page 12
Advantages:
1. Saving Cable
2. Layout simple cable
3. Easily developed
Disadvantages:
1. Detection and fault isolation is very small
2. Traffic density
3. When one client is damaged, then the network can not function.
4. Required repeaters for long-distance
b. Star Topology
The second type is the Star. Star just as you pull the network cable to the center of
each computer concentration as Switch, that's the basic concept of a star topology.
Switching the switch handle outbound traffic to other nodes in the network. The
following diagram shows the picture of a star topology.
Advantages:
1. Most flexible
2. Installations / change station is very easy and does not interfere with other parts of
the network
3.
Centralized control
4.
5.
Page 13
Disadvantages:
1. Wastage cable
2.
3.
c. Ring Topology
Third computer network topology is the Ring. Compared Bus and Star, Ring is
more complex but offers an interesting feature. Nodes communicate with Ring
formation, with each node communicates directly only with the upstream and
downstream neighbors.
The following figure shows the ring that often implemented physically as Star.
Advantages:
1. Saving Cable
Disadvantages:
1. Sensitive error
2. Development of a more rigid network
Page 14
d. Mesh Topology
Other LAN computer network topology is a mesh that is a relationship with each
other among multiple nodes. Generally, a mesh intended for redundancy purposes.
Each campus network must apply a mesh to achieve a level of redundancy and fault
tolerance is a requirement of the business data network them.There are two types of
mesh and full mesh partial mesh. Full mesh - each node interconnected with each
other with its own dedicated line while partial as the name suggests has a track only a
part according to the requirement.
The following figure shows the mesh in general, any device / node has a
connection to every other device on the network.
Advantages:
1.Partial mesh designed to provide redundancy where it is needed.
Disadvantages:
1. Full mesh is not very practical except for small scale networks.
2.
Page 15
e. Tree Topology
Tree topology is a network topology tree (Tree) network topology is called as
well as a multilevel network topology. This topology is commonly used for
interconnection between different central hierarchy.
Advantages:
1. Like a star topology devices connected to the control center / HUB.
2. But the HUB is divided into two, the central HUB, HUB and secondary,
3. This tree topology has the advantage over able to reach greater distance by
activating the Repeater function owned by HUB.
Disadvantages:
1. Cable used be a lot more careful planning so that necessary arrangements,
including the layout of the room.
f. Line Topology
Line topology is the topology of rare works by connecting each host to a host
which is located on the right.
Advantages:
1. Save cables
2. Layout simple cable
Disadvantages:
1. Detection and Isolation of error is very small
Page 16
supports
communication
unreliable
(unreliable),
without
connection
(connectionless) between the hosts in the network using TCP / IP. This protocol is
defined in RFC 768.
Page 17
Internet such as web browsers or e-mail, where DNS helps map the host name to an
IP address of a computer.
d. Point-to-Point Protocol
Point-to-Point Protocol (PPP) is a network packet encapsulation protocol that is
widely used in wide area network (WAN). This protocol is an industry standard that
runs on the data-link layer and developed in the early 1990s as a response to the
problems that occur in protocol Serial Line Internet Protocol (SLIP), which only
supports static IP addressing to its clients. Compared with its predecessor (SLIP), PPP
is much better, considering this protocol work faster, offers error correction, and
negotiation sessions dynamically without any intervention from the user. In addition,
this protocol also supports many network protocols simultaneously. PPP is defined in
RFC 1661 and RFC 1662.
Page 18
standard authentication methods, which use the user name and password are sent in
unencrypted form.
1. Hybrid Network
This network is a combination of the nature of the peer-to-peer and client / server.
Workgroup is composed of several computers connected together to manage
resources without requiring authorization from the network or server administrator. In
this network, there is also the nature of the client / server network so that security
levels can be maintained and the presence of servers having a certain service
functions, such as file servers, print servers, database servers, mail servers, and
others.
Page 19
Decentralization of resources placed on each member of the network, and does not
require network administrators.
The flow of information can flow between two computers directly, wherever.
However, this network is not completely free without control, they can use a
password to protect files and folders, can also be set so that certain people can not use
certain peripherals.
Because of the ease of installation, maintenance, and cost, this network is more
popular with the number of computer network that is slightly (about 2 to 20
computers).
This network can be set up so that each client must log on to the server
before it can take advantage of the resources that are connected to the server. The
server then authenticates the client and verify that the client computer used to have
Page 20
permission to log on to the network, by checking the client's username and password
against a database on the server.
1. Hardware
For computer network or LAN (Local Area Network) contains some simple hardware
components or very important and is the main requirement. The hardware in question
include:
Wireless LAN
Swicth Wireless
UTP Cable
Telephone Cable
Conector
VDSL Converter
UPS if needed
Page 21
The equipment is standard and there should be a need for a network. Then when
the computer network in your office will be upgraded or greater must be added some
other hardware such as:
Repeater
Bridge
Router
Gateway
Page 22
1.3 Switch
Switch or better known as a LAN switch is an extension of the concept of
bridge. There are two basic architectures used in switches, namely cut-through
and store-and-forward. Cut-through switches have advantages in terms of speed
because when a packet arrives, the switch only pay attention to the destination
address before being forwarded to the goal segment. While the switch store-andforward is the opposite of cut-through switches. This switch receives and analyzes
the entire packet before it forwards it to the destination and to check the package
requires time, but it allows the switch to detect and prevent damage to the
package so as not to disrupt the network.
Page 23
1.4 Router
Routers work in a manner similar to switches and bridges. The difference,
the router is a filter or filters data traffic. Filtering is done by using a specific
protocol. The router is basically a divider network devices logically instead of
physically. For example, an IP router can divide a network into several subnets so
that only traffic destined for a specific IP address that can flow from one segment
to another. An example could be a regular network LAN (Local Area Network) or
WAN (Wide Area Network) or a global network such as the Internet.
2. Software
As has been described above that the software mentioned in this paper is the
software including the operating system that is used in building a network, either a
Windows-based network (Workgroup or Client Server) as well as other operating
systems. However, in this paper I limit it to just use Microsoft's operating system
products, namely Microsoft Windows family.
Page 24
For those of you who want to build a small network with Workgroup, can use the
operating system Microsoft Windows XP , Windows Vista or Windows 2000
Professional .
Page 25
Page 26
CHAPTER III
CLOSING
3.1. CONCLUSION
Computer Networking is the solution to human needs in accessing the data, this is
reflected by the growing computer network demand, both small and large in scope.
Users of these services was not limited only at certain groups, but has spread to
almost all the computer users.
Computer networks provide a good side and a bad side. One bright side is that
there are big potential on efficiency of resource usage, time acceleration and money
savin in accesing it.. However, there are also potential negative impacts done by
people who are not responsible, such as data theft by haecker for their personal
advantage, accessing porn sites, hacking accounts and other cyber crime cases.
Eventually, the above mentioned side effects are depending onn the intention of
the users, and on how to position themselves in undertaking the technology
3.2. RECOMMENDATION
In the era of increasingly sophisticated technology, everyone can have more
access to the internetin the entire world .Our suggestion to the potential users is to
take most advantages in utilizing computer networks wisely. Wise use of computer
networks will result a great affect in their daily life..So, take advantage of all of them
for good.
Page 27
REFERENCES
Yuhefizar, ilmukomputer.com
Cv-Sysneta, http://www.jaringan-komputer.cv-sysneta.com/
Page 28