Showing posts with label Computer Network. Show all posts
Showing posts with label Computer Network. Show all posts

Tips Sharing Data Folder on the Computer Network

Tips and How To Sharing Data Folder on the Network / Network Computer PC - Windows

The purpose of this technique is to share access to another user on a folder that you want. You can choose to which users are able or allowed access to your folders and can also provide access to all the people who exist on the network or your network.
Steps or stages of sharing folders in Windows 98/Me/2000/XP:
  1. Right click on the folder that you want to distribute access.
  2. Select the 'sharing' or 'sharing and security'
  3. Select 'Share this folder to the network' on windows xp or directly specify the folder name display.
  4. Choose anyone or any user has access to your folders and type of access rights. Select full access if you allow others to edit or delete and add data files on shared folders. Select read only if other people may only look-see or copy files only.Select Ok if you have made a choice.

The purpose of this sharing technique is to share access to another user on a folder or drive that you want. You can choose to which users are able or allowed access to your folders and can also provide access to all the people who exist on the network or your network.

Steps:

1. Local Sharing

Actually Windows XP has made a special folder called Shared Documents. If the file we put in that folder automatically other users will be able to access data / our files.
\ Documents and Settings \ All Users \ Documents
C: Documents and SettingsAll UsersDocuments

2. Sharing Data in a Folder

Right click the folder you want shared> Select Sharing and Security ...> In the Network sharing and Security> Put a check (v) in front of the Share this folder on the network> Fill in the name of the shared data on the Share name:

If in front of Allow network users to change my files come in check, meaning that other users can add and remove files that we share.

sharing of data

3. Sharing Drive

Almost the same as the Sharing folder. Right click the drive to be shared> Sharing and Security ...> Emerging Drive Properties window of the shared> Click If you understand the risk but still to share ... etc.> Then just like sharing a folder (no. 2).

shared and not shared

4. Taking Data to Share

To be able to access the folder / drive that is shared within a network area there are several ways:
* Through the Computer Name and Workgroup
Start> Explore> Looking for My Network Places> Entire Network> Microsoft Windows Network> Workgroup name search> Click the Computer Name in which the shared folder> double click, then the shared folder will appear.
NB. : We must be in a workgroup and know the workgroup and computer name where the shared folder.
* Through the RUN command
Start> Run> type \ \ [computer name]> Enter or Windows Logo + R> type \ \ IP Address shared computer> Enter. Example: \ \ PC01 or \ \ 10.63.41.101
NB. : We must know the shared folder where the Computer Name and IP Address from a shared computer.
* Through SoftPerfect Network Scanner Software
Software can be downloaded at www.softperfect.com, small size (674 KB) and portable, no need to install and easy to use.

Screenshot

SHARING DATA ON COMPUTER SERVER TO CLIENT SERVER

At the point in doing Sharing data between client and server computers must have tersetting Radio and Wireless AP bias in order to perform data sharing.

On the server machine using ...
IP Address: 192.168.11.254
Subnet Mask: 255.255.255.0
The other can also be emptied, ..
On the client computer using the ...
IP Address: 192.168.13.1
Subnet Mask: 255.255.255.0
The trick

  • Right-click on the folder you want us Sharing, select Properties> Select Sharing
  • Click "If you understand the security risks but want to shared files without running the wizard".
  • Click Next until you're at most dose ol, .. select just finish the wizard I do to run the wizard on other computers, right click> Finish.

* Then I view the data that has been in Sharing

1. Client entered kestart Explorer right click> Search> click computer on the people>
click the computer on the network server IP input.
2. Then if successful will appear server IP> Click on the IP server it will exit the file
in Sharing by Server.

Network Connection

The network connection is an attempt to connect all network equipment in the computer network infrastructure. You must concentrate first on a local area network before you make a connection to a WAN network that connects all your remote sites into a network connection system - a computer network infrastructure. This does not mean you do not need to create a WAN design into the design of your network until all of your local area network network is formed, however, you kosentrasikan first until you can be sure that your LAN network connection system has been efficiently before making a connection to the WAN.

It would be a lot of work to be completed within this network connection and depending on how big the scale of your network design. Creating a network connection in a company where the office is composed of several remote sites over the limit even to geography, different network connections in the local area network that connects several buildings in an area company or maybe just in a small office space. You must have completed the design of your network including a computer system that will use this network infrastructure systems. The work of this network connection is complicated depending on how big the scale of your network, especially if you have to also design a network backup in case of disaster or in anticipation of problems in the network.

It is assumed that you have created your network design diagrams and some of the sites you like the picture of this church service, how do you make a network connection according to diagram these sites?

Network Connection Diagram

The server room where multiple servers are located, was in the building HRD. there are about 80 users in this building. I told some servers - why do not all servers are in one room and in the same building? This is about the safety standards of security best practices regarding the placement of servers (next article). There are still two more buildings to be connected in a network connection:

1. Building mining which is about 70 meters from the building HRD (there are about 80 users as well)

2. The workshop, which is below the valley which is more than 300 meters from the building HRD (there are about 50 users here)
Total users in this network is 200 (80 in the HRD building in Mining + 80 + 40 at the Workshop), and not including a permanent IP address need for multiple servers; printers; Wireless Access Point; switch; as well as VoIP. You can use a private IP network 192.168.100.0/24 katakana (254 available IP addresses) for all users and devices in this network. For that you can use 4 pieces of 24 port switch in the cascade in both mining and HRD building with 100BaseT Ethernet standard. While at the workshop just 3 switches 24 ports in the cascade. Exception in the server room you need to switch Gigabit 12 ports if all your servers are equipped with Gigabit Ethernet, to transfer data very quickly and will feel useful if you use a single device Autoloader backups for backup of all data servers; exchange and your database, are routinely done at night.

Then how about the network connection between the building with the HRD Workshop? Because the location of this workshop is under the valley with a distance of more than 300 meters, you may not use a cable connection. Then you can take advantage of wireless technology that connects two or more points through the access point radio transmission medium with a frequency 2.4 GigaHz. You can get this kind of market products such as Cisco Aironet. You can build two towers is simple to put the antenna on top of the tower from the second antenna access point can see each other without a hitch. Wireless devices can transmit data up to 58 Mbps; enough for a link between this building with air transmission media. Please read the next article about wireless local area network.

Now how do you connect the network connection between the buildings in Mining and in HRD which is about 70 meters? This will depend on the constraints you face, if you should decide to pull underground cable then use a LAN cable Cat 5e outdoor UTP which is designed specifically for outdoor use and waterproof and support gigabit speed. However, for reasons of security and ease of maintenance then enter the UTP cable whose diameter is large enough it into an iron pipe or the like, and if necessary Make a special kind of drainage channels.

Why not just use a wireless network between two buildings is like between HRD and workshops? Indeed, with very practical wireless network once you do not have to bother-2 pulled an underground cable, but you know if the wireless until now the highest speednya about 300 Mbps (draft 802.11n standards), while between the two buildings that you need a reliable connection gigabit speeds as the backbone of two buildings. In the Mining Office also there are some servers and data mining applications, especially very large data and geological data should be centralized backup in the building of HRD. Not to mention control of blackspot if there are problems with your wireless, or radio frequency interference number of obstacles. While the workshops are the obstacles to building requires us to use a wireless radio network for inter-building must pass through the valley and does not allow pull the cable through the woods that even though only about 300 meters. Wireless networks are very reliable if the two tower antennas can see each other. And again at the workshop only requires connection to a computer clients only.
To complete the network connection, you still need to think about network configuration and network setup for all devices in this network connection such as IP addresses to all client PCs; permanent IP for the server; switch; printer and so on.

What's next? All you have to consider is the documentation of all this work

Understanding and Working Principle LAN

LAN (Local Area Network) can be defined as a network or network of computer systems, which are located in one building is limited, a complex building or a campus and not using common media of communication facilities like telephone, but the owner and manager of communications media is the owner of the LAN itself. From the above definition we can know that a LAN is limited by physical location. The use of the LAN itself result in all computers connected in a network can exchange data or other related words. Cooperation is growing from just the data exchange through the use of equipment together. LANs are generally using a hub, the hub will follow the principle of work itself. In this case is that the hub does not have pengetahuantentang destination address so that a broadcast data delivery, and also because the hub has only one collision domain so that if one port is busy then the other ports will have to wait.

Basic components of a LAN

Some of the basic components that normally form a LAN is as follows:

Workstation

Workstation is a node or host in the form of a computer system. Computer systems can be either a PC or can also be a large computer systems such as minicomputers, and even a mainframe. Workstations can work alone (stand-alone) can also use the network to exchange data with other workstations or users.

Server

Hardware (hardware) that function to serve the network and workstations connected on the network; its general resources (resources) such as printers, disks, and so that would be used jointly by the user at the workstation are and work on the server. Based on the types of services known as disc servers, file servers, print servers, and a server can also have multiple service functions at once.

Link

Workstations and servers can not function if the equipment is not physically connected. Relationship in a LAN is known as a transmission medium which is generally in the form of wires. As for some examples of the link is:

1. Twisted Pair Cable

  • The cable is divided into two, namely Shielded Twisted Pair and Unshielded TwistedPair (UTP)
  • More known as a telephone cable
  • Relatively inexpensive
  • Short Distance
  •   Easily affected by the disorder
  • Speed ​​of data that can be supported is limited, 10-16 Mbps
 2. Coaxial Cable
  •  Commonly used on television
  •  The distance is relatively more distant
  •  higher data transmission speeds in the appeal Twisted Pair, 30 Mbps
  •  Prices are relatively inexpensive
  •  The size is larger than Twisted Pair

3. Fiber Optic Cable
  • The long distance
  • High data speed, 100 Mbps
  • The relatively small size
  • Difficult influenced disorders
  • Prices are still relatively expensive
  • Installation is relatively difficult

Network Interface Card (NIC)

A workstation is not connected directly with a network cable or transceiver cable, but through an electronic circuit that is designed specifically to handle the network protocol known as the Network Interface Card (NIC).

Network Software

Without the software the network then the network will not work as desired. This software also allows one computer system to communicate with other computer systems.

LAN Support Tools

a. Repeater
  • In OSI, works on Physical layer
  • Continue and strengthen the signal
  • Widely used in bus topology
  • Its use is easy and relatively cheap price
  • Not having knowledge of the destination address so that the delivery data broadcast
  • Only have one collision domain so that if one port is busy then the other ports will have to wait.

 b. Hub
  • Work on the Physical layer
  • Forward the signal
  • Not having knowledge of the destination address
  • Its use is relatively easy and affordable
  • Only have one collision domain

c. Bridge
  • Working in the Data Link layer
  • Have used the addresses to forward data to its destination
  • Automatically create table translator for acceptance masing2 port

 d. Switch
  • Working in the Data Link layer
  • Each port in the swith has its own collision domain
  • Having a central translation table that has a list of interpreters to all ports
  • Allows full duflex transmission (both directions)

 e. Router
  • Router function to filter or filter the data traffic
  • Determine and select an alternative path to be traversed by the data
  • Connecting the network between LAN, WAN and even with LAN topology

Understanding Network topology is the arrangement of data flow path in the network that physically connects one node to another node. Here are some of the existing network topology and used to date, namely:

1. Star Topology

Some of the node / nodes connected to the central node / host, which form a physical network such as a star, all communications are handled directly and managed by the host in the form of mainframe computers.

2. Hierarchical Topology

Shaped like a branching tree consisting of the host computer (host) connected to the node / other node in stages. Higher levels of functioning as a regulator working level below.

3. Bus Topology

Some of the node / nodes connected by data paths (buses). Each node can perform the tasks and operations yangberbeda but all have the same hierarchy.

4. Loop Topology

Is the relationship between the node / nodes are serialized in the form of a closed loop. In this form there is no central node / host, all have the same hierarchy.

5. Ring Topology

This form is a combination of loop and bus topology, if one node / node is broken, then it will not affect other nodes due to communication separate from the data path.

6. Topology Web

Is a form of topology, each node / node in the network can be interconnected with other nodes via multiple links. A web form networks with n nodes, will use the link as many as n (n-1) / 2.

NB :

By using all the advantages and disadvantages each configuration, enabling the development of a new configuration that incorporates several new technologies in order topologies with ideal conditions for a network system can be met.

Setting Local Computer Networks (LAN - Local Area Network) using Windows XP

Computer network setup, I'll explain how to perform a LAN computer network settings by using Windows XP.
  1. Click Start, Settings, Control Panel to exit the Control Panel dialog box (as seen drawn below).
  2. Double-Click the Network Connection icon to exit the Network Connection dialog box.
  3. Double-click Local Area Connection icon to exit the dialog box Local Area Connection Status.
  4. Click the Properties dialog box to exit the Local Area Connection Properties.
  5. Double-Click Internet Protocol (TCP / IP) that is in the dialog box Local Area Connection Properties dialog box to exit the new: the Internet Protocol (TCP / IP) Protocol.


Enter the IP Address data as shown above. Data IP Address every UAD will be different and unique (not the same between the USD Campus Campus III with other UAD). IP Address of this data, will be given when Broadband installation is complete (when activation network)

IP Address data are most needed by each PC that will be set at each remote UAD is as follows:

  • Default Gateway IP Address from the Broadband modem. Given time following activation.
  • IP Address IP Address this is one class with a Broadband Modem IP (IP Default Gateway) later.
  • Subnet Mask IP Block , Data to be provided, it must ingclude to the Subnet Mask of this data.
  • After the data the TCP / IP is entered, click OK to close the dialog box Internet Connection (TCP / IP) Properties.
  • Click OK to close the dialog box "Local Area Connection Properties."
  • Click Star, Run,  RUN to exit the dialog box, and type CMD to exit the dialog box new "command."
  • In the dialog box "Command" earlier, type: ipconfig.


If the ping test results obtained (Request timed out), there is probably a problem in local networks. The problem could be from the following:
  • Network cable connectors (wired LAN) installed less tight. So Fasten the wiring connections to the LAN port Ethernet Hub and to LAN PC Card
  • LAN cable is not good (no pin-pin cable connections are broken in the middle) Replace with another great LAN cable
  • Port Ethernet Hub which is not good (or bad loose contact), Try moving the port

If the ping test results obtained as shown above (Reply from xxxx), we can be sure that the network operates normally.

Each user on the remote network UAD, expected at least, can perform actions as above.Target users in the UAD is ensuring local network connected to the IP LAN Ethernet Modem Broadband Gateway is a network of leading UAD UAD Center Network Server and the Internet.

If PC users have been able to do the ping test as above, and get results Reply from xxxx - (Ip modem), then certainly in the LAN the UAD network no problem.

After making sure the LAN network is not problematic, the UAD user is directed to perform TEST PING the IP Address Server Center. How to ping test is similar to an IP ping test modem on the local network. The difference is only in the IP ADDRESS to be entered in the IP address ping computer at the central office, or IP Address that is on the internet. Furthermore  performed test application - Internet applications.

Components Of A Computer Network

Computer network components composed of several basic elements which include hardware and software components, namely:


1. Hardware Components
Personal Computer (PC), Network Interface Card (NIC), cable and network topology.


2. Software Components
Network Operating System, Network Adapter Drivers, Network Protocols.


A. Network devices


1. Repeater
Function to receive signals then pass back the received signal with the same power. With the repeter, the signal from a computer to another computer that is located far apart.


2. Hub
Its function is similar to a repeater hub is only comprised of several ports, so that the hub is also called multiport repeter. Repeaters and hubs work in the physical layer so it does not have knowledge of the addressee. Although the hub has multiple ports, but still make use of the broadcast method of sending signals, so that if one port is busy then the other ports will have to wait if you want to send a signal.


3. Bridge
Functioning like a repeater or hub, but more clever because it works on the data link layer so as to have the ability to use the MAC address in the process of sending the frame to the addressee.




4. Switch
Its function is similar to the bridge just switch consists of multiple switch ports so-called multiport bridge. With these capabilities if one of the busy port on a switch then the other ports can still function. But the bridges and switches can not forward IP packets addressed to another computer that different logical networks.


B.  Types of Cables and Wiring


Each cable type has different capabilities and specifications, therefore, made the introduction of cable types. There are several types of cables are known in general, ie twisted pair (STP UTPunshielded twisted pair and shielded twisted pair), coaxial cable and fiber optic.


1. Thin Ethernet (thinnet)


Thin Ethernet or thinnet have advantages in terms of cost is relatively cheaper compared to other types of wiring and the installation of components easier. The length of thin cable coaxial/RG-58 between 0.5 - 185 m and a maximum of 30 computers terhubung.Kabel coaxial type is widely used among amateur radio, especially for the transceiver that does not require a large power output.


To be used as network devices, this type of coaxial cable must meet the standards of IEEE 802.3 10BASE2, where the average diameter of about 5mm and usually black or other dark colors. Each device (device) connected to a BNC T-connector. The cable type is also known as thin Ethernet or thinnet. This type of coaxial cable, such as the type RG-58 A / U or C / N, if implemented with Tconnector and terminator in a network, must follow the rules as follows:


• Each end of the cable were given 50-ohm terminator.
• The maximum length of cable is 1,000 feet (185 meters) per segment.
• Each segment is a maximum of 30 network devices (devices)
• The network card can simply use an onboard transceiver, do not need extra transceivers, except for the repeater.
• Maximum of 3 segments are connected to each other (populated segments).
• Each segment should be equipped with a ground.
• The minimum length among the T-Connector is 1.5 feet (0.5 meters).
• Maximum cable length in one segment is 1.818 feet (555 meters).
• Each segment has a maximum of 30 devices connected.


2. Thick Ethernet (Thicknet)


With a thick Ethernet or thicknet, the number of computers that can be connected in the network will be more numerous and the distance between computers can be enlarged, but the cost of procurement is more expensive wiring and installation is relatively more difficult compared with thinnet. In Thicknet transceiver used to connect each computer to the network system and connectors used are type DIX connector. The maximum transceiver cable length 50 m, Thick Ethernet cable length maximum of 500 m with a maximum 100 transceiver connected. This type of coaxial cable specified by the IEEE 802.3 10Base5 standard, where the cable has an average diameter of 12mm, and usually are colored yellow; cable of this type commonly referred to as a standard ethernet or thick Ethernet, or simply abbreviated ThickNet, or even referred to as yellow cuman cable.Kabel this Coaxial (RG-6) when used in the network have the specifications and rules as follows:
• Each end should be terminated with 50-ohm terminator (recommended to use
terminator that has been assembled, instead of using a single 50-ohm resistors 1 watt, for voltage dissipation resistor has a fairly wide).
• Maximum of three segments with the connected equipment (attached devices) or a populated segments.
• Every network card has an additional transmitter (external transceiver). Each segment contains a maximum of 100 network devices, including repeaters in this case.
• Maximum cable length per segment is 1640 feet (or about 500 meters).
• Maximum distance between the segment is 4920 feet (or about 1500 meters).
• Each segment should be grounded.
• Rarely a maximum between the tap or pencabang from the main cable to the device (device) is 16 feet (about 5 meters). Rarely minimum inter-tap is 8 feet (about 2.5 meters).

Introduction Of Computer Network Security

Computer network security is important and should be learned by experts network for the convenience of the user while accessing the internet. With the construction of computer networks, a computer will be easier and more frequently accessed. With the increasing number of access, automated computer security is increasingly vulnerable, especially if there are users who have bad intentions. Security settings on the computer network at its core is the set access software or hardware. Security software / hardware security should always be checked so as not to cause disruption in the system. 

4.1. Security hardware 

Security hardware is often forgotten but is usually the main thing to keep the network from the destroyer. In security hardware, servers and data storage should be a major concern. Physical access to servers and critical data should be limited as much as possible. It would be easier for thieves to take the hard drive data or tape backup of the server and the storage of data rather than having to tap the software from the network. Garbage should also be considered because a lot of hackers who come to the garbage company to find information on its computer network. One way of securing hardware is placed in a room that has good security. Airways holes need to be given attention because people can just enter the server room through the channel. Network cables must be protected so as not easy for a hacker to cut the cable and then connect to the computer. 

Access to computers can also be restricted by setting security on BIOS level that would prevent access to a computer, format the hard drive, and change the contents of the Main Boot Record (where information partition) hard drive. The use of hardware autentifikasiseperti smart card and finger print detector is also worth considering to improve security. 

4.2. Security software 

As already mentioned in the previous chapter that the first step to reduce the security risk is not to install unnecessary things on the computer, especially on the server. For example, if the server is only assigned to the router, do not need web server software and an FTP server installed. Limit the software that is installed will reduce the conflict between the software and limit access, for example if the router is also fitted with an FTP server, then the people from the outside with anonymous logins may be able to access the router. Software to be installed should also have good security settings. The ability of encryption (data scrambling) is a specification that must be owned ooleh software that will be used, especially because 128-bit encryption with a consistent 56-bit encryption has to be solved easily at this time. Some software that has a security hole is the sendmail mail server and telnet applications. Sendmail has a disadvantage that can ditelnet without logging in port (25) and accessor can create an email with a fake address. Telnet application has deficiencies transmit data without encrypting (scrambling the data) so that when it can be tapped will be very easy to get the data. 

The second thing to note is the password. Should set the minimum password length fatherly complicate memcahkan password hacker. Password will also be better if not composed letters or angak course, small or all capital letters, but should be combined. Encryption can increase network security by randomizing passwords and usernames, either in the record in the host as well as password and username that is passed the current network to log into another computer. 

For users who do not need to physically access the server, also need to be set so that user can only access from the client computer. In Windows NT, the term is a logon locally. Users also need to be restricted so as not to be shut down or reboot the computer. On UNIX systems by default, pressing ontrol-Alt-Delete will cause system reboot. 

Limiting traffic TCP / IP is the most widely used. Limiting traffic here, for example do not allow a host or network packets passing through the router, especially if the host has to know is owned by hackers. The most widely performed is to shut down certain ports that are not needed, such as telnet port (23) and FTP port (21). 

Routing is not apart from the security breach. Disorder that often arises is the provision of false information about path routing (source routing in the IP header). Giving false information is usually intended to be datagram-datagram can be tapped. To prevent such a thing, the router must be set to not allow source routing and the routing protocol diseertakan password authentication or some sort of order routing information is only obtained from a trusted router. Authentication is contained in the RIP version 2 and OSPF version 2. 

Computer Network Installation

Computer network instalation - Before discussing about how to install a computer network, known in advance what exactly komputer. In the referred with a simple network of computer networks is 2 (two) or more computers that are interconnected to one another, each electronic communicate, sharing of resources (such as cd-rom , printers, file sharing, file exchange, internet, etc.) and also are able to use the same computer resources are connected to one another are usually can be connected through various media such as cable media, radio waves, satellites, infra-red. There is 3 different types of networks, namely:

1.Local Area Network (LAN)
2.Metropolitan Area Network (MAN)
3.Wide Area Network (WAN)

As we know that at this time, the network komputerterus growing more rapidly. Almost every company in various fields already use the network in their business activities. Included in residential areas throughout the world for communicate with each other. In this unit of competency participants will learn about the Local Area Network (LAN) having a much smaller scope than the MAN and WAN
.

Before you start installing computer networks, the first we must think about what topology design that will be used. Topology is the pattern adopted in the weave network that shows how the shape of the relationship between the server and workstation systems lainnya.Ada several topologies commonly used, namely;

1.Topology Star (Star)
 Ie topology which makes computer servers service center point for all workstations
.
2.Topology Linear Bus
 Ie workstations interconnected with a cable line up the wrong one end connected to the server via a Hub
.
3. Topology Ring (Ring)
 That server is connected to multiple workstations form a circle (ring).

 4.Topology Tree
 Namely the merger of several smaller bus lane into a large jalurbus. is an extension of Linear bus topology.

Once we know the system topology to be used, we can prepare the necessary equipment if the operating system sertamengidentifikasi
that there are possible kitauntuk make the system topology we have chosen. In addition, we also must prepare drivers that can make hardware devices that we install will be able to work optimally.

Setting up a Network Device Driver Installation Package

The software consists of a network driver interface (NIC), network operating system or Network Operating System (NOS), Network Application, Application Management and Application Diagnostic / Monitoring and Backup Applications. Some of these elements bundled in one package NOS and partly shaped as a third-party software.

Bridge with the network card driver software network in server or workstation side. Network card driver specific to the type of network card and operating system used, usually other than provided by the vendor, the card makers also sometimes provided by network operating system vendor. If you lose your NIC drivers that you can still search through the internet to your site or another site the vendor its NOS.

Type of driver that was developed there were two of the Open Data-Link Interface (ODI) and
Network Driver Interface Specification (NDIS).

Network Operating System running on the server and responsible for process the request, manage the network, and mengendalikanlayanan and devices to all workstations. NOS can just change the file system used on the workstation in a transparent manner, for example padasistem Novell Netware, Windows workstation using the FAT filesystem and server are using Netware File System, another instance of Windows to a Linux Samba connections.

Each workstation requires a client to dapatberkomunikasi NOS applications with the server. These applications are often also referred to as a shell, the redirector, requestor or client. In general NOS client already bundled in the operating system, such as Samba client on Windows is included in the Explorer.

Application Aware Network is a bundle of server applications designed specifically for network systems. This application has the properties aware of the access network systems such as recording, aksestertentu restrictions, etc.. Sophisticated applications in the world of client / server can even divide the process into other machines apart. In Linux contohnyaadalah Beowulf.Network project management software is network monitoring software yangberfungsi. Element of bias in the form of network activity is monitored, life / death of nodes, etc.. Protocol Simple Network Management Protocol. function for this, if all nodes support the SNMP-agent monitoring software can monitor all activitiesnodes such that occur in the performance of processor, RAM usage, traffic input / output etc.. One of these applications are developed in Linux NetSaint and MRTG (Multi Router Traffic Grapher). Backup application in NOS become one of the things that pentingdalam tissue, NOS is usually bundle these applications in the package. Backups can be done in software or hardware, the software an administrator can perform remote backups to mesinlain periodically, usually done in hardware backups with disk-mirroring.

Network Topology

The bus topology is a stretch of one cable with both ends closed, where there is a cable along the nodes. Signal in the cable with this topology are skipped one direction to allow a collision occurs. To make the interconnection between computers, bus topology using the T-Connector (with a 50ohm terminator on the end of the network).

The main difficulty of using cable sepaksi is difficult to gauge whether the cable used sepaksi really matched or not. Because if not truly be measured correctly will damage the NIC (network interface card) that is used and the performance of the network becomes blocked, do not reach maximum capacity. This topology is also often used in fiber optic network with a base (which later merged with a star topology to connect with a client or a node.).

At the two ends of a bus topology network must be terminated with a terminator. Barrel connector can be used to expand it. Network consists of only one cable channel that uses a BNC cable. Computers that want to connect to the network can link her with Ethernetnya to tap along the cable.

Bus network installation is very simple, inexpensive and consist of a maximum of 5-7 computers. The difficulty is often encountered is the possibility of data collision because the mechanism is relatively simple network and if one is broken then the node will disrupt the entire network performance and traffic.

There are also advantages for the user as follows;


  • cheap, because it does not wear a lot of media and cable that can be used easily to the right or widely available in the market.
  • each computer can exchange information, whether it be text, images, and video directly.



Loss


  • frequent hangs / Crass talk, ie when more than one pair of wear track at the same time had to take turns or plus relays.

Types Of Computer Network

Types Of Computer Network - In general, the types of computer network is a LAN, MAN, and WAN. Between three types of networks have widely different connection. I'll explain more detailed one by one.

1. Local Area Network (LAN)


LAN is a network that is limited by the relatively small area, generally bounded by the area of ​​environment, such as an office in a building, or of each room in a school. Normally no further antarnode distance of about 200m.
Judging from the very rapid technological developments, now most users are using LAN technology based on IEEE 802.3 Ethernet switch using the device, which has a data transfer speed 10, 100, or 1000 Mbit / s. In addition to Ethernet technology, the current 802.11b technology (or so-called Wi-Fi) is also often used to form the LAN. Places that provide LAN connectivity with Wi-Fi technology called hotspots.
On a LAN, each node or computer has its own computing power, in contrast to the concept of terminal dump. Each computer can also access resources on the LAN in accordance with the permissions that have been set. These resources can be data or devices such as printers. On a LAN, a user can also communicate with other users by using the appropriate application.
In contrast to Wide Area Networks or Wide Area Network (WAN), the LAN has the following characteristics:
1. Having rapidly higher data
2. Covers a narrower geographical region
3. Does not require telecommunications lines leased from telecom operators
Usually one of the computers on the network computer will be used to manage all servers in the network system.

2. Metropolitan Area Network (MAN)

MAN connections usually have a wider area than a LAN, for example antargedung in a region (such as a province or territory of the State). In this case a network connecting several small networks into a larger area of ​​the environment. For example, a network of several offices of a bank branch inside a big city that dihungkan between one another.
MAN connection range is between 10 and 50 km, MAN is a proper network to build a network of offices in one city of factories / agencies and headquarters are located within its reach. in the MAN network has only one or two wires whose function is to organize the data packet through the output cable. Standards for MAN is currently being implemented. Standard is called the DQDB (Distributed Queue Dual Bus) or according to standard IEEE 802.6. DQDB consists of two unidirectional wires where all computers are connected.

3. Wide Area Network (WAN)

WAN is a network that is usually already using wireless media, means of satellite, cable or fiber optic cable, because its scope is broader than the LAN, and MAN. WAN not only covers one city but the WAN to reach the area / territory authorities of other States.
For example, the City Bank office computer networks that exist in each State, which are interconnected, network ATM Master Card, Vista Card or Cirrus dispersed throughout the world, etc..
WAN is usually more complicated and highly complex when compared to the LAN or MAN. Use many means to connect LANs and WANs into globlal communications like the internet, however between LAN, MAN, and WAN are not much different in several respects. Only the scope of its area being different from one another.

Peer to Peer & Client - Server

Peer to peer means co-worker. Peer to peer network is a computer network consisting of multiple computers (usually no more than 10 computers equipped with 1 or 2 printers only). For specific use, such as computer labs, research, and some other stuff, then the model is peer to peer connections could be developed for more than 10 to 100 computers.

Peer to Peer is a model in which each PC can use the resource on another PC or give it to other PC's resources. In other words can function as a client and a server in the same period. Method of peer to peer is the system known as Windows Workgroup, in which each computer in a network are grouped in a single working group.

For example there are several units in one department computer that is named group in accordance with the relevant department. Each - each computer assigned an IP address from an IP class of the same order each other to exchange data sharing or resource owned by their respective computers, such as printers, cdrom, file, and others.

Client - Server - In addition to the local network, this system can also be applied to internet technology where there is a computer unit that functions as a server that only provides services to other computers, and clients who also just request a service from the server. Access is done transparently from the client by first logging into the server in question.

Client can only use the resources provided by the server in accordance with the authority granted by the administrator. Applications that run on the client side can be a resource that is available on the server or applications that are installed on the client side but can only run after connecting to the server.

Type of Client services - servers include:
  • File server: provide file management functions.
  • Print server: providing services printing function
  • Database server: the functional processes of the database running on this machine and the other station can request the service
  • DIP (Document Information Processing): provide the storage function, management, and retrieval of data.

What is Computer Network

Three centuries before the present, each marked with different dominance. 18th century was dominated by the development of a mechanical system that accompanied the revolution tradition. The 19th century is the era of steam engines. The 20th century, radio technology, tv and computers play a role for the collection, processing, distribution and media information. The 21st century, where global computer network technology capable of reaching all areas of the world, the development of systems and technology used, dissemination of information via internet, the launch of communications satellites and communications devices wirelees / provider, marking the beginning of the century of the millennium.

Since memasyarakatnya Internet and Windows 95 operating system marketed by Microsoft Inc., to connect multiple computers either personal computers (PCs) and servers with a network of this type of LAN (Local Area Network) to WAN (Wide Area Network) into a common and easy. Similarly, the concept of downsizing and lightsizing aimed at pressing the budget (budget efficiency), especially for the computer equipment is one thing that can not be inevitable.

Thus, a computer network is the set of interconnection between two or more autonomous computers connected by transmission media cable or wirelessly (wireless). If a computer can create other computer restart, shutdown, or perform other control, then the computers are not autonomous (not to exercise control over other computers with full access).

Two tekoneksi said computer unit if they can exchange data / information, various resources owned, such as files, printers, then the storage (floppy disks, hard drives, cd-rom, flash disks, etc.). The data in the form of text, audio, and video media moving through wires or wirelessly (wireless) to enable computer users in computer networks to exchange files / information, print on the same printer, and using hardware / software that is connected in a network together -the same.

Each computer, printer or peripherals that are connected in a network is called a node. A computer network comprising at least two computer units or more, can amount to dozens of computers, thousands, or even jutaaan nodes that are connected to each other.

Such is the history and definition of computer network can be summarized that I wrote based on the knowledge I have. Hopefully bermamfaat, thanks and good luck.