Wednesday, 9 May 2012
Token Ring Cards
•Token Ring network cards look similar to Ethernet cards.
•One visible difference is the type of connector on the back end of the card.
•generally have a nine pin DIN type connector to attach the card to the network cable.
LocalTalk Connectors
•LocalTalk is Apple's built-in solution for networking Macintosh computers.
•utilizes a special adapter box and a cable that plugs into the printer port of a Macintosh.
Types of card
Ethernet Cards
•Ethernet cards contain connections for either coaxial or twisted pair cables (or both)
–BNC(Bayonet Neill-Concelman) connection for coaxial cable
–RJ-45 connection for twisted pair,
•Some Ethernet cards also contain an AUI connector, used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card.
•Ethernet cards contain connections for either coaxial or twisted pair cables (or both)
–BNC(Bayonet Neill-Concelman) connection for coaxial cable
–RJ-45 connection for twisted pair,
•Some Ethernet cards also contain an AUI connector, used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card.
Network Interface Card (NIC)
•provides the physical connection between the network and the computer workstation.
•major factor in determining the speed and performance of a network
•Most NICs are internal, with the card fitting into an expansion slot inside the computer.
•Some computers, such as Mac Classics, use external boxes which are attached to a serial port or a SCSI port.
•Laptop computers - built-in NIC or network cards that slip into a PCMCIA slot.
•The three most common network interface connections are
–Ethernet cards,
–LocalTalk connectors, and
–Token Ring cards.
Workstations
•user computers that is connected to a network are called workstations.
•configured with a network interface card, networking software, and the appropriate cables.
•do not necessarily storage capability , files can be saved on the file server.
•almost any computer can serve as a network workstation.
File servers
•A file server stands at the heart of most networks.
•very fast computer
•large amount of RAM and storage space,
•a fast network interface card.
•network operating system software resides on this computer, along with any software applications and data files that need to be shared.
Network Equipments
NETWORK DEVICE/EQUIPMENT/HARDWARE
•Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network.
Pelayan Fail (File Servers)
Stesen Kerja (Workstations)
Kad Antaramuka Rangkaian (Network Interface Cards )
Hub (Concentrators/Hubs)
Pengulang (Repeaters )
Jambatan (Bridges )
Router (Routers )
•Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network.
Pelayan Fail (File Servers)
Stesen Kerja (Workstations)
Kad Antaramuka Rangkaian (Network Interface Cards )
Hub (Concentrators/Hubs)
Pengulang (Repeaters )
Jambatan (Bridges )
Router (Routers )
NETWORK OPERATING SYSTEM (Client/Server)
•allow the network to centralize functions and applications in one or more dedicated file servers
•the file servers become the heart of the system, providing access to resources and providing security.
•individual workstations (clients) have access to the resources available on the file servers.
•Novell Netware and Windows 2000 Server are examples of client/server network operating systems.
Peer to Peer
Advantages
•Less initial expense - No need for a dedicated server.
•Setup - An operating system (such as Windows XP/…) already in place may only need to be reconfigured for peer-to-peer operations.
Disadvantages
•Decentralized - No central repository for files and applications.
•Security - Does not provide the security available on a client/server network.
•Less initial expense - No need for a dedicated server.
•Setup - An operating system (such as Windows XP/…) already in place may only need to be reconfigured for peer-to-peer operations.
Disadvantages
•Decentralized - No central repository for files and applications.
•Security - Does not provide the security available on a client/server network.
NETWORK OPERATING SYSTEM( Peer to Peer)
•In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network
•allow users to share resources and files located on their computers and to access shared resources found on other computers.
•do not have a file server or a centralized management source
•designed primarily for small to medium local area networks.
•AppleShare and Windows for Workgroups are examples of programs that can function as peer-to-peer network operating systems.
NETWORK OPERATING SYSTEM (NOS)
•Software that controls a network and its message (e.g. packet) traffic and queues, controls access by multiple users to network resources such as files, and provides for certain administrative functions, including security.
•coordinate the activities of multiple computers across a network.
•acts as a director to keep the network running smoothly.
•A NOS is not the same as the networking tools provided by some existing OSs, Windows XP for instance.
•An NOS is an OS that has been specifically written to keep networks running at optimal performance.
•Some popular NOSs include:
•Windows NT , IBM AIX, Sun Solaris, Windows 2000 Server, Windows Server 2003,Inferno Novell NetWare, Red Hat Linux, BSD
•The two major types of network operating systems are: :
–Peer-to-Peer
–Client/Server
FIBRE OPTICS
•consists of a center glass core surrounded by several layers of protective materials
• It transmits light rather than electronic signals eliminating the problem of electrical interference.
•ideal for certain environments that contain a large amount of electrical interference..
•able to transmit signals over much longer distances than coaxial and twisted pair
CO-AXIAL CABLE
Coaxial cabling has a single copper conductor at its center.
A plastic layer provides insulation between the center conductor and a braided metal shield
The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Coaxial Cable Connectors
•The most common type of connector used with coaxial cables is the Bayonet-Neill-Concelman (BNC) connector
•Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator.
Shielded Twisted Pair (STP) Cable
STP is a type of cable consists of two individual wires wrapped in a foil shielding to help provide a more reliable data communication.
•suitable for environments with electrical interference;
•however, the extra shielding can make the cables quite bulky.
•often used on networks using Token Ring topology.
LAN TECHNOLOGY CABLING: Shielded Twisted Pair (STP) Cable
Unshielded Twisted Pair (UTP) Cable
The standard connector for unshielded twisted pair cabling is an RJ-45 connector
RJ=Registered Jack
-A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference.
RJ=Registered Jack
-A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference.
UTP Cable Standards
1.Cat 3 UTP
- to carry data up to 10Mbit/s.standard cable for use with Ethernet 10Base-T.
- to carry Ethernet up to 100Mbit/s and ATM up to 155Mbit/s.standard cable for use with Ethernet 100Base-TX.
- an enhanced version of Cat 5 UTP.to carry data up to 1000Mbit/s.standard cable for use with Ethernet 1000Base-T.used to extend the distance of 100Base-TX cable runs up to 350 meters.
- similar to Cat 5 UTP, except that it is designed and manufactured to even stricter standards.
Unshielded Twisted Pair (UTP) Cable
The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
Categories
Types use
-Category 1
Voice (Wayer Telefon)
-Category 2
Data to 4 Mbps (LocalTalk)
-Category 3
Data to 10 Mbps (Ethernet)
-Category 4
Data to 20 Mbps (16 Mbps Token Ring)
-Category 5
Data to 100 Mbps (Fast Ethernet)
Categories
Types use
-Category 1
Voice (Wayer Telefon)
-Category 2
Data to 4 Mbps (LocalTalk)
-Category 3
Data to 10 Mbps (Ethernet)
-Category 4
Data to 20 Mbps (16 Mbps Token Ring)
-Category 5
Data to 100 Mbps (Fast Ethernet)
Types of Cables
•Unshielded Twisted Pair (UTP) Cable
•Shielded Twisted Pair (STP) Cable
•Coaxial Cable
•Fiber Optic Cable
CABLING
•Cable is the medium through which information usually moves from one network device to another .
•several types of cable are commonly used with LANs.
•In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types
•several types of cable are commonly used with LANs.
•In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types
Protocol FDDI
•Fiber Distributed Data Interface - a network protocol that is used primarily to interconnect two or more local area networks, often over large distances.
•access method involves token-passing.
•uses a dual ring physical topology. Transmission normally occurs on one of the rings; if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring.
•A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.
Tuesday, 24 April 2012
PROTOCOL:TOKEN RING
• developed by IBM in the mid-1980s.
• access method involves token-passing.
• the computers are connected so that the signal travels
around the network from one computer to another in a
logical ring.
• A single electronic token moves around the ring from
one computer to the next. If a computer does not have
information to transmit, it simply passes the token on
to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data
to the token. The token then proceeds around the ring
until it comes to the computer for which the data is
meant- the data is captured by the receiving computer.
PROTOCOL:LOCALTALK
• a network protocol that was developed Macintosh
computers.
• used a method called CSMA/CA (Carrier Sense
Multiple Access with Collision Avoidance), where a
computer signals its intent to transmit before it
actually does so.
• allows for linear bus, star, or tree topologies using
twisted pair cable.
• disadvantage : slow speed (only 230 Kbps).
PROTOCAL:ETHERNET
• the most widely used wired networks protocol
• Early Ethernet network were half duplex, uses an
access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection), a system where
each computer listens to the cable before sending
anything through the network to avoid collisions.
• Since 1997 Ethernet uses full duplex communication,
that does not require listening to other messages and
no collisions occur.
• The Ethernet protocol allows for linear bus, star, or tree
topologies. Data can be transmitted over wireless access
points, twisted pair, coaxial, or fiber optic cable.
• Early Ethernet protocols (10BASE-T) support
transmissions rate 10 Mbps
• Today
– 100BASE-T or 100BASE-TX – 1000Mbps (1Gbps
– 10Gigagbit Ethernet – 10Gbps
PROTOCOL AND CABLING
What is a Protocol?
• A protocol is a set of rules that governs the
communications between computers on a network.
• These rules include guidelines that regulate the
following characteristics of a network:
– access method,
– allowed physical topologies,
– types of cabling, and
– speed of data transfer.
Protocol
• Protocol (communications protocol)=
standards that specifically address how the
devices on a network communicate, i.e
– How the data is packaged for transmission
– How receiving devices acknowledge signals from
sending devices
– How errors are detected and handled
Friday, 13 April 2012
KOMPENAN-KOMPENAN UNTUK LAN
1. Komputer pelayan (Server)
- Ethernet Card -Contoh :3Com (RM 350), D-Link (RM 220), 10Base (RM 120)
- Token Ring Card
- LocalTalk Connector
Bil | |||||
I | Coaxial | Ya | Tidak | Ya | Tidak |
II | Shieled Twisted Pair (STP) | Ya | Ya | Ya | Tidak |
III | Unshieled Twisted Pair (UTP) | Tidak | Ya | Ya | Tidak |
IV | Fiber Optic | Tidak | Ya | Ya | Ya |
Bil | ||||
I | Coaxial | Cepat | Lebih Baik | Sedang |
II | Shieled Twisted Pair (STP) | Lebih cepat | Baik | Rendah |
III | Unshieled Twisted Pair (UTP) | Dapat diterima | Terpengaruh oleh interferen elektromagnetik | Terendah |
IV | Fiber Optic | Paling laju | Kebal terharap interferen elektromagnetik | Tertinggi |
- Soket (Connector)
I | Coaxial | BNC dan BNC T-Connector |
II | Shieled Twisted Pair (STP) | RJ-45 |
III | Unshieled Twisted Pair (UTP) | RJ-45 |
IV | Fiber Optic | ST Connector, SC Connector |
- Alat tambahan
- a) Pengacip khas (Crimping)- RM50 : Untuk klip wayar dan masukkan
wayar ke dalam soket.
Rangkaian Tanpa Wayar(Wireless network)
Perkakasan asasnya ialah penyesuai tanpa wayar (Wireless adapter) dan titik capaian (access point), perisian rangkaian( Novell Netware, LANtastic)
- Sistem Operasi Rangkaian bertanggungjawap ke atas:
- Mengarahkan lalu-lintas data pada rangkaian.
- Membenarkan dan menghalang pemindahan data antara workstation.
- Mengelolakan aliran data di antara berbagai workstation yang berbeza(tidak selasi)
- Mengelola permintaan layanan printer.
- Mengelola permintaan dan pesanan di antara pengguna rangkaian.
- Mengelolakan hubungan di antara jaringan dan lokasi-lokasi jarak jauh.
- Hab digunakan untuk menjadi pusat kepada rangkaian bintang (Star). Ia digunakan untuk mengawal trafik aliran data dan maklumat dalam rangkaian. Contoh Ethernet Hub 8ports (RM200), Ethernet Hub16ports (RM400),10Base8 ports (RM550), 10Base16ports (RM1200)
- Router digunakan untuk meterjemahkan maklumat di antara rangkaian yang berasingan. Router tahu alamat bridge dan komputer bagi kedua-dua rangkaian yang berhubung. Kebaikan router ialah
- Menguruskan penghataran isyarat dengan berkesan.
- Menghanter maklumat di antara dua protocols atau rangkaian.
- Menghanter maklumat di antara topologi LAN yang berlainan.
- Menghanter maklumat di melalui jenis kabel yang berbeza.
JENIS-JENIS LAN
Terdapat dua jenis Rangkaian Kawasan Setempat (LAN) iaitu:
- 1. Pengguna dan pelayan (Client-server)
- Pelayan fail (Fail server)- Menyimpan perisian dan data.
- Pelayan data (Database server)- Menyimpan data sahaja.
- Pelayan cetak (Print server)- Mengawal satu atau lebih pencetak.
- Pelayan fax (Fax server)- Menguruskan penghataran fax.
- Pelayan mel (Mail server)- Menguruskan e-mail.
- Biasanya pelayan ini tidak memproses atau mengubah data yang dikirim. Pelayan tidak perlu tahu jenis fail, sebaliknya ia sibuk menjawab permintaan dari komputer pengguna atas fail yang disimpamnya. Contoh perisian Sistem Operasi Rangkaian /Network Operating Syatem(NOS) ialah Novell Netware, Windows NT, UNIX
|
|
- 2. Pengguna-pengguna sebaya (Peer to peer)
|
|
rangkaian setempat(local area network)
Sistem rangkaian yang besar ( MAN dan WAN ) lebih berguna dari segi keluasan kawasan geografinya tetapi banyak organisasi perlukan rangkaian setempat untuk menghubungkan alat-alat yang digunakan di tempat yang terhad. Jadi aspek-aspek berikut perlu dipertimbangkan:
- Pengguna-pengguna sebaya (Peer to peer)
- Jenis LAN - Pengguna dan pelayan (Client-server)
- Komponen-komponen LAN
- Topologi LAN
- Kesan dari LAN
SISTEM RANGKAIAN KOMPUTER
- Terdapat tiga sistem rangkaian seperti berikut:
Bil | Sistem Rangkaian Komputer | | |
1. | Local Area Network (LAN) | Kawasan Kecil (10km) | Sekolah, makmal, dalam sebuah bangunan. |
2. | Metropolitan Area Network (MAN) | Kawasan lebih besar (10-50km) | Bandar, negeri. |
3 | Wide Area Network (WAN) | Kawasan sangat besar (lebih daripada 50km) | Seluruh dunia, negara, Internet |
KEBAIKAN MENGGUNAKAN RANGKAIAN (NETWORKING)
- Berkongsi Fail Pengguna dapat berkongsi fail yang disimpan pada palayan (server) atau komputer pusat.
- Menimdahkan Fail Memudahkan pemindahan fail yang disimpan dari satu komputer ke komputer yang lain.
- Berkongsi Perisian (Aplication) dan mengurangkan kos Memudahkan pengguna untuk berkongsi program aplikasi seperti Word, Lotus, Access dll. Dengan ini ia dapat mengurangkan kos dan memudahkan instalasi perisian.
- Berkongsi data dan menjimatkan masa untuk memasukkan data Data-data dapat dimasukkan serentak oleh dua atau lebih pengguna kedalam satu aplikasi. Pada masa yang sama juga pengguna yang lain dapat menggunakan data -data tersebut.
- Berkongsi Pencetak, Pengimbas, CD-Rom dll Pencetak atau CD-Rom yang terdapat pada sesebuah komputer dapat digunakan oleh semua pengguna yang mengunakan komputer lain.
- Menggunakan Mel Elektronik (E-Mail) Pengguna dapat menghatar memo dari satu komputer ke komputer yang lain.
Saturday, 17 March 2012
computer networks
- Client Server
Client Server adalah komputer yang memanfaatkan layanan dari server. Sistem operasi jaringan Client Server memungkinkan untuk mensentralisasi fungsi dan aplikasi kepada satu atau dua dedicated file server. Sebuah File server menjadi jantung dari keseluruhan sistem, memungkinkan untuk mengakses sumber daya dan menyediakan keamanan. Linux, Novel Netware, dan Windows NT adalah contoh model sistem operasi jaringan Client Server.
- Konsentrator
Konsentrator adalah perangkat yang digunakan untuk memperluas dan menambah jumlah komputer dalam sebuah jaringan. Konsentrator terdiri dari dua jenis yaitu hub dan switch. Perbedaan keduanya pada kemampuan transfer data. Pada hub kecepatan transfer data adalah 6,25 Kbps sedangkan pada switch kecepatan transfer data adalah 100 Kbps.
- Modem
Modem singkatan dari Modulator Demodulator yang berfungsi untuk mengkonversikan data digital ke data analog dari komputer pengguna ke komputer server melalui jalur telepon dan sebaliknya.
- Setting LAN
Cara yang paling efektif dan efesien untuk menghubungkan satu komputer dengan komputer yang lain atau menghubungkan sejumlah komputer ke internet adalah dengan membangun jaringan lokal (local area network/LAN). Dengan adanya jaringan maka hanya diperlukan satu sambungan saja ke internet yang bisa dipergunakan secara bersama-sama oleh komputer yang tergabung dalam jaringan tersebut.
- Sharing Internet
Agar semua computer client dapat terkoneksi dengan internet, maka koneksi internet di server harus di sharing ke dalam jaringan LAN.
- Trouble shooting Jaringan
Jika koneksi antar komputer terputus maka kita harus mengecek penyebab putusnya koneksi tersebut. Adapun langkah-langkah pengecekan sebagai berikut :
* Periksa Swicth menyala atau tidak
* Periksa kabel UTP terlepas atau tidak
* Periksa IP Address komputer tersebut sudah benar atau belum.
* Klik kanan pada ikon LAN kemudian klik Disable kemudian ganti dengan Enable.
* Periksa Swicth menyala atau tidak
* Periksa kabel UTP terlepas atau tidak
* Periksa IP Address komputer tersebut sudah benar atau belum.
* Klik kanan pada ikon LAN kemudian klik Disable kemudian ganti dengan Enable.
Subscribe to:
Posts (Atom)