Sie sind auf Seite 1von 15

CHAPTER I

INTRODUCTION
1.1 Background of problem
Nowadays, human needs in the ever increasing data access, is due to a
shift in the pattern of human life to a more developed. With the use of computers
this can be facilitated quickly. The result would be the efficiency of time, cost and
resource, so that will yield the optimal output. On the other hand the need for data
access was hindered by the distance and the time, sometimes we need access to
our brothers who are in different countries.
With the computer network, it can be resolved. Not only distance but the
difference waktupun can always be accessed. Suppose that when we want
information that was then. nternet and World Wide Web !WWW" is very popular
all over the world. #any people who need nternet$based applications, such as %$
#ail and Web access via the internet. So that more and more businesses are
developing applications running over the nternet.
1.! Problem formula"#on
What is the definition of a computer network&
What and how the computer network topology&
What are the techniques to build a computer network&
1.$ %oal
To know the definition of a computer network
To know the network topology
To know the techniques of building computer networks
1
CHAPTER II
D#cu#on
!.1Def#n#"#on of compu"er ne"&ork
'omputer networks have the definition of a set of computers and other
devices as supporting computers that are connected to each other in a single
unit. #edia computer network without wires and can be via cable, this allows
network users to share information, such as data or documents, can print
through the same printer in the same network, the user can communicate
between each other !email , chat", to accessing information !web browsing".
n a computer network there are two parties interacting with each other
to achieve the common goal of the client and server. 'lient side is the party
receiving or requesting service, while the server is the party who send or
deliver the service. n addition there is a computer in a network of tens,
thousands, and even millions of nodes. Node is any computer or other device
connected to a network.
n summary computer network is two or more computers linked
together and connected through wired and wireless media.
!.! Compu"er ne"&ork "opolog'
( network topology describes the arrangement of systems on a
2
computer network. t defines how the computers, or nodes, within the
network are arranged and connected to each other. Some common network
topologies include star, ring, line, bus, and tree configurations. These
topologies are defined below)
a. ("ar $ One central note is connected to each of the other nodes on a
network. Similar to a hub connected to the spokes in a wheel.
b. R#ng $ %ach node is connected to e*actly two other nodes, forming a ring.
'an be visuali+ed as a circular configuration. ,equires at least three nodes.
c. Bu $ %ach node is connected to a central bus that runs along the entire
network. (ll information transmitted across the bus can be received by any
system in the network.
d. Tree $ One -root- node connects to other nodes, which in turn connect to
other nodes, forming a tree structure. nformation from the root node may
have to pass through other nodes to reach the end nodes.
a. ("ar Ne"&ork Topolog'
n local area networks with a star topology, each network host is
connected to a central hub with a point$to$point connection. n Star topology
every node !computer workstation or any other peripheral" is connected to
central node called hub or switch. The switch is the server and the peripherals
are the clients. The network does not necessarily have to resemble a star to be
classified as a star network, but all of the nodes on the network must be
connected to one central device. (ll traffic that traverses the network passes
3
through the central hub. The hub acts as a signal repeater. The star topology is
considered the easiest topology to design and implement. (n advantage of the
star topology is the simplicity of adding additional nodes. The primary
disadvantage of the star topology is that the hub represents a single point of
failure.
No"e
.. ( point$to$point link !described above" is sometimes categori+ed as a
special instance of the physical star topology / therefore, the simplest
type of network that is based upon the physical star topology would
consist of one node with a single point$to$point link to a second node, the
choice of which node is the 0hub0 and which node is the 0spoke0 being
arbitrary.
1. (fter the special case of the point$to$point link, as in note !." above, the
ne*t simplest type of network that is based upon the physical star
topology would consist of one central node / the 0hub0 / with two
separate point$to$point links to two peripheral nodes / the 0spokes0.
2. (lthough most networks that are based upon the physical star topology are
commonly implemented using a special device such as a hub or switch as
the central node !i.e., the 0hub0 of the star", it is also possible to implement
a network that is based upon the physical star topology using a computer
or even a simple common connection point as the 0hub0 or central node.
3. Star networks may also be described as either broadcast multi$access or
nonbroadcast multi$access !N4#(", depending on whether the
technology of the network either automatically propagates a signal at the
hub to all spokes, or only addresses individual spokes with each
communication.
b. R#ng Ne"&ork Topolog'
4
( network topology that is set up in a circular fashion in which data travels
around the ring in one direction and each device on the right acts as a
repeater to keep the signal strong as it travels. %ach device incorporates a
receiver for the incoming signal and a transmitter to send the data on to the
ne*t device in the ring. The network is dependent on the ability of the
signal to travel around the ring. When a device sends data, it must travel
through each device on the ring until it reaches its destination. %very node
is a critical link
c. Bu ne"&ork "opolog'
n local area networks where bus topology is used, each node is connected
to a single cable. %ach computer or server is connected to the single bus
cable. ( signal from the source travels in both directions to all machines
connected on the bus cable until it finds the intended recipient. f the
machine address does not match the intended address for the data, the
machine ignores the data. (lternatively, if the data matches the machine
address, the data is accepted. Since the bus topology consists of only one
wire, it is rather ine*pensive to implement when compared to other
5
topologies. 5owever, the low cost of implementing the technology is
offset by the high cost of managing the network. (dditionally, since only
one cable is utili+ed, it can be the single point of failure. f the network
cable is terminated on both ends and when without termination data
transfer stop and when cable breaks, the entire network will be down.
d. Tree ne"&ork "opolog'
The type of network topology in which a central 0root0 node !the top
level of the hierarchy" is connected to one or more other nodes that are one
level lower in the hierarchy !i.e., the second level" with a point$to$point
link between each of the second level nodes and the top level central 0root0
node, while each of the second level nodes that are connected to the top
level central 0root0 node will also have one or more other nodes that are one
level lower in the hierarchy !i.e., the third level" connected to it, also with
a point$to$point link, the top level central 0root0 node being the only node
that has no other node above it in the hierarchy !The hierarchy of the tree
is symmetrical." %ach node in the network having a specific fi*ed number,
of nodes connected to it at the ne*t lower level in the hierarchy, the
number, being referred to as the 0branching factor0 of the hierarchical tree.
This tree has individual peripheral nodes.
.. ( network that is based upon the physical hierarchical topology must
have at least three levels in the hierarchy of the tree, since a network
6
with a central 0root0 node and only one hierarchical level below it would
e*hibit the physical topology of a star.
1. ( network that is based upon the physical hierarchical topology and
with a branching factor of . would be classified as a physical linear
topology.
2. The branching factor, f, is independent of the total number of nodes in
the network and, therefore, if the nodes in the network require ports for
connection to other nodes the total number of ports per node may be
kept low even though the total number of nodes is large / this makes
the effect of the cost of adding ports to each node totally dependent
upon the branching factor and may therefore be kept as low as required
without any effect upon the total number of nodes that are possible.
3. The total number of point$to$point links in a network that is based upon
the physical hierarchical topology will be one less than the total number
of nodes in the network.
!.$T'pe of compu"er ne"&ork.
1. PAN )Peronal Area Ne"&ork*
6(N stands for personal area network. Type of computer network 6(N is a
relationship between two or more computer systems that are not too far
away. Typically one network type is only 3 to 7 meters. This type of
network very often we use. for e*ample, connect the phone to the
computer.
!. +AN )+okal Area Ne"&ork*
7
8(N stands for local area network. This type of 8(N network very often
we meet in the cafe$cafe, college, school or office that requires a
relationship or connection between two or more computers in a room.
8ocal (rea Network !8(N" is a network of personal property within a
building or campus$si+ed to several kilometers. 8(Ns are often used to
connect personal computers and workstations in ompany offices or
factories to use shared resources !eg, printers, scanners" and e*change
nformation. 8(N can be distinguished from other types of networks based
on three haracteristics) si+e, transmission technology and topology. 8(N
has a finite si+e, which means that the transmission time in the worst
circumstances are limited and can be known in advance. 8(Ns often use a
single cable transmission technology. Traditional 8(N operates at speeds
from .9 to .99 #bps !mega bits : sec" with low delay !tens of micro$
second" and has a small error actor. #odern 8(Ns can operate at higher
speeds, up to hundreds of megabits : sec
$. ,AN ),e"ropol#"an Area Ne"&ork*
#(N stands for metropolitan area network. This type of computer
network #(N is a network of computers in a city with high speed data
transfer that connects a location such as schools, colleges, and government
offices. #(N network is actually a combination of several 8(N networks.
,ange of the #(N network can reach .9$;9 kilo meters.
8
#etropolitan (rea Network !#(N" is basically a 8(N version is larger
and usually use the same technology to the 8(N. #(N can include
corporate offices are ad<acent and can be used for private purposes
!private" or public. #(N usually mamapu support data and voice, and can
even be associated with the cable television network. #(N only have one
or two buiah not have cable and switching elements, which serve to
regulate the output packets through multiple cables. The e*istence of
switching elements to make the design simpler. The main reason for
separating #(N as a special category has it determines is the standard for
#(N, and these standards are now being implemented. The standard is
called =>=4 !=istributed >ueue =ual 4us" or ?91.7
-. .AN ).#de Area Ne"&ork*
W(N stands for wide area network. W(N is a computer network covering
a kind of a pretty big area. e*ample is the network that associate a region
or a country to country.
!.-Tec/n#0ue "o bu#ld compu"er ne"&ork.
a. Connec"#on me"/od
1. .#red
Wired networks, also called %thernet networks, are the most common type
of local area network !8(N" technology. ( wired network is simply a
collection of two or more computers, printers, and other devices linked by
%thernet cables. %thernet is the fastest wired network protocol, with
connection speeds of .9 megabits per second !#bps" to .99 #bps or
9
higher. Wired networks can also be used as part of other wired and
wireless networks. To connect a computer to a network with an %thernet
cable, the computer must have an %thernet adapter !sometimes called a
network interface card, or N'". %thernet adapters can be internal
!installed in a computer" or e*ternal !housed in a separate case". Some
computers include a built$in %thernet adapter port, which eliminates the
need for a separate adapter !#icrosoft". There are three basic network
topologies that are most commonly used today. !5omenthelp.com"
!. .#rele ).#1#*
Wireless Network is the medium in the form of electromagnetic waves. n
this network cables are not required to connect between computers because
it uses electromagnetic waves to transmit signals between a computer
information network. These types are produced by the nstitute of
%lectrical and %lectronic %ngineers !%%%". These standards define all
aspects of radio frequency wireless networking. They have established
four transmission standards@ ?91..., ?91...a, ?91...b, ?91...g.
The basic differences between these four types are connection speed and
radio frequency. ?91... and ?91...b are the slowest at . or 1 #bps and
;.; and ..#bps respectively. They both operate off of the 1.3 A5+ radio
frequency. ?91...a operates off of a ; A5+ frequency and can transmit up
to ;3 #bps and the ?91...g operates off of the 1.3 A5+ frequency and can
10
transmit up to ;3 #bps. (ctual transmission speeds vary depending on
such factors as the number and si+e of the physical barriers within the
network and any interference in the radio transmissions. !Wi$fi.com"
b. IP addre me"/od
1. IP "a"#c
Static 6 is a dedicated 6 with a 6', computer or other networking device
!eg a router". Static 6 address is an 6 address gift that never changes.
Static 6 address is important because the server using the 6 address and
=NS mappings might have pointed to the server, and usually provide
information to other machines !such as email servers, web servers, etc..".
4lock may be given a static 6 address by your S6, either by request or
automatically depending on how your connection to the nternet.
!. IP d'nam#c )DHCP*
=5'6 !=ynamic 'onfiguration 6rotocol" is a service that is automatically
assigns 6 addresses to computers that request. 'omputers provide 6
number is referred to as a =5'6 server, whereas computer requested 6
number is referred to as a =5'6 'lient. Thus the administrator
no longer have to provide the 6 address manually in the setting T'6 : 6,
but enough to provide a reference to the =5'6 Server.
When both =5'6 client turned on, then the computer is doing request to
the =5'6$server to get an 6 number. =5'6 reply to provide 6 number
that is in the =5'6 database. =5'6 Server after provide 6 number, then
lend server !lease" to a number of e*isting 6 =5'6$'lient and cross out
the 6 number from the list of pool. 6 number granted along with the
subnet mask and default gateway. f there is no 6 numbers can be given,
then the client can not initiali+e T'6 : 6, by itself can not connect to the
network.
(fter a certain period of time, then use the =5'6 'lient declared
selesaidan client does not renew the request again, the number 6 is
11
returned to the =5'6 server, and the server can provide a number 'lient
6 to that need. This long period can be determined within minutes, hours,
months or forever. 6eriod of time called the leased period.
c. Ne"&ork me"/od
1. Cl#en" er2er
Servers are computers that provide facilities for other computers on the
network and client computers that are receiving or using the facilities
provided by the server. Server in a client$server network called =edicated
Server for purely acting as servers that provide facilities to the workstation
and the server can not act as a workstation.
(dvantage
5igher access speeds due to the provision of network facilities and
management is done e*clusively by a single computer !server" that is
not burdened with other tasks as workstations.
Security system and network administration is better, because there is
a user who served as a network administrator, who manages
administration and network security systems.
4etter data backup system, because the client$server network backup
is done centrally on the server, which will backup all the data used in
the network.
Weakness
Operational costs are relatively more e*pensive.
t takes a special computer$enabled one more to be assigned as a
server.
Survival is highly dependent on the network server. f the server to
crash overall network will be disrupted.
!. Peer "o peer
12
When the review from the role of both types of servers in the network, the
servers on the network type of peer to peer termed non$dedicated server,
because the server does not act as a pure server but also can act as a
workstation.
(dvantage
4etween computers in the network can mutually share its facilities
Operating costs are relatively cheaper compared to the type of client
network$Server
'ontinuity of the network is not dependent on a single server.
Weakness
Troubleshooting network is relatively more difficult, because the type
of peer to peer network each computer it is possible to engage in
communication.
8ower performance compared to client$server network,
Network security system determined by each user to manage the
security of each facility owned.
13
CHAPETER III
C+O(IN%
$.1 CONC+U(ION
'omputer network is a collection of computers. This means that the
computer is more than one separate but interconnected delam can carry out a
task. ( group of computers that work autonomously. This means that only
can do the e*change in an area or a particular member
n use, the network classified based on specific functions or by the
place and the main sources of data processing. #oreover, in computer
networks is also known for some topologies where the network topology is
the thing that describes the geometric relationship between the basic elements
making up the network, ie nodes, links, and station. The peripheral devices
are often used in computer networks such as bridges, routers, and so on. The
equipment works based on their respective functions.
14
RE1ERENCE(
http)::sengkang$flash.blogspot.com:19..:9.:defenisi$<aringan$komputer.html
http)::blogku$$inspirasiku.blogspot.com:19..:9B:klasifikasi$<aringan$
komputer.html
http)::<eckkalie.wordpress.com:199B:92:1;:klasifikasi$<aringan$komputer$
berdasarkan$metode$transmisi:
http)::<areperpus.blogspot.com:19.1:93:pengertian$<aringan$wireless.html
http)::en.wikipedia.org:=ynamicC5ostC'onfigurationC6rotocol.htm
15

Das könnte Ihnen auch gefallen