Rabu, 30 Maret 2011

Star Topology

Star topologies is very different from the bus topology or ring topology that hard in improving its network. star topologies is better than the both of topologies earlier.

Star topology is centralized and likened topologies similiar to the star. In a star topology, all the cables from computers connected to a central location, where everything is connected to a device called hub.

Star topology is used in dense networks, while endpoint can be reached directly from a central location, the need for network expansion, and requires high reliability. This topology is the arrangement that using more cable than bus and because of all the computers and devices connected to a central point. So if there is one computer or device that is corrupt, the other will not affect the network.

How Star Network Work?

Every computer in star network to communicate with central hub that sends back messages to all computers (in a broadcast star network) or only to the destination computer (in switched star network). Hub of a broadcast star network can be active or passive. Active hub renew the electrical signal that is received and sends it to all computers connected to the hub. Hub types are often also called multiport repeater. If we use the hub has 32 ports, if all ports filled, then the collision will often occur that would result in decreased of network performance. To avoid this we can use a switch that has the ability to define an destination data. Active hub and switch requires power to run it. Pasisive hubs, like wiring panels or punch-down block, only serves as a connection point (connection point) and did not renew the reinforcement signal or signals. Passive hubs do not requires electricity to run it.

To build a network using this topologies, you requires a higher cost than bus or ring topologies because it requiresmore wires to connect each computer to a hub or switch.however, this topology is very easy to fix if problems occuron the network. This topologies is used almost in everyoffice, school, and internet cafe.

Sabtu, 26 Maret 2011

Ring Network Topology

Definition of Ring Topology
after previously talking about bus topology, now I'm trying towrite another topology is a ring topology. ring topology is a concept to build a network that forms a circular pattern like a ring. To form a ring topology, each must be connected centra
l series with each other and this relationship will form a closed loop. In this system each central must be designed to interact with the adjacent central and far apart. Thus the ability to switch to different central direction.
The advantage of this network topology, among others: the level of network complexity is low (simple), also if there is any interference or damage to the central flow traffic can be passed in the other direction in sistem.Yang most widely used in computer networks is a network of buses and tree type, it is because of their complexity, ease of installation and maintenance as well as the price paid. But only just a tree-type network reliability that is recognized as loss one of the wires on the client, will not affect relations with other clients.
Ring topology is used in a network that has a high performance, which requires network bandwidth for time-sensitive features such as video and audio, or when performance is needed when the computer is connected to the network in large quantities.
How it works
Every computer connected to the natural next computerring, and each computer sends what is received from the previous computer. The messages flowing through ring inone direction. Every computer that sends what it receives,the ring is an active network. There is no end to the ring.Some do token passing ring network. Short message, called token ring to run through a computer wants to sendinformation to another computer. The computer then converts these tokens, by adding the address and adddata, and send it through the ring. Then each computer in order to receive the token and send the information to thecomputer next to the computer with the address of thetarget achieved or token back to the sender computer(original sender of the message). Computers recipientswill reply message to the sender of the message homeindicates that the message has been received. Then theoriginal sender of the message will make another tokenand put it on the network, and the token will continue tospin until there is another computer that captures the tokenand ready to start delivery.

Benefits of using ring topology:
  • • There is no monopoly on computer network, becauseevery computer has the right to equal access to the token.
  • • Data flows in one direction so that the collision can beavoided.

lack of using Ring Topology

  • * If there is one computer in the ring that failed to function, it will affect the whole network.
  • • It is difficult to overcome the damage in a network thatuses ring topology.
  • • Increase or decrease the computer will mess up the network.
  • • Difficult to reconfiguration.


FTRBEW8BAX89

Jumat, 25 Maret 2011

BUS TOPOLOGY

Topology is an description of communication between devices in series of computer. If 2 or more Nod connected hybrid topology is formed. There are three types of topology principle in a LAN , Bus, Ring and Star topologies. There Other topologies such as hybrid, mesh and wireless.


BUS TOPOLOGY
topology bus is a LAN topology for a small scale. with the following specifications:
a. Interface
Interfaces for bus topology is to use passive equipment or T connector. This equipment does not have the ability to strengthen or repeat signal in the transfer. Accordingly the way, more further data / signal to move, so the weaker signal in the network.

b. Multipoint Connection Bus topology has a multipoint connection where a conductive medium in partnership by all Nod. What are the data that the transfer will be in partnership by all Nod.

c. Addressing
This topology justify unicast, multicast and broadcast addressing. Each Nod will listen and check the recipient address on the received frame. If a unicast address, Nod will check address on the frame. If the frontier of Nod will receive the data if not, the frame will be discarded. If the multicast address, Nod involved in group will take the data and unrelatedNod will discard the frame. If the broadcast address, all Nod will save frames in transfer.
description of delivery and Acceptance data image below illustrates how Conductor data from PC1 to PC 3.

d. Medium Conductor
usually medium Conductor for bus topology is a coaxial cable.

weakness of Bus Topology:

  1. 1. Damage to the Kable will cause serious problems to the network.
  2. 2. Caused antaramuka passive use, it will not apply if the prevailing serious problem of damage to the interfaces.
  3. 3. caused between the face is passive, the data will be increasingly weak in the conductivity
  4. unless the amplifier amplifire or repeater / repeater is used.
  5. 4. Delay delivery of data depends on the amount of Nod is connected.
  6. 5. in case of network troubleshooting, it will be difficult to repair

excess of bus topology:
  1. 1. Cheap
  2. 2. No need for additional equipment.
  3. 3. No need for long cables.

Rabu, 23 Maret 2011

Computer Network

computer network is a collection of individual computerswhich are connected and can exchange information. some of the benefits of computer networks are:
  1. 1. resource efficiency: with a computer on your networkcan share data and software or hardware. so you do notneed to install hardware that can be used together in eachcomputer. It also can save costs in assembling a computerfor the network.
  2. 2. to maintain information in order to remain reliable andup to date: that is centralized data storage systemmanaged by bai allow all users access data from different locations, and restrict access to data when data is beingprocessed.
  3. 3. accelerate the process of sharing data. means totransfer data on the network is always faster than the oreby means of other shared or not the network.
  4. 4. communication efficiency in work group. means you cantransmit data, messages, monitoring projects, onlineconference, which all help the team become moreproductive.
  5. 5. serve clients more effectively. means the centralizeddata storage, allowing workers / employees can accessdata whenever and wherever they are.
to build a computer network, you must know what tools aremust exist on each computer. such as NIC, cable (according to the Topology used in designing yourcomputer network), crimping tools, connectors and severaladditional tools to support the development of computernetwork that you build.

Sabtu, 19 Maret 2011

Network Cables

after a few days ago post about the NIC which is a component that converts data into electrical signals, so now I will discuss about the data that are Conductor cable network. network cable is divided into several types. that are:
1. Coaxial cable:
probably a bit difficult to find a network that still uses this cable. because the coaxial cable used by a computer network with bus topology type. positions lined up the other end, if there is damage, it will disrupt the overall network. bus topology has several weaknesses that make the performance less effective. them if a server in the store at the end of the network and client There are 2 types of coaxial cable. that are:
a. Thicknet
b. thinnet

2. UTP (unshielded twisted pair):
This cable has 8 wires in it that has a small role re
spectively.
role on the cable is determined by the RJ-45 connectors that connect to the NIC. This cable is suitable for star topology type that connects a computer to a
switch or hub that terhubungn with
another computer. This cable is used on any computer network at this
time. because the star topology is very easy in the diagnosis of damage and easy to fix. and jka there is damage on one cable that connects the computer, it will not affect the overall computer network and This cable can deliver data up to 100 m.

3. STP (shielded twisted pair)
STP (Shielded twisted pair) is a type of telephone cable that is used in some installations business. There is an additional
wrapper for each pair cable ("twisted pair"). STP cable is also used for data networks, use on the IBM Token-Ring. Packaging can provide better protection against EMI interference. These cables are usually used in token ring topology. will however have some disadvantages. that:
a. Expensive price
b. At high frequencies, the balance down so it can not compensate for the emergence of "crosstalk" and signal "noise".

4. FO (Fiber Optic):
Fiber Optic Cable is the latest cable technology. Made of optical glass. In the middle there is a cable glas filaments, called "core", and surrounded by a layer of "cladding", "buffer coating", the amplifier material, and protector luar.Informasi transmitted using light waves by converting electrical signals into light waves. The most used transmitter LED or laser. and has several benefits there are:
a. Large bandwidth capacity (gigabits per second).
b. Further transmission distance (2 to more than 60 kilometers).
c. Immune to electromagnetic interference.
Fiber Optic Cables are widely used in WAN networks for voice and data communications. The main obstacle in the use of fiber optic cable LAN is an electronic device that is still expensive. While the price of fiber optic cable itself is comparable with UTP LAN cable.



Minggu, 13 Maret 2011

N.I.C



NIC (network interface card) or usually called a LAN card is an additional interface card on a computer that has a function as modifiers electricity into digital data or opposite. if you want to connect multiple computers using a cable, then each computer must have a NIC as a gateway out of the entry of data in a local area network.
There are two types of NIC, onboard NIC and external NIC .
  1. 1. onboard NIC , is the NIC that integrates with the mainboard and can not be separated.
  2. 2. External NICs: an optional NIC is installed if the onboard NIC does not exist. External NICs installed in PCI slots, so you can add as many PCI slots are available.
with each other NIC you can connect with multiple computers and became a small-scale computer network called LAN (Local Area Network). in addition to the computer, you also can connect with a printer that can be used together, sharing files, even you can share the device.

posted by: 4climategate.info

Sabtu, 12 Maret 2011

Laptop Insurance

Now, Laptops have become one of the main priorities can be equated with even handphone. but since this laptop is a portable electronic goods, so it is very vulnerable to theft of a laptop.

solution is to insure your laptop on the company providing insurance services laptop. many insurance providers online with low cost laptops. would not hurt if you insure your laptop because it will provide many benefits to the secure of your laptop. you include your laptop safe from theft of laptops, the damage resulting from disasters such as floods, and accidents. even if that happens, you will your insurance company will replace it with a new laptop within 48 hours.
other than theft, the insurance also covers liquid damage, accidental damage, fire damage, flood damage, malicious damage. Most cases that occur is damage caused by spills of liquid milk, your coffee or your drinking water.

Laptop insurance company can guarantee your safety latptop with excellent service and handle your laptop problems quickly. so what are you waiting? your laptop insured immediately prior to the above things happen to your laptop without you knowing when it will happen.


Kamis, 10 Maret 2011

WoW Guide


World of Warcraft (WoW), who does not know with this game? This game is very famous among lovers of the game. but for newbies gamers, will be quite difficult to follow this game. then, you need to find wow guide who can guide you in playing world of warcraft. wow guides will guide you in making the strategy, build, and others. world of warcraft guide is very helpful for newbies gamers. you can quickly become a master world of warcraft by following the world of warcraft guides.


post by: www.4climategate.info

Selasa, 08 Maret 2011

Benefits of Computer Insurance




Today, the computer is an absolute tool of its existence and become a necessity in everyday life. but have you insure your computer? computer insurance is very important for people who have important data inside the computer. computer insurance will protect all the bad things that will happen on your computer.

computer insurance protection can be divided into some sections. there are:
  1. 1. Computer Hardware insurance that protects your computer hardware from damage or theft. compensation that would have got is something that you agree when you register your computer on a computer insurance providers.
  2. 2. insurance computer software that protects your data from any damages that occur on your computer software. although the price for software is quite expensive insurance, but please take into account how important and valuable data that your computer have?
  3. 3. lost computer, if there is theft of computer / laptop.

several benefits that will you can if you insure your computer, you will definitely calm them, because your computer will be protected from any risk arising from accident, disaster or things that happen beyond our expectations which can cause your computer to be damaged or lost .
we never know when it will happen something bad had happened to us, especially our computer.
before you insure your computer, you should compare various computer insurance providers, to review further the advantages and disadvantages of the service provider computer insurance. this is done to minimize risks that occur on our computers. and also secure your computer from all the bad things that could happen happened to you.

so, what are you waiting? immediately insure your computer before bad things happen to your computer and its hardware and software.

Minggu, 06 Maret 2011

Dibayar hanya untuk Online

Siapa yang nggak mau dapat duit tanpa bekerja? Ini akan menjadi solusinya. Anda tinggal daftar, download toolbar/ aplikasinya, install, biarkan, dan uang pun akan terus mengalir disaat anda asyik Facebookan atau twitteran.

  • a. Cashfiesta

  • Daftar dan download toolbar cashfiesta. Ketika anda online, maka poin anda akan terus bertambah. 1000points=US$ 1. ada juga bonus untuk referral sebesar 10%
    Daftar. untuk pembayarannya via cek.
    Info: cashfiesta.com

  • b. GOMEZPEERZONE

  • Daftar dan download aplikasi Gomez peer international. Setelah itu anda buka pada sistem tray, pilih preference dan isi dengan username anda dan klik SAVE.
    Di tahap awal statusnya adalah waiting setelah beberapa menit akan menjadi pending. Butuh 10-20hari untuk membuat statusnya jadi active.
    Bagusnya aplikasi ini akan aktif pada saat windows start up dan Dollar akan terus bertambah ketika anda online.
    Pendapatan dapat mencapai US$ 45/bulan. Lumayan buat bayar koneksi internet ataupun warnet.
    Ajaklah teman-teman anda agar bergabung lewat link referral anda. Anda akan mendapatkan US$ 1/teman yang bergabung.
    Daftar
    Info: gomezpeerzone.com

    The Rapture of the Church

    This world would be destroyed, all places will be razed to the ground, and all believers will be the end of the Hour that life on earth. and will begin a lasting kahidupan after the apocalypse. Christians believe that there will be an event called The Rapture of the Church. no one knows when these events will occur. only god knows when this event occurred.

    as people we just hope that there will be apparent that the best thing for all people on earth.

    Jumat, 04 Maret 2011

    Tips Meningkatkan Alexa rank dengan cepat di tahun 2011


    mungkin sebagian masih ada yang gak tahu apa itu alexa rank? definisi alexa Peringkat lalu lintas didasarkan pada tiga bulan agregasi data lalu lintas historis dari jutaan pengguna Toolbar Alexa dan merupakan ukuran gabungan tampilan halaman dan pengguna (mencapai). Sebagai langkah awal, Alexa menghitung jangkauan dan jumlah tampilan halaman untuk semua situs di Web setiap hari. Peringkat Alexa trafik utama didasarkan pada rata-rata geometris dari kedua jumlah rata-rata dari waktu ke waktu (sehingga peringkat situs mencerminkan baik jumlah pengguna yang mengunjungi situs tersebut serta jumlah halaman di situs dilihat oleh para pengguna ) – translate by google” itulah pengertian alexa rank.
    Alexa rank biasanya digunakan acuan bagi yang menguangkan blog para blogger dengan mengikuti paid Review seperti ReviewMe, jual beli link, dan lain-lain.

    jadi, jika anda ingin meningkatkan alexa rank, berarti secara tidak langsung anda harus mendatangkan pengunjung. dan ini juga yang membuat saya kewalahan mendatangkan pengunjung. tapi ada alternatif yang bisa membuat agan-agan coba untuk mengikutinya, soalnya cara ini lumayan ampuh untuk mendongkrak Alexa Rank. dalam 1 minggu saya bisa menurunkan alexa sampai 3 juta. caranya baca dibawah ini:
    Tips Mendongkrak Alexa Rank di Tahun 2011 :
    1. install alexa toolbar pada browser yang anda gunakan. Menggunakan browser yang terinstall toolbar Alexa bisa ningkatinranking website kamu. Sebenarnya bukan hanya websitemu, setiap website yang dikunjungi browser yang terinstall toolbar Alexa juga mendapat “nilai” yang akan diperhitungkan dalamranking. Lalu, bukankah pengunjung pasti dari websitemu adalah dirimu sendiri? So, kalau browsermu sudah terinstall toolbar, maka penambahan point ranking akan terjadi secara otomatis.
    2. pasang widget alexa pada blog anda.
    3. membujuk orang lain untuk memasang alexa toolbar.
    4. tulis artikel tentang Alexa atau tips untuk meningkatkan alexa rank.
    5. tinggalkan link blog kamu di Forum-forum.
    6. blog walking, berkomentar di blog orang lain yang sedang populer. jika anda bertanya dimana? saya akan rekomendasikan anda untuk mengunjungi botd.wordpress.com . disana anda dapat berkomentar dan meninggalkan link di Top Blog Post(posting terbaik dan sedang ramai).
    7. terkait dengan tips no 1, anda main saja ke Warnet, dan jadikan blog anda sebagai Home Page yang akan tampil pertama kali jika browser tersebut dibuka. semakin banyak komputer klien di warnet yang anda setting home page nya, maka akan meroketkan Alexa Rank blog anda.
    sekian Tips Meningkatkan Alexa rank. semoga bermanfaat dan selamat mencoba.

    Kamis, 03 Maret 2011

    PERSIAPAN BELAJAR BISNIS DI INTERNET


    Pernahkah anda terpikir mendapatkan uang dari internet? Mungkin itu pertanyaan yang lazim bagi orang yang masih awam dalam dunia internet. Internet bukan hanya facebook atau friendster ataupun twitter saja. Tapi anda juga dapat menghasilkan uang dari internet.

    Bisnis di internet tidak memerlukan modal uang. Hanya bermodalkan E-mail, waktu, kemauan , alat pembayaran dan Blog(sebagian).

    Untuk pembayaran online kita hanya bermodalkan alat pembayaran yaitu PAYPAL atau ALERTPAY atau yang lainnya yang dapat kita peroleh secara gratis..tis..tis…. Saya ibaratkan paypal itu seperti tabungan. Tapi lazimnya menggunakan paypal.

    Jadi sistemnya begini:

    1. 1. Anda mengikuti program bisnis di internet
    2. 2. Jika uang yang dihasilkan sudah cukup untuk melakukan PAYOUT (batas minimum penarikan) maka anda transfer ke akun paypal anda tunggu beberapa waktu(tergantung website mengirimkan uang hasil usaha kita)
    3. 3. Setelah dari PAYPAL anda transfer ke rekening Anda.

    setelah punya akun paypal & ingin transfer ke rekening anda, anda harus memverifikasi dengan membayar sekitar US$2 dari kartu kredit anda. Karena paypal yang belum diverifikasi hanya dapat menampung penghasilan anda saja. Sayangnya jarang bank di Indonesia yang menyediakan layanan verifikasi lewat kartu kredit walaupun bisa, waktu yang dibutuhkan cukup lama(beberapa hari). Mungkin Cara yang paling Jitu adalah dengan membeli VCC(virtual Credit Card). Cari saja penjual VCC di Mbah GOOGLE yang harganya berkisar Rp.60,000 – 100,000 (tergantung penjualnya). Dengan VCC anda hanya butuh waktu 10menit. Setelah itu paypal anda pun langsung terverifikasi. Untuk pembelian VCC pertimbangkan kredibilitas penjual, jangan sampai anda tertipu. Jika status paypal anda sudah diverifikasi, anda bisa melakukan penarikan uang ke rekening anda & transfer antar paypal.

    Hati-hati jangan ceroboh membuka akun program pencari uang anda. Karena ada sebagian program yang mengharuskan anda hanya punya 1 IP address. Alias jangan pindah-pindah computer.

    Memakai Baju Muslim? Siapa Takut

    Muslim, muslim adalah orang yang beragama islam(setahu saya sih begitu). Tapi apakah anda yang mengaku muslim telah melaksanakan semua ajaran dasar dari islam? dari mana kita memulai? saya sarankan dari apa yang kita kenakan sehari-hari. sebagai seorang muslim figur yang kita contoh adalah Rosululloh SAW. karena Rosul Juga menganjurkan kita untuk memakai pakaian yang menutup aurat. dan pakaian yang beliau maksud adalah baju muslim(bagi laki-laki) dan baju Muslimah(bagi perempuan).
    seiring berjalannya zaman, kini Baju muslim dapat dipadukan dengan berbagai aksesoris, bahan kain, dan lain-lain. seperti baju muslim yang dibuat dari bahan dasar batik yang merupakan warisan budaya Indonesia. juga diciptakan dengan berbagai model sehingga dapat dipakai untuk beribadah sholat, pengajian, ke perkawinan dan bisa juga untuk santai dalam sehari-hari.
    sedangkan untuk busana muslimah, tersedia dengan variasi mode. seperti contoh dipakai pada jilbab, jilbab bukan hanya dijadikan penutup kepala dan pelindung dari panas matahari. akan tetapi bisa di serasikan dengan baju yang dikenakan. juga untuk pakaian bagian bawah, bisa memakai rok, kadang juga ada yang matching dengan celana(tapi jangan yang ngetat karena dapat menimbulkan nafsu lawan jenis). selain itu pakaian muslimah harus bisa dijadikan sebagai pakaian sehari-hari. Selain matching, Anda juga bisa terhindar dari siksa neraka.


    post by: 4climategate.info

    Twitter Delicious Facebook Digg Stumbleupon Favorites More

     
    Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | coupon codes