Friday, October 28, 2011

CHAPTER I

CHAPTER I


INTRODUCTION



1.1        Background Of The Problems

Since development of system information technology, now has a lot to implement computerized system and network in various areas of companies which working in the sector of services or goods. Benefits of the information technology company which working in the field of goods or services no longer work manually, no longer hampered by the distance to each other in coordination with each company's internal divisions, subsidiaries, or even with other partner companies.


By installing a computer network allows us to combine the various skills that have the capacity of staff as well as various types of existing equipment, regardless of physical location of staff and equipment. Networking allows the utilization of shared among the users of the data files and applications, exchanging data and messages, and allows the implementation of the security system of the installation as a whole.

The network does not directly stand alone, there are steps that must be design such place or where the network will be in pairs, topology what is in use, the service network that is enforced, giving the IP Address, how many servers that will be used, network equipment will be used, medium networks transmission that will be applied, the use of network security systems and others.

Any network that has installed most likely still have shortcomings and need for the development for such networks can be more better. Deficiencies which exist on the network can hamper even able to stop the activity of a company if it is not in control at regular intervals.

Network which has been installed did not miss from the problems that must be overcome, problems that arise on the network can be of various aspects that exist on the network itself. To minimize problems arising in the behavior tissues network maintenance will be undertaken on a regular basis.

Based on the above, the authors analyze the existing computer networks, topology which used, how many computers are attached, systematization workings, data communication between computers, security systems from the network computer.





1.2 Limitation Of The Problems

Limitation of problems in the practical work of this report, that is:
1. LAN networks installed at the R.S Pelabuhan Jakarta only using the star topology.
2. Network address that is used in the R.S Pelabuhan Jakarta only using TCP / IP.
3. Security system installed at the R.S Pelabuhan Jakarta only using Antivirus.
4. Network installed in R.S Pelabuhan Jakarta are only Intranet.

1.3 Purpose Of The Study

The purpose of this practical work are:

1. To know and study the network attached to the R.S Pelabuhan Jakarta.
2. To analyze if there are deficiencies in the network and security systems which installed   in hospitals. Port of Jakarta.
3. As one of the requirements in the levels of educational programs taking Strata One (S1) in informatics of technology STT-PLN.

1.4 Benefits Of The Study

1. To determine the application of computer networks and security systems in the real world of work life.
2. Adding to the author's experience in studying computer networks.
3. Learn how to complete the tasks given.

1.5 Location And Time Of The Study

The location where the author is carrying out practical work in R.S Pelabuhan Jakarta. While time is of practical work since February 7, 2011 until March 7, 2011.

1.6 Systematics Of Writing

Systematics of writing used in the preparation of this practical work is as follows:

CHAPTER I INTRODUCTION

In this chapter the author describes various things that cause this practical work carried out and the things that cause the authors raised the issue to be discussed. This chapter describes in more detail about the background, formulation of the problem, boundary problems, purpose of writing, employment benefits and systematic practice of writing.

CHAPTER II COMPANY PROFILE

In this chapter will explain about the picture on the
R.S Pelabuhan Jakarta profile. In this chapter also describes the vision, mission, functions, tasks and organizational structure.


CHAPTER III REVIEW REFERENCES

In this chapter described the various theories underlying the formation of a network system, both the theory derived from the title, as well as supporting data from the explanation that the writer explained.

CHAPTER IV METHODOLOGY OF WORKING PRACTICES

This chapter describes the flow chart of the framework that has been the practice of writers do, at once shows the mindset or frame of thinking the author when starting and ending the practice of work activities.

CHAPTER V DISCUSSION

This chapter describes the discussion of issues that the writer take the title.


CHAPTER VI CONCLUSION

This chapter contains the conclusions the authors draw from the title of the writing and suggestions for writing or further development.


No comments:

Post a Comment