Friday, October 28, 2011

CHAPTER III

CHAPTER III



REVIEW REFERENCES


3.1 NETWORK ANALYSIS [7]
Telephone network technology is very rapid development, has been able to reach all corners of the world and within the discovery of other electronic devices such as: Radio, TV , etc. With the speed of development of these technologies, that become intertwined. Organizations that have remote offices that distance can be easily checked on the progress of its performance by simply pressing a button.
The computer industry is relatively young compared to other industries, but only over the two decades since the discovery of an original computer system must occupy a large space today require a fairly small space and with the ability far more compact than previous computers the ability of .
Incorporation of computer technology and communication is very influential on the form of computer system organization. A concept of "Computer Centered" is an outdated concept. Single computer model that serves the entire computing tasks has been replaced with a set of computers amounted to many separate but interconnected in carrying out their duties, the system is called the Network Computer.
The history of computer network at the start in the 1940s in America, in a study utilizing a computer device want together. To equate a process without wasting a lot of free time, they invented the process of succession (Batch Processing).
In 1950's when the types of computers began to swell until the creation of super computers, the high cost of computer equipment then there are the demands of a computer must serve multiple terminals. From this it appears the concept of distribution of time-based process known as TSS (Time Sharing System). First form a network applied computer, the system TSS several terminals are connected in series to a host computer.
Furthermore, this concept evolved into the distribution process (Distributed Processing). In this process multiple host computers to do a great job in parallel to serve some terminals which are connected in series in each computer.
Then when the prices of small computers has begun to decline and the distribution process concept has matured, then the use of computers and networks have started a variety of start dealing with the process and communication between computers (Peer to Peer System) course without going through a central computer. To start developing the local network technology known as a LAN (Local Area Network). Similarly, when the Internet was introduced, it is mostly a stand-alone LAN start related and formed a giant network that called global level in terms of WAN (Wide Area Network).
In a network that has been in pairs and are considered to have less than the maximum functionality to the company or related institution is in need of analysis on the network, if later found fault location on the network and can be fixed for better performance.

1.2 DEFINITIONS OF NETWORK
Computer networks can be defined set of interconnection (interconected) a number of autonomous computers. Two computers are connected to each other when both are said to be able to exchange information / communicate with the media intermediary variants (wire, fiber optic, microwave, satellite) and a computer at say antonomous if there are no computers that control the other computers to start or stop [7] .


The purpose of communicating with each other is mentioned in the shared use of resources, namely:
• Sharing data and information (audio, video, text / document, etc.)
• Share hardware or network connected peripherals (printers, hard drive, CD Rom, etc.),
• Sharing of software applications.


Image 3.1 Share Pheriperal

Computer 1 and computer 2 has been connected network and a computer has a printer while the computer 2 does not have a printer and a document that should be in print, because both the computer / host has been connected to the network 2 computers can print a document without having to share a printer with pheriperal (printer) by the server or administrator. So the presence of any computer network can take advantage of all the artifacts on other computers connected to the network should always buy new equipment.
Thus the concept of sharing resources as one of the relations of mutual communication each computer when it is connected in a network.
Each network has a kind services offered or the previous configure. Based on the function, there are three types of computer network services, that is:
• Client Server / Server based
• Peer To Peer
• Hybrid
Of the three types of service over a computer network used by the network installed in RS.Pelabuhan Jakarta is the type of server Client / Server based. Client / server is a server based network with a dedicated computer as a server. A service / service can be provided by a computer or more. The cost is very expensive and requires a Network Operating System. Implementation, there are certain users who act as administrators and existing network management.


Advantages of Client Server / Server based, that is:
• Centralized data storage provides convenience for the management and backup of data,
• The use of optimal server specifications to accelerate the process of communication in the network,
• Ease of setup user and sharing expensive equipment,
• Security is guaranteed

The drawback of the server Client / Server based, that is:
• The cost of purchasing expensive server hardware and software,
• It takes a network administrator.

1.3 LAN (Local Area Network)
Of the several types of existing networks such as LAN, CAN, MAN and WAN network design in RS.Pelabuhan Jakarta only uses that are not Internet-connected but LAN.
Local Area Network (LAN) is a network of computer systems, which are located in one building is limited, a complex building or a campus, Local Area Network (LAN) is still much in use by various institutions.

Schematic example of a network image:
 

image  3.2 Local Area Network

LAN form a pattern of group work that allows computer users to communicate and exchange data using a device that already exist. LAN has provided much convenience in many ways that were previously hindered by distance can now be done instantly, because the LAN can exchange data / information quickly, cheaply and accurately. LAN now more use of technology by the IEEE 802.3 Ethernet switch, or with Wi-Fi. Most run at speeds of 10, 100 or 1000 Mbps. LAN can be connected to other LAN using routers and leased lines to form a WAN. Moreover, it can connect to the internet and get connected to other LANs using the tunnel and VPN technology.

1.4 TRANSMISSION MEDIA [1]
Information can be transferred from one place to another through two transmission media, which is guided and unguided media.
• Guided Media: information / data is transferred through the media that seem physically along the path where the signal is propagated; include twisted pair, coaxial cable, and fiber optics
• unguided media: use of an antenna for transmission in air, vacuum, or water.

1.4.1 Guided Transmission Media
In guided media, the wave is guided along the media that physically own media seem invisible to the eye, such as twisted pair, coax, fiber optics. While the media is in use on the network contained in RS.Pelabuhan Jakarta is twisted pair.

3.4.1.1 Twisted Pair

Twisted pair cable (twisted pair) is a form of wiring in which two conductors are combined in order to reduce or eliminate external electromagnetic interference such as electromagnetic radiation from unshielded twisted pair (UTP) and crosstalk between adjacent cable pairs.
        

Image3.3 Twisted Pair Cables
 

Image 3.4 STP and UTP Cables
Unshielded twisted-pair (UTP) is a type of network cable that uses a copper base material, which is not equipped with an internal shield. UTP is the most common type of cable is often used in the local network (LAN), because it's low cost, flexible and showed relatively good performance. In the UTP cable, there is one layer of insulation that protects cables from physical strain or damage but, unlike Shielded Twisted-pair cable (STP), the insulation does not protect the cable from electromagnetic interference.
Characteristics of Twisted Pair
• The analog signal amplifiers are needed every 5-6 km,
• Transmission of digital repeater is required every 2 or 3 km,
• Compared to other transmission media, twisted pair is limited in terms of distance, bandwidth and data rate,
• Susceptible to interference and noise because it is easily contaminated by electromagnetic fields.

3.4.1.2 Category 5 UTP cable
In connecting the Ethernet network using Category 5 UTP cable, there are two strategies wiring, namely crossover cable and straight-through cable. Crossover cables are used to connect two similar devices (NIC with another NIC, hub to another hub, etc.), while the straight-through cable used to connect the NIC to the hub or NIC to the switch.
Pengabelan UTP Category 5
 

Image 3.5 Wiring UTP Category 5 Straight
 

Image 3.6 Wiring UTP Category 5 Cross


5.3 Network Topology
For simplicity in the pattern of relations between one computer to another computer, LAN has some pattern in that a network topology. The following types of network topology installed on RS. Pelabuhan Jakarta:

3.5.1 Star Topology
In a star topology, each workstation connected directly to the server or switch.
Advantages of Star Topology:
1. Easy to detect errors, because the centralized network control.
2. Flexible in terms of installation of a new network, without affecting the existing network.
3. If one user's cable connection is lost, the only computer user in question are not working and does not affect other user accounts (the overall network connection is still working).
Star Topology Disadvantages:
1. Wasteful in the use of cable, if connected to larger networks and wide.
2. Control is only centered on the hub / switch so that the operations need to be addressed specifically.
 

Image 3.7 Star Topology


3.6 NETWORK SECURITY SYSTEM
On the network highly vulnerable to attack, either from network users, people who utilize the network and from a variety of viruses. Thus the network also need a security system that serves to protect the client and server to avoid the attack that might occur.

Antivirus 3.6.1 [4]
Antivirus is a type of software used to secure, detect and remove computer viruses from computer systems. Antivirus Virus Protection Software is also called. This application can determine whether a computer system has been infected with a virus or not. Generally, this software runs in the background (background) and do a scan of all files that are accessed (opened, modified, or when saved).
Antivirus - antivirus is now not only detect the virus. An antivirus program now also been equipped with the ability to detect spyware, rootkits, and malware - other malware. Not only that, now equipped with antivirus firewall to protect your computer from hacker attacks and to prevent the entry of anti-spam and junk email or virus to the user's inbox.


3.6.1.1 Development of Antivirus

1. The first generation: "scanner is simple". Antivirus programs scan to find a signature virus. This technical limited to detection of viruses that have been known.
2. The second generation: "smart scanner" (heuristic scanner). Antivirus uses smart rules (heuristic rules) to look for possible virus infection.
3. The third generation: the pitfalls of activity (activity trap). An antivirus program is a program resident in memory (memory resident programs). This program identifies the virus through its actions rather than the structure of the infected program.
4. The fourth generation: full protection (full featured protection). This generation Antivirus uses a variety of antivirus techniques simultaneously. These techniques include scanning and activity traps.

Antivirus 3.6.1.2 How it Works
In general, how the virus is:
• The detection by using virus signature database (virus signature database): The workings of this antivirus is an approach that is widely used by traditional antivirus, looking for signs of the presence of the virus by using a fraction of the virus code that has been analyzed by antivirus vendors, and has accordance with the type, size, power and destruction of several other categories. This method is particularly fast and reliable way to detect viruses that have been analyzed by antivirus vendors, but can not detect new viruses until the virus signature database into the newly installed system. Virus signature database can be obtained from the antivirus vendor and can generally be obtained free of charge via download or by subscription (subscription)
• Detection by the way how the virus works: How it works like this antivirus is a new approach borrowed from the technology applied in Intrucsion Detection System (IDS). This method is often referred to as Behavior-blocking detection. This method uses policy (policies) that must be applied to detect the presence of a virus. If any software behavior that is "not fair" according to the policy being applied, as well as software that tries to access the address book to send out mass e-mails to e-mail list within the address book (this way is often used by virus to transmit the virus through e-mail), then the antivirus will stop the process performed by the software. Antivirus also can isolate the code that is suspected as a virus until the administrator determines what to do next. The advantage of this method is an antivirus can detect new viruses that have not been recognized by the virus signature database. The drawback, obviously because of the antivirus software to monitor the workings of a whole (rather than monitor the file), then the antivirus often create a false alarm or "False Alarm" (if the configuration of the antivirus too "hard"), or even allow the virus to multiply in the system (if antivirus configuration is too "soft"), false positives occur. Some manufacturers call this technique as a heuristic scanning. Heuristic Scanning technology has progressed so far that now. Some anti-virus check on a file with the usual definition. If the usual escape detection, then the file is run in a virtual environment. All changes made file is like a virus, then the user will be warned.

Based Antivirus 3.6.1.3 Types of Users
Antivirus is based on users divided into two, namely the Home User and Network / Corporate User. For home users, antivirus running as usual. For the network version (network), antivirus scans on a computer - the client computer and network drives. In addition, the update client computers in the network do not have to directly from the Internet. Client computer can do upate directly from a network server.

Firewall 3.6.2 [6]
Today the network system configuration is rarely made with an open system, where things need to arrange for data entry and exit doors. Firewalls can be either a computer, router or communications equipment that filters access to protect the network from vulnerable, illegal interference, an accident or crime, for example to protect corporate networks from intruders illegally when computer users access to Internet service companies such as email.
There are some firewalls which contains features to control and prove who is accessing the system from the internet so you can protect sensitive data from the processes of disturbance. Firewalls can be either a set of hardware or software or can also be a set of rules and procedures established by the organization.
In protecting a network, the firewall has two main components, namely the packet filter and NAT (Network Address Translation). The firewall will filter all the packets that will go from the network in TCP, while the NAT serves as a protective detail private IP address used to use the LAN to the Internet.
NAT makes the network safe from outside attacks. There are some control of the firewall, namely:
1. Permited Services: Services that may traverse the firewall should be limited to applications that really allowed.
2. Restricted Flow Communication: Direct communication should be restricted and controlled firewall.
3. Access Control: user access rights should be restricted from nowhere and going where, when and what should or should not be accessed.
4. NAT: Enable hidden internal private IP network.
5. Message Control: Allows the firewall to not reply to scanning or sending messages of a protocol such as host unreachable, time exceede and others.
 

Image 3.8 Firewall
In general, a simple firewall rule will have a configuration as follows:
1. Block incoming access to ports below 1024 for TCP port where most of the services are sensitive to security threats such as finger SMTP (mail) and telnet.
2. Block all packets UDP (User Datagram Protocol) messages. There are some useful services that run over UDP, but the service is often used as a way to get into the system.
3. Blocking traffic to port 6000 from outside. Port 6000 is the port used for access to X11 servers and it also can pose security problems.
4. Closing ports and unused services, such as the File Transfer Protocol, Telnet, Database and other daemons.
The function of a firewall is that it can mengarjakan stout stuff to the network and our servers. Some of the main advantages to be gained by the firewall are as follows:
1. Firewall as the focus of security decisions.
2. Firewall support the security policy and ensures that security policy is made.
3. The firewall records user activity.

3.7 DATA COMMUNICATION
Specialize in data communication in the delivery of information in the form of text, images, etc. from one computer to another computer that has connected the network. Data communication can be viewed via the data transfer and  rate of time to the destination computer. To view the data transfer speed and the time required an additional application, because the network itself has not been able to show transfer of data and speed the time to send the information.
There are many software that can see how fast a data transfer network, one of which is Wireshark. Wireshark is a tool used to analyze network data, notify the IP address and notify the IP Gateway.

3.8 OPERATING SYSTEM [2]
Operating System is a software system whose job is to perform control and management of hardware and basic system operations, including run software applications such as word processing programs and web browsers.
In general, the Operating System software on the first layer is placed on computer memory when the computer starts up. While other software is run after running the Operating System and Operating System will perform the core public service for the software. Common core services such as access to the disk, memory management, task scheduling, and user interface. So that each software no longer need to perform the core duties of the public, because it can be served and performed by the operating system. Section of code that perform the core duties and the general is called the "kernel" an Operating System
When the computer system is divided into layers, then the Operating System is the link between the hardware layer and software layer. Beyond that, Operating Systems perform all important tasks in the computer, and ensure that different applications can be running simultaneously with the smooth. Operating System ensures other software applications can use the memory, perform input and output to other equipment, and have access to the file system. If multiple applications running simultaneously, then the Operating System right set schedule, so far as possible all running processes have enough time to use the processor (CPU) and do not interfere with each other.
In many cases, the Operating System provides a library of standard functions, which other applications can call functions, so that in each new program, no need to create these functions from scratch.
Operating systems generally consist of several parts:
1. Boot mechanism, namely putting the kernel into memory
2. Kernel, which is the core of an Operating System
3. Command interpreter or shell, which reads input from the user
4. Libraries, which provides a collection of basic functions and standards that can be invoked by other applications
5. Drivers to interact with external hardware, as well as to control them.
Some operating systems allow only one application running at a time (DOS), but most of the new operating system allows multiple applications to run simultaneously at the same time. Operating systems are referred to as Multi-tasking Operating System (eg UNIX family of operating systems). Some operating systems are very large and complex, as well as the input depending on user input, while the other Operating Systems are very small and made with the assumption that work without human intervention at all. The first type is often referred to as a Desktop OS, while the second type is the Real-Time OS. As an example, which meant that the operating system include Windows, Linux, Free BSD, Solaris, Symbian, and so on.
Along with the development of operating systems, more and more services become common core services. Now, an OS may need to provide network services and Internet connectivity, which was not a common core services. Operating systems also need to keep the damage to computer systems from interference destructive programs from other computers, such as viruses. List of common core services will continue to grow.
Operating system-the primary operating system commonly used computer systems (including PCs, personal computer) is divided into 3 major groups:
1. Microsoft's Windows family, which among others consists of the Windows Desktop Environment (version 1.x to version 3.x), Windows 9x (Windows 95, 98, and Windows ME), and Windows NT (Windows NT 3.x, Windows NT 4.0 , Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7 (Seven), which was released in 2009, and Windows Orient which will be released in 2014)).
2. Unix family of operating systems that use the POSIX interface, such as SCO UNIX, family BSD (Berkeley Software Distribution), GNU / Linux, MacOS / X (based on a modified BSD kernel, and known by the name of Darwin) and GNU / Hurd.
3. Mac OS is the operating system for computer output is commonly called Apple Mac or Macintosh. The latest operating system is Mac OS X version 10.4 (Tiger). Beginning in 2007 planned launch of version 10.5 (Leopard).
While mainframe computers, and super computers using many different operating systems vary, generally a derivative of the UNIX operating system developed by vendors such as IBM AIX, HP / UX, and others.
The following is the operating system in use at the RS. Pelabuhan Jakarta.
1. CentOS
CentOS is a free operating system based on Red Hat Enterprise Linux (RHEL). Additional software archives provide the latest version of its packets, packet-based RPM. CentOS stands for Community Enterprise Operating System (Operating System Company artificial Community / Community) which is an independent project that aims to provide a distribution of GNU / Linux is stable for institutions and individuals that do not really need the support to run the system they have.
CentOS distribution derived from the same source code with the distribution of RedHat Enterprise which already dominates the market users operating system GNU / Linux.
2. Windows Serever 2003
Windows Server 2003 is a version of Microsoft Windows operating system aimed at the corporate server market. Internal version number is a Microsoft Windows NT 5.2 build 3790. Formerly known as. NET Server, Windows. NET Server, or Whistler Server. This operating system is a continuation of the Windows 2000 Server system.
3. Windows XP
Windows XP is a line of graphical operating systems made by Microsoft for use on personal computers, including home and business desktop computers, laptops, and media center (Media Center). The name "XP" is short for "Experience". Windows XP is the successor to Windows 2000 Professional and Windows Me, and is the first Windows operating system version of consumer oriented built on the Windows NT kernel and architecture. Windows XP is available in various editions. The most common editions of the Windows XP operating system is Windows XP Home Edition, which is targeted for home users, and also Windows XP Professional, which offers additional features such as support for Windows Server domains and two physical processors, and is targeted at power users market , business and corporate clients.

3.9 EQUIPMENT OF LOCAL NETWORK
Network hardware used to make the network itself can work optimally. There are many network devices that can make the performance of a network becomes very maximum but most only use devices that are only in use for the characteristics of the company where the network was installed.

3.9.1 Switch
Switch is a device that unifies network cables from each workstation, server or other device. The difference is the way delivery / distribution of data on the network.

3.9.2 UPS (Uninterupted Power Supply) [3]
Uninteruptible Power Supply is a provider of electric power systems are very important and necessary as well as serve as a bastion of power failure and damage to system and hardware. UPS systems will become a very important and indispensable in many telecommunication service providers, information services, internet service providers and more. Can imagine how large losses resulting from power failure if the system is not protect with UPS.
The main function of the UPS are:
1. Can provide temporary electrical energy when the power failure occurred on the main power (PLN).
2. Provide sufficient time opportunity for us to immediately turn the main power generator in lieu of (PLN).
3. Provide sufficient time opportunity for us to immediately back up your data and secure Operating System (OS) to perform appropriate shutdown procedures when the main power (PLN) outages.
4. Securing computer systems from electrical disturbances that can disrupt the computer system in the form of damage to software, data or hardware damage.
5. UPS can automatically stabilize voltage when there is a change in the input voltage so that the output voltage that is used by the computer system in the form of a stable voltage.
6. UPS can perform diagnostics and management over itself making it easier for users to anticipate if it will be an interruption to the system.
7. User friendly and easy to install.
8. Users can control UPS through LAN network by adding a few accessories that are needed.
9. Can be integrated with the Internet network.
10. Notification in the event of failure by setting the UPS management software.




3.10 TCP / IP [7]
TCP / IP (Transmission Control Protocol / Internet Protocol) included in a series of communications protocol used to connect hosts on the Internet network. TCP / IP protocol uses a lot in it, as for the main protocol is TCP and IP. TCP / IP is built on a UNIX operating system and used by the Internet, to transmit data out of the network itself to network thereon. TCP / IP handles the network communication between nodes on the network. So the TCP / IP including one of the many existing computer communication language for communication between computers, it is because it can be said to be able to communicate is a must have the same language, in this case using the same protocol, although the type of computer and operating system although different does not matter. For example a PC computer with Windows XP operating system can communicate with a computer with Sun SPARC Solaris operating system, this condition is possible because both used protocol TCP / IP and is connected directly to the same network both local and internet though.
TCP and IP was originally developed by the Department of Defense in the United States. In his research is able to design the relationship between different networks. It was in the early success, the success of the research made some basic services that all people need such as file transfer, electronic mail, remote log on to a number of other clients and server systems. Several computers in a small environment department can use TCP / IP along with other protocols on the same LAN systems. The IP component going to the routing of the network within the department to the corporate network, then proceed to the regional network and ultimately to the global network Internet.
As well as communication protocols other TCP / IP has layers, while the lining consists of layers:
• IP is responsible for the transfer of data packets between nodes. Will forward IP packets on the basis of 4 (four) byte destination address (IP number). The Internet offers a different delegation of authority. To required IP operation performed through the next gateway machine by the machine where the gateway will set the data should be sent, whether to the network in the outer tissue underneath or above it, which in turn enabled the data moved all over the world.
• TCP is responsible for the submission of test data from client to server. Data can be lost in the network. TCP has the addition of support for error detection or loss of data and allows correct errors or restore lost data, so data can be accepted entirely at the receiver side.
• Socket is a name given to the package of sub routing to providing access to TCP / IP on many systems.
TCP / IP protocol that is widely accepted and practically become de-facto standard computer network-related traits contained the protocol itself.
• Protocol TCP / IP protocol was developed using open standards
• Standard TCP / IP in the form of Request For Comment (RFC) can be taken by anyone at no cost, RFC standard TCP / IP is the [RFC: 793, 791]
• TCP / IP was developed by not depending on the operating system or hardware
• Development of TCP / IP is done by consensus and does not depend on a particular vendor
• TCP / IP network independent of the hardware and can run on Ethernet, Token Ring, dial-up telephone lines, X.25 networks, and practically any type of transmission media (wired or wireless).
• Addressing TCP / IP is unique on a global scale. In this way, computers can connect to each other even though the current Internet network covering
• TCP / IP has facilities that allow routing so that it can be applied to the internet.
• TCP / IP has many types of services.

3.11 IP Address
IP address used to give the destination address for each data sent over the network, then any client or server should be given an IP address to be able to communicate with each other. There are 5 (five) types of addressing, namely class A, class B, class C, class D and class E. Class A common IP address in use is a class A, class B and class C, the first number in each class with the last digit is not recommended for use as a valid host ids, for example, class A 0 and 127, 128 and 192 class B, class C 191 and 224. This is usually used for loop back address / servise. IP addresses are in use on each client and server on the network in RS.Pelabuhan Jakarta is used class B.


Image 3.9 IP Address            

3.11.1 DHCP [5]
DHCP (Dynamic Host Configuration Protocol) is a protocol-based client / server architecture that is used to facilitate the allocation of IP addresses in one network. A local network that does not use DHCP to give IP addresses to all computers manually. If DHCP is installed on the local network, all computers are connected in a network will get an IP address automatically from a DHCP server.

No comments:

Post a Comment