31 December 2015

How to send Bit Commands Networking

User1 when the computer is using the user computer 2 (file server), the network must take the file from the hard disk on the server, move it... thumbnail 1 summary
User1 when the computer is using the user computer 2 (file server), the network must take the file from the hard disk on the server, move it over the network, and sends it to a word processor on the user computer 1. Before transmitting the contents of files over a network, the file server must read the file from a floppy disk , Subsequently, the file server must transmit bits over the network.

Whenever the flow of electricity running through the wires, you can put a device at the end of the cable in order to feel something else on the electricity flow. Something that can be felt is the voltmeter. Bye electric voltage is electricity that flows through the cable. In networking, to send bits, the sender can change the electrical voltage at one level to indicate a binary 0, and the other to indicate a binary 1.

For example, to transmit bits, the NIC in the computer User 2 send some electrical signals through wires. The appliance is at the other end of the cable into the PC NIC User 1 this case further interpret the arrival of electrical signals. In order to work, both NICs must meet the standard transmission equipment. For example, imagine if the NIC User 2 sends an electrical signal a + 5 volts to transmit a binary 0 and +10 volts to transmit a binary 1, then the network will not work because User 1 is not going to know what is in User 2 sent to him.

Transmission physical bits can be much more complicated than these examples, but the basic idea remains the same, placing the delivery of electrical devices on the cable, which is interpreted as a binary number by a device at the other end of the cable. The term encoding refers to the process of taking a binary value and produces an electrical signal that is appropriate to be able to transmit bits over the network. Ecoding rules that are used to transmit the data specified by the standard networking.

Once Sent Bit A Time Package


Even if you read an example of a particular networking standard for transmitting the bits, some other standards in need before the two computers can communicate well. For example, imagine if User 2 can transmit the contents of a file successfully, but some data is lost, as are shown in Figure below.

Bit Commands Networking
Bit Commands Networking


In normal operation, the devices - devices in the network to send bits in groups, commonly called a packet. For example, User 2 sends the first part of the file performance first package, the next part of the file in the next package, and so on. Package is just a bunch of bits, combined for the transmission network. You can imagine the package as a package - a package store a few bits to you when bits - the bits sent over the network. Why network using packet ?? It's like if you work at a company selling widgets, you need to send one million widgets to a customer. Are you going to put it all in one box ?? Probably not. You will bring partly in one box, and partly to another box, until you've put all the widgets in several boxes. You will be sent a box - the box is the same place, and you may even send all the boxes on the same day. However, it will be easier to send the package - the package if the size of the box - the box more easily managed.

Similarly, instead of sending the entire contents of a file that may be billions - billions of bits in length if all tell the computer sends data in packets so that data transmission a little easier to handle. In fact, one of the reasons require a networking standard package form was as error recovery, you will learn in the next section.

What You Should Do When Bit Experiencing In Conflict


Now imagine if a second package that are shown in Figure 3.2 there is an error. If the second NIC is assumed that the +5 volt binary 0 and +10 volts is 1, what happens if the mains voltage is 15 volts? Or 7.5 volts? Of course, the power supply voltage will disrupt the NIC.

How did the error happen? Indeed, something simple person who is running the vacuum cleaner near the cable can cause changes in the electrical tension when electricity travels through wires. This phenomenon is called electrical interference. Formally, the electrical interference is the effect of a change in the electrical signal in because presence of several adjacent electrical signals. You all have seen or heard of electrical interference, such as when a television picture you slightly blurred, while the sound of AM radio you can not be heard when you're driving down the cable - high voltage power line, or when you hear a humming stereo sound from you when you was turn on the blender in your kitchen.

A good command for networking


The solution to the problem of transmission error usually occurs in the software on two computers with networking standard today. To rediscover the packet error, the computer software must agree to use the same networking protocol, a protocol that provides a method to identify two to recover from the error.

The protocol is a kind of a standard, in fact in some ways, protocols and standards are the same thing, but the term simple protocol that may be used to determine the lost data.

Error Recovery is a process that not only inform the general appearance of errors in the transmission paker, but also the demand to transmit packets back to the package well received. Rather than sending all the bits in the file at the same time, the use of the package enables to restore by simply sending another portion of the file.

29 December 2015

A good command for networking

Standard network depending on many standards to be able to do something useful. Before before discussing further standard, it is useful to c... thumbnail 1 summary
Standard network depending on many standards to be able to do something useful. Before before discussing further standard, it is useful to consider some networking standards. The next section discusses some basic - basic about how the data transmission between computers, how and why a set of bits has an error during transmission. But before, you should understand some of the terms in particular, bits and bytes.

Roadway through for a Bit To Get Byte


Two people communicate when one person says something and the others listen. If you would consider it, two people need to understand the same language, to communicate with people who spoke had to say a series of words. Word - the word itself is sound in combination. From a perspective, two people communicate in the same language, but at the other end of the spectrum, you may think that they communicate by making a series of sound.

A good command for networking

Likewise, computers can communicate to each other using the network, but with some perspective. For example, I'm using Microsoft Word to write the text in this article. When I send a file to my editor at cisco press, he used the same program to open the file and edit my files. So, can you imagine that our computers speak the same language. In this case, we understand both computer files in Word format with Microsoft, which is a word processor.

Relatively easy to imagine a file that consists of text on this article. However, at the same time, it is only a file set Byte each byte consists of 8 bits. It was a bit like when where you put the file folder in a file cabinet. You may be thinking that you just do something to save a file in the cabinet. From a different perspective, if the folder consists of plated - the sheet. Likewise, when the computer stores the files on the disk drive, the computer actually also save a file. However, from a different perspective, the computer also stores the bits that make up the file.

Computer file consists of a collection of binary digits. Humans typically use decimal numbering for example, 0, 1, 2, 3, .... 9, with ten unique digits. Binary only uses two digits: 0 and 1. This is because the computer hardware, at the most basic level, it can save one of the two electrical states in its memory, and it symbolizes a binary 0 or 1. Hence the phrase binary digit is composed of five parts if the spoken word, (at least in English), also because it is often too used, then condense the terms of bits.

see more : Build a Network: It Starts with Planning

To talk premises other people, you use the language, but it is actually the sound you produce a lot of small sounds. The sound is a combination of sound and then compose words and sentences performance language of your choice. Likewise, the computer might have a Word document or any other file on the computer useful. However, the contents of the file is only a small set of information, called bits. The bits of information are combined to make up part - part owned a computer in memory. (Meanwhile, the term refers to a series Byte 8 bit on most computers.)

When computers are communicating, the application needs to send something to an application on another computer. For example, when you see the web page, in which there are contents that consist of a single file or in more. Applications need to transfer the contents of a file to another computer. To that end, the computer sends a series of bits to another computer as a file is simply a series of bits.

Build a Network: It Starts with Planning

Face this reality: without good planning, everything that involves a lot of people would be fatal. There is even a popular proverb about the... thumbnail 1 summary
Face this reality: without good planning, everything that involves a lot of people would be fatal. There is even a popular proverb about the importance of planning, such as "those who fail to plan, plan mean failure."
The network can not operate unless all networking vendors follow the same plan or standards. Networking standards define the rules to be followed by anyone who makes networking products, including cables, hardware, and software. When you follow those standards, the product should be run simultaneously.
This paper outlines some of the most popular standards and explain the miraculous advantages in the use of standards for networking.

Comply with the rules (Rule)

Anyone who has ever spent time teenagers and I think most people who read this article at least once a teenager knows that the time was a time of rebellion. Rather than comply with the rules, sometimes they just think that rules are made to violated! In some cases, breaking the rules may be allowed, however often, as it is known by the parents, a policy to create and customize self-regulation can be realized after thinking even in teenagers.

Standards are rules that make life much easier. For example, Look at the outlet located at the nearest wall. If you live in the United States, you may see an electrical outlet with three holes - two holes for teeth with a flattened metal, and a tooth for a round hole. Teeth are flattened parallel to one another. If you go to the store and buy a lamp, you hope that the lamp is equipped with a power cord, and you hope one end of the cable fits into the outlet. That is one example of popular standards. If you go to the store and buy a toaster, can opener, and a stereo, you expect the seller to adjust the working standard outlet in your country.

However, if the link between the story with networking? standard tends to limit one particular thing, such as a contact form and connectors used by the electrical outlet and power cord. Other standards may adjust the amount of juice (voltage) flowing through the outlet, whether it is AC or DC, whether that equipment, and so on. All standards are important and must be followed to prevent the explosion of the lamp. In short, it does not mean that just because you can turn on the lights, then all important standards used. Likewise, Networking has a standard physical details so that you can install the cable. However, network devices must also support other standards so that the network is working properly.

Rule, School for Networking

Some standards still required even though a simple network, this will show images below standard in the use of Networking.
Build a Network: It Starts with Planning
Both PC has installed NIC, and each card has a container into which a cable can be connected. NIC aalah computer cards that enable computers to send and receive data over the physical network. The word behind the acronym NIC (network interface card) is quite reasonable because the NIC is a computer card that provides the interface between the computer and the network.

Standard networking sets some type of connector. Connector cable is a physical endpoint, with a certain size and shape. For example, an electric power plug at the end of the electrically charged wires may have two flat-edged teeth and one tooth tipped round. With a networking cable, plug the cable end is not known, but the connector. Connectors hold the wire inside the cable. Standard connector also ensures that the connector according to the NIC interface.

So, two computers must implement the same standard about how the networking software on each computer ordered another computer about what she wanted to do.

29 November 2015

Reason Presence Network

CBI - Nowadays, almost everything you want done by utilizing a network of computer users. Indeed, the majority of today's computers do ... thumbnail 1 summary
CBI - Nowadays, almost everything you want done by utilizing a network of computer users. Indeed, the majority of today's computers do not need to communicate with other computers. However, most computers require it. In fact, many people now have multiple computers in their homes, and even computers - computers that need to communicate with each other.

However, computer users usually do not need to know everything about the network. In fact, most do not even know when they need a computer network and when not needed. Most users who use computers in their work knowing that somehow computers can communicate over a network and knowing that some of their applications can not be run when the network was shut down.

One of the best ways to network is to learn the lessons of what was done by the end user network. Most of you have used the network for work or at school. This article discusses the features - the basic features that might want to get by the end users of its network. Through the next part of the next article, I will explain the basis - the basis of how the network supports the end user.

Using Network By Coincidence
Some of the most common network services that have been hidden from the end user network. You can think of it as the cause of a service network usage by chance by the end user because he does not realize that the network was involved in the task - the task was doing.

To explain the network services "accident", I will use the shadow workers in remote offices. We call him Fred. Fred is the master of his own domain. He has a PC, Printer, and he can do all his duties without many interruptions from the central office. To carry out its duties a day - day, Fred opens a document using a word processor, change some text, and print a copy. Subsequently, he sent a letter to customers and save the changes - changes to the letter. Figure 2.1 shows the basic idea.
Reason Presence Network
Figure 2.1

Steps - steps in the following picture:
1. The word processing program reads the letter of the disk drive.
2. When Fred click the print icon, the PC sends a copy of the letter to the printer.
3. When Fred save the file, the program as a word processor to write the file back to disk.

Step one is often called a file is read, which means the computer to copy files from the disk drive memory to a computer so that the computer can doing. Furthermore, by doing dile write, computer replaces the old file on the disk drive with a new file that has been revised.

Fred lives quite well separately while, but like anything else, the changes sometimes - sometimes can occur. Fred growing company, and he can not handle all the work. Thus, the central office sends a hotshot, named Wilma, Fred remote office to work with him and help him finish the job.

Wilma brought high-end PC fast power-dooper her to his new office and install a network. He also took over the old printer Fred and will connect to his PC. Became the ruler of the strange, Wilma also copy all customer letter from Fred PC via their own PC. Figure 2.2 shows the general concept similar to a simple LAN in Chapter 1, "Network That Is?"
Reason Presence Network
Figure 2.2

Wilma set everything, including the network, so that he knows how the network works. But Fred did not understand why she was confound everything up like that. So, in the morning - morning, after drinking a cup of coffee, Fred lit a word processor, take the diskette, and walked toward the Power-dooper computer Wilma and copy a customer letter to the disk. He walked back to his desk, using computer clonkey renew his letter, and then walked back to the computer with a floppy wilma. Furthermore, Fred copy the file back to the computer wilma, replaces the old file, and use word processing on a computer Wilma, he scored a copy to be mailed to the customer.

In the example, Fred was not using the network. He instead uses a method called Sneakernet. Sneakernet is a sarcastic term that refers to a process that does not use a real network. But it goes back and forth between computers using floppy CD-ROM, move files manually and it takes sneaker [sneakers] comfortable!

Fred Sneakernet method can be implemented, but the way it takes more time than before to send relief headquarters, which is Wilma. Finally, Wilma visited the office and found Fred was using his rubber shoes are comfortable, ready - ready for - paced office.

"Fred, I think I forgot to tell you how to use the network! You do not even need to know that the network was there! If you see Drive C in a folder named Costumers, you will see the same files as you normally do. File - the file exists in my PC - File Server - but not invisible to you. Additionally, when you click the Print icon of your word processor, you will see the name of the printer SomeOldPrinter, clever name is not it? If you print on the printer, it will be printed on the same printer belongs to your parents even though he is connected to my PC. My PC is referred to as Print Server. So, you can print on the same printer yours. You can do your job the old fashioned way, from clonkey your computer, but you can still wearing rubber boots if you want it! "

So that the network can be operated, computer Wilma provide file service. File Service includes the process by which a computer, usually called a file server, save the file - the file on its disk drive and allow other computers to read and write to the file using the network. The term "File Server" refers to a computer that provides file storage on a disk drive and make it available to be read and written by someone else, in this case, the computer Wilma. (Disk drives are components of a computer where you can save files permanently.)

Likewise, Wilma computer providing print services, a process in which a computer allows other computers to print files to a printer that is physically connected to the computer. Print server refers to a computer that provides printing services.

Fred computer can still do all three steps are shown in Figure 2.1, but that is not known Fred is the fact that the work to read, print, and write occurs across the network.
Remember that a network consists of Software, Hardware and wiring which allows various computers to communicate well.

The Different Types of Computer Networking Traditional

So far, you have seen only a simple network with a few computers. Particular, the Network exists in various shapes and sizes. So, it is usef... thumbnail 1 summary
So far, you have seen only a simple network with a few computers. Particular, the Network exists in various shapes and sizes. So, it is useful to consider some other examples from the network before jumping to the next lesson.

Large companies, Many Sites: WAN Enterprise

Shadow if you work at a company that has many physical sites located in separate states. For network users, you might realize that the network connecting all sites. For example, you may be able to view information about the program is favorable, Fill out the form to change your retirement plan investments, and so on. You know that the Man Resources department located in the central office, and you are placed in a small branch office. So, you could easily assume that your company needs a network, in such cases, WDE Area Network (WAN) enterprise. FIGURE 1.6 illustrates an example of that.
WAN Enterprise
Figure 1.6 - WAN Enterprise
In the picture above, you can see the three branches are located far apart, Each - each with a pair of PCs and printers. Headquarters site has more users (because there are a lot of PCs) and servers. Eraser remote site has a LAN, more resembling Most LANs which have been shown previously. However, the network now include images of cloud shapes called WAN. WAN is actually a part of the network through which computers on each - each site can send and receive data from a computer connected to the LAN at other remote sites.

Most people refer to the network are shown in Figure 1.6 as an Enterprise Network because the network is owned and manufactured by a company, and a company can be considered as an enterprise. You will also hear the network type as Enterprise WAN for Enterprise network typically used as part of an overall WAN.
Just you and me and the whole world - the Internet

Internet - indeed with the capital letter "I" in the "Internet" has significantly changed the lifestyle of people - people. The Internet has penetrated the world and allow the exchange of ideas worldwide freely among billions of people.

The Internet is not a network to another, but more unique again. Its uniqueness is that virtually all enterprise network connected to the internet. In addition, the individual user can also connect to the internet. To run everything, the Company named Internet Service Providers (ISP) provides services to companies of any individual in order to connect them to the internet. The result? Almost all the computers on the planet can communicate with each other. Cultural implications of the Internet is much emphasis on comfort technology, and the technology was quite comfortable!

Again, the cloud shape Picture shows the existence of a part - part of the network, but the details remain hidden. The idea is quite simple: If we create a core network called the Internet, and all the companies and individuals connected to it, so everyone can communicate with each other. Now, the Internet has penetrated where - where, even you could almost get it for free !!.

Summary

Through this article, you have taken the first step towards a clear vision of networking. The computer network may consist of a pair of PC, some cables, and less hardware and software, which can commonly called LAN. As an alternative, a network may consist of hundreds or even thousands of computers in a large company, equipped with a large number of cables that wide - range and networking devices as well as a number of sites, which is commonly called Enterprise Network. Or a network is the Internet as a whole, which literally cover hundreds of millions of computers, Billions of people, some companies in the world, and a number of devices and network cables are countless.

A network is a combination of hardware, software, and cabling, Yang together - together allow various computer devices to communicate with each other. Regardless of size, Stu important thing about networking is all the applications on the network type.

About Server Guy, Cabling Guy and Network Guy

Central Bit of Indonesia - Depending on where you work, you may have a lot of different people - different working on the network. At some ... thumbnail 1 summary
Central Bit of Indonesia - Depending on where you work, you may have a lot of different people - different working on the network. At some companies, one person is responsible for all parts of the network. At another company, responsibility is shared between many different people - different. In some cases, you only need a few different skills for different tasks. In other cases, there may be a job in a different department for organizational reasons. Labor union personnel who often operate cable.

Therefore, other people often working on different aspects of the network, they estimate they themselves whether the network is and what it is not. So, like the three blind men and the elephant, each type of workers may develop a tendency to ignore or bypass part - the part that is in the network Although most people are not narrow-minded as people - people I have just described, people - people tend to build views their own based on their own experience and that applies also when working with the network.

For example, imagine a person who is responsible for the server. The person requires skill on PC hardware, but more importantly, he requires strong skills about software. The hard part and the fun part of its support with regard to the installation of server software, testing, administration, and troubleshooting.
However, Server Guy [person in charge and responsible for the server] may not know what is on the other end of the network cable. In reality, he may feel the scope as in the image below.

Server Guy
Figure 1.3 - Server Guy
Indeed, the size of the servers in Figure 1.3 rather look ridiculous. Nonetheless, Still it is the focus of a server guy. He also thought of the client PC. He saw the remaining tissue as a utility network. The term refers only to utility networks on the idea of ​​treating the remaining tissue as if you imagine the telephone, electricity, water, and so forth. You expect the network utility work, and indeed such is the case. Cloned partitions you are not too worried, but the network was not working.

Cabling Guy {person in charge and responsible for the cabling in the network and the Network Guy} {person in charge and responsible for network} is actually making a network utility. Cabling Guy, usually called the electrician, may also have a narrow view of the world. His work requires him organize cables - cables of any small space to the wiring closet. His work requires physical dexterity, knowledge about how to meet the standards of the building's electricity, and a willingness to air a little dirty - dirty while laying cables under the floor, in the sky - the sky, or in some other holes of the wall. Thereof, the network cabling.

Cabling Guy ensure that the cable is active in the channel from the wiring closet to every place closes in a building where the computer needs to be connected to the network.

Electrical mechanic} {cabling guy laying of cables usually take care of each wall plate to the Wiring Closet, With cable laying on the floor or in the sky - the sky. Wall Plate only provide plug into which an electrician can connect the cable short of all computer networking. Wiring Panel provides a place for an electrician to connect the cable ends so that the network technicians} {cabling guy can easily connect the end of the cable to the switch. Cabling Guy focus lies on Installing, testing, and troubleshooting wiring of each Wall Plate to the Wiring Closet.

Finally, Network guy - more commonly called network technicians responsible for the switch, Similarly to other hard ware and software that is used to create a network utility on the computer. Network technicians to install, support, and perform troubleshooting on the hardware and software on the switch. To do that, he needs to know where every cable laid and in which each switch port in the wiring in the connection. However, network engineers do not always need to know exactly where the wiring that runs to get to the wall plate. This view of his world was on show in FIGURE 1.5.

From the perspective of networking guy, only a cable that runs from the switch to each - each device. In other words, he ignores all the difficulties faced by an electrician so that all cables can function properly, however, he knows which computer cables in the plug to different specific port on the switch. {Switch typically has many places to be able to plug one of the networking between the wires. Where you plug the cable in the call Switch Ports. }
Network Guy
Figure 1.5 - Network Guy
 Network Guy also wanted to know the location where the server so he can confirm that the server really - really be able to send and receive traffic through the network. Network Guy might need to also know the type of services provided by the server. However, Network Guy usually need to know the server is slightly more than the server guy.

NOTE
Network in the previous pictures show some commonly called local-area network (LAN). LAN is a computer network or a local adjacent to one another. The second part I will discuss in more detail how where the workings of the LAN.

The interesting thing about the three types of networking and other workers as well is that they are all right on some things. Without wiring, the Network can not be worked. Without networking devices, Most of the network is not going to work. If you do those two things correctly, you have made the utility network.

However, without the server running, the end user will not do something useful with the network. Thus, the third Although workers may have different views about the network, they need to do their job better so that the network can be used.

24 November 2015

What is that network?

There is a story about three people are blind who went to the Zoo to study elephants. Each running and touching a different part of the elep... thumbnail 1 summary
There is a story about three people are blind who went to the Zoo to study elephants. Each running and touching a different part of the elephant's body. A touch of proboscis and thought that the elephant was like a snake. Another touching us and thought that the elephant was like a tree. A more longer holds its tail and thought that the elephant was like a rope. (there are many variants of this story, which you can find by looking for it on the internet.)

As much as an elephant and three blind people, many people have a narrow view regarding the actual network, you and everyone who reads this article has its own thought about networking. So, rely on your own experience, you might think of the network in a certain way. In contrast, other people may think of networking with other viewpoints. This chapter helps you get started building Computer Networking is more consistent and more complete with describes some different views about the network and not the network.

So.. What is a network?

I will begin with a good definition, and then give some examples about the network :
Network – a combination of hardware, software, and cabling (cabling), which together allow a wide range of computing devices to communicate with each other.

In short, the network enabling computers to communicate. However, this definition can be applied in a variety of different network types. So, some examples of the following images can help you.
What is that network?
The image above shows the basic idea about a particular simple network used by a company on a single site.
If given back his definition, the network consists of hardware and software. The picture does not show some hardware or wiring, line drawing in a network means that there there are components of the network, hardware, software and wiring, but the details are hidden because the details are not important in the discussion of this point.

The image above shows some of the important parts of the network, especially servers and client computers of end users, particularly Personal Computer (PC). In the network, the server provides some form of service to the users on the network. In this case, all users store files on the server, and they print goes through in the printer that is connected to the network. Some among you may operate on a daily basis, both at work and at school.

The simple network in accordance with the definition of a network. Although you can not see some details, the network allows computers to communicate. But like the three blind men and an elephant, depending on your job, you may have very different views about the real life networks.