29 January 2016

Transmit Bit Through Local Network

Back to the previous tutorial " reason for existence Networks ", you have seen an example where User1 opens a file that is stored ... thumbnail 1 summary
Back to the previous tutorial "reason for existence Networks", you have seen an example where User1 opens a file that is stored on the disk drive User2. Furthermore, User1 print files to a printer connected to a computer User2, and finally, User1 save the file back to disk drive User1.
Transmit Bit Through Local Network
Use Server File/Print
So that the process is running, User1 and User2 must be able to transmit a series of bits stored in memory on a computer to another. A file is simply a collection of bits. So, imagine it using a word processing program on a single computer. You can open the file, read the contents, and edit and change files. Likewise, if you can send the same bit in the file to another computer over a network, then you or someone else can edit the file using the same word processing program on the computer. So, let the computer work, the network should be able to get a set of bits from one computer to another.

Controlling Bit Through Cables

To transmit a binary code from one device to another device, the devices generate electricity through the wire delivery. Electrical signal has many characteristics that can be controlled and changed by the NIC. Changing one value means a binary 1 and a binary 0 value means, allowing you to transfer data over the wire.

For example, imagine if both PC1 and PC2 have a NIC, and there is a single wire that mengoneksikan two cards. The thin wire, long pieces made of copper, and copper is able to mengonduksikan electricity very well. Now imagine if the encoding standard used by companies that cause the NIC established that binary 0 is represented by a power supply voltage of 5 volts and a binary 1 is represented by 10 volts. Encoding is a term that refers to a set of rules that define what kind of electrical signal to be made by the sender to implement the binary 0 and binary 1.

In the picture above, PC2 generate electricity in a wire. In this case, PC2 wants to send a binary value of 0101. So PC2 sends a signal of 5 volts, then 10 volts, 5 volts and 10 volts, because the encoding scheme imaginative in this example stating that the 5 volt mean 0 and 10 volts means 1. PC1, Another tip of the wire, felt the incoming electrical signals and interpret its electricity using the same set of rules to interpret the encoding as PC2 0101, to be exact.

Note that the graph shown in the figure above illustrates the different electrical voltage, or constant. Therefore, the X-axis (horizontal axis) present time, when the electric Voltage changed, the X-axis value immediately changes to the next.

utilization different and constant value, which subsequently changed rapidly to other value that allows (as shown above), is called digital transmission. To transmit a binary number, or binary digit, is very useful when the data transmission is done using digital transmissions.

The term bps (bits per second) often refers to the connection speed networking. Note when units are bits, not bytes. In fact, in particular LAN running at a much higher speed, with slow LAN transmit 10 million bits per second (Mbps, also called megabits per second).

28 January 2016

How Standard TCP/IP Evolving

As mentioned in the previous section, IETF manage the making of and agreement on standards and TCP/IP protocol. The core definition of the T... thumbnail 1 summary
As mentioned in the previous section, IETF manage the making of and agreement on standards and TCP/IP protocol. The core definition of the TCP/IP protocol in written documents called Requests for Comments (RFC). Each RFC defines several protocols or standards that are important for TCP/IP model. The term "RFC" originated from the fact that everyone can give an opinion regarding the current protocol protocot it in the review before it becomes a standard. In fact, the document is placed on the Internet so that everyone can see and give an opinion before the document became an RFC.

If you want to see some RFC which consists of models of networking TCP/IP, you have to do is use the connection to http://www.rfc-editor.org, you will be in a website that allows you to view some or all of the RFC. Most people learn to TCP/IP by reading the other sources (such as this article) before reading the RFC, which shows the high technical nature of the RFC. The point is every people can learn these standards, understand, and implement it.

Some TCP/IP Protocol The Good Popular

When learning something new would be very helpful if we use the example - a particular example. TCP/IP protocol is composed of various individuals. TCP/IP is actually a combination of two of the most popular protocol in the TCP/IP model. The next two sections present a little background of the two protocols.
Transmission Control Protocol (TCP).

How Standard TCP / IP Evolving
TCP Error Recovery
TCP provides several features, described in the next article, "Choosing Options Exspedisi when Menggangkut Goods Through Highway (Network)." However, considerations concerning some details at this time can help you in the overall concept of TCP/IP. The most impressive feature of TCP is error recovery, which works like the example in Figure 3.3. Figure 3.3 shows some imaginative protocol that is used as error recovery. Figure 3.6 shows images the same, but the details that are added to TCP.

To perform error recovery, TCP uses TCP header before user data. Note that the image above shows some square box, beginning with the word "TCP Header", and followed by "User Data". The header is a collection of overhead bits are added to the user data so that the protocol can do its job. For example, to perform error recovery, TCP packets need to be numbered. For numbered packets, TCP need a place to write down the number. Furthermore, TCP could give a number, called Sequence Number, the TCP header. TCP header part of a packet sent over the network.

TCP also set part of the header to control the number reply. TCP uses are ackowloadgement number in the header to tell the sender of the packet which get an error. Note that fred set the acknowledgment number on the number sign next packet expected to be received by user1. For example, when user1 show replies value 2, it means he gets the number 1 and number 2 hope to get next. Therein User2 know when to send the packet number 2 again. Process shows the expected next package, rather than lists of the last received packet, called forward acknowledgment.

27 January 2016

How to build the Local Roadway (Network)

So far, you have been reading how the network allows computers to communicate with each other. Software included in the network, the majorit... thumbnail 1 summary
So far, you have been reading how the network allows computers to communicate with each other. Software included in the network, the majority are in the computer and the other is in the router. The network also includes hardware, such as network interface cards (NIC) in the PC, which is mentioned in the previous article, "Building Networks" that starts with planning. Finally, enter your network cabling, which provide physical equipment to transmit bits over a network.

In the United States, most of the city, all the states, and the US federal government has a department of transportation (DOT). Each DOT plan, build, and resolve the issue concerning the highway. You can learn a lot about networking by comparing network and roads.

Bit control through Roadway Network

I just returned from lunch at one of my favorite places. At lunch, I get in the car, drove to the restaurant, ordered my favorite food and go home.
When I arrived home, my wife said, "So you drive a car through the streets is very cold outside for lunch huh?" Yes, absolutely. Who cares way as what I went through? My goals are more important.

Indeed, to know networking properly, you need to know some basics about the networking of similar lines. If you feel really interested in what will be discussed in the next article, you probably belong to one of the people - those who really - really want a career in the technical field of networking. If not, you should at least know the concept - the concept so that you can communicate with the networking geek in the entire world and have a strong understanding of networking.

What is a Local-Area Network?

Local-Area Network (LAN) set up as a network where the devices of his software are relatively close to one another. Of course, the network, once again according to this article, including computers, software, hardware, and wiring that allows computers to communicate. Although the definition is accurate, you really do not get a detailed picture of the LAN and in this way.
simple LAN components
simple LAN components
In this case, the LAN consists of multiple real elements. First, you need at least two computers. These computers must have networking software. Otherwise, computers will not be able to communicate. They also need the physical ability to transmit bits from one computer to another, here are needed cables and NIC in each computer.

No LAN simpler than this. A large LAN can be more complicated, with more components such as the HUB and Switch networking, you'll learn more in the next post.

26 January 2016

Exclusive Network Model to Prevent People Penetrate Networking Devices

Once upon a time, there is no network or computer. After that, the first computer made, but because no one else who can be invited Speaking,... thumbnail 1 summary
Once upon a time, there is no network or computer. After that, the first computer made, but because no one else who can be invited Speaking, not necessary a network! Finally, the second computer is made, and the need for networking has been started.

Network began to be developed as part of any offer computer vendor in the late 1960s, and eventually popular in the late 1970s. Each vendor computer networking to create a model of its own, which helps the computer so that a vendor can communicate easily.

Arrival networking, the two largest computer vendor in the world is the International Business Machines (IBM) and Digital Equipment Corporation (DEC). Then, IBM make its own model of networking, called Systems Network Architecture (SNA), and DEC to make his own, cleverly called DECnet.

Models Exclusive Networking vendors and others that are similar to the model is very good, the model enables the creation and implementation of the network, and can be operated, but not perfect. Problems on the exclusive networking models is have the quality exclusive model. So, the IBM computer can not communicate with computers DEC. Imagine if the same thing happens on the phone, you will not be able to call your best friend if he's using a different phone vendors.

Exclusive Network Model
As you can see, if a company wants to have some IBM computers and some computers DEC, then the company must have a separate network. Although thought it might be silly for now, imagine if you can only afford to buy a Dell PC as Gateway PC can not speak to Dell. That's the problem facing Exclusive networking models.

Two solutions emerged, short-term and long-term. Short-term solution, in association with kindness, just a form of capitalism long: DEC adjust its computers with models of the IBM SNA. Why? At that time, IBM gross income is approximately 10 times larger. So, DEC makes software that convert between standard DECnet and SNA standards. Software was not good, but it can be operated.

DEC create an gateway "DEC to SNA", which enables the devices of DEC and IBM SNA to communicate. The term gateway refers to a wide variety of networking devices that typically change one standard to another standard. As you can see, computer DEC easily act like an IBM computer, which uses SNA networking models. DEC just write some software, it operates on a device called a gateway, which converts into a DECnet SNA and vice versa.