Tampilkan postingan dengan label Networking. Tampilkan semua postingan
Tampilkan postingan dengan label Networking. Tampilkan semua postingan

Rabu, 23 Maret 2011

Principles of Good Wiring

Cable is the foundation of any computer network. Without planning and installation are eligible, problems can arise from things that are not unexpected. In a certain scale, to address the issues of this kind may be needed efforts take time and exhausting, and this often means a network that forced non-active for long periods of hard to predict.For critical networks (critical systems) in an organization that puts the network activity as one of the business requirements, problems that lead to network downtime can not be tolerated. Therefore a comprehensive design, planning, measurable, and installation is a series of structured processes that need to be pursued seriously. The following are the principles that need to be considered in a structured network cabling (Structured cabling Systems-):
• The network has never been smaller or less complexity.
• Build a cabling system that is able to accommodate the needs for voice and data transmission.
• Always install the cable in excess of current needs. Extra cable is not needed now will be useful someday.
• Adhere to the standards set forth in the structured-cabling Standards when building a new cabling system. Avoid using proprietary tech cable.
• Use the cables and components are of high quality. Failure to turn off cable's most sophisticated applications. Quality does not always correlate with the price. Use the cable on the basis of reference, which has proven performance, and reputation of the manufacturer of quality cable.
• Install properly. Even with the best quality cables will not be meaningful without good workmanship.
• Plan for future needs. Just because Ethernet 1000BaseT impressed not too useful at this time, does not mean there will be an absolute need for the next 5 years.
• Documentation, documentation, documentation.

IEEE 802.3

IEEE 802.3 is a frame format which is the result of a merger of the specification IEEE 802.2 and IEEE 802.3, and consists of an IEEE 802.3 header and trailer and a header which the IEEE 802.3 IEEE 802.2 defines the physical layer and media access control sublayer of the data-link layer of the Ethernet standard wired
Here are some examples of standard IEEE 802.3 (Ethernet):
• Speed ​​10Base2 10Mbps, baseband technology, cable lengths up to 185 meters.Known as thinnet and can support up to 3 hosts in a single cable segment. Using a bus topology, both physically and logically with AUI connectors. Number 10 means 10 Mbps, base means using baseband technology, and the number 2 means the maximum distance of 200 meters before requiring a repeater. Network cards (NICs) using 10Base2 BNC connector (British Naval Connector / Bayonet Nut Connector / Bayonet Neill Concelman), and T-connector for connection to the network.
• Speed ​​10Base5 10Mbps, baseband technology, cable lengths up to approximately 500 meters. Known as Thicknet, using the topology of physical and logical bus with AUI connectors. Can reach 2500 meters with several repeaters and able to handle 1024 users for all segments.
• 10BaseT speed of 10Mbps, baseband technology, cable lengths up to 100 meters, using UTP cable category 3 (Cat 3). Unlike the 10Base2 and 10Base5, 10BaseT every device on the network must be connected through a hub or switch, and allowed only one Hub / Switch on each segment of cable. Using the RJ-45 connectors (8-pin modular connector) with a physical star topology and logical bus topology.
• 100BaseTX Speed ​​100Mbps, baseband technology, cable length 100 meters.Using 2 pairs of UTP cable with category 5, 5e or 6. There is only one host in a single cable segment, use an RJ-45 with a star topology (Star) physical and logical bus topology.
• Using 100BaseFX multimode fiber optic cable 62.5/125 micron size with a length of up to 412 meters. Using the ST or SC connectors with the topology of point-to-point.
• 1000BaseT speed of 1Gbps, using Category 5 UTP cable (Cat 5 and Cat 5E) 4 pair, with cable lengths up to 500 meters.
• Represents 1000BaseLX Singlemode fiber optic with a size of 9 microns and the signal emitted by laser 1300 nanometers. Can work with a distance of 30-10 kilometers.

Senin, 21 Maret 2011

TCP/IP

Transmission Control Protocol / Internetworking Protocol (TCP / IP) is a protocol that describes how all the transmissions that can be done via the Internet.


The basic concept addressing format of TCP / IP using a protocol called IP which has a length of 32 characters which are divided into 2 fields, namely netid and hostid;where netid is the network where the host is connected and the hostid is a uniqueidentifier for each host on a network. IP addresses are written as 4 where thenumerical value in a single numerical value, there are 8-bit binary number.


In the IP addressing class, divided into five classes where the class A of 0.0.0.0 - 127 255 255 255; Class B between 128.0.0.0 - 191 255 255 255; Class C between192.0.0.0 - 223 255 255 255; Class D between 224.0.0.0 - 239 255 255 255; Class Ebetween 240.0.0.0 - 255 255 255 255; To get the address previously used in thecalculation of binary numbers. For more details can be seen below table:





So little that I can share with and hopefully can be useful for friends as well. If there is a problem please share so that the problem can be solved together.

Sabtu, 19 Maret 2011

Wiring Principles of Good



Cable is the foundation of any computer network. Without planning and installation are eligible, problems can arise from things that are not unexpected. In a certain scale, to address the issues of this kind may be needed efforts take time and exhausting, and this often means a network that forced non-active for long periods of hard to predict.For critical networks (critical systems) in an organization that puts the network activity as one of the business requirements, problems that lead to network downtime can not be tolerated. Therefore a comprehensive design, planning, measurable, and installation is a series of structured processes that need to be pursued seriously. The following are the principles that need to be considered in a structured network cabling (Structured cabling Systems-):
• The network has never been smaller or less complexity.
• Build a cabling system that is able to accommodate the needs for voice and data transmission.
• Always install the cable in excess of current needs. Extra cable is not needed now will be useful someday.
• Adhere to the standards set forth in the structured-cabling Standards when building a new cabling system. Avoid using proprietary tech cable.
• Use the cables and components are of high quality. Failure to turn off cable's most sophisticated applications. Quality does not always correlate with the price. Use the cable on the basis of reference, which has proven performance, and reputation of the manufacturer of quality cable.
• Install properly. Even with the best quality cables will not be meaningful without good workmanship.
• Plan for future needs. Just because Ethernet 1000BaseT impressed not too useful at this time, does not mean there will be an absolute need for the next 5 years.
• Documentation, documentation, documentation.

TIA/EIA-568 standard for UTP cable

Chategory
Description
Category 1
Used for voice transmission, not suited for data transmission.
Category 2
Low-performance cable. Used for transmission of voice and low speed datatransmission; capacity of up to 4 Mbps.
Category 3
For voice and data transmission, frequency of 10 MHz, can be used for Ethernet, Fast Ethernet and Token Ring.
Category 4
For voice and data transmission, frequency of 20 MHz, can be used for Ethernet, Fast Ethernet and Token Ring.
Category 5
For voice and data transmission, frequency of 100 MHz, suitable for Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring and ATM-155 Mbps.
Enhanced Category 5
(Cat 5E)
Just like Cat 5 with an improved manufacturing process: quality of a better cable thanCat 5, the frequency of 200 MHz, suitable for Ethernet, Fast Ethernet, GigabitEthernet, Token Ring and ATM 155 Mbps. Able to handle 550-MHz broadband video, as well as 622-Mbps ATM, 1.2-Gbps, and 2.4-Gbps.
Category 6
The frequency of 250 MHz, with a similar capability with Cat 5E
Category 6 (STP)
Shielded Twisted-Pair cable, 600 MHz frequency, used for data transmission.Suitable for Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, and ATM high speed.
Category 7
Not yet standardized by the EIA / TIA, the frequency of 600 MHz, capable of reaching speeds higher than Cat 6, probably will require new kinds of different connector from the RJ-45

This type of network communication media

There are 4 basic types of computer networks communication media: coaxial cable, twisted-pair, fiber optic and wireless (wireless). Coaxial cables and twisted-pair cable is the construction with copper-based media (copper-based), while optical fiber made of glass or plastic, and wireless technology uses radio frequency and microwave as the media.Here are definitions of basic types of computer networks communication media:
• coaxial cable used in network environments with a high level of signal interference, the maximum capacity of 10 Mbps, and is quite difficult to install. Currently, the network with coaxial cable has been rarely used.
• Fiber optic is the choice for demanding high-speed LAN, also commonly used as a WAN connection or connections between buildings that require a guaranteed level of data security. Fiber-optic cable using light as a medium of instruction signals, so immune to interference Electromagnetic Interference (EMI).
• Wireless Media (wireless) has a flexibility that can not be met by cable-based media, and now very commonly used in public areas.
• Twisted-pair is the most popular types of media today, and can work on all types of existing networks. As the name implies, this cable is comprised of at least two mutually twisted copper rods to each other as in the DNA molecule. Require data transmission cable (2 pairs); pair to pair to send and receive data.
There are two variations of twisted-pair cables: Shielded Twisted-Pair (STP) and (UTP) Unshielded Twisted-Pair. Both variations are standardized by the Telecommunications Industry Association and Electronic Industries Alliance (TIA / EIA) through TIA/EIA-568 standard that defines a standard structured cabling for use in the industrial world (568A) and non-industrial (568B). TIA/EIA-568 standards specify the types of cables that can be used for a variety of applications, types of connectors, and minimum and maximum length allowed for each cable.




Jumat, 18 Maret 2011

Routing Information Protocol (RIP)

Routing Information Protocol (RIP) is a dynamic routing protocol used in local and broad-based network. Therefore, this protocol is classified as an interior gateway protocol (IGP). This protocol uses distance-vector routing algorithm.RIP is a distance-vector routing protocol, which employs routing hops as a metric. RIP prevents routing loops by implementing restrictions on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limit the size of the network that can support the RIP.A hop 16 is considered an infinite distance and used to denounce inaccessible, inoperable, or routes that are not desirable in the selection process.

Initially each RIP router management updates are transmitted every 30 seconds. At the beginning of deployment, routing table is small enough that traffic is not significant. As networks grow in size, however, it became apparent there might be a massive traffic burst every 30 seconds, even if the router is initialized at random.
There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng.

RIP version 1
RIP uses the classful routing. Periodic routing updates do not carry subnet information, lacking support for variable length subnet masks (VLSM). This limitation is not possible to have different sized subnets within the same tissue class. In other words, all subnets within the network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks.

RIP version 2
RIP version 2 includes the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain compatibility, the hop limit of 15 fixed. RIPv2 has the facility to fully operate with the original specification should be zero if all the protocol field in RIPv1 messages correctly determined. In addition, the necessary activation of compatibility features that enable interoperability.In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIP using unicast broadcast. Unicast addresses are allowed for special applications.RIPv2 is an Internet Standard STD-56.

RIPng
RIPng (RIP next generation) is an extension of RIPv2 to support IPv6, the next generation Internet Protocol. 

The main difference between RIPv2 and RIPng is:


Description 
RIPv2
RIPng
Network Support
IPv4
IPv6
Authentication
Support
Not Support
Needs in the entry route
Encode-hope for every entry route
Encode-specific hope for a set entry route

Routing

Routing is a process performed by the router to forward data packets are passed to the destination network from origin to destination address. A router that works on OSI layer 3 forwarding decisions based on destination IP address of a packet. To take the right decision, the router must learn a way to reach to the network that are not directly connected with it (the remote network). The first way is when a network administrator to write a routing table into the router configuration, a list of networks that can be achieved by the router in question. This technique is called with Static Routing, in the sense of each route should be added or removed from the routing table manually in order to reflect the actual network topology. In a large network, this kind of manual activity will take more time and less practical, requiring a more flexible way.
A router can recognize each interface attached to it, in other words, he also recognizes that every network connected directly to it by IP address on each interface is attached. If he collects the facts of this and put it in a Routing Table, then he sends this list to any other router that connected directly with him, and vice versa, he received a list of other router's routing table through the same process, then there was a process of Dynamic Routing .
The process of exchanging routing table is held in:

1) automatically, without the involvement of a network administrator to write a routing table, and
2) dynamic, meaning that every change in topology that occur will be distributed by the router is concerned, so that routing tables will be in a condition that is always up to date. Furthermore, each router's routing table to process the list he received from another router and forwarding decisions based on parameters that are more complex concerning the size of the network segment, the amount of bandwidth available from a link, and protocol-run. This will have significant influence if a router finds there is more than one route to reach to a segment of the same network.

tutorial packet tracer

Packet Tracer is an application developed by Cisco for network simulation. To performthe network configuration will be much better to do so in the first simulation will be more leverage pengkonfigurasian results and avoid mistakes. Especially for Cisco devices,packet tracer used. but even if not using the devices from Cisco, packet tracer can beused as learning about how to do the actual network configuration before the jump as anetwork administrator.
Below are some tutorials that can help your friends in learning about Packet Tracer:

situs resmi : Cisco

Network File System

NFS (Network File System) is one service that could allow a computer to mount a directory on another computer.Samba is a Unix application that uses the SMB protocol (Serve Message Block) where a lot of operating systems that use this protocol to communicate between clients and servers including Windows / DOS and OS / 2. Samba enables between a Linux machine to communicate with the machine Windows / DOS or OS / 2 because the use of the same protocol.


The history begins with human problems both when working in a computer where file sharing is necessary because it is a very important thing. Prior to the Samba and NFS, we can only do a job that uses a computer on one computer only and the problem of back-up data is very difficult.ConfigurationTo configure the NFS to the server we need to make as below:
1. Create a new directory which will be shared to the NFS client to be accessible by
2. The contents of the directory that was created above with an arbitrary file
3. NFS configuration by editing the file / etc / exports
4. Restart the NFS server service


To configure the NFS to the client there are 2 ways, among others:
1. Configuring NFS client using the mount command
    a. Create a directory to hold the data from the NFS
    b. Reading the shared directory from the NFS server
    c. Conducting trials in each directory / temp/dir1, / temp/dir2, temp/dir3 such as deleting files, copying files, add files, etc.
2. Configuring NFS client using the mount command
    a. Edit the file / etc / fstab
    b. Restart mount


To configure Samba to the server we need to make as below:
1. Adds script in the / etc / samba / smb.conf
2. Restart the Samba service


To configure Samba to the client we need to make as below:
# Smbclient / / 10.252.108.24/temp
# Smbclient / / 10.252.108.24/folder1Added interface ip = 10.252.108.8 10.252.108.25 bcast = nmask = 255.255.255.0
Domain = [PRAKTJARKOM3W] OS = [Unix] Server = [Samba 2.2.7a-security-rollup-fix]Smb: \> mkdir ok
NT_STATUS_NETWORK_ACCES_DENIED making remote directory \ ok

introduction mikrotik

mikrotik is that which stands mikrotikls derived from Latvian language, which means a small network where a router software that is installed in the PC called RouterOS.RouterOS is the operating system and software capable of producing an Intel-based PC / AMD is able to do dungsi router, bridge, firewall, bandwidth management,wireless access points and clients, and many functions. In RouterBoard election that must be considered include: the performance of the processor, memory (RAM), the number of interface (ethernet or MiniPCI), and level to level 3 license which is only seton the wireless client / PTP, to level 4, just set the wireless access point and a customfrequency