Saturday, July 31, 2010

understanding of computer network, type - type of computer network and the benefits of computer networks and computer network hardware

Understanding Computer Networks

Computer network is a collection of computers, printers and other equipment that terhubungdalam unity and exchange data from one computer to another. Information and data moving through the wires to allow computer network users can exchange documents and data, scored on the same printer, and using hardware / software that is connected to the network. Each computer, printer or peripherals connected to the network called a node. A computer network can have two, tens or even hundreds of nodes.
A biasanyan network consisting of two or more computers that are interconnected and share resources, such as CD-ROMs, printers or exchange file.sehingga mengkakses facilitate us in a data.

Computer Network Benefits

if a computer connected to the network sebuuah will get a useful benefit to the user computer itself. benefits we can get the them:
a. Can we use bebagi each file (data sharing) with peer computers that are connected with our network.
b. Exchange of data between computers can be done quickly.
c. Allows users to use one computer network connected to the network printer together in a network area.
d. Improved work efficiency.
e. More cost savings.
f. Data files can be more easily maintained and protected.
g. Can we increase the system performance in accordance with the load of using computers in the network. We just simply add the ability of a processor and RAM if it needs improvement.

Types of Computer networking
computer networking in general differentiate into four types, namely LAN, MAN, WAN, and Internet. Let us learn to four kinds of network.
1. Local Area Network (LAN)
LAN (Local Area Network) is a network that is limited by a relatively small area, generally bounded by the area like an office environment in a building, or a school, and usually no further than about 1km square. Some models of LAN configuration, one computer is usually made in a file server, which is used to store software that govern network activity or as software that can be used by kumputer-computer connected to the network. Computer connected to the network (network) is usually called a workstation. viewed in terms of workstation hardware and software applications are no better than on the server. Most LANs use the media cable to connect between one computer to another computer.
The advantage of using LAN networks, among others:
a. Exchange of files can be done easily (File Sharing).
b. Use the printer can be done by all clients (Printer Sharing).
c. Data files can be stored on the server, so data can be accessed from all clients, and can protect themselves by the client so that guaranteed the security of the file
d. Data backup process becomes easier and faster.
e. Can connect multiple computers.
f. Can connect to the internet.

2. Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN) is a development of the LAN. This network consists of several interconnected LAN network. Location of this network can be far from each other, depending on the length of cable used. This network can also reach a different location places.
A MAN, usually covering an area larger than the LAN, for example between regions within a province. In this case, the network that connects several small networks into a larger area of the environment.
MAN may include companies that have offices adjacent and MAN can support voice and data, can even be connected with a cable television network. This network has a distance of 10-50 km radius.

3. Wide Area Network (WAN)
Wide Area Network (WAN) is a form of computer network consisting of LAN and MAN. WAN is a network of the scope of which usually are already using satellite facilities. WAN Network has been meeting the various needs of network systems, such as for general network, the network in the field of banking, buying and selling of tissue directly (online) on the internet. WAN using Internet protocols such as Network Service Provider (NSP). Without NSP, the WAN network will not work. With the NSP which is connected with a WAN network, it will establish an Internet network that is global. Thus the Internet can be accessed by people who will use this network.
WAN networks have several advantages, namely:
a. When connected to the Internet jaringa then transfer the files on places far from each other can be done quickly using email and FTP (File Transfer Protocol).
b. Having a broad network system so that it can reach the State, the continent, even the whole world.

4. INTERNET (international networking)
Internet network is a network of international scale, and this network is the largest network today. why for now? because who knows 10 years from now there is a planet other than Earth laindi network. so that the earth and the planet is forming a network. heheheheh

Kind - kind of hardware in a network.
1. Personal Computers
Personal computer or PC is a main device in a computer network.This PC was the one who will work to send and access data within the network. Determine the ability of a PC once the performance of a network. The higher capability of a PC then access will continue to be conducted quickly and smoothly.
2. Network Internet Card (NIC)
Portyang NIC is connect your computer with this card jaringan.Port or join in a personal computer attached to the Main Board or that called the device on board. NIC is off the board is not attached to the mainboard has the type of ISA and PCI. When this type are widely used Network Card PCI karenaPCI is capable of data transfer within the computer more tinggidaripada I SA.
NI CjenisISA
NI CjenisPCI
3. Wiring
Computer network is basically a cable network that connects one side to the other side, but by no means a closed curve, could be an open curve with a terminator diujungnya. Along with technological development, liaison between computers also experienced growth, ranging from telegraph technology that utilizes radio waves to optical fiber and laser technology. Selection type of cable is closely related to network topology yangdigunakan. As an example for this type of Ring topology typically use Fibre Optic cable (although some are using twisted pair). The bus topology uses a lot of Coaxial cable. The main difficulty of using coaxial cables is difficult to measure whether the coaxial cable yangdipergunakan really matched or not. Because if not truly be measured properly will damage the NIC (Network Interface Card) yangdipergunakan and network performance becomes constrained, not reaching maximum capacity. Star network topology jeniskabel many uses UTP. There are three types of cables that are typically used in networking,
namely:
• Coaxial cable
• Fiber Optics
• Twist ed pair
a. Coaxial cable
This cable is divided into two types: thick coaxial cable (has a fairly large diameter) and thin coaxial cable (has a smaller diameter).
1). Thick coaxial cable
Coaxial cable of this type is specified by IEEE 802.3 10BASE5 standard, where the cable has an average diameter of 12mm, and is usually given a yellow color. This kind of cable is commonly referred to as Standard Ethernet or ThickEthernet, or simply abbreviated ThickNet. Coaxial cable when used in the specification and aturansebagai networks have the following:
• Each end must be terminated with 50-ohm terminator (recommended using a terminator that has been assembled, instead of using a single 50-ohm resistors 1 watt, because the resistor has a fairly wide voltage dissipation).
• Maximum of three segments with the connected equipment or be populated segments.
• Each transmitter has an additional Network Card (External Transceiver).
• Each segment contains a maximum of 100 network devices, including repeaters in this case.
• Maximum panjangkabel per segment is 1640 feet (or about 500 met er).
• Maximum distance between segment is 4920 feet (or about 1500 meters).
• Each segment must be grounded.
• The maximum distance between pencabang from the main cable to the device (device) is 16 feet (approximately 5met er).
• The minimum distance between taps is 8 feet (about 2.5 meters

2). Thin Coaxial Cable
This type of coaxial cable widely used among amateur radio, especially for the Transceiver which do not require a large power output. To be used as network devices, this type coaxial cable must meet the standards of IEEE 802.3 10BASE2, where the average diameter ranging from 5mm and usually black or other dark color.Each device (device) is connected with BNCTconnector. This kind of cable is also known as Thin Ethernet atauThinNet. This type of coaxial cable, such as the type RG-58 A / U atauC / U, if implemented with a T connector danTerminator in a network, must follow the rules as follows:
• Each end of the cable or 50 ohm terminat given.
• The maximum length of cable is 1.000 feet (185 meters) per segment.
• Each segment is a maximum of 30 devices connected to the network
• Network Card is using the onboard transceiver, do not need an additional transceiver, except for the repeater.
• Maximum of three segments are connected to each other (populated segments).
• Each segment better equipped
with one ground.
• The minimum length between the T connector is 1.5 feet (0.5 meters).
• Maximum cable length in one segment is 1, 818 feet (555 meters)


b. Fiber Optic

Fiber Optic network using (FOR) are usually large companies, due to price and installation process more difficult. yet Thus, a network that uses FOR terms of reliability and speed are not in doubt. Data tranmitions speed with the media and free from 100Mbps FOR more environmental influences.

c. Twisted Pair Ethernet
Twisted Pair cable is divided into two types of shielded twisted pair (STP) and unshielded twisted pair (UTP). STP is a type of cable has a sheath wrapping whereas UTP has no sheath wrapping. For this type of cable connection using RJ-11 or RJ-45. In twisted pair (10 BaseT) network, a computer arranged to form a star pattern. Every PC has a twisted pair cable to HUB centralized. Twisted pair is generally more reliable (reliable) compared with thin coax, because the HUB has errorcorrection data capabilities and improve transmission speed. While there are several grades or categories of twisted pair. Kategory can be seen the list below: Delivery 1/2/3/4/5/6 category is the category of specifications for each copper cable and also to the jack. Each is a series of revisions to the quality of cable, quality cable wrap (insulation) and also for the quality of "entanglement" (twist) of each pair of wires. In addition, to determine magnitude frequency which can pass on the cable infrastructure, and also the quality of insulation so that it can reduce the effects of induction between cable (noise can be suppressed in such a way). It should be noted, too, and CAT5 CAT5 spesifikasiantara have enchanced the same industry standard, but on CAT5e already equipped with insulators to reduce the effects of induction or electromagnetic interference. CAT5e cable can be used to connect networks to the speed of 1Gbps

4. Modem
The Modulator Module modem or network equipment that is used to connect to the internet using the phone cord to network
5. Hub / Switch
HUB or Switch is used to connect each node in the LAN network.The equipment is often used in the star and extended star topology. Differences between HUB and Switch is the speed of data transfer.Namely 10:100 Mbps

6. Bridge
Bridge is a network equipment that is used to expand or break the network. Bridge works to connect and combine media network that is not the same as unshielded twisted pair (UTP) and fiber-optic cables, and to combine different network architectures such as Token Ring and Ethernet. Bridge meregenerate signal but does not perform
protocol conversion, so the same networking protocol (like TCP / IP) must walk to the two network segments connected to the bridge. Bridge can also support the Simple Network Management Protocol (SNMP), and has a network diagnostic capabilities. Bridge
comes in three basic types of Local, Remote, danWireless. Local Bridge directly connects Local Area Network (LAN). Bridge a remote that can be used to create a Wide Area Network (WAN) connects two or more LAN. whereare wireless bridge can be used to join LAN or connect remote machines to a LAN. Bridge operates to recognize the MAC address of the home address of the transmitting node and network data to automatically build an internal tablerouting. This table is used to determine to which segment will diroute package and provides filtering capabilities. Once you know where to segmen to deliver a package, the bridge will continue to deliver the package directly to segmen. If the bridge is not recognize packet destination addresses, the packet will be forwarded all these segments are connected except segment origin address. And if the destination address is in the same segment with the source address, the bridge will reject the package. Bridge also continue all these broadcast packets except segmen segment of origin.

7. Router
Routers are devices used to expand the network or network by continuing to break the packets from one network to another to netwrok logic. Routers are widely used in large internetworks using protocol family TCP / IP to connect all hosts and TCP / IP and Local Area Network (LAN) to the internet use dedicated leased line. Currently, there are still many companies using Cisco 2500 series router to connect two LAN (WAN with the members of the two LAN), LAN to an ISP (Internet Service Provider). Connections like this cause all workstations can connect to the internet for 24 hours. Router contains internal information tables called routering labels that make record of all known network addresses and paths that may be impassable. Router make the path a packet - packet based on the available paths and time journey. because using network packet destination address, the router works only if the protocol is configured routing protocol tables such as TCP / IP or IPX / SPX.This is different from the bridge nature protocol independent.

today so hopefully useful learning for all amenn!!!
1. understanding of computer networks, the definition of LAN, MAN, WAN, INTERNET.
2. types of network cables, network hardware.
3. free learning the computer network.


Friday, July 30, 2010

Intellectual understanding

Understanding Intellectual Property Rights
In general, the Intellectual Property Rights can be divided into two categories, namely: Copyright and Industrial Property Rights
Based on Law Number 19 Year 2002 About Rights
Notices:
Copyrights are exclusive rights for the creator or assignee to announce or its creation or
give permission for it by not reducing the restrictions- restrictions according to statutory regulations which valid. (Article 1 paragraph 1)
While the Industrial Property Rights include:

1. Patent
2. Brand
3. Industrial Design
4. Layout Design of Integrated Circuits
5. Trade Secrets
6. Plant Variety

Based on Law Number 14 Year 2001 About Patents:
Patents are exclusive rights granted by the State to Inventor of the invention in the field of technology, which for long certain time conducting his own invention or give consent to another party to implement it (Article 1 Paragraph 1).

Based on Law Number 15 Year 2001 About Brand:
Brand is the mark in the form of images, names, words, letters, numbers, the composition of color, or combination of elements those who have distinguishing features and used in activities trade in goods or services. (Article 1 Paragraph 1)

Based on Law Number 31 Year 2000 About Design
Industries:
Industrial Design is a creation on the shape, configuration, or composition of lines or colors, or lines and colors, or
combination thereof in the form of three-dimensional or two-dimensional which gives aesthetic impression and can be realized in three patterns dimensional or two-dimensional and can be used to generate a product, goods, industrial commodities, or handicrafts. (Article 1 Paragraph 1)

Based on Law Number 32 Year 2000 About Design Integrated Circuit Layout:
Integrated Circuit is a product in the form of finished or intermediate in which there are various elements and at least one of these elements are active elements, which partly or entirely interconnected and formed integrated in a semiconductor material that is intended to produce electronic functions. (Article 1 Paragraph 1)

Layout Design is the creation of three groundbreaking design dimensions of various elements, at least one of the elements is an active element, and some or all of the interconnection within an Integrated Circuit and the positions of these three dimensions intended for the preparation of an Integrated Circuit. (Article 1 Paragraph 2)

According to Law Number 30 Year 2000 About the Secret Trade:
Trade Secret is information not known by the public in technology and / or business, have economic value because
useful in business activities, and kept confidential by Trade Secret owner.
Software Intellectual Property Rights Preliminary
Before discussing the technical aspects in depth, we should first establish an understanding of non-technical aspects of an operating system that is Intellectual Property Rights Tools Software (IPR PL) The discussion starts with explaining the concept IPR in general, and more in IPR PL. Specifically will discuss the concept of Free Software / Open Source - PLB / ST (Free / Open Source Software - F / OSS). This discussion is not intended as such ideology indoctrination! Precisely which expected:

1. Streamlining the mistaken perception of PLB and ST, as well as an explanation
2. differences and similarities from the two concepts.
3. What should and what should not be made with the PLB / ST.
4. Streamlining the perception that the authors of computer programs are not entitled to be paid decent.
5. Streamlining the perception that PLB should not be sold / commercialized.
6. Streamlining the perception that the PLB shall be disseminated.
7. Streamlining the perception that when the distribution is not required to include source code.

After listening to this paper, expected to be more understanding and better appreciate the meaning of PLB / ST in particular, as well as IP / PL is general.

''''Intellectual Property Rights (IPR) is a translation of the term''''Intellectual Property Right (IPR). These terms consist of three key words are:''Right'',''Intellectual Property''and''''. Wealth is an abstraction that can be: held, transferred, purchased, or sale. While the''Intellectual Property''is a wealth of all thought the power of intelligence products such as technology, knowledge, art, literature, composition of songs, writings, cartoons, and onwards. Finally, the IPR represents the rights of (Authority / power) to do something on Wealth Intellectual, which is regulated by norms or laws applicable law.

`` Right''itself can be divided into two. First, `` Basic Rights (Human)'', which is an absolute right which can not be bothered- sue. For instance: the right to life, the right to get justice, and so forth. Second, the `` Mandate Rights / Rule''is his right as given by the public through regulation and legislation. In various countries, including the American and Indonesian, IPR is Rights''Mandate / Settings'', so that the society that determine, how much intellectual property rights granted to individuals and group. In accordance with essentially all, Intellectual grouped as private property rights are intangible in nature (Intangible). Seen that the IPR is Granting of Rights General (Public) guaranteed by the Constitution. IPR is not is a human right, so the criteria for granting intellectual property rights is things can be debated by the public. What is the criteria for providing IPR? How long will acquire rights to intellectual property rights holders exclusive? Is IPR may be revoked in the public interest? What about the IPR on drug formulas for patients HIV / AIDS?
IPR legislation regarding the first time in Venice, Italy comes to patents in the year 1470. Caxton, Galileo, and Guttenberg listed as inventors who appear in this period and has monopoly rights over inventions them. About patent laws were then adopted by the British monarch in the Tudor era of the 1500s and later The first patent law was born in England about the Statute of Monopolies (1623). New United States has laws patent in 1791. Efforts to harmonize the first time in the field of Intellectual Property Rights occurred in 1883 with the birth of the Paris convention for the problems patents, trademarks and designs. Then the 1886 Berne Convention for problems Copyright.

Free Software
Smoking on the word of free software is that the exact user is free to run a program, change the program, and redistribute the program with or without change it. Since free software is not a matter of price, low price is not more free, or closer to free. So if you redistribute a copy of free software, you can just pull costs and get money. Redistributing free software is a good and legitimate activity; if you do this, please also take advantage. Free software is software that allows anyone one to use, copy, and distribute, either modified or not, free of charge or for a fee. Need emphasized, that the source code of the program should be available. If there is no source, it's not software. Tools Free software refers to the users' freedom to run, copy, distribute, study, change and improve the software. More precisely, refers to four kinds of freedom for the users at Software:

1. Freedom 0. The freedom to run the program for any purpose.
2. Freedom 1. The freedom to study how the program works and can be tailored to your needs. Access to the source code is a precondition.
3. Freedom 2. The freedom to redistribute copies so that software can help your neighbor.
4. Freedom 3. The freedom to improve program performance, and can spread to the general public so that all enjoy the benefits.Access to the source code is a precondition for this.

A program is free software, if any users have all of those freedoms. Thus, you should be free to redistribute copies,
with or without modification (changes), either gratis or charging a fee for distribution, to anyone else where too. Freedom to do all the above means you do not have to ask or pay for the license.

Free software does not mean `` no''commercial. Program Smoking should be used for commercial purposes. The development of free software was not commercially is a strange thing, and software is free commercial.

Software License

In Indonesia, the Intellectual Property Rights included in the category PL Copyright (Copyright). Some countries allow patents device software. In software industry, very large public companies has a patent portfolio, which amounts to hundreds, even thousands.
Most of these companies have agreements with cross- licensing, which means''I let you use my patent I may use the patents as long as you are''. As a result of law patents in the software industry is very detrimental to the company-
small firms tend not to have a patent. But there also smaller companies who abuse this. Many parties do not agree on software patents because costly software industry. A patent valid in a country. If a company wants to patent valid in
another country, the company must register its patent in the other country. Unlike copyrights, patents must be
registered first before prevailing.

Proprietary Software (Propriety)

Proprietary software (propriety) is software that
not free or even semi-free. A person can be prohibited, or must ask for permission, or be subject to other restrictions if
use, distribute, or modify them.

Commercial Software

Commercial software is software developed by businesses for profit from its use. `` Commercial''and `` ownership''are two things Different! Most commercial software is proprietary, but there are commercial free software, and there software is not free and not commercial. Instead, this term not used.

Semi-Free Software

Semibebas software is software that is not free, and but allow each person to use, copy, distribute, and modify (including distribution of version which has been modified) for a particular purpose (Suppose a non-profit). PGP is one example of a program semibebas. Semi-Free Software far better than proprietary software, but there are still problems, and one can not use it on free operating system.
Public Domain

Public domain software is software that, without rights copyright. This is a special case of non-free software copyleft, which means that multiple copies or versions that have been modification may not be free at all. Sometimes there are
use the term `` free''public domain, meaning `` Give away''or `` is available free of charge ". Yet''`` public domainis a legal term which means `` not copyrighted''. For the sake of clarity, we recommend to use the term `` Public domain,''in the sense of it, and use another term to interpret the terms of the other. A masterpiece is a public domain if the owner of the copyright so demands. Furthermore, copyright has a time expiry. For example, most of them are classic lagulagu public domain, because it has passed the expiration period of rights copyright.

Freeware

The term `` freeware''is not clearly defined but usually used for packages which permit redistribution but not modification (and the code is not available). Pack- This package is not free software.

Shareware

Shareware is software that allows people to redistribute copies, but those who continue to use it are asked to pay a license fee. In
practice, people often disregard the distribution and do this anyway, but actually agreement does not allow it.

GNU General Public License

(GNU / GPL) GNU / GPL is a set of distribution terms specific to the copyleft a program. GNU Project use it as a distribution agreement for most GNU software. An example is the common GPL license used in Open Source software. GPL gives rights to others to use an invention as long as modification or derivation of the creation of these products have a license the same. The opposite of copyright is public domain. Creation in the public domain can be used sekehendaknya by other parties.

Open Source

PL, even though their role is important, public understanding on Intellectual Property Rights Software (IPR PL) still relatively minimal. This Kebinggungan increases with increasing the use of Free Software (PLB) - Free Software - and Open Source Software (PLST) - Open Source Software (OSS). PLB is often disalahkaprahkan as PLST, even though their actually there is some fundamental difference between both approaches. Basically, the more priority to PLB fundamental freedoms, while more major PLST practical utilization of the OT itself.

The concept of Open Code Software (Open Source Software) on the point is open source code (source code) of a software. This concept seemed strange at first because is the source code of a software key. With logic known to exist in the source code, anyone else should can create the same software functions. Open source nothing more. That is, not be free. We could make software that is open-source its code, patented algorithmic, medaftarkan copyright, and continue to sell devices The commercial software (aka not free). open definition yangasli source, as stated in the OSD (Open Source Definition)
namely:
1. Free Redistribution
2. Source Code
3. Derived Works
4. Integrity of the Authors Source Code
5. No Discrimination Against Persons or Groups
6. No Discrimination Against Fields of Endeavor
7. Distribution of License
8. Not License Must Be Specific to a Product
9. License Must Not Contaminate Other Software
Some forms of business models that can be done with Open
Source:

1. Support / sellers, the revenue earned from the sale of media distribution, branding, training, consulting services, custom development, and support after the sale.
2. Loss leader, a free Open Source product used to replace commercial software. Widget Frosting, companies basically sell the hardware that uses open source programs to run hardware such as a driver or other.
3. Accecorizing, the company distributes books, hardware, or other physical items associated with Open Source products, eg the O Reilly book publishing.
4th. Service Enabler, Open Source software created and distributed to support the direction of sales of other services that generate money.
5. Brand Licensing, a company's earning with the use of trade name.
6. Sell it, Free it, a company started its production cycle as a commercial product and then turn it into an open source product.
7. Franchising software, this is a combination of brand licensing model and support / seller.

hopefully useful

Source: http://bebas.vlsm.org/

UTP cabling techniques and cross straiht computer network

Wiring is the little things that often in lalaikan by a network administrator or someone just learning the computer network. Slightly this paper we collated from various sources to make it easier for us all in learning about the science computer networks especially in the case of wiring.
Note:
1. Cables LAN (Local Area Network), commonly called UTP (unshielded Twisted Pair) and identified using the category level (category - CAT). When we need to create / install a new network, we should use UTP cable category 5, 5e, or 6 (unless there are special reasons and strong so we do not use the cables that category), which was made for the operation 10 and 100 Mbps LAN .
2. UTP cables there are two kinds, namely SOLID (SOLID), and stringy (Stranded). Both types of UTP according to the type of cable conductors located in the middle, called SOLID having a single conductor, while others called stringy having conductors that consist of several thin wires. Only one of the most obvious advantages of using UTP cable filamentous type (which is generally more expensive) is this type of very flexible, so it can bend to a maximum without breaking the conductor.
3. 100Base-TX cabling system we can use the 10Base-T network, but the reverse is not always able. So you should use the standard wiring 100base-TX/T4 ALWAYS.
4th. 100Base-TX standards can always be used when doing the wiring using UTP category 5, 5e, or 6, which used only two pairs of wires, or four conductors. Most of the information in this paper uses the assumption that the wiring using UTP category 5, 5e or 6.
5. When you use UTP cable category 3 or 4 with a 100Mbps LAN, must use the 100Base-T4 standard and has some limitations, and uses all four pairs of wires, or 8 conductor.
6. The maximum length of single pieces of LAN cable is 100 meters, when the length required is more than 100 meters, it can be used to connect switches to the next cable.
Use of Cable "Straight" and "Crossed"
The following diagram shows the general use cables "straight" and "crossed".


Note:
To avoid the use of crossed wires, some manufacturers provide a hub or switch uplink port. This port allows the use of straight cables for connecting two pieces switches or hubs.
Table of color codes UTP category 5 and 5e
Figure and table below shows the normal color code on the cable category 5, based on two standards issued by the TIA / EIA


10BaseT Straight Cable (PC to HUB / switch)
Straight cables are used to connect a PC or peralatanlain to the hub or switch. If your connection is PC to PC or HUB to HUB you MUST use a Crossed cable.
The following cable description is for the wiring on both ends (RJ-45), either by using the color scheme for the wires 568A and 586B category 5 (e).

Note:
Pin numbers are marked with an asterisk (*) is not used in 10Base-T network (10Mbps), and because in general the current used is 100base-T/T4 network (100Mbps), then it is better to use wiring standards 100base-T/T4.
We use the 100Base-T4 cabling specification that can be used in 10Base-T network.
10Base-T Crossed cable (PC to PC or HUB to HUB)
Crossed cable used to connect a PC to PC or HUB to HUB. Crossed cable are sometimes called Crossover Cable, Patch or Jumper. If your connection is PC to HUB you MUST use a Straight cable.
The following table shows the order of the wiring on both sides / ends at the RJ-45 Male, in a Crossed cable.


Note:
On systems 10Base-T (10Mbps network), the numbers with an asterisk (*) is not in use, but because we will use 100base-T/T4 system, so that for us will always include the wiring number 4, 5, 7 and 8.
100Base-T Straight Cable (PC to HUB / SWITCH)
Straight cables are used to connect PCs or other equipment to a HUB or Switch. Please remember that to connect a PC to PC or HUB to HUB you MUST use a Crossed cable.
The following table shows the wiring at both ends of the RJ-45 connectors with a hint of color on the cables category 5 UTP.


Note:
1. Cables marked with two asterisks (**) in the network NEEDED 100Base-T4, also for the system Power-Over-Ethernet (POE).
2. POE system specs there are three ways in which power (power) delivered through UTP cable. Two of the ways POE, penghantaran power (power) using cable pairs 4, 5 and 7, 8 (marked with two asterisks (**) in the table above), while the other method only uses a cable partner for both 1.2 and 3.6 signals or power. Commonly used are 4.5 and 7.8 pairs used to deliver power.
100Base-T Crossed cable (PC to PC or HUB to HUB)
Crossed wires commonly used for the relationship between PCs, or between the HUB. Often referred to as a Crossover cable, Patch atauJumper. To connect the PC to HUB you generally use a straight cable.
Below shows the wiring at both ends of the RJ-45 connectors of the wires crossed. The diagram below shows the crossing of four pairs of UTP cables and wires can be used on categories 3 and 4. In 100Base-TX network, cable pairs 4.5 and 7.8 do not have crossed.

Notes:
1. Most Crossed wires in use today are not crossed cable pairs 4.5 and 7.8. Over three-quarters did not use the media cable wiring system crossed like that will not cause problems.
2. Gigabit Ethernet uses all four pair UTP cable (8 conductor) crossed wire configuration for it, like the picture above.
When using POE, the POE system Model A or Alternative A uses pairs cables 1.2 and 3.6 for the data while the power. While on the Model B or Alternative
1. B, using a pair wiring for data 1.2 and 3.6, while the power through the cable pairs 4.5 and 7.8. POE typically use diode bridge, so the crossing of the wires 4.5 and 7.8 generally no effect.
Ordering Pin On RJ-45 connector
RJ-45 Male

Some Basic Instructions Regarding connections RJ-45
1. Perform the test with a network cable tester (Cable Tester), no need to use expensive testers, the most important thing is to test whether both ends of the RJ-45 connectors are connected properly or not.
2. Be careful when cutting the outer sheath UTP not to injure sheathing insulation from each conductor as it will cause the relationship between conductor (short).
3. Cut the outer sheath so that each UTP cable conductor looks up approximately 2.5 cm.
4th. Arrange the wires in the order of conductor wiring standards used.
5. Measure the length of each conductor to the same length, do not let the veil of each conductor is visible from the end of the plastic RJ-45 connectors, as this could easily cause the conductor were injured and caused the relationship between conductors.
6. Make sure the tip touches the tip of each conductor RJ-45 when entering the UTP cable into the RJ-45 connectors.
7. Use a crimping tool which is still good, so that each leg of the RJ-45 connectors can be touched with the perfect conductor.
8. If possible, test / test new cable made with a network cable tester (Cable Tester).
General problems in the network connection is located on the RJ-45 connectors, while the incomplete outer shell cut UTP cable, or do not use standard wiring sequence. Use the RJ-45 connectors are of good quality, more careful in cutting the outer sheath UTP, and the use of standard cabling standards, to avoid such problems as mentioned above.

detect damage to the computer with the familiar beep sound


Hello. . netter a happy good-night, today we started learning about computer repair, out of trouble on every computer must be brought to a handyman service better little by little we learn how to handle computer trouble. On occasion this time we will detect damage to the computer on BEEP sound. Before we go to learn to detect damage to the computer. There are descriptions of some of the authors. BIOS stands for Basic Input Output System, this is the basic of computers. In the bios in the computer world know there are two types of AMI BIOS and AWARD BIOS. For more details about the bios in the future we will learn about the bios. Beeping sound that comes out of the computer depending on the type of BIOS, AMI BIOS has the cirri themselves in a loud beep as well as with the AWARD BIOS. Immediately, we are surfing.



AMI bios
First time the voice BIP
DRAM refresh failure. Have problems accessing the system memory to merefreshnya.
Second time the voice BIP
Combination parity failure. On the data transmitted in the computer, usually added parity bit which is used to detect and correct errors. Work carried parity circuit contained in a computer. This is probably due to a problem with memory or motherboard.
3 votes Kali BIP
Base 64K memory failure. Base 64K memory is 64 KB of RAM memory first. This failure could be due to the memory slots are grouped into modules that have damaged the chip.
4 votes Kali BIP
The failure of the system timer. Possibility of errors in one or more timers that are used to control functions on the motherboard.
5 votes Kali BIP
Processor failure. Can be caused by excessive heat, or because the processor is not installed properly into the socketnya.
6 votes Kali BIP
Failure of keyboard controller / gate A20. Keyboard controller is a chip on the motherboard that mengedalikan your keyboard.
7 votes Kali BIP
Processor errors.
8 votes Kali BIP
Error read / write display memory.
9 votes Kali BIP
Damage to the BIOS.
10 Kali BEEP sound
CMOS error.
Kali 11 votes BIP
Damage to the cache memory.

BIOS AWARD
Award prefer messages through the monitor. But there are times when video card is not working and the message is displayed using the beep code. Therefore, in the BIOS beep code this type less. BIOS beep codes at this as a sign Morse, combining long and short beeps.
1 long beep
Problems with memory. Chances are that the memory is not installed properly, or too damaged memory chip. Could be related to damage to the motherboard.
One long beep, two short beeps
Video system error. BIOS can not access the video system to write error messages to the screen. There are several possibilities, including video cards installed in the existing system on-board video card, or use an IRQ that is already in use for the video card is causing the conflict. Alternatively, the video card is not installed properly.
One long beep, three short beeps
Same as above, there are errors in the video. BIOS can not access the video system to display an error message to the screen. Connect connect beep sound
Could be due to memory or video card. There are some general guidelines that can be used for every BIOS. These general guidelines can only be used for errors detected before and during the Power On Self Test (POST). We already know the procedure performed when starting the computer is turned on, and this will be helpful in diagnosing the problem. The first time when the computer is turned on, power supply, will send power to all components of. When switched on when there is no reaction whatsoever, then check the internal power supply located on your computer. To test it, we can use LED (Light Emiting Diode) and then plug in the POWER LED connector. If the flame, it means that power supply was still good. Then, if all components have got enough power, the processor will work to find instructions. He will find these instructions on the ROM BIOS. For processors, the probability is that excess heat caused by overclocking or not the position perfect. For the BIOS, the odds were that the location of the BIOS chip is not perfect. Check the BIOS can be done on another computer. Some viruses are able to damage the BIOS program. If the POST will continue but not completed, most likely the problem is on the motherboard. For this one, there are several steps that must be done:
If the PC will not boot at all, make sure the minimal components already installed, ie processor, memory filled with appropriate video card, and a drive, and make sure all these components are properly installed. Components that there should not be soldered
missing.
Remove the components that are not mandatory, such as expansion cards, external peripherals such as printers, scanners, etc., due to improper installation can cause I / O error. Then turn on the system, and try to plug one by one these cards to test it.
Double-check the jumper settings on the motherboard. Make sure the processor type, bus speed, multiplier, and voltage jumpers. And also make sure the BIOS jumper is in the proper position.
Change the BIOS settings to the default settings to ensure the problem does not lie in excessive BIOS settings. For example by reducing the read / write memory access time and hard disk. Check all cable connections on the motherboard are correct. Check whether there are components that experienced excessive heat. If there is, change the BIOS settings and the setting is lower.
Handling
For cases 1, 2, and 3 times a beep, try to fix the position of first memory. If it still occurs, there is the possibility of corrupted memory. Replace with new memory. For four, five, seven and 10 times a beep, the motherboard is damaged and must be repaired or replaced. To six times a beep, try refining your keyboard controller chip position. If there are errors, replace the keyboard chip. 8 kai beep indicates a memory error in the video adapter. Replace the video card. Nine times a beep indicating the BIOS chip failure. Usually not due to a position less than perfect. 11 times a beep, replace the cache memory.

N boy's okay if that's all girl for once we learn this time, hopefully useful for all. amen

Thursday, July 29, 2010

Optimizing Windows XP startup


In using the Windows operating system especially Windows XP computer that is sometimes we used was very slow. After we check it a lot of programs currently running. However, running programs are run automatically every we turn on the computer. So fast we have to shut down the program individually. But not all programs can be turned off. And also that every time we turn on the computer to shut down these programs one by one would take a fair amount of time especially when we rush - a sudden rush for the task. Therefore we must be able to prevent the auto start these programs permanently. let's just starting to learn to disable the windows xp starup. let's follow the steps - the steps below.
1. into RUN (star> run or with the keyboard press windows + R) then type "msconfig" without the quotation marks
2. straight into the menu tab "starup"
3. remove unnecessary check in autostart (suggestions Uncheck the author do not in the antivirus program)
4th. click ok

after the computer restarts ok, now the computer is free from programs that automatically star at the time we start the computer, so hopefully useful belajanya first "spirit"

Tuesday, July 27, 2010

easy way to assemble pc (personal computer) own

preliminary
Assembling is one of the most basic thing to do when you want to build a PC. PC was supposed to assemble the ability possessed by each user in order to avoid dependence on computer service fees when there is little problems that really easy to do and learn, but because it is less known is considered as something difficult. With hardware knowledge would also facilitate us to expand efficiently in accordance with the needs of our PC.


Preparation merakitpersonal computer
Equipment used:
1. Screwdriver (+ -) with medium and small size. Try to use a screwdriver that has a magnetic power to keep the screws can not be separated from the tip of the screwdriver.
2. Tang clasp with a small tip, point to remove the jumper or take the little screw that irrespective of the place.
3. Jumpers or screws up, it can be bought at electronics stores
4. Bracelet anti-static electricity, or occasionally holding the casing or other metal object to eliminate static electricity from your body.


Includes computer hardware
1. Mainboard / motherboard
2. Processor (in accordance with the needs of the mainboard)
3. RAM
4. CD Room
5. Power supply
6th. Hard Drive
7. Cassing
Sesudag all tools and materials available then let's start learning assemble a pc, the following steps - steps

1. Take the casing, unscrew the side, then noticed kabeh - existing cable through it make sure the cable - the cable there is no peeling. (Usually the power supply has become one with the casing so we do not need to install it)

2. Open the box for the motherboard. Read the manuals carefully. If there are jumpers / switches to be removed / set, done before the motherboard is installed into the casing. Usually jumpers or switches are set bus frequency processor (66 MHz-133 MHz), multiplier (the multiplier) processor speed (eg 600 MHz processor with 100 MHz bus frequency, then the multiplier is 6X), and set the processor power voltage and frequency and voltage memory. Some new motherboards have a BIOS that automatically adjust it, so eliminating the jumper or switch on their motherboard designs.

3. Prepare your processor. Read the fine details on the processor box. In the back of the box usually terapat description of the processor speed of the processor and processor bus frequency (in units of MHz), voltage processor, and your multiplier should be set on your motherboard. If your processor type slot, insert vertically in the slot, insert the vertically on the processor slot on the motherboard, be sure to stand firm and not swayed. If there are lock slot, lock processor until terdengan a click. For the type of socket, you must play hinges on the motherboard to the open to open it, holding the edge of the processor, and enter it carefully. Do not force the processor into the socket. Make sure the pins are not forming right angle into the right hole. Having entered all of the processor pins into the socket, turn the hinge socket in the direction close to cover and tighten the processor in the socket. Further pairs of Cooling (heat absorber module processor, consisting of metal plate heat sink and fan cooling on it). For the type of processor slot, usually pendinginya been installed together in the processor module. While for type socket, must be paired pendinginya own. Make sure the bottom of the cooling completely flat and has a thermal grease, you can buy at computer stores or electronics stores. Attach clamps to the coolant which menojol on the edge of the processor socket one at a time. Patikan heatsink clamps were tight, and no longer have a gap anymore between the processor heatsink.

4. Install memory (RAM). note the slot on the mainboard usually modern motherboards use DDR slots but still many are using SDR slots. Enter Ram slowly - and hit land in kudua end ram, until it clicks (Ram had been locked by perngait in mainboard)

5. Place the motherboard into the casing. Prepare screws and screwdrivers. Enter the motherboard into the chassis, match the screw holes on the motherboard with the screw holes on the chassis. Put the screws and tighten. on the casing there is a small plug-connector that is part of the casing to be connected to the motherboard. The function of these small connectors vary. There's a power button on the casing connects to the motherboard, connect the hard drive LED, connect the motherboard to the internal speakers, and the 'Reset'. Look carefully read the label connector casing and motherboard manuals before mengkoneksikannya.

6. Prepare drives, CD-ROM and data cables attached to them. Data cable and hard drive / CD-ROM IDE connector has been paired with 40 holes on the motherboard connector. Type Ultra DMA/66 To drive, the cord is more sparse than the regular IDE cable. Do inverted install data cable, connect pin 1 on the connector to the data cable that has a red stripe / black. See manual harddis to see where the pin number 1 on the data cable connector on the hard disk. Make sure your disk jumper to Master position. The same thing applies when you install the data cable on the floppy drive and CD-ROM drive, when using the same IDE cable with the hard drive, set to position slave.Masukkan jumpernya hard drive, CD-ROM into the bay each. while for CD-ROMs are usually located at the top of the casing and measuring 5.25 inches. Do not forget to plug the power cord into any such devices.

7. Attach add-on card in each slot. Most current graphics cards using the AGP slot (brown slot on the motherboard). Another add-on card is usually attached to a PCI slot / ISA are available. Open the metal that covers the back of the card slot for add-on and tighten the retaining screws. After everything is installed, do not close before casingnya. Plug konektorkeyboard and mouse port PS / 2 at the rear of the casing. Mouse Port PS / 2 ports are usually located on the right of the keyboard. When you buy a serial mouse, plug the connector on port COM1 or COM2.

8. Prepare the monitor next to the casing is attached. Plug the power supply cable connector on the chassis and the monitor. Plug in the back of graphics card. Press the power button on the casing to ignite the charge in the casing to turn on the computer. When all components have been installed correctly, your machine beeps once and the screen of your monitor was running terlihar BIOS POST (power on self terting). Immediately press the DEL / f1/f2 to enter the BIOS menu. Read the motherboard manual for BIOS setup. Save the BIOS changes and exit the menu. Bootable CD-ROM to start the operating system installation process. If the monitor does not display anything, do not panic. Look back connections from each component that you install. Tighten the holder of each component. If all goes well, you can close your casing.

Had so many times before learning this, and hopefully useful. Before saying goodbye a little advice "learn and keep learning, if you fail do not despair, keep the spirit"

Basic computer network

Basic computer network
Based on the criteria for a computer network consists of four parts :

1. Based on the distribution of information or data sources
Network-centered
This network consists of server and client computers where the client computer only serves as an intermediary to access the source data or information derived from one server computer
- Distributed Network
This combination of multiple networks, so there are few centralized network server computers that are interconnected with the client to form a specific network system

2. Based on geographic coverage
- Network LAN (local area network)
Is a network that connects two or more computers in a small scope like a lab, cafe, offices, etc.

- Network MAN (metropolitan area network)
A network in a city with high-speed data transfer, which connects various locations such as campuses, offices and so forth. MAN network is a combination of several LANs. Coverage of this MAN among 10 to 50 km, MAN this is the right network to build a network between the offices in one town between the plant and agencies and headquarters located within range
- Network WAN (wide area network)
Is a computer network covering a large area as an example of a computer network among regions, cities or even countries, or can be defined as well as computer networks require routers and public communications channels.
WAN is used to connect a local network with other local networks, so users or computers in one location can communicate with users and computers in other locations.
- Network Internet (international networking)
This network covers the whole world

3. Based on the roles and relationships of each computer in the process data.

- Client-Server Networks
In this network there are one or more server computers and client computers. Computers that will be a server computer or client computer must be altered through software on the network protocol. As an intermediary for the client computer can access data on a server computer and the server computer provides the information required by the client computer.

- Networking Peer-to-peer
In this network there are no client computer or server computer because all computers can do the delivery and reception of information so that all computers function as clients as well as a server.

4. Based on data transmission media

- Wired Network (Wired Network)
In this network, to connect one computer to another computer network cables required. Function in the network cable to send information in the form of electrical signals between the network computer.

- Wireless Network (Wireless Network)
Network is a form of electromagnetic waves with the medium. On this network is not necessary cables to connect between computers because it uses electromagnetic waves to transmit signals between the computer information network.


hemm .. duu learn today so hopefully useful. amen

basic computer

computer is one of the sophisticated electronics, where computers are the main tools in supporting various institutions. institutions especially schools, offices, supermarkets etc..
computer understanding:
1. by Hamacher : the computer is an electronic calculating machine, fast and able to receive digital input information, then process it in accordance with programs stored in memory, and generate output information.
2. according Blissmer: the computer is an electronic tool that is able to perform several tasks as the following: receive input, process the input was in accordance with the program; keep the commandments and the results of the processing and provides output in the form of information
3. while according Fuori: computer is a data processor that can perform large calculations quickly, including the calculation of arithmetic and logic operations, without interference from humans.

well now let's learn what is on a set of computer. computer equipment was divided into two, namely hardware and software. hardware are all part of the physical computer, and be with the data residing in or who operate in it, and be with the software that provides instructions for the hardware in completing tasks. examples of hardware cpu, monitor, keyboard, mouse, printer etc.. while the software is a general term for data that is formatted and stored digitally, including computer programs, documentation, and other information that can be read and written by a computer. In other words, the computer system that is not tangible. These terms highlight the differences with examples of computer hardware operating systems (windows, linux, apple), microsoft office, etc..

well now we have to understand computers. Now we begin to learn about how computers work system. working computer system consists of three stages and each stage interconnected with each other. 3 system is a working computer.
1. input device that is computer hardware that serves to enter data or commands into a computer. example: keyboard, mouse, scanner, digital camera etc.
2. Process is a computer hardware device that serves to process data or instructions received by an input device and provides the results of processing the data to the output. for example cpu
3. output device is computer hardware that serves to display results that have been processed by the process. for example, monitors, printers, speakers etc..

first few days of this study, may be useful for all.

bismillahirrohmanirrohim

bismillahirrohmanirrohim, dengan menyebut nama Allah yang maha pengasih lagi maha penyayang. Semoga dengan bacaan basmallah tadi dapat memperlancar kita dalam belajar amin...

Wednesday, July 7, 2010

Sedikit Bumbu Keamanan PHP


Saat kita mulai membuat aplikasi berbasis web dengan menggunakan PHP tentu kita akan berfokus pada cara pembuatannya, bagaimana mengimplementasikan logika sehingga menghasilkan suatu karya (sistem) yang berjalan sesuai dengan keinginan dan kebutuhan kita.

Tapi ada kalanya kita perlu membalik pola pikir tersebut dengan memandang sebagai seorang user (pengguna aplikasi) yang mungkin memiliki waktu lebih banyak dalam penggunaan aplikasi tersebut. Dalam hal ini banyak hal yang mungkin tidak kita perhatikan dari aplikasi buatan kita tersebut oleh karena itu ada pepatah "Tidak ada sistem yang sempurna." tetapi penulis akan memberikan sedikit informasi keamanan dasar sehingga kita bisa sedikit melangkah menuju kesempurnaan tersebut.


Beberapa hal yang perlu diperhatikan dalam langkah percobaan para cracker untuk memboikot akses website kita antara lain :
1. Melalui URL (method GET)
2. Melalui media input yang terdapat dalam form (method POST)

Sebagaimana kita ketahui bahwa terdapat 2 cara umum pengiriman variable dalam PHP yaitu GET dan POST sehingga perlu penanganan khusus dalam penerimaan serta pengiriman variable tersebut.

Untuk method POST :
Method POST merupakan penangkapan variable dari media input yang terdapat dalam FORM.

1. Batasi jumlah karakter (maxlength)
Pembatasan jumlah karakter dalam media input sangat penting sehingga tidak dimungkinkan penulisan script seperti javascript pada inputbox tersebut.
Contoh implementasi :
Titik rawan : Input Login (username dan password), Input search

2. Lapisi dengan penahan kutip atau addslashes()
Fungsi PHP ini akan membantu kita menambahkan tanda kutip (') pada setiap karakter garing (/) sehingga dapat mencegah timbulnya efek SQL injection. Saya rasa teknik hacking ini cukup populer diantara anda. Penambahan kutip akan membuat garing menjadi bertipe string sehingga tidak dianggap sebagai salah satu perintah query pada MySQL / SQL.
Contoh implementasi : addslashes($_POST['_username'])
Titik rawan : Form Login

3. Lapisi dengan penahan tag atau htmlspecialchars()
Untuk mencegah terjadinya teknik hacking xss atau javascript injection maka ada baiknya kita menambahkan fungsi tersebut. Hal ini akan membuat tag html maupun javascript memiliki tipe data string sehingga tidak akan dieksekusi oleh browser.
Apabila script dimungkinkan dalam media input sehingga masuk ke dalam database dan saat browser membuka halaman yang terkontaminasi tersebut maka browser akan melakukan eksekusi terhadap perintah tersebut yang biasanya dalam bentuk javascript.
Contoh implementasi : htmlspecialchars($_POST['pesan'])
Titik rawan : Form Login, Form Kontak Admin

4. Perhatikan nama media input
Sudah saatnya kita berusaha sedikit lebih unik dalam menentukan nama pada media input kita sehingga mempersulit beberapa tools penjahat yang menggunakan library (kamus kata) dalam penentuan nama variable incarannya. Misalnya pada media input login tambahkan garis bawah. Tentu anda memiliki ide sendiri dalam
mengimplementasikan hal ini.
Contoh implementasi :
Titik rawan : Input Login (username dan password)

Untuk method GET :
Method get merupakan penangkapan variable yang berasal dari URL.

1. Gunakan .htaccess
Sebenarnya ini adalah sebuah metode yang menjadikan website kita seakan memiliki
struktur direktori yang luas, padahal itu adalah variable. Sehingga memecah
konsentrasi dari pengunjung yang berniat isenk. Bila halaman tidak ditemukan maka
kita dapat meredirectnya ke halaman 404 kesayangan kita.

Implementasi :


RewriteEngine On
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule ^(.*)$ index.php?page=$1 [L]


RewriteEngine on
RewriteCond %{HTTP_HOST} ^mydomain.com$ [NC]
RewriteRule ^(.*) http://www.mydomain.com/$1 [L,R=301]

Untuk lebih jelasnya dapat dilihat disini :
http://www.ilmuwebsite.com/tutorial-php/membuat-url-mod-rewrite-part-1-http-conf

2. Hindari $_REQUEST()
Metode ini digunakan untuk menangkap variable dalam bentuk POST dan GET. Ada kalanya kita membutuhkan metode penerimaan variable dengan menggunakan fungsi ini, tetapi batasilah penggunaannya karena tanpa disadari suatu saat anda akan mendapatkan masalah karena hal ini. Dan bila kita telah terlanjur menggunakannya pada seluruh aplikasi kita maka kita akan sulit untuk merubah (Bisa, dengan memilah mana yang tidak perlu dan benar-benar menggunakan.).

Tambahan :
1. Session dan Cookies timeout
Gunakan timeout pada session atau cookies terutama untuk pengenalan login. Session merupakan penanda dari sisi server dan akan hilang apabila browser ditutup, sedangkan cookies adalah pengenalan dari sisi browser dan bila tidak diset timeout maka status akan terus login (pada pengenalan login.), tentu saja anda tau kemungkinan-kemungkinan yang akan terjadi selanjutnya.

Mungkin sampai disini dulu, karena sudah waktunya berangkat kerja. Bila ada yang ingin ditambahkan silahkan ditambahkan karena pengetahuan kita tidak akan habis dengan saling berbagi.

Penulis : Sofian Oktavianus