Sunday, December 7, 2008

CONCEPT PROTOCOL AND NETWORK.

IP Address
IP Address represent binary number 32 forceps beet dissociated by dot sign in each its 8 beet. Address IP that is passed to address is computer network and equipments of network using protocol of TCP / address ip.ip can be written down with format 4 number group denary dissociated by dot sign like 192.168.10.1

Format writing of form of IP address shall be as follows 11000000101010000000101000000010

address 32 beet above to facilitate to be divided into 4 okctet ( 8 beet of session)

tables of list of host ID ( class of Ip address)
Address Ip divided to become 3 class, like example at tables of following.

Kelas Network ID Host ID default sub Net

A xxx.0.01 xxx.255.255.254 255.0.0.0

B xxx.xxx.0.1 xxx.xxx.255.254 255.255.0.0

C xxx.xxx.xxx.1 xxx.xxx.xxx.254 255.255.255.0


address of TCP/IP

TCP/IP ( Transmission Control Protocol / Protocol internet) representing network communications protocol. TCP / IP can be used as by network protocol of privet, is also used as by network of default to use internet, good use Dialup and also use otherly

Sunday, November 30, 2008

PROTOCOL NETWORK

Protocol that is a order which must adhere by two or more station ( between machine) that is data terminal or computer / information / file, delivery of message which must receiver and transmitter of so that happened communications relation can walk better and correctness.

Existence of protocol of vital importance, that is to control system, complex progressively protocol, price excelsior will its, but will progressively economize usage of expense, band and equipments of other supporter

kinds of protocol
Is seen from way of its frame, can protocol differentiated to become 4 especial group:
  • Protocol which orienting to character using special characters to differentiate segment-segment frame different information.
  • Byte Protocol, count use header contain count field which is character count showing to come and character count which have been accepted without mistake.
  • Protocol which orienting biit that is every frame lapped over to the an located field between flag early and is final. Every bit at each field except information field encoded with address beet, conduct count and inspection of mistake in network of byte.
  • Protocol SDH ( digital synchronous hierrarchy) and ATM ( asynchronus transfer mode) supple standard facility to do data communications and voice. Divisible become 3 level that is : infra office with maximal reach 2 km, office inter with reach between 2 km-15km, haul long with reach above 15 km.

Monday, November 17, 2008

TOPOLOGY NETWORK.

topology is connective procedure between computer so that computer which is one with other computer earn otherly
communicating and forming an network. topology which most commonly and used by many is bus, ring token and star, where from each this topology have insuffiency and excess. network topology can be differentiated to become two, that is physical topology and logik topology.

TOPOLOGY ( ARSISTEKTUR) PHYSICAL
topology, that is network related to physical formation all computer network, good of client and also server there is 6 kinds of network arsistektur or topology physically for example as follows.

  • BUS topology
bus topology that is topology which all its terminal each other incircuit to a bus of data communications taken data or information pass as long as band or pass all workstation. this topology often weared for the area of local, to many dot and for short distance


  • star topology
star topology that is topology which is the each terminal in network interfaced to center dot ( server) using band and and all extension between terminal have to be continued to pass server. server act as controller and regulator all data communications that happened.

  • dot topology to dot
dot topology to dot every node or its of direct connective ya of antarterminal, and network system a kind of this do not depend on such even also

  • ring topology
ring topology that is all connective server terminal, is so that formed by an radian pattern loo like a ring every server nor terminal of meneriman or pass from one computer to other computer. if address gone to according to, hence information accepted. if information do not will be passed.

  • linear topology of bus
linear topology [of] bus that is topology which is arsistektur loo like with branch or a tree, sent data from an terminal to other terminal will through inspection of open band. if band have been accepted, hence data the will be accepted, and other terminal deliver data concurrently hence will experience of to collide head-on hereinafter have to arrange free band before delivering of data repeat


  • hierarki topology
hierarki topology that is topology which dimiciling its terminal will be more be high master existing terminal under nya, so that this topology base on terminal which dimiciling is highest

Monday, November 10, 2008

requirement of component of hardware equipments and to develop cable network.

to develop build network of LAN required by some conducive elementary element between computer earn is communicating each other. Elementary element cover peripheral of computer like : workstation server, card interface network ( NIC) and cable, while component of software cover : network operating system, driver adapter network, and network protocol.

1. server
Computer type taken as as server have to have the specification of nicer than computer of workstation, because server will determine activity of network. Computer with high activity will be able to send and data access in network swiftly. Server have to have stability in working, because server undertake to provide facility and manage network operational work computer of workstation. computer of Server like : generation of pentium 4 or above him that is XEON, or Itanium 2.

server can be differentiated to become two kinds of that is:
  • server dedicated, that is server which only functioning special as center ( central) controller of network.
  • Non dedicated, that is komouter which besides can function as server also as clien.
specification of hardware for server
  • generation of pentium 4 or above him that is XEON, or Itanium 2.
  • RAM 256 Mb, 512 Mb suggested by above him take example 1 minimum Gb Harddisk 80 Gb or of him
types of server that is
  • disk of server
  • server printer
  • file of server
  • terminal of server.

2. workstation/ client

all computer weared by using network and its arrangement is focused by at server as controller.

specification of hardware for client
  • minimize pentium 3 ( better above him)
  • RAM 128 Mb ( better bigger)
  • Minimum harddisk 10 Gb ( better bigger)

3. Card LAN or of NIC.
so that network system incircuit between server with workstation, hence have to provide with network card or so-called with NIC. As according to bus type, there are some type of NIC, that is ISA,PCI, and EISA

4. cable ( communications media)
in developing a network, becoming constraint in problems is related to election of cable type to be used. Cable represent requirement of very fundamental to develop a network. Problem of related to cable do not only its just type, but which must be paid attention istance and its its his. easy and common/public cable is way of its installation is cable type of coaxial. But, along with growth of other equipments like HUB, hence cable of UTP start used many, because cable of UTP besides its cheaper price, and its its facet even also can be pledged. very popular other Cable type is cable type of F/O (optic fiber) having ability of speed of very high data transfer, but this cable type still pertained is costly. So that its accumulator boundary only to just big offices and company. Become principle election of cable through consideration of and distance of antarterminal, topology type, and expense.

5. RJ 45 (regertered jack 45)


6. Component and of software to develop a network

requirement of software to develop network can come from software output of and window of linux, good base on text and also base on window.
types of software required for network among others :
  • window NT
  • window server 2002
  • window server 2003
  • redhat
  • mandrake
  • SuSe
  • caldera
  • debian
  • slackware
  • SQL server

Monday, November 3, 2008

Kinds of Network.

ursuant to wide scope of working area geographically, computer network can be differentiated into some kinds of among others as follows.

1.LAN ( Local Area Network)
LAN that is a[n network system where each;every computer or hardware and software used so that earning is communicating each other in certain [job/activity] area by using [is] same program and data, also have speed of[is transfer of quicker data. LAN have maximal reach 100 metre.LAN formed caused by supporter component that is cable, And network card RJ45.

Amenity use LAN
  • Data Sharing that is usage of resource with, printer case, modem, facsimile, and others
  • Program Sharing that is accumulator with data bases and program
  • Internet Sharing or intranet that is usage of broader network computer, either in office, international world and building
  • quicker Data information
  • Data distribution Prose
Type technological of LAN
  • its Reach 100 speed metre Ethernet 100 / 10 Mbps applying of young yan.
  • technological Lino 300 14 mbps metre Power of This LAN can use power cable which have there is. have been equiped by enkripsi 56 DES beet, and his excess of this is network technology very cheap.
  • Wi-Fi ( 802.11b) reach from this technology reach 30 metre , and speed if when using this network technology 11/ 5.5 Mbps.
  • Wi-Fi5(802.11A) reach from technological usage of this network only 15-20 metre, its speed 54 / 22 mbps. Technological of this network consist of 8 canal, while bandwidth which in earning very big.
  • Reach Bluetooth if/when using this network technology only 9-20 metre, its of lower nya even also compared to other network technology only 1 Mbps / 300 Kbps, technological of this network integrated at PDA or ponsel.
Difference of Network LAN have cable to with LAN nirkabel network
conventional Network LAN with LAN nircabel network basically is same, just only is of connection method and component or peripheral in its of different nya.
Elementary difference which is very between LAN konversional network with LAN nirkabel network that is at usage of extension and cable in LAN itself development.
Excess use LAN nirkabel network very conducive access to workstation which do not have Ethernet card and very easy its development of using cable. Difference apart its reach for the network of LAN konversional as far as 50 metre, while for the network of area niekabel or reach energy between workstation by using relative point access farther

2. WAN (Wide Area Network)
WAN that is network technique having intercontinental activity area, by passing geographical boundary of public And property state.

3. MAN (Metropolitan Area Network)
MAN that is network having area work office region one town, building, factory, campus, and head office in its reach area. There by, MAN have geographical reach broadly between 10 kilometre up to 50 kilometre.

4 . INTERNET (Interconnection Networking)
Internet that is computer network globally able to be accessed to whole world, and can yield all infomasi.
5 WIRELES (Tanpa Kabel)
Wrireles that is network without cable using radio technology ( frekuensi) or recognized with WLAN (WIRELESS network area local term) or referred as also with Wifi term

Monday, October 27, 2008

NETWORK COMPUTER

Recognizing computer network
What that computer network?
Computer network is corps from some computer, good of big scale and also small scale computer network, small scale network which usually in using at home and also office, while intercity big scale network and also provinsi, or twinning network ( internasional) like is intercontinental. Where computer-computer each other incircuit and organization between computer which is one with other that is among server computer ( as its mains), with client computer ( as its child). In everyday life of network can be illustrated with an group or bevy which is interaction or is communicating each other between subordinate and leader ( its staff).

Network Type consist of 2 type that is
Jaringan client-server
Server that is computer providing facility to other computer, while client that is other computer which accept or use facility provided by server

Excellence
  • Speed access higherly
  • Security System and better network administration
  • System back up better data.
Weakness
  • Costlier operating expenses
  • Is required one capable special computer more to be assigned as server
  • Very depend on server, because if server of problem or trouble, hence as a whole network will annoyed

Network Peer To Peer
Term non-dedicated server ace network peer to peer Type, note do which server is that only sharing server pure ace, workstation personate also but.

Excellence
  • Computer in network earn is sharing each other owned facility it: harddisk, drive,fax/modem, printer
  • Cheap operating expenses definitely more.
  • Continuity of its activity do not base on server, because if one of the damage or dead computer. Hence network as a whole will not experience of damage
Weakness
  • Troubleshooting, network more is difficult compared to client-server network, because at peer-to-peer type network each;every conducive computer to got mixed up with existing communications. At communications server client network only between station work and server.
  • For compared to lower activity of server client network.
  • Security network System determined by each user, by arranging each security which owned.

ELEMENTARY PRINCIPLE OF NETWORK.
At full speed of technological information system growth and communications this time, start from IC chip component creation ( circuit integret), invention of equipments of electronic to technological growth of computer, hence created by various computer. Along with information and techenology and the communications, finally everybody claim and wish to join the above mentioned concept, to be data communications from an place to other place can be accessed ( is communicating each other) with a purpose to can cost effective, data access and usage of quicker time. The Computer can interact and each other converting information by developing network.

Monday, October 20, 2008

HISTORY COMPUTER

Yours Soybean cake about seldom ordinary computer of you use?
Computer which we recognize in is contemporary, have passed various development, and also have very long history sheet. Computer sill in line with mathematics science development. Without clear mathematics of computer will not emerge because without mathematics, human being will never recognize number and also calculation.
Ancient human being have recognized also technique calculate, but still is limited of number 20 namely as according to human being fingers. Growth adding machine alone felt reality after finding of itself adding machine.
From description of its history of computer, marginally can be made by the division of computer to follow the sequence generation:

1. First Generation
First Generation Computer, started by since its him MARK I in University Harward ( 1944-1945). Found Numerator machine is at that moment called by ENIAC ( Electronic Numerical Integrator calculator and) woke up by mauchly professor and Eckert professor from Moore School Electrical Engineering of. This Machine can having compared to higher level speed it of MARK machine I. Later;Then in the year this 1950 machine is re-developed its smaller size measure, but its compared to bigger ability of ENIAC

2. Second Generation
Second generation Computer, is made by computer between year 1959-1965. At this generation put into use transistor, what is smaller technically, but its of compared to higher of vacuous tube which used by first generation computer

Is compared to first generation computer, second generation computer have excess, for example
• Fomat smaller
• Speed of Excelsior
• Recall more and more.
• Software more and more.

3. Third Generation
Computer which including third generation, is made by machine is start 1965 hitherto. This Computer have that way go forward so that various weakness from second generation have been overcome, even generation computer of is three have earned to be used for the multiprogramming of and also prosesing data multi. This progress progressively excitement, in line with its it Integret Circuit in electronics area, so that computer become machine calculate its by[all machine maker pioneer a period of previouslya

Wednesday, August 20, 2008

What Is Computer Ethics

Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important.

On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase “computer technology” because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves.

A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and some as a society. Computer ethics includes consideration of both personal and social policies for the ethical use of computer technology.

Now it may seem that all that needs to be done is the mechanical application of an ethical theory to generate the appropriate policy. But this is usually not possible. A difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis which provides a coherent conceptual framework within which to formulate a policy for action. Indeed, much of the important work in computer ethics is devoted to proposing conceptual frameworks for understanding ethical problems involving computer technology.

An example may help to clarify the kind of conceptual work that is required. Let’s suppose we are trying to formulate a policy for protecting computer programs. Initially, the idea may seem clear enough. We are looking for a policy for protecting a kind of intellectual property. But then a number of questions which do not have obvious answers emerge. What is a computer program? Is it really intellectual property which can be owned or is it more like an idea, an algorithm, which is not owned by anybody? If a computer program is intellectual property, is it an expression of an idea that is owned (traditionally protectable by copyright) or is it a process that is owned (traditionally protectable by patent)? Is a machine-readable program a copy of a human-readable program? Clearly, we need a conceptualization of the nature of a computer program in order to answer these kinds of questions. Moreover, these questions must be answered in order to formulate a useful policy for protecting computer programs. Notice that the conceptualization we pick will not only affect how a policy will be applied but to a certain extent what the facts are. For instance, in this case the conceptualization will determine when programs count as instances of the same program.

Even within a coherent conceptual framework, the formulation of a policy for using computer technology can be difficult. As we consider different policies we discover something about what we value and what we don’t. Because computer technology provides us with new possibilities for acting, new values emerge. For example, creating software has value in our culture which it didn’t have a few decades ago. And old values have to be reconsidered. For instance, assuming software is intellectual property, why should intellectual property be protected? In general, the consideration of alternative policies forces us to discover and make explicit what our value preferences are.

The mark of a basic problem in computer ethics is one in which computer technology is essentially involved and there is an uncertainty about what to do and even about how to understand the situation. Hence, not all ethical situations involving computers are central to computer ethics. If a burglar steals available office equipment including computers, then the burglar has done something legally and ethically wrong. But this is really an issue for general law and ethics. Computers are only accidentally involved in this situation, and there is no policy or conceptual vacuum to fill. The situation and the applicable policy are clear.

In one sense I am arguing for the special status of computer ethics as a field of study. Applied ethics is not simply ethics applied. But, I also wish to stress the underlying importance of general ethics and science to computer ethics. Ethical theory provides categories and procedures for determining what is ethically relevant. For example, what kinds of things are good? What are our basic rights? What is an impartial point of view? These considerations are essential in comparing and justifying policies for ethical conduct. Similarly, scientific information is crucial in ethical evaluations. It is amazing how many times ethical disputes turn not on disagreements about values but on disagreements about facts.

On my view, computer ethics is a dynamic and complex field of study which considers the relationships among facts, conceptualizations, policies and values with regard to constantly changing computer technology. Computer ethics is not a fixed set of rules which one shellacs and hangs on the wall. Nor is computer ethics the rote application of ethical principles to a value-free technology. Computer ethics requires us to think anew about the nature of computer technology and our values. Although computer ethics is a field between science and ethics and depends on them, it is also a discipline in its own right which provides both conceptualizations for understanding and policies for using computer technology.

Though I have indicated some of the intellectually interesting features of computer ethics, I have not said much about the problems of the field or about its practical importance. The only example I have used so far is the issue of protecting computer programs which may seem to be a very narrow concern. In fact, I believe the domain of computer ethics is quite large and extends to issues which affect all of us. Now I want to turn to a consideration of these issues and argue for the practical importance of computer ethics. I will proceed not by giving a list of problems but rather by analyzing the conditions and forces which generate ethical issues about computer technology. In particular, I want to analyze what is special about computers, what social impact computers will have, and what is operationally suspect about computing technology. I hope to show something of the nature of computer ethics by doing some computer ethics.

Tuesday, May 6, 2008

computer







COMPUTER




By : YUDISTIRA AKBAR














Computer are machienes that handle information automatically. They

can perform calculations and proces data. Computers can wprk with

member to solve problems in a few seconds. Computers can remember

a gret deal if infomation and make practically no mistakes. That is

why computer are widely used in places such as bank, office and

companies.






Computer work likes calculators, but calculators can do only one

thint at a time. We tell them what to do by pressing various buttons.

To do the same wook, wecan give a series of instrustions a computer.

We call this computer program. If we set up a program, the computerscan

provide other information, such as list, member, letters, words or even

graphs of picture. once we provide a program, the computers can do all

this handles number. The number may be mathematical formulas or coloumns

or figures. The number may also be codes that stand for letters of the

alphabet, word of intructions to the computer.




    All computers have there basic parts:

  1. Input and output unit (I/O). The input unit takesin informations,
    and the output unit gis the result.

  2. A central processing unit (CPU). this unit does the work of computing

  3. A memory. It store or remember the information and intructions that the CPU needs
    to do the work






The I/O make it possible for people to communicate with computers.

They are several kinds if I/O. One of them is a video terminal. The video

terminal has a typewriter-like keyboard and a screen like a television screen.

we can see the output of the computer on the sreen.






If we need a permanent record of a computers output, a printer will

make it. And if the computers main memory cannot hold enough

information, magnetic disk or tapes can be used for this purpose. The

computer then can turn the information stored on the disks or type into

member or letters.








Thursday, May 1, 2008

kamus komputer

Dr.Nik L. Tebing, mengeluarkan kamus komputer terbaru sbb:

Ejakulasi Dini: peristiwa di mana diman komouter terlalu cepat keluar dari programnya. ketika komputer sedang diaktifkan, tiba-tiba sudah exit dan tidak bisa melanjutkan programnya. peristiwa ini sangat dirisaukan oleh pengguna komputer. biasanya pengguna komputer akan mencari orang yang pakar dalam mengatasi masalah ini.

monopause: komputer generasi lama WS dan lotus yang sudah tidak bisa dia aktifkan lagi. biasanya komputer jenis ini sudah ditinggalkan penggunanya. jika dipaksakan komputer jenis ini, tidak akan menghasilkan produk.

Orgasme: adalah rasa senang yang dialami pengguna komputer karna terlalu asik dan larut dalam menggunakan komputer. perasaan ini bisa membuat para pengguna komputer lupa daratan dan tentunya dapat mengurangi produktifitas dan efektifitas etos kerja.

Penetrasi: adalah istilah populer ketika seseorang memasukan disket ke dalam drive A atau drive B. setelah disket dimasukan, maka akan terjadi interaksi di dalan CPU. disket akan mengeluarkan program sesudah dimasukan ke drive A dan B.

Masturbasi: adalah kelaianan komputer dalam mengeluarkan program karna pengelihan prosedur yang lazim. biasanya ini terjadi pada komputer yang jarang sekali dipakai oleh pengguna komputer. untuk menghindarkan hal ini, sebaiknya komputer sering diaktifkan.