0% found this document useful (0 votes)
78 views

Understanding Computer Networks

Computer networks allow computers to share resources and communicate with each other. They connect autonomous computers using communication protocols over communication media. The goal is to transmit information precisely from sender to receiver. Benefits include sharing resources, communication, integrated data, efficient development and maintenance, data security, and up-to-date information. Computer networks can be local area networks within a building or campus, metropolitan area networks within a city, or wide area networks spanning countries. Topologies determine how computers are connected and include star, ring, tree and bus configurations.

Uploaded by

Aihpelee
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

Understanding Computer Networks

Computer networks allow computers to share resources and communicate with each other. They connect autonomous computers using communication protocols over communication media. The goal is to transmit information precisely from sender to receiver. Benefits include sharing resources, communication, integrated data, efficient development and maintenance, data security, and up-to-date information. Computer networks can be local area networks within a building or campus, metropolitan area networks within a city, or wide area networks spanning countries. Topologies determine how computers are connected and include star, ring, tree and bus configurations.

Uploaded by

Aihpelee
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

A.

UNDERSTANDING COMPUTER NETWORKS

Computer Network
A group of autonomous computers that are interconnected with each other
using communication protocols through communication media so that they
can share information, programs, the joint use of hardware such as printers,
hard disks, and so on. Moreover
Computer network can be interpreted as a collection of a number of
communication terminals located in various locations consisting of more than
one interconnected computer.

B. GOAL OF BUILDING A COMPUTER NETWORK

The purpose of a computer network is to carry information precisely and


without any errors from the sender (transmitter) to the receiver side through
the communication media.
There are several things that are still considered to be obstacles, namely:
1. Still expensive communication facilities available and how to utilize existing
communication networks effectively and efficiently.
2. The transmission line used is not completely free from interference (noise)
problems.

C. BENEFITS OF COMPUTER NETWORKING

Benefits obtained in building a computer network, namely:

1. Sharing resources
Sharing resources aims so that all programs, equipment or other peripherals
can be utilized by everyone on the computer network without being affected
by the location or influence of the user.

2. Communication Media

Computer networks allow communication between users, both for


teleconference and for sending messages or other important information.

3. Data Integration

Computer networks can prevent dependence on central computers, because


each data process does not have to be done on one computer only, but can be
distributed elsewhere. Therefore, integrated data can be formed that makes it
easier for users to obtain and process information at all times.

4. Development and Maintenance

Equipment development can be done easily and save costs, because every
purchase of components such as printers, then there is no need to buy a
printer a number of existing computers but just one piece because the printer
can be used together. Computer networks also make it easier for users to take
care of hard drives and other equipment, for example to provide protection
against virus attacks, so users simply focus on the hard drive on the central
computer.

5. Data Security

Computer network systems can provide protection against data. Because of


the provision and regulation of access rights to users, as well as hard disk
protection techniques so that data gets effective protection.

6. More Efficient Resources and Up-to-Date Information

By using resources together, it will get maximum results and high quality. In
addition, the data or information accessed is always up to date, because any
changes that occur can be immediately known by every user.

D. TYPE OF COMPUTER NETWORK

Based on the distance and work area of the computer network is divided into
three groups, namely:
1. Local Area Network (LAN)
Local Area Network (LAN)is a privately owned network in a building or campus
that measures up to several kilometers. LANs are often used to connect
personal computers and workstations in a company's offices or factories to use
resources (resouce, such as printers) and exchange information.

By paying attention to data transmission speed, LAN can be classified into


three groups.
that is:
a. Low Speed PC Network
The data transmission speed on a Low Speed PC Network is less than 1 Mbps
and is usually applied to personal computers. Examples of this type are
Omninet by Corvus Systems (network bus), Constalation by Corvus Systems
(star network), Apple talk by Apple Corporation.
b. Medium Speed Network
Data transmission speeds on the Medium Speed Network range from 1 -20
Mbps and the bias is applied to mini computers. Examples of this type are
Ethernet by Xerox, ARC Net by Datapoint Corporation, Wangnet by Wang
Laboratories.
c. High Speed Network
The data transmission speed on the Hig Speed Network is over 20 Mbps and is
usually applied to mainframe computers. Examples of this type are Loosely
Coupled Network by Control Data Corporation, Hyper Channel by Network
System Corporation.
2. Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN), is basically a larger version of a LAN and
usually uses the same technology as a LAN. MAN can include offices of
companies located nearby or also a city and can be used for the purposes of
ribadi (private) or public. MAN is able to support data and voice, can even be
related to cable television networks.
3. Wide Area Network (WAN)
Wide Area Network (WAN), its reach covers a large geographical area, often
spanning a country and even continent. WAN consists of a collection of
machines that aim to run the user's programs (applications).

Examples of data network allocations

E. COMPUTER NETWORK TOPOLOGY


Topology is a pattern of relationships between terminals in a computer
network. This pattern is very closely related to the access method and delivery
media used. The topology depends largely on the geographical location of each
terminal, the quality of control required in communication or messaging, and
the speed at which data is delivered. In the definition of topology is divided
into two, namely physical topology which shows the position of physical
cabling and logical topology that shows how a medium is accessed by the host.
The physical topologies commonly used in building a network are:
a. Point to Point.
Point work network is the simplest work network but can be used widely.
So simple is this network, that it is often not considered a network but
merely a regular communication. In this case, both nodes have a level
position, so that any node can initiate and control the relationship in the
network. Data is sent from one node directly to another as a receiver, for
example between the terminal and the CPU.

b. Star Network.
In a star configuration, several existing equipment will be connected to a
single computer center. Existing controls will be centered at one point, such
as managing workloads and setting existing resources. All links must be
related to the center if you want to channel other collected data. In this
case, if the center is disturbed, then all terminals will also be disrupted. |
Information Technology Computer Handout This star network model is
relatively simple, so it is widely used by banks that usually have many
branch offices scattered in various locations. With this star configuration, all
kinds of activities in branch offices can be controlled and coordinated
properly. In addition, the world of education also uses this star network to
control the activities of their students.

c. Ring Networks.
In this network there are several equipment connected to each other and
will eventually form a chart like a ring. The ring network does not have a
point that acts as a center or data traffic controller, all nodes have the same
level. The data sent will run through several nodes so that it reaches the
intended node. In conveying data, the network can move in one or two
directions. However, the data still moves one way at a time. First, the
existing message will be delivered from another point to point in one
direction. If there is a failure, for example there is damage to existing
equipment, then the existing data will be sent in a second way, namely the
message is then transmitted in the opposite direction, and can eventually
end up at the intended place. This type of configuration is relatively more
expensive when compared to the configuration of the star network. This is
because, every node that exists will act as a computer that will overcome
every application it faces, and must be able to share the resources it has on
the existing network. In addition, this system is more suitable for
decentralized systems, where there is no need for a particular priority.
d. Tree Network.
In the tree network, there are several levels of nodes. The center or higher-
level node, can set other lower-level nodes. The data sent needs to go
through the central node first. For example, to move from a computer with
node-3 to a node-7 computer as is the case in an image, existing data must
pass through nodes3, 5 and node-6 before ending up on node-7. The
superiority of a network of tree models like this is, can form a group needed
at any time. For example, a company can form a group consisting of
bookkeeping terminals, as well as in other groups formed for sales
terminals. The downside is, if the higher knot then does not work, then the
other group under it eventually also becomes ineffective. The workings of
this tree network are relatively slow.

e. Bus Network
Another configuration is known as bus-network, which is suitable for areas
that are not too large. Each computer (each node) will be connected by a
communication cable through an interface. Each computer can
communicate directly with the computer or other equipment contained in
the network, in other words, all nodes have the same position. In this case,
the network is not dependent on the computer at the center, so that if one
of the equipment or one of the nodes is damaged, the system can still
operate. Each node has its own address or nature. So as to access data from
one of the nodes, the user or user simply mentions the address of the node
in question.

f. Plex Network (Combination Network).


It is a truly interactive network, where each node has the ability to access
directly not only to the computer, but also with other equipment or nodes.
In general, this network has a shape similar to a network of stars. Existing
data organizations use de-centralization, are conducting maintenance, used
centralization facilities
Logical topology is generally divided into two types, namely:
1. Broadcast Topology
Simply put, it can be described as a host that sends data to all other hosts
on the network media.
2. Topologi Token Passing
Organize the transmission of data on a host through media using tokens
that regularly rotate across the host. The host can only transmit data only if
the host has a token. With this token, collisions can be prevented.

A LAN that combines a variety of topologies

F. VARIOUS KOMPUER NETWORK DEVICES


Computer network components:
1. Switch

Switch is a network device that has almost the same function as the
hub, but this device is 'smarter' than the hub because it can overcome the
problem of data collision. Not only that, switches also have some
advantages such as data transfer speed and network area that is much
better than the hub. In addition, the switch is not only used to divide the
signal but also filter the data packets and then forward them to the
intended network.

2. Hub

Hub is one of the network devices in charge of changing the network


transmission signal, which is intended so that both or more computers can
connect with each other. The hub cannot manage the flow of a data, so any data
packets that pass through the hub will be broadcast to all ports until the data
packet in question reaches its destination. This makes the data packet sent
experience a collision or data collision.

3. Bridge
Bridge is a network device that has the function of expanding a network while
creating a network segment. The bridge will map the Ethernet address of each
point in each network segment. Then Bridge will select and only allow the
transfer of certain data only. The way a bridge works is to recognize a MAC
address that transmits data to a network, then the bridge will create an internal
table automatically,

4. Server

A server is a special device or computer that provides various services or


services to clients connected to it. Generally, servers are equipped with high
hardware specifications, especially in terms of processors (can use Intel Xeon)
and RAM (average 16GB more). The server's primary function is to serve and
take full responsibility for data requests from client computers. In addition, the
server function is also to set access rights to the network that can be used by
the client computer.
5. Router

Router is a network device that connects two or more networks so that data
can be sent from one network to another. By using a router, we can connect
two different networks, for example 192.168.2.0/24 can connect to the
network 200.200.200.0/24.

Conclusion

 A computer network is two or more computer devices connected to


each other to share data and information.
 This type of computer network consists of PAN, LAN, MAN, WAN, CAN,
Internet and VPN. Topologies used include bus, ring, star, tree and mesh.
 The main benefits are facilitate human work, as well as help in the
process of conveying information and communication smoothly and
optimally.
 In addition to you can benefit greatly from the utilization of computer
networks, there are some negative impacts of its use. One real example
is the practice of data theft, to the cost of maintenance that is not
cheap.
Quizz…

1. Sebuah alamat pada komputer agar komputer bisa saling terhubung dengan komputer lain
disebut dengan ...

a. Netmask/Subnet Mask
b. Broadcast Address
c. Gateway
d. IP Address
e. E-mail.

2. Jenis jaringan komputer dimana server melayani permintaan client adalah ...

a. Workstation
b. ClientServer
c. Peer to Peer
d. Intranet
e. Internet

3. Flashdisk berfungsi untuk ...

a. Menggandakan data
b. Untuk menyimpan data
c. Sebagai modem
d. Mengkopi data
e. Menghilangkan data

Jawaban: Untuk menyimpan data.

4. Agar 3 atau lebih komputer bisa membentuk suatu jaringan, maka diperlukan...

a. VGA Card
b. Modem
c. Repeater
d. Hub
e. Router
5. Topologi LAN yang paling sedikit menggunakan kabel penghubung :

a. Ring
b. Tree
c. Star
d. Bus
e. Mesh
6. Pada Star topologi, perangkat jaringan apa yang digunakan...
a. Repeater
b. Switch
c. Terminator
d. Amplifier
e. Router
7. Untuk menghubungkan beberapa jaringan, diperlukan perangkat jaringan yaitu...
a. Router
b. Bridge
c. Gateway
d. Backbone
e. Wireless router

8. Sekumpulan komputer berjumlah banyak yang terpisah-pisah akan tetapi saling


berhubungan dalam melaksanakan tugasnya merupakan pengertian dari...
a. Jaringan komputer  
b. Manajemen komputer
c. System komputer
d. System informasi
e. Jaringan dasar              
      
9. Jaringan dengan area operasi lebih besar dari LAN tetapi lebih kecil dari WAN (disebuah
kota), dengan kapasitas data dan performa hardware yang tinggi merupakan pengertian dari...
      a. SAN (Storage Area Network)  
      b. WAN ( Wide Area Network )
      c.MAN (Metropolitan Area Network)
      d. Network client – server
      e. Network peer-to-peer

10. Sebutan jaringan raksasa di seluruh dunia adalah...


a. a.MAN
b. WAN
c. LAN
d. Enthernet
e. Internet
 https://docplayer.info/storage/52/30170805/1636197797/T93U1lRjk
j3NaPdklV9O9A/30170805.pdf
 https://www.sekawanmedia.co.id/pengertian-jaringan-komputer/

You might also like