Journal of Data Communication and Networking
Journal of Data Communication and Networking
Networking
KELOMPOK 5
ANGGOTA :
Dimas R.A.R
Jeffry Alfiannas
Fachrurozi
Agung Budiyanto
Rujiono
Febry Aldiana
12130456
12130705
12130494
12130946
12130410
1213
Allows sending large amounts of data efficiently, without errors and economically from
one place to another.
Allows the use of computer systems and support equipment (remote computer use)
Allows the use of a centralized computer system and are dispersed so that support the
management in terms of control (either centralized or decentralized)
Facilitate the possibility of managing and regulating the existing data in a wide variety of
computer systems
Reduce time for data processing.
Obtain data directly from the source (enhances reliability).
Accelerating the dissemination of information.
INTRODUCTION
Basically, data communication is the process of sending data from one computer to another. To be
able to transmit data on a computer should be added a special tool known as a network interface
(network interface).
This type of network interface varies depending on the physical medium used to transfer data.
Another thing to note is on the computer, the data transfer destination there may be more than one
application is waiting for data. The data must be sent to the appropriate application, the right
computer without errors.
For any problem in data communications, created a special solution in the form of rules to deal with
such problems. To handle all the data communication problems, overall this rule must cooperate with
each other. A set of rules to regulate data transmission process is referred to as a data
communication protocol. This protocol is implemented in the form of computer programs (software)
contained on the computer and other data communications equipment.
Computer Network
The computer network is a collection of computers, printers and other equipment
connected. Information and data moving through wires allowing
computer network users can exchange documents and data, print on
the same printer and together using hardware / software that is connected
the network. Each computer, printer or peripherals connected to the network
called nodes. A computer network can have two, tens, thousands or even
millions of nodes.
A network typically consists of 2 or more interconnected computers
among one another, and share resources such CDROM,
Printer, exchange files, or allow it to communicate with each other
electronic.
Source: http://www.itgeorgia.com/images/WebNetwork4.gif
Source: http://ops.fhwa.dot.gov/publications/telecomm_handbook/images/
WAN is designed to connect computers located on a broad geographic scope, such as the
relationship from one town to another within a State. WAN coverage bias covering 100 km to 1,000
km, and regular inter-city speed varies between 1.5 Mbps to 2.4 Gbps. In the WAN, the cost of
equipment for high-speed transmission, and WAN networks typically owned and operated as a public
network.
Bus Topology
This topology is the initial topology is used to connect a computer. In this topology each computer will be
connected to a long cable with multiple terminals, and at the end of the Kable must end with a terminator. This
topology is very rarely used in building a network of regular computer because it has several shortcomings
including the possibility of its collision data stream, if one device is broken or there is damage to one part of
the computer directly connected network will not work until the damage to be overcome.
Bus Topology
This topology Coaxial Cable initially used as a medium of instruction data and information. But at the moment
this topology in the build kabal computer network using optical fiber (fiber optic) but combined with other
network topologies to maximize performance.
Ring Topology
Or extending the ring topology is often called the ring topology is a network topology where each computer
connected in a circle. With a sense every computer that is connected into a network of inter-connected to two
other computers to form a network similar to the shape of a ring.
ring topology
The advantages of this topology is the cable that is used can be saved. The downside of this is the development
of a network topology will be difficult because each computer will be connected.
In the picture clearly shows how the token ring Kable made into a circle connecting the first and will
be in to back the terminals for each of the computers and other devices.
Star Topology
Or star topology is more often called star topology. In this topology we have to use another tool to
help connect computer networks. Examples of tools in use here is the hub, switch, etc.
Star topology
In the visible image of the hub serves as a hub of computers interconnected. The advantage of this topology is
very much all of which facilitate network administrators to manage, facilitate the addition of a computer or
terminal, ease of detecting defects and errors in the network. But with many of its advantages in terms of
topology is not without flaws. Shortcomings include waste to cable, control centered on the hub so sometimes
critical problems that in case of damage to the hub, then all of the network will not be in use.
Topology tree
Or tree topology also called hierarchical topology and can also be called multilevel topology is a
topology that can be used on the network in the multi-storey office space.
Tree topology
In the picture we can see the relationship between one computer to another computer with a branching
hierarchy or central jelas.sentral which is at the very top of an active central central while underneath is a
passive central.
Public Data Network (PDN); Network used to connect a network hub with each other and
are usually located far apart even be on another continent. The central general of PDN
possession of the government or other organizations.
Private Branch Exchange (PBX); Network which is used primarily for telephone or voice
communication on the buildings but uses the same technology as the telephone exchange.
Similar to the LAN but the data transfer is not as high as its LAN.
Establish an interface between the system input / output bus and a modem;
Controlling modem interface signals and converting the signal level to match the
interface;
Change the data to be transmitted into the series and vice versa;
For synchronous equipment are buffers, and control of news between the two
stations is done by DCCU;
Set the error recovery to retry mechanism;
Perform code conversion where necessary;
Perform synchronization good character by means of start / stop and the SYN
character;
Conduct bit synchronization for asynchronous controller. Sometimes synchronous
controller can also do it with the internal clock;
Perform testing error (parity, longitudinal or BCC);
Controlling procedures to track the transmission control character.
Included in the classification DCCU include the I / O controller and the controller
terminals.
Terminal is the location in the network which is where the information can get in and out.
Thus a computer can be classified as a terminal, when the function is indeed the case.
Some common kinds of terminals:
Key board - printer
Key board - a video display
Data processing
Cycle Data Processing
Derived from the word processing if that means a series of activities or conducting activities - specific
activities for specific activities as well. Based on the understanding that the processing of data is a
series of activities, thoughts and energy assistance or an equipment which follow a series of steps,
the formulation of such data, form the composition, the nature or contents become more useful. Data
processing can be done in centralized and decentralized. Sentaralisasi data processing allows
direction:
a. Application of the division of labor with the division of costs and quantitative development more
profitable.
b. Use the same file on a lot of data processing.
c. A better utilization of technical administration of the target.
d. Application of separation of functions between operational and central data processing.
Data processing can be interpreted also as all the processing to make the data useful in accordance
with the desired result that can be immediately used. Data processing is a process of receiving data
as input (input) and processed (processing) by a particular program and issued the results of data
processing by computers is known a system called EDP (Electronic Data Processing) is a data
processing system in which computers play a major role.
Judging from the data processing system, can be divided into three basic phases, namely:
a. Read data or input data.
b. Process data or process
c. Results or outputs.
Firewall
The Internet is a computer network that is very open in the world, the consequences
which should be on the responsibility is no guarantee of security for the network related to
The Internet. This means that if network operators are not careful in setting up the system, then
most likely related to the Internet network will be easily accessible people
were not invited from outside. It is the duty of the relevant network operator,
to suppress these risks to a minimum. Selection strategies and skills
The network administrator, will be very easy to distinguish whether a network
penetrated or not.
Firewall is a tool to implement the security policy (security
policy). While the security policy, based on the balance between facilities
supplied with its security implications. The more stringent security policies,
increasingly complex service configuration information or the fewer facilities
available on the network. Conversely, with more and more facilities are available or
applied in such a simple configuration, the easier people
'Nosy' from the outside into the system (a direct result of the lack of security policy).
In the real world, a firewall is a wall that separates the room, so that
fire in a room does not spread to other rooms. But the truth
firewall on the Internet is more like a defense around the castle, which maintains
against attacks from outside. Point:
restrict the movement of people into the internal network
restrict the movement of people who come out of the internal network
prevent attackers layered defense approach
So that out of the firewall should be acceptable. A firewall is a combination of
routers, servers, and appropriate complementary software.
A firewall is a method / system / mechanism is applied both to
hardware, software or system itself with the aim of protecting, either
by filtering, limiting or even reject any or all relationships / activities
a segment of the private network to the outside network that is not a space
scope. These segments can be a workstation, server, router, or
local area network (LAN).
This policy, then the firewall must ensure that all businesses that represent
The operation should fail or be defeated. Thus, all the illegal access
inter-network (not authorized) will be rejected.
Characteristics Firewall
1. The whole relationship / activities from the inside out, must pass through the firewall. This matter
can be done by blocking / physical limit all access
to the local network, but pass through the firewall. There are many types of network
which allows.
2. Only the registered activity / known that can pass / intercourse,
this can be done by adjusting the local security policy configuration.
Many types of firewalls that can be selected at the same time various types of policy
offered.
3. The firewall itself must be immune or relatively robust against attacks / weaknesses.
This means the use of a system that can be trusted and the operating system
relatively safe.
the information from the TCP header. Attackers expect only a part (fragment)
The first course to be in check and the rest will be able to pass freely. Case
This can be in the tackle by rejecting all packet with TCP protocol
and has offset = 1 IP fragment (IP section)
The second way, using the proxy system, where each communication that occurs
between the two networks should be done by an operator, in this case the proxy
server. Some protocols, such as Telnet and SMTP (Simple Mail Transport
Protocol), will be more effectively dealt with the evaluation of the packet (packet filtering),
while others such as FTP (File Transfert Protocol), Archie, Gopher and
HTTP (Hyper-Text Transport Protocol) will be more effectively dealt with by the system
Proxy. Most firewalls use a combination of these two techniques (packet
filtering and proxy).
In a network that implements the proxy system, communication links to the internet
conducted through a system of delegation. Computers that can be recognized
by the Internet acts as a 'representative' for the other machines that want to connect to
outside. Proxy server (set) of certain protocols are run on a dual-homed
bastion host or host, where all network users can communicate
to him, then the proxy server acts as a delegate.
In other words each client program to be associated with the proxy server and proxy servers
who will be in touch with the real server on the internet. Proxy servers will
evaluate each request from the client relationship and decide which one
is allowed and what is not. When this connection request is approved, then the
proxy server relays the request to the real server.
Conclusion
From the above discussion, the authors conclude that the data communication is very beneficial for
humanity and life in the fields of education, social, economic and also as a means of entertainment,
especially for the advancement of science and technology.
Data Communications also has many applications menyuguhkam various advantages and
convenience for users.
Suggestion
Let us be wise in all things, including the use of activity modulation techniques and data
communication in the network components in the computer. If we use the internet properly it will help
us in the work. Conversely, if we use for the bad things that would harm ourselves or others.
Bibliography
Simple. 2012. "Modulation Systems", http://www.wikipedia.com (accessed 30 March 2012)