0% found this document useful (0 votes)
8 views

Kp m3032.k4 Prepare Hardware and Software Requirements

Uploaded by

Zahra Irina Iqua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Kp m3032.k4 Prepare Hardware and Software Requirements

Uploaded by

Zahra Irina Iqua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

JABATAN TEKNOLOGI MAKLUMAT & KOMUNIKASI

UNIT SISTEM KOMPUTER DAN RANGKAIAN


KOLEJ VOKASIONAL KUDAT
P/S 141, 89057
KUDAT, SABAH

KERTAS PENERANGAN
M303.K4
KOD DAN NAMA PROGRAM/
COMPUTER SYSTEM AND NETWORKING
PROGRAMS CODE & NAME
NO. DAN TAJUK MODUL/
KSK 3032 BASIC COMPUTER NETWORK SETUP
MODULE NO. AND TITLE
TAHAP/ LEVEL SVM 2 SEMESTER 3

KREDIT/ CREDIT UNIT 2.0


MASA BERTEMU/ CONTACT
4 HOURS / WEEK
HOUR

KOMPETENSI/ COMPETENCY K4 PREPARE HARDWARE AND SOFTWARE EQUIREMENTS

4.1 ANALYSE HARDWARE AND SOFTWARE SPECIFICATION


STANDARD PEMBELAJARAN/ 4.2 OBTAIN HARDWARE AND SOFTWARE QUOTATIONS
LEARNING STANDARD 4.3 SELECT HARDWARE AND SOFTWARE REQUIREMENTS

Muka/ Page : 1
NO. KOD / CODE NUM. M303.K4
Drpd / of :
NAMA PELAJAR
NO. KP
Muka / Page : 2
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

TITLE: PREPARE HARDWARE AND SOFTWARE REQUIREMENTS

4.1 ANALYSE HARDWARE AND SOFTWARE SPECIFICATIONS

COMPONENTS OF A NETWORK

A computer network comprises the following components:

 A minimum of at least 2 computers


 Cables that connect the computers to each other, although wireless
communication is becoming more common
 A network interface device on each computer (this is called a network interface
card or NIC)
 A ‘Switch’ used to switch the data from one point to another. Hubs are outdated
and are little used for new installations.
 Network operating system software

INFLUENCING FACTORS TO CHOOSE THE EQUIPMENT

1. Purpose - The purpose of a computing facility will greatly impact most design
aspects including room layout, computer hardware, printing systems,
projection/presentation systems, etc. Consider what the primary use of this facility
will be:
 Open computer use - students come and go to use the computers for
assignments or projects
 Instructional computing facility - facility is used for instruction lead by a single
person
 Collaborative work - facility is used by students in a group project setting
 Laboratory work - computers are used for data collection or in a laboratory
setting

2. Specific application - The greatest influence on the computer hardware itself is


the intended application and operating system. These will drive the need for more
powerful computers, larger monitors, specific printing needs, and other technical
decisions.

3. Budget - If everyone could afford to build the perfect lab they would, but there
are always budget limitations. Find the limits and project priorities (these priorities
should be influenced by the above factors) and decide on trade-offs. Is new
furniture sacrificed for more powerful computers? Is advanced printing left behind
in favor of a projection system?
Muka / Page : 3
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

4. Staffing/Maintenance - A computing facility requires staffing to install, configure,


and maintain hardware and software. The size, complexity, and purpose of a
computing facility will determine the staffing needs. The lack of proper staffing
and maintenance may limit a facilityÕs availability or usefulness.

ASPECTS FOR CONSIDERATION TO CHOOSE THE EQUIPMENT OR FACILITIES

Special note - For all of the following hardware items, one should consider the reliability,
serviceability, and warranty of the specific items. This can greatly impact the
maintenance costs and headaches down the road. We recommend at least a three-
year warranty on all computer hardware if available.

1. Workstation hardware - This central aspect of the facility is influenced by all of the
previously mentioned factors. Consider the needs in the following areas
 CPU - What level of processing power is required by the applications?
 Memory - What amount of RAM is required by the applications?
 Primary storage space - How much storage space is required to install the local
applications? Will users be storing documents on the local machines? Do
applications require a great deal of swap space?
 Sub-systems - evaluate your needs for:
 Networking - generally only a 10/100 Ethernet card is required
 Audio - Sound card, speakers, headphones, microphones
 Video - Video card speed and memory
 Secondary storage - CD, CD-R, DVD, Zip, etc.
 Input - Keyboard and mouse variations
 Monitor - Is a large monitor needed for graphics or engineering work?
 Form factor - Is a small computer required due to furniture or space limitations?
Is a small form factor monitor required for students to see the instructor or each
other?

2. Server hardware - Most computing facilities rely on a server for application serving,
print serving, or storage. This hardware can vary greatly depending on the specific
use of the server.

3. Networking - Networking is a core component of computing facilities; it allows


access to Internet resources, access to e-mail, and the ability to collaborate
remotely. Potential networking costs include installation/activation of Ethernet
jacks (B-jacks), monthly B-jack fees, hubs/switches for networking within the room
Muka / Page : 4
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

(not needed if each computer has a B-jack), and cabling. Networking may
represent a good portion of the cost of the facility.

4. Printing - Most computing facilities require some form of printing to be available.


For most applications this simply means the ability to print black and white text
documents, but there are a variety of printing needs. Another consideration is the
quantity of printing expected in the facility. This greatly influences the specific
model of printer within a type of printer. The following are the most popular forms
of printing in campus computing facilities:
 Black and white laser printing
 Color printing (laser or inkjet)
 Plotting

5. Other peripherals - The purpose and specific application of a facility may require
additional hardware not in a traditional computing lab. These are some common
peripherals used in special applications:
 Scanning
 Special storage (CD-R, Jaz, DVD-R, etc.)
 Special input (tablets, mapping, data acquisition, etc.)

6. Audio/Video systems (projector, sound, etc.) - Many computing facilities,


especially instructional ones, benefit from the ability to display information for the
entire room. This may include the ability to project computer screens, project
television/video tapes/DVDs, play audio tapes/CDs, and amplify input from
microphones. More advanced systems even allow instructors to project any of the
workstation screens to a projector or to other computer screens on the fly.

7. Upgrade path - Any computer hardware and software will eventually have to be
replaced as it becomes obsolete. Computing facilities should have an upgrade
plan and budget for both hardware and software. In general, ITS uses a three-year
replacement cycle for hardware in computing facilities. Software is replaced more
frequently, usually as new, more useful, versions are released. Budgeting for new
software is difficult due to the unpredictable nature of software development, but
plan on spending about a third of your original software costs each year in
upgrades.

8. Furniture - The purpose of a facility is the strongest influence on the furniture and
layout of the facility. An open computer lab may simply be rows of computers on
basic tables. An instructional facility may have rows all facing the front of the room
Muka / Page : 5
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

for instruction. A collaborative facility may have single computers (or groups of
computers) at large tables designed to seat many students. At least one
workstation in each facility should be placed on an adjustable height table for
accessibility by people using wheelchairs. In an instructional facility, the
instructorÕs workstation should also be placed on an adjustable height table.

9. Accessibility - In addition to placing accessible tables in the lab (see the above
section on furtiture), one should also consider the accessibility of the computer
applications (using special input/output hardware or software), other systems
(printing, A/V equipment, etc.), and the accessibility of the room layout. More
detailed information about accessibility is available from the CU-Boulder Assistive
Technology Lab.

10. Power - Often the existing power circuit(s) in a room are not sufficient for a
computing facility. Examine your power needs and resources, and contact
facilities management regarding power system upgrades.

11. Structured Cabling


The two most popular types of structured network cabling are twisted-pair (also
known as 10BaseT) and thin coax (also known as 10Base2). 10BaseT cabling looks
like ordinary telephone wire, except that it has 8 wires inside instead of 4. Thin coax
looks like the copper coaxial cabling that's often used to connect a Video
Recorder to a TV.

12. 10BaseT Cabling


When 10BaseT cabling is used, a strand of cabling is inserted between each
computer and a hub. If you have 5 computers, you'll need 5 cables. Each cable
cannot exceed 325 feet in length. Because the cables from all of the PCs
converge at a common point, a 10BaseT network forms a star configuration.

Fig 1a shows a Cat5e cable, with a standard connector, known as an RJ-45


connector.

Fig 1b shows a standard Cat5e Wall Outlet socket which the cables are
connected to.

Fig 1c shows a standard Cat5e Patch Panel Wall Outlet socket which is used to
terminate the cables from various points in the school bank to a central point.

Fig 1d shows a wall mounted cabinet used to house and protect patch panel
cables and connectors.
Muka / Page : 6
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Fig 1a: Cat5e Cable and a close up of RJ-45 connector

Fig 1b: Cat5e Wall Outlets

Fig 1c: Cat5e Patch Panel

Fig1d: Wall Mounted Cabinet


Muka / Page : 7
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

10BaseT cabling is available in different grades or categories. Some grades, or


"cats", are required for Fast Ethernet networks, while others are perfectly
acceptable for standard 10Mbps networks--and less expensive, too. All new
networks use a minimum of standard unshielded twisted-pair (UTP) Category 5e
10BaseT cabling because it offers a performance advantage over lower grades.

13. Network Interface Card (NIC)


A NIC (pronounced 'nick') is also known as a network card. It connects the
computer to the cabling, which in turn links all of the computers on the network
together. Each computer on a network must have a network card. Most modern
network cards are 10/100 NICs and can operate at either 10Mbps or 100Mbps.

Only NICs supporting a minimum of 100Mbps should be used in new installations


schools.

Computers with a wireless connection to a network also use a network card

Fig 2: Network Interface Cards (NICs)

14. Hub and Switch


A hub is a device used to connect a PC to the network. The function of a hub is to
direct information around the network, facilitating communication between all
connected devices. However in new installations switches should be used instead
of hubs as they are more effective and provide better performance. A switch,
which is often termed a 'smart hub'.

Switches and hubs are technologies or ‘boxes’ to which computers, printers, and
other networking devices are connected. Switches are the more recent
technology and the accepted way of building today's networks. With switching,
Muka / Page : 8
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

each connection gets "dedicated bandwidth" and can operate at full speed. In
contrast, a hub shares bandwidth across multiple connections such that activity
from one PC or server can slow down the effective speed of other connections on
the hub.

Now more affordable than ever, Dual-speed 10/100 autosensing switches are
recommended for all school networks. Schools may want to consider upgrading
any hub based networks with switches to improve network performance – ie
speed of data on the network.

Fig 3a: An 8 port Hub

Fig 3b: 2 Examples of 24 port Switches

SERVER FUNCTIONALITY
Muka / Page : 9
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

File & Print Server

Printer

Multimedia or
Scanner

Access to:

Internet content &


learning resources,
Scoilnet etc
Cache/Proxy,
Main Servers &
Filtering/Firewall
Internet Access
Modem or Router

Network

Fig 4: Server Functionality Model

The network connects to a File and Print Server, Fig 4. The File server stores common files,
The Print Server manages the different requests for printing. A Multimedia or CD server is
used to store and distribute Multimedia - Sound, Video, Text , applications etc . Internet
access is handled via a modem or router, while internet Filtering , Proxy and Web Caching
are all handled via a dedicated server.

EXAMPLE NETWORK CONFIGURATIONS:


Models for Networking

First let’s review some simple models where no networking exits and computers are used
in standalone or ad-hoc mode. The following represent some simple models representing
classrooms.

Model 1a: One computer in a classroom with its own private printer. It is recommended
that schools with computers in this situation would network the classrooms in question as
shown. Networking will more effectively make use of commonly shared resources such
as file servers and school printers, internet , email etc. When a mobile PC or PC with
projector is require in a room the network points are already present.

In this scenario, there could be a single LAN-connected point for the teacher and an
additional LAN connection to allow for a portable switch. Refer to diagram 4a

Model 1a
Muka / Page : 10
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Fig 4a: From single PC to networked LAN Points


Model 1b: This scenario is similar to Model 1a, but where other equipment such as printers,
scanners are used in ad-hoc and inefficient configuration. It is recommended that
schools with computers in this situation would network the classrooms in question .
Networking will more effectively make use of commonly shared resources such as
scanners, printers, internet , email etc. In this scenario there may be a single LAN-
connected point for the teacher and a limited number of LAN connection points
throughout the room to allow students access to the school LAN. The connection points
may be situated as required around the room depending upon class learning
requirements and the availability of existing power outlets. Refer to diagram 4b

Model 1b:

Fig 4b: Networking other commonly used equipment


Muka / Page : 11
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Networked Computer Room

Model 1c: A non networked computer room or resource area with an ad-hoc and
inefficient use of printers, scanners etc. Networking computer rooms is essential so that
all PCs can access printers, the internet, email etc. This scenario represents a school
computing room which can be timetabled for classes, and with each computer
networked to the LAN. There may be a single LAN-connected presentation point for the
teacher and LAN-connected computers throughout the classroom. Traditionally, ICT in
Irish secondary schools has been concentrated in dedicated computer rooms. Primary
schools have more varied deployment. From an administrative point of view, this setup is
attractive. An entire class can be timetabled, avoiding problems of extra teachers for
split classes. Refer to diagram 4c

Model 1c:

Fig 4c: Networked computer lab.

Media Bays (Ref Fig 5a)

Media bays, or data suites are clusters of perhaps four desktop computers, a scanner
and a printer.

Though self-sufficient in terms of peripherals, they would be connected to the main


school network and have Internet access. This is one reason why they would be best sited
in public areas around the school.
Muka / Page : 12
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

These suites would be used by students in small groups or individually and could
accommodate task-oriented activities and self-directed learning.

Advantages are easy access to staff and students alike, Utilise areas of school without
losing classrooms

Public supervision

Disadvantages are Open access means security issues must be addressed .

Fig 5a: Movable or mobile Media Bays

Laptop and data-projector (Ref Fig 5b)

A combination of laptop and data-projector is a highly effective teaching model where


a teacher wants to provide the whole class with visual or multimedia content . It can be
used in conjunction with an existing LAN point in the room for best effect.

Fig 5b: Movable or mobile Laptop PC with Digital Projector

Wireless LAN (Ref Fig 5c)

This scenario has the capability to connect multiple computers to the school LAN without
providing direct LAN connections. No LAN cabling is required for the classroom; instead
all computers are radio linked to the LAN. Wireless LAN technology is relatively new and
Muka / Page : 13
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

generally more expensive and more limited than cabled LANs. There is the potential,
however, to save on extensive cabling work with this option.

Wireless connections allow a region to be connected to a network by radiowaves, which


link a wireless card in the computer to a wireless access point. One should remember that
the access point itself must be connected by cable to the main network.

Advantages

 Flexibility of machines - usually laptops - linked even if students break into small
workgroups in different parts of room.
 Wireless networking means that large common areas such as canteens or libraries
can be easily connected to the network.
 Less unplugging of cables into sockets reduces wear and tear

Disadvantages

 Wireless networking may prove much more expensive if wiring large numbers of
machines close together.
 Wireless hubs data rates (typically 11Mbps) are considerably less at present than
their cable equivalent. Thus is unsuitable for high data volumes such as multimedia
access by large numbers of machines.
 Manufacturers stated ranges of 100 - 300 metres is wildly optimistic. Ranges of less
than 18 metres are not uncommon, Data rates drop off as distance increases.

While it is unlikely that wireless will replace data cables in the near future they do
provide a flexibility that can be harnessed creatively.

Fig 5c: Wireless LAN (WLAN)


Muka / Page : 14
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Some Relevant Terms


MDF Main Distribution Frame

IDF Intermediate Distribution Frame

Broadband Refers to a higher speed always on internet connection

Narrowband Refers to speeds of up to 128kbps

Dial up Refers to having to dial up the internet every time one goes online.

Always On Refers to the nature of broadband, being ‘always on’ means a dial
up is not required.

Download speed The speed at which data is delivered to a school modem from the
internet

Upload speed The speed at which data is sent to the internet from a school
modem.

ISP Internet Service Provider

ISDN Integrated Services Digital Network (64kbps single channel or


128kbps dual channel)

PSTN Public Switched Telephone Network (refers to an ordinary telephone


line)

ADSL Asymmetric Digital Subscriber Loop

Mbps Megabits per second (1,000,000 bits per second)

Kbps Kilobits per second (1,000 bits per second)

Ethernet Ethernet is a standard for transferring data over networks.

USB Universal Serial Bus

Modem A simple device used to access the internet

Router A more technically advanced device used to access the internet


Muka / Page : 15
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

NETWORK SOFTWARE APPLICATION AND TOOLS

Network software applications utilize the Internet or other network hardware


infrastructure to perform useful functions.

SERVER

1. NETWORK OPERATING SYSTEMS


Popular network operating systems include Windows, Mac, Linux, NetWare, and
OS/2. Learn about computer networking from the operating system point of view.
The term "NOS" stands for network operating system. A NOS contains protocol
stacks as well as device drivers for network hardware.

2. DEVICE DRIVERS

3. WINDOWS FIREWALL SOFTWARE


A network firewall guards a computer network against unauthorized incoming
messages or undesired outgoing messages. Network firewalls may be hardware
devices, software programs, or a combination of the two.

Free Firewall Download - Personal Free Firewall Software


i. PeerGuardian
PeerGuardian is a software firewall for Windows file sharing clients.
PeerGuardian maintains a database of IP addresses suspected to be used
by corporate entities searching for illegal file sharing activity

ii. Kerio
The limited edition of Kerio Personal Firewall is free for home and personal
use. This free firewall download also includes a 30-day trial of Kerio's full
edition
iii. NetVada Safety.Net
From NetVada - "Safety.Net is free for personal and not-for-profit charitable
entity use (excluding governmental entities, educational institutions and
libraries)."
iv. Sygate
Before being discontinued by Symantec, this firewall was provided by
Sygate as a free download for personal / home use.

v. ZoneAlarm
Muka / Page : 16
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

From Zone Labs - "ZoneAlarm is free for individual and not-for-profit


charitable entity use

4. FTP File Transfer


FTP is a method to transfer files across the Internet using an FTP client program. FTP
is commonly used on school networks and by Web publishers.
5. Network Ping - Testing Commands and Utilities
In computer networking, ping is a process for sending test messages from one
computer to another to check the health of network connections. Ping tests are
run using various software commands and utility programs
6. Network Programming - Windows, Unix and Socket
Did you know that network programming is the use of software APIs and
development tools to build network-aware applications? Windows, Mac and
Unix/Linux network programs all share some of the same fundamental concepts
including sockets. So-called cross-platform network programming environments
like Java and Python also exist.
7. Microsoft Internet Explorer
The Internet Explorer browser provides access to Web pages and also contains a
large number of network file sharing and security settings.

WORKSTATION

1. OPERATING SYSTEMS – Windows XP, 7 or 8


2. DEVICE DRIVERS – NIC, Network adapter, monitor, printer etc
3. APPLICATION SOFTWARE – Microsoft Office, EDraw max, Microsoft Visio etc

NETWORK SPECIFICATION

Network requirements in a LAN environment

Network speed

LAN Networks slower than Fast Ethernet (100 Mbit/s) should be avoided for
everyday work. Although networks slower than Ethernet (10 Mbit/s) can appear
robust as long as the user is not performing large updates, joining or sharing a
project

DHCP and DNS services


Muka / Page : 17
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Without the DNS service the /etc/host file will need to be configured to resolve
names. It is recommended to have the DNS service running and avoid the subtle
problems that could arise when depending on the /etc/host file for name
resolution.

Router settings

If a local network is joined by a router, it is possible clients on one subnet will not
learn of a BIM Server running on the other subnet. ArchiCAD’s discovery service
relies on broadcasting UDP datagrams, and frequently routers block broadcast
messages. If you would like the BIM Server pop-up list to be populated for all clients
no matter where they are on your local network, make sure the routers are set to
pass broadcast messages.

Firewall settings

Firewalls should be open to the ports used by Teamwork. If these ports are not
open it is possible that a user could see the Internet, download email, but still not
have access to the BIM Server.

Host names/Computer names

Host names are restricted to the same standard naming convention as domain
names. That is, they should only contain the letters a-z the numbers 0-9 and the
hyphen '-'. A hyphen cannot start or end a host name. See RFC 1178 Choosing a
Name for Your Computer

BIM Server IP address

This must be a static IP address.

Network requirements in a private WAN environment


As long as the above LAN requirements are met, Teamwork will operate fine. In a WAN
environment unicasting and multicasting may be disabled to reduce bothersome
network traffic. If broadcasting is disabled, then users will have to add the BIM Server to
their server lists.
If VPN over the Internet is being used, the bandwidth of the connection may prove a
bottleneck. Users should be warned that they should send/receive more frequently, and
avoid tasks that could change large amounts of data, for instance, bulk layout or
section/elevation updates.
Muka / Page : 18
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Network requirements over the Internet


Teamwork over the Internet will require a static public IP address. This is not an IP that
comes standard with Internet access, but an option that must be specifically ordered. A
small office would not need more than one static public IP address. (This requirement can
be circumvented, see "Exception to the public IP address requirement when connecting
via the Internet" below.)
Although working with a modem/dialup bandwidth (56 Kbit/s) can be done, it will be
slow and for that reason it is not recommended. Remote users should consider ADSL (1.5
Mbit/s) or better.

Common network problems that interfere with BIM server operation


The computer name and the IP address of the BIM server are two important points of
failure in the connection process. The project remembers which method you used to
connect: either hostname or IP address. If either information were to change or not be
available, then projects that use this information to connect would fail to connect.

IP addresses are not necessarily permanent in a network.

In most local networks a Dynamic Host Configuration Protocol (DHCP) is used to


assign an IP address to a specific computer. A computer has an IP address for a
given lease period. If the lease runs out, or the computer is restarted a new IP
address is obtained from the DHCP server and it could be different. This poses a
fatal problem if a joined project uses an expired IP address to link to a BIM Server.
The solution is to guarantee that the BIM Server has a fixed IP address via proper
configuration of the DHCP server.

IP addresses are not necessarily reachable

Any company may have a group of smaller subnets linked together via routers.
Routers can be configured to control the traffic between two subnets which might
mean the blocking of connections between certain IP addresses. Make sure that
your BIM Server is ping-able from where you want to join it from.

To access a BIM Server over the Internet presents a different hurdle. Up to now we
have been primarily discussing private IP addresses. The type that are most likely
assigned by a local DHCP server. Unlike private IP addresses, public Internet IP
addresses are guaranteed to be globally unique. For this reason, a private IP
address cannot be used for a BIM Server that will be accessed from the Internet
via its IP address. Public addresses are managed by the Internet Assigned Numbers
Authority and your Internet service provider may be able to help in the application
process. When you apply for an IP address you generally apply for a domain name
as well.
Muka / Page : 19
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

The Port to the IP address is being blocked -- Firewall

The BIM Server listens for activity on several ports. If any of these ports are being
blocked by a Firewall or are already in use by another listener the BIM Server will
fail in one way or the other. The ports are defined in the BIM Server preferences
dialog.

Computer names or hostnames are not necessarily permanent

It is possible that your computer obtains its name from a Domain Name System
(DNS) server. (I have seen this happen with Macs thats do not log into the domain)
If this is the case you should configure the DNS server to always provide the same
hostname. If the hostname does not resolve to a static IP address the BIM Server
might stop and start randomly as it receives new IP addresses or hostnames.

Computer names are not necessarily resolvable

The DNS server's main task on your network is to translate the computer names to
IP addresses. Since office networks often resides in one “domain.” a hostname is
all it takes for one computer to connect to another. When you connect your home
PC to a BIM Server via the Internet a fully qualified hostname is required. For
instance, joes_pc.graphisoft.com. You will need to add this manually, since the
Discovery protocol does not work over the Internet. Additionally, this means that
your hostname.domain must be resolvable by an Internet DNS server. That is the
domain must be a publicly registered domain name. If you do not have a
registered domain you will have to resort to tricks.

Exception to the public IP address requirement when connecting via the


Internet
This is for a small office that is experimenting with Internet access to its BIM server. This is
not a suggested workflow.
The below example used Server: T-Online ADSL dynamic IP address, Linksys WiFi router,
attached to aMacMini Client: A laptop somewhere

Setup Steps

1. Register with a dynamic DNS service provider. We used the free services of
DynDNS.com.
Muka / Page : 20
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

2. Provide the DNS service provider with your desired hostname. Your dynamic IP
address will route to this hostname.
a. The LynkSys router Administrative Interface already offes the DynDNS
service as an option. At this point you need to provide a
username/password and host data. After this the router will register itself
with DynDNS and power on or whenever its IP address changes.
b. If your computer is directly connected with the modem, (router is not
present) there is an application with which you can register.
3. The connections that reach the router IP address via DynDNS and hostname must
be forwarded to the BIM Server's port on the internal network's IP Address

Special notes

1. Arbitrary remote computers can connect with the BIM Server using the DynDNS
hostname, but only if the Port is not blocked by a firewall.
2. If users within the local network wish to access a project that will also be available
from outside the local network then all teammates must use the external
hostname to connect. Otherwise the library paths will not be the same and user
with the "wrong" path will not see the loaded library.

WIRELESS NETWORK (TAMBAHAN)

The term 'wireless network' refers to two or more computers communicating using
standard network rules or protocols, but without the use of cabling to connect the
computers together. Instead, the computers use wireless radio signals to send information
from one to the other. A wireless local area network (WLAN) consists of two key
components: an access point (also called a base station) and a wireless card.
Information can be transmitted between these two components as long as they are fairly
close together (up to 100 metres indoors or 350 metres outdoors).

Fig 6a: Wireless Access point or Wireless Basestation


Muka / Page : 21
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Suppliers would need to visit the schools and conduct a site survey. This will determine the
number of base stations you need and the best place(s) to locate them. A site survey will
also enable each supplier to provide you with a detailed quote. It is important to contact
a number of different suppliers as prices, equipment and opinions may vary. When the
term 'wireless network' is used today, it usually refers to a wireless local area network or
WLAN. A WLAN can be installed as the sole network in a school or building. However, it
can also be used to extend an existing wired network to areas where wiring would be
too difficult or too expensive to implement, or to areas located away from the main
network or main building. Wireless networks can be configured to provide the same
network functionality as wired networks, ranging from simple peer-to-peer configurations
to large-scale networks accommodating hundreds of users.

Fig 6b: Desktop PC Wireless LAN card Fig 6c: Laptop PC Wireless LAN card

What are the advantages and disadvantages of a Wireless LAN?

Wireless LANs have advantages and disadvantages when compared with wired LANs. A
wireless LAN will make it simple to add or move workstations, and to install access points
to provide connectivity in areas where it is difficult to lay cable. Temporary or semi-
permanent buildings that are in range of an access point can be wirelessly connected
to a LAN to give these buildings connectivity. Where computer labs are used in schools,
the computers (laptops) could be put on a mobile cart and wheeled from classroom to
classroom, providing they are in range of access points. Wired network points would be
needed for each of the access points.

A WLAN has some specific advantages:

 It is easier to add or move workstations


 It is easier to provide connectivity in areas where it is difficult to lay cable
Muka / Page : 22
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

 Installation can be fast and easy and can eliminate the need to pull cable through
walls and ceilings
 Access to the network can be from anywhere in the school within range of an
access point
 Portable or semi-permanent buildings can be connected using a wireless LAN
 Where laptops are used, the ‘computer suite’ can be moved from classroom to
classroom on mobile carts
 While the initial investment required for wireless LAN hardware can be similar to
the cost of wired LAN hardware, installation expenses can be significantly lower
 Where a school is located on more than one site (such as on two sides of a road),
it is possible with directional antennae, to avoid digging trenches under roads to
connect the sites
 In historic buildings where traditional cabling would compromise the façade, a
wireless LAN can avoid drilling holes in walls
 Long-term cost benefits can be found in dynamic environments requiring frequent
moves and changes
 They allows the possibility of individual pupil allocation of wireless devices that
move around the school with the pupil.

WLANs also have some disadvantages:

 As the number of computers using the network increases, the data transfer rate to
each computer will decrease accordingly
 As standards change, it may be necessary to replace wireless cards and/or
access points
 Lower wireless bandwidth means some applications such as video streaming will
be more effective on a wired LAN
 Security is more difficult to guarantee, and requires configuration
 Devices will only operate at a limited distance from an access point, with the
distance determined by the standard used and buildings and other obstacles
between the access point and the user
 A wired LAN is most likely to be required to provide a backbone to the wireless
LAN; a wireless LAN should be a supplement to a wired LAN and not a complete
solution
 Long-term cost benefits are harder to achieve in static environments that require
few moves and changes
 It is easier to make a wired network ‘future proof’ for high data transfer.

Wireless Network Components


Muka / Page : 23
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

There are certain parallels between the equipment used to build a WLAN and that used
in a traditional wired LAN. Both networks require network interface cards or network
adapter cards. A wireless LAN PC card, which contains an in-built antenna, is used to
connect notebook computers to a wireless network. Usually, this is inserted into the
relevant slot in the side of the notebook, but some may be internal to the notebook.
Desktop computers can also connect to a wireless network if a wireless network card is
inserted into one of its internal PCI slots.

In a wireless network, an 'access point' has a similar function to the hub in wired networks.
It broadcasts and receives signals to and from the surrounding computers via their
adapter card. It is also the point where a wireless network can be connected into an
existing wired network.

The most obvious difference between wireless and wired networks, however, is that the
latter uses some form of cable to connect computers together. A wireless network does
not need cable to form a physical connection between computers.

Wireless Network Configurations


Wireless networks can be configured in an ad hoc/peer-to-peer arrangement or as a
local area network.

Ad Hoc/Peer-to-Peer Configuration
This is the most basic wireless network configuration. It relies on the wireless network
adapters installed in the computers that are communicating with each other. A
computer within range of the transmitting computer can connect to it. However, if a
number of computers are networked in this way, they must remain within range of each
other. Even though this configuration has no real administration overhead, it should only
be a consideration for very small installations.

Benefits and Educational Uses

The installation of cables is time consuming and expensive. The advantages of not doing
so are apparent:

the amount of work required and the time taken to complete it are significantly reduced
the network is accessible in places where wiring would have been difficult or impossible
with no cables linking computers together, cable-related faults and network downtime
Muka / Page : 24
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

are minimized. Where a wireless network is in place, teachers or students can have
continuous access to the network, even as they move with their equipment from class to
class.

The space over which a wireless network operates is not planar but spherical. Therefore,
in a multi-level site, network access is available in rooms above or below the access point,
without the need for additional infrastructure.

In a location within a school where network access is required occasionally, desktop


computers fitted with wireless network cards can be placed on trolleys and moved from
location to location. They can also be located in areas where group work is taking place.
As they are connected to the network, documents and files can be shared, and access
to the Internet is available, enhancing group project work.

As the range of the wireless network extends outside the building, students and teachers
can use wireless devices to gather and record data outside, e.g., as part of a science
experiment or individual performance data as part of a PE class.

Technical and Purchasing Considerations

Network interface cards for wireless networks are more expensive than their wired
counterparts. The cost of the access points has also to be considered.

Wireless networks work at up to 54Mbps, whereas wired networks normally work at


100Mbps (Fast Ethernet). This data transmission rate is dependent on the number of users,
the distance from the access point and the fabric of the building (metal structures in walls
may have an impact). A wireless network will be noticeably slow when a group of users
are transferring large files. This should be considered if multimedia applications are to be
delivered over the network to a significant number of users.

As the range of the network may extend beyond the walls of the building, it can be
accessed from outside. Consideration should be given to what security features the
equipment provides to ensure that only valid users have access to the network and that
data is protected.

IDENTIFY NETWORK EQUIPMENT

Rangkaian Kawasan Luas - WAN (Wide Area Network) berupaya menghubungkan


sesebuah organisasi di satu negara dengan satu negara yang lain dalam hanya
beberapa minit sahaja. Walau bagaimanapun, rangkaian WAN ini amat rumit dan
Muka / Page : 25
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

kompleks, ini kerana ia memerlukan pelbagai perkakasan dan perisian sebelum


membolehkan rangkaian setempat (LAN) dan metropolitan (MAN) berhubung dengan
komunikasi secara global dan antarabangsa seperti Internet. Secara asasnya, rangkaian
WAN kelihatan hampir serupa dan tidak banyak bezanya dengan LAN atau MAN. Di
antara perkakasan-perkakasan yang digunakan di dalam rangkaian komputer adalah
Multistation Access Units (MAUs), Multiplexers, Repeaters, Bridges, Routers, Brouters, Hubs,
Gateways, ATM Switches dan Virtual LANs. Walau bagaimanapun, sebelum sesuatu
rangkaian dibina, kadar kuasa yang yang betul dan keadaan kuasa yang sesuai perlu
dipastikan dengan betul agar rangkaian komputer dapat dijalankan dengan baik.

ANTARA PERALATAN YANG DIPERLUKAN

1.1 HUB

Hub juga dipanggil concentrator, hub adalah alat yang menyambungkan workstation
dan alat lain dari LAN. Hub boleh bertindak sebagai repeater dan menyambungkan
nodes di dalam network yang sama. Apabila hub disambungkan ke workstation dan
LAN, ia telah disambungkan ke network server. Lihat Figure 1-2, adalah tidak mungkin
secara individu menyambungkan semua peralatan network secara terus ke server jadi
hub di perlukan untuk memberi semua peralatan network memasuki ke server dan
antara satu sama lain.

Figure 1-2 Penggunaan hub

1.1.1 Intelligent Hub


Muka / Page : 26
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Ia mempunyai perisian pengurusan(software management) bagi mengesan dan


mengasingkan masaalah didalam rangkaian. Keupayaan pengurusaan ini penting bagi
membolehkan rangkaian berjalan dengan baik. Bagi sistem rangkaian yang kecil, Kabel
dan port testing boleh dilakukan bagi mengesan kerosakkan. Namun bagi sistem
rangkaian yang besar, keupayaan pengurusan ini diperlukan. SNMP atau Simple
Network Management Protocol merupakan salah satu management protocol yang
terdapat didalam Intelligent hubs. SNMP menyelaraskan dan mengawal sistem
rangkaian bagi menentukkan ianya berfungsi dengan baik dan segala maklumat
disimpan didalam MIB (Management Information Base). Dan yang terbaharu MIB2.
Kedua-dua MIB ini tidak serasi. Terdapat juga Intelligent Hub yang menggunakan CMIP
(centre Management Informaton Protocol) sebagai management protocol.

1.1.2 Hub External Connections


Tidak semua port pada hub digunakan sebagai penyambungan local network.
Terdapat sesetengah model hub mengandungi port tambahan yang dipanggil AUI
(Attachment Unit Interface) bagi membolehkan hub disambung kepada peranti-peranti
lain seperti Bridges atau Routers. Model ini biasanya dinyatakan seperti berikut 12 + 1
dimana terdapat 12 network port dan 1 AUI port. Cable yang disambung diantara
peranti network dipanggil backbone Lihat Figure 1-3, Hub yang terkini biasanya
menpunyai fiber connections. Terdapat juga hub yang mengandungi RS-232 port untuk
penyambungan ke PC atau modem untuk membolehkan “remote management”
sekiranya terdapat kerosakkan pada network.

MAU MAU MAU

TERMINATOR BACKBONE TERMINATOR

AUI AUI AUI


max max max
50m 50m 50m
long long long
HUB HUB HUB

10BaseT
Muka / Page : 27
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

PC PC PC PC

Figure 1-3 Attachment Unit Interface

1.2. REPEATER
Repeater ialah komponen penyambungan yang paling ringkas dan digunakan pada
Local Area Network. Ianya adalah peranti elektrik yang beroperasi pada lapisan fizikal
dalam model OSI. Ini kerana ia menyambungkan segment dari network yang sama dan
membolehkan node dijarakkan dengan lebih jauh lagi. Akan tetapi repeater bukanlan
peralatan yang bijak kerana ia tidak dapat menyambungkan kepada netwokrk yang
lain. Isyarat yang membawa maklumat dalam rangkaian komputer boleh melalui jarak
dan ini menyebabkan isyarat yang dibawa akan menjadi lemah sebelun isyarat tersebut
tiba ke destinasi yang dituju. Hal ini berlaku disebabkan oleh geseran atau gangguan
seperti kebisingan yang mana ianya akan mengpenggaruhi kesinambungan data.
Oleh yang demikian repeater diperlukan bagi mengatasi masalah ini kerana repeater
ialah komponen dalam network yang berfungsi sebagai penguat isyarat yang diterima
dari satu segment lalu menghantar pula ke sambungan segment lain yang
berkedudukan jauh untuk jangkauaan transmitter. Tetapi penggunaan repeater ada
hadnya. Repeater tedak mampu untuk menaikkan lagi nilai bandwidth dan
menambahkan kelajuan penghantaran data. Malahan , sekiranya berlaku kerosakan
pada satu segment, segment yang masih lagi berfungsi seperti biasa kecuali tiadanya
lagi perhubungan antara satu segment ke segment yang rosak itu.

Figure 1-4

1.2.1 Ciri-Ciri dan Fungsi Repeater


 Mempunyai had jarak yang ditetapkan
Muka / Page : 28
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

 Mempunyai had bilangan yang boleh digunakan dalam network


 Tidak boleh dikawal menerusi remote access program
 Jika menggunakan panjang kabel yang melebihi dari standard yang
dibenarkan, repeater mungkin akan menyebarkan data yang salah.

Kabel Jarak Maksimum Limit Repeater


10 Base 5 500 m 4
10 Base 2 185 m 4
10 Base T 100 m 4
Fiber 1000m
Figure 1-5 Jenis-jenis kabel yang digunakan

1.3. SWITCH

Figure 1-6

Switch pula boleh mencapai 100MB bandwidth bagi setiap port. Semua user boleh
mendapat sambungan maksimum10MB boleh meminta sistem admin untuk
mendedikasi sambungan 10MB untuk PC yang dituju sahaja dan sambungan bandwidth
akan kurang untuk user-user lain.
Malahan switch adalah lebih bijak dari hub dan akan menghantar packet kepada
destinasinya sahaja. Kelebihan ini adalah kerana switch mempunyai ciri-ciri intelligent
iaitu boleh menyimpan table MAC address NIC (network interface card) dan peralatan
komputer lain dengan membuat perbandingan sebelum menghantar ke destinasinya
yang betul. Dengan cara ini “network utilisation” dapat dikurangkan kerana bandwidth
digunakan dengan lebih efficient.
Collision mungkin tidak / kurang berlaku kerana network boleh disegmenkan kerana
packet hanya dihantar ke destinasinya dan bukan ke semua port-port yang lain.
Dengan ini mutu penghantaran yang baik dapat dikawal dan dilaksanakan. Selain
daripada itu juga, ia digunakan untuk mengelakkan daripada penggunaan melebihi
daripada empat repeater di antara satu komputer ke komputer yang lain di dalam
rangkaian. Lebih isimewa lagi penggunaan Switch Ethernet juga dapat menampung
ruang penambahan untuk sambungan rangkaian pada masa akan datang.
Kefungsian hub atau switch boleh dilihat apabila sistem rangkaian tersebut berfungsi
dengan baik dan LED atau “indicator” yang berada pada hub atau switch tersebut
Muka / Page : 29
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

akan berkelip apabila berlaku penghantaran data. Tiap-tiap “indicator” mewakili satu
port dan terdapat nombor-nombor port di setiap “indicator”.

1.4. ROUTER
Dengan penggunaan Routers, data yang dimasukkan kedalam paket hanya akan
dihantar ke network segment yang perlu ditujunya sahaja. Ia berfungsi seakan sama
dengan Bridges dan switches dan oleh sebab itu ia menapis keluar network traffic yang
tidak perlu dan membuangnya dari network segment. Routers bekerja pada Peringkat
Protokol.Router dipasang untuk mengasingkan network secara berasingan mengikut
logic. TCP/IP router dapat membentuk segment pada network berpandukan pada
alamat TCP/IP. Penapisan pada tahap ini ( Di alamat TCP/IP, juga dikenali sebagai level
3 switching) akan mengambil masa yang lama berbanding dengan Bridge atau switch
yang hanya melihat pada lapisan MAC.
Kebanyakan Routers juga boleh melakukan fungsi Bridges. Disebabkan Routers boleh
menapis paket pada peringkat protocol, ia boleh digunakan sebagai firewalls. Ia
bertindak sebagai penghadang/penghalang yang menahan paket yang tidak
dikehendaki samaada hanya melalui atau memasuki kawasan network.Selalunya,
organisasi yang disambung pada internet akan memasang router pada gateway link
yang utama iaitu diantara network dan kawasan luar/dunia luar.Dengan melaras router
berdasarkan senarai kemasukan(access list) yang menyenaraikan protocol atau host
mana yang dibenarkan masuk). Ini adalah factor keselamatan dimana ia
menghalang/membenarkan kemasukan samaada ke internal atau external
host.Sebagai contoh, internal WWW server membenarkan kemasukan IP dari external
network, tapi server company yang lain yang mengandungi data yang sensitive boleh
dikawal, jadi external host dari luar boleh dihalang kemasukannya (anda juga boleh
mengabaikan kemasukan internal workstation jika diperlukan)
Kefungsian router boleh dilihat apabila sistem rangkaian tersebut berfungsi dengan baik
dan LED atau “indicator” yang berada pada router tersebut akan berkelip apabila
berlaku penghantaran data samada kedudukan “indicator” tersebut berada di
bahagian hadapan atau belakang router tersebut.
Muka / Page : 30
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Figure 1-7

1.5. MODEM
Modem adalah perkakaksan yang membolehkan pengguna berhubung dengan
pengguna lain dengan menggunakan wayar telefon, kabel ataupun langsung tidak
menggunakan wayar(wireless). Perkataan Modem adalah gabungan daripada dua
patah perkataan modulator dan demodulator yang bermaksud mengubah sesuatu
frekuensi atau amplitud. Setelah beberapa tahun yang lalu, cara ini telah digunakan
dengan menggunakan wayar ataupun gelombang radio.
Modem selalunya mempunyai banyak indicator bagi menentukan kefungsian modem
tersebut. Indicator modem TD,RX dan SD menunjukkan data sedang dihantar dan
diterima. Modem juga mengeluarkan bunyi yang nyaring apabila penyambungan
hendak dilakukan.

1.5.1 Apa yang modem lakukan?


Modem akan menukar signal jenis digital ke analog dan juga menukar signal jenis analog
ke digital kerana radio ataupun sistem telefon menggunakan gelombang jenis analog
manakala komputer pula menggunakan gelombang jenis digital. Adalah menjadi
masalah kerana komputer tidak dapat menghantar data ke komputer lain melalui talian
telefon kerana gelombang yang digunakan adalah berbeza. Modem akan menjadi
pengantara dengan menukarkan gelombang analog dan gelombang Digital.
Muka / Page : 31
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

MENYEMAK PERALATAN RANGKAIAN


Semak Hub/Switch
Jenis / fungsi Hub yang telah dipasang

Hub merupakan satu kotak yang digunakan untuk mengumpul satu kumpulan komputer
pada satu lokasi pusat dengan sistem kabel 10BaseT atau 100BaseT.
Jenis-jenis hub ini boleh didapati dalam kelajuan
 10BaseT
 10/100BaseT
 10/100/1000BaseT.
Dan bilangan „port‟ padanya seperti:
 4 port
 5 port
 8 port
 12 port
 16 port
 24 port
Dengan penggunaan hub kita mudah mengalih atau menambah komputer pada
rangkaian,mencari serta menbetulkan masalah kabel serta dapat mengalih keluar
komputer daripada rangkaian sementara(untuk tujuan peningkatan pristasi).
Muka / Page : 32
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

Switch mempunyai rupa bentuk seperti hub dan mempunyai port untuk sambungan ke
sistem kabel.
Jenis-jenis switch ini boleh didapati seperti Hub, iaitu mengikut kelajuan dan bilangan
portnya.

Ia digunakan untuk mengatasi masalah kesesakan penghantaran/penerimaan data .Ini


kerana switch mengandungi alamat IP pada komputer atau peralatan lain dalam
rangkaian untuk tujuan penghantaran maklumat yang cepat.Ia juga dapat
meningkatkan kelajuan komputer dengan tidak mengambil kira komputer yang tidak
di”ON”.

Jenis jenis hub ada pelbagai sebagai contoh D-Link, 3Com.


Jenis jenis switch juga ada pelbagai salah satunya ialah D-Link, 3Com

Status Penunjuk Rangkaian


Semua Hub dan Switch menpunyai L.E.D .
LED ini terdapat pada depan HUB atau Switch, iaitu untuk:
- Menunjukkan status „power supply‟
- Menunjukkan status setiap port, di mana ianya menunjukan status hub dan switch sama
ada hub dan switch berfungsi atau tidak
Contohnya:
 LED bernyala bila elektrik dibekalkan ke Hub
 LED berkelip-kelip menunjukkan konflik data (pertembungan data-data semasa
penghantaran)
 LED tak bernyala menunjukkan dua kemungkinan, iaitu pertama ialah stesen kerja
tak dihidupkan dan kedua ialah port tersebut rosak dan tidak dapat digunakan
lagi.

Menentukan jenis switch dan hub yang dipasang


Kita dapat mengenalpasti hub atau switch yang dipasang dengan melihat label pada
hub atau switch.
Perhatikan spesifikasi Hub/Switch juga untuk kelajuannya (sama ada 10BaseT,
10/100BaseT atau 10/100/1000BaseT) dan bilangan port padanya
Kita juga dapat menbezakan hub dan switch dengan membandingkan harganya
kerana switch adalah lebih mahal dari hub.

Mengenal jenis kerosakan pada port switch dan hub

Langkah-langkah untuk menentukan port adalah tidak elok:


Muka / Page : 33
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

 Pastikan connector RJ 45 dipalam masukkan ke hub atau switch dan ke semua stesen
kerja.
 Hidupkan hub/switch tersebut dan hidupkan juga stesen kerja.
 Perhatikan LED pada Hub untuk mempastikan port-port berada dalam keadaan
baik.
 Jika terdapat satu port tidak bernyala, cuba tukarkan sambungan dari stesen kerja
yang lain dengan mempalam masukkan kabelnya pada port yang tidak
mengeluarkan cahaya pada LED.
 Ini bertujuan untuk memastikan port benar-benar masih elok atau tidak.

Mengenalpasti kerosakan pada switch dan hub

Jenis-jenis kerosakan pada hub/switch:


 Jack untuk connector RJ45 longgar
 Port pada hub/switch rosak
 Keadaan fizikal Hub yang longgar/melekuk mungkin kerana terjatuh
 Kabel pembekal elektrik mungkin telah rosak
 Komponen (chip-chip) di dalamnya rosak atau tertanggal
Periksa keadaan hub tidak ada kesan lekuk, LED berlampu atau tidak dan pastikan ada
bekalan tenaga pada hub. Periksa tempat Pelabuhan(Port) pasti keadaan baik atau
tidak. Kalau port pada hub tidak berfungsi cuba uji port tersebut dengan menggunakan
kabel yang lain untuk mengetahui sama ada kabel berfungsi atau tidak. Periksa
keadaan fizikal hub juga.

Panduan
Semua perkakasan ada buku panduan seperti buku panduan penggunaan kabel tester.
Di dalam buku panduan ini dinyatakan cara pemasangan langkah demi langkah. Juga
dinyatakan cara mengendalikannya seperti membaca status cahaya pada LED.
Dengan ada buku panduan, kita dapat melakukan kerja dengan mudah dan merujuk
balik sekiranya berlaku kesilapan.

Contoh Senarai Semak


Senarai Semak Status Peralatan Rangkaian

Senarai Semak Status Status


Peralatan Rangkaian Butir-butir(Jika tidak)
Perkakasan Baik Tidak
D-link Hub (24
Pelabuhan)
Muka / Page : 34
NO. KOD / CODE NUM. M303.K4
Drpd/of : 3

ISDN Modem
NIC
Connecter RJ-45
Kabel UTP Cat 5
Router
Bridge
Repeater

Tarikh :__________________________
Disemak Oleh :____________________
Tandatangan :_____________________

You might also like