Académique Documents
Professionnel Documents
Culture Documents
Name :
Angelia Hanna Sirait (1820010307)
Joshua Theo Kurniawan Siregar (1820010104)
Pangeran Nicola Alfiano (1820010172)
Faculty :
Mr. Listyo Edi Prabowo
Preface
We thank to God for the blessings that he give to us, so we can complete this Project
with title “Architecture Design of Museum Network System ”. We have prepared this Project to
the maximum so we can make this Project as good as possible and we thanks to people who
helped us in making this Project.
We realize that there are still lack in the sentences writing formation and the grammar.
From that we accept all criticism and suggestions so we can make this Project better.
Finally, we hope this Project with the title “Design of Architecture Museum Network
System” useful can expanding your knowledge in networking system and help to solve a problem
in networking system. We hope our God can give the best thing for our lifes.
TABLE OF CONTENTS
PREFACE
TABLE OF CONTENTS
TABLE OF FIGURE
TABLE OF TABLES
CHAPTER I. INTRODUCTION
TABLE OF Figure
TABLE OF TABLES
CHAPTER I. INTRODUCTION
I.1 Background
Usually, ordinary people view Internet as a cloud. They store data in one place and it comes
out from the place they want take it to on the other side. But the fact is network isn’t simple as
they think about it. A network is tens of thousands kilometers of fiber optic cable, hundreds of
thousands to millions of kilometers of copper wire, and hardware and software connecting them
all together in a redundant, fast, and self-sufficient network.
In this era, network is needed to fulfill many needs like searching information, storing data,
security, business, etc. Along with the development of era, technology has growing rapidly.
Network is past technology has been exposed, where this era, network can connect to many devices
without cable/wireless.
Our goal from making this Project “Design Architecture of Museum Network System” is
to fulfill the task from our lecture and we want to present you about:
This Project is restricted about museum network system. But, be developed some important
points, that are:
CHAPTER I. INTRODUCTION
A. Input Devices
Input devices are used to input raw data. They aid in feeding data such as text, images, and
audiovisual recordings. They even aid in file transfers between computers. For example mouse,
touchpad, keyboard, joystick, microphone, webcam, Ethernet hardware, etc.
B. Processing Devices
Output device are used for raw data is transformed into information. The microprocessor is
subdivided into three important units, which work together in order to accomplish its function.
The units are:
a. The control unit
It manage manages and supervises the operation of processor and other components
that are crucial in data manipulation.
b. Arithmetic and logic unit
The ALU is responsible for all arithmetic and logic operation like addition,
multiplication, subtraction, division, and comparison logic operation.
c. Register and cache
These are storage location inside the processor that responds to the instruction of the
control unit by moving relevant data around during processing.
C. Output Devices
Output devices are used to disseminate and display both data and information. Output is the
culmination of a cycle which starts with the input of raw data and processing. These
components are sub-categorized under softcopy and hardcopy output. Softcopy output includes
the intangible experience. The user derives visual satisfaction by reading a message through
display components or listens to audio files through speakers. On the other hand, hardcopy
output devices are tangible, like printouts of paper and 3D models
a. Softcopy
1) Monitor
2) Speakers
3) Ethernet cables
4) Optical drives
b. Hardcopy
1) Dot matrix printer
2) 3D printer
3) Inkjet printer
4) LaserJet printer
5) Thermal printer
D. Memory/ Storage Devices
Storage devices are components to save/store data. Storage is sub-divided under primary
and secondary memory and is ether volatile and non-volatile. Primary memory usually refers
to random-access memory (RAM). RAM is volatile, it’s mean retains data only when the
computer is powered up. The central processing unit (CPU) or accelerated processing unit
(APU) reads instruction stored in this memory and executes the as required. Read-only
memory (ROM) is a type of storage medium that permanently stores data on personal
computers (PCs) and other electronic devices. It contains the programming needed to start a
PC, which is essential for boot-up; it performs major input/output tasks and holds programs or
software instructions. Because ROM is read-only, it cannot be changed; it is permanent and
non-volatile, meaning it also holds its memory even when power is removed. RAM and ROM
are the examples from primary memory devices.
Secondary memory is a memory that data stored within secondary storage media (usually
disk drives) do not communicate directly with the microprocessor. Any data stored in such
media is first transferred to a RAM devices for processing to take place.
A. Operating System
Operating system is a type of system software kernel that sits between computer hardware and
end user.
B. Device Drivers
Driver software is a type of system software which brings computer devices and peripherals to
life. Drivers make it possible for all connected components and external add-ons perform their
intended tasks and as directed by the OS. Without drivers, the OS would not assign any duties.
C. Firmware
Firmware is the operational software embedded within a flash, ROM, or EPROM memory chip
for the OS to identify it. It directly manages and controls all activities of any single hardware.
D. Programming Language Translator
These are intermediate programs relied on by software programmers to translate high-level
language source code to machine language code. The former is a collection of programming
languages that are easy for humans to comprehend and code (i.e., Java, C++, Python, PHP,
BASIC). The latter is a complex code only understood by the processor.
E. Utilities
Utilities are types of system software which sits between system and application software.
These are programs intended for diagnostic and maintenance tasks for the computer. They
come in handy to ensure the computer functions optimally. Their tasks vary from crucial data
security to disk drive defragmentation.
A. Bus Topology
In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every otherworkstation in the
network.
Figure 2.2 Bus Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)
B. Start Topology
In the star network topology, there is a central computer or server to which all the workstations
are directly connected. Every workstation is indirectly connected to every other through the
central computer.
C. Ring Topology
In the ring network topology, the workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other pairs ofworkstations are indirectly
connected, the data passing through one or more intermediate nodes. If a Token Ring protocol
is used in a star or ring topology, the signal travels in only one direction, carried by a so-
called token from node to node.
Figure 2.4 Ring Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)
D. Mesh Topology
The mesh network topology employs either of two schemes, called full mesh and partial mesh.
In the full mesh topology, each workstation is connected directly to each of the others. In the
partial mesh topology, some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most data.
E. Tree Topology
Tree topology Uses two or more stars networks connected together. The central computers of
the star networks are connected to a main bus. Thus, a tree network is a bus network of star
networks.
Figure 2.6 Tree Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)
A. IP Address
IP is one of the computer network software (networking software) available in the system, and
is used in data communication in local area networks (LAN) and the Internet. An Internet
Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two
principal functions: host or network interface identification and location addressing.
B. MAC Address
A MAC address is a hardware identification number that uniquely identifies each device on a
network. The MAC address is manufactured into every network card, such as an Ethernet card
or Wi-Fi card, and therefore cannot be changed. In a local area network (LAN) or other
network, the MAC (Media Access Control) address is a computer's unique hardware number.
(On an Ethernet LAN, it's the same as the computer’s Ethernet address.) When the user is
connected to the Internet from the user’s computer (or host as the Internet protocol thinks of
it), a correspondence table relates it’s IP address to the computer's physical (MAC) address on
the LAN.
Wireless networks are computer networks that are not connected by cables of any kind.
The use of a wireless network enables enterprises to avoid the costly process of introducing cables
into buildings or as a connection between different equipment locations. The basis of wireless
systems are radio waves, an implementation that takes place at the physical level of network
structure. Wireless networks use radio waves to connect devices such as laptops to the Internet,
the business network and applications. When laptops are connected to Wi-Fi hot spots in public
places, the connection is established to that business’s wireless network.
A. Wired Network
A wired network is a common type of wired configuration. Most wired networks use Ethernet
cables to transfer data between connected PCs. Wired network include Twisted Pair cable,
Coaxial cable, and fiber optic cable.
a. Twisted Pair cable
The most popular network cabling is Twisted pair. It is light weight, easy to install,
inexpensive and support many different types of network. It also supports the speed of
100 mps. Twisted pair cabling is made of pairs of solid or stranded copper twisted along
each other. The twists are done to reduce vulnerably to EMI and cross talk. The number
of pairs in the cable depends on the type. The copper core is usually 22-AWG or 24-
AWG, as measured on the American wire gauge standard. There are two types of
twisted pairs cabling.
b. Coaxial cable
Coaxial cable is very common & widely used commutation media. For example TV
wire is usually coaxial. Coaxial cable gets its name because it contains two conductors
that are parallel to each other. The center conductor in the cable is usually copper. The
copper can be either a solid wire or stranded martial. Outside this central Conductor is
a non-conductive material. It is usually white, plastic material used to separate the inner
Conductor form the outer Conductor. The other Conductor is a fine mesh made from
Copper. It is used to help shield the cable form EMI. Outside the copper mesh is the
final protective cover. (as shown in Fig) The actual data travels through the center
conductor in the cable. EMI interference is caught by outer copper mesh. There are
different types of coaxial cable vary by gauge & impedance. Gauge is the measure of
the cable thickness. It is measured by the Radio grade measurement, or RG number.
The high the RG number, the thinner the central conductor core, the lower the number
the thicker the core.
Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic
cable light only moves in one direction for two way communication to take place a
second connection must be made between the two devices. It is actually two stands of
cable. Each stand is responsible for one direction of communication. A laser at one
device sends pulse of light through this cable to other device. These pulses translated
into “1’s” and “0’s” at the other end. In the center of fiber cable is a glass stand or core.
The light from the laser moves through this glass to the other device around the internal
core is a reflective material known as CLADDING. No light escapes the glass core
because of this reflective cladding. Fiber optic cable has bandwidth more than 2 gbps
(Gigabytes per second)
B. Wireless Network
a. Radiowave
Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are normally
called radio waves. Radio waves are omnidirectional. When an antenna transmits radio
waves, they are propagated in all directions. This means that the sending and receiving
antennas do not have to be aligned. A sending antenna send waves that can be received by
any receiving antenna. The omnidirectional property has disadvantage, too. The radio
waves transmitted by one antenna are susceptible to interference by another antenna that
may send signal suing the same frequency or band. Radio waves, particularly with those
of low and medium frequencies, can penetrate walls. This characteristic can be both an
advantage and a disadvantage. It is an advantage because, an AM radio can receive signals
inside a building. It is a disadvantage because we cannot isolate a communication to just
inside or outside a building.
b. Microwave
Electromagnetic waves having frequencies between 1 and 300 GHz are called micro
waves. Micro waves are unidirectional. When an antenna transmits microwaves, they
can be narrowly focused. This means that the sending and receiving antennas need to
be aligned. The unidirectional property has an obvious advantage. A pair of antennas
can be aligned without interfering with another pair of aligned antennas.
Microwave propagation is line-of-sight. Since the towers with the mounted antennas
need to be in direct sight of each other, towers that are far apart need to be very tall.
Very high-frequency microwaves cannot penetrate walls. This characteristic can be
a disadvantage if receivers are inside the buildings.
The microwave band is relatively wide, almost 299 GHz. Therefore, wider sub-bands
can be assigned and a high date rate is possible.
Use of certain portions of the band requires permission from authorities.
c. Terrestrial Microwave
For increasing the distance served by terrestrial microwave, repeaters can be installed
with each antenna .The signal received by an antenna can be converted into
transmittable form and relayed to next antenna as shown in below figure. It is an
example of telephone systems all over the world.
d. Satellite Microwave
This is a microwave relay station which is placed in outer space. The satellites are
launched either by rockets or space shuttles carry them. These are positioned 36000
Km above the equator with an orbit speed that exactly matches the rotation speed of
the earth. As the satellite is positioned in a geo-synchronous orbit, it is stationery
relative to earth and always stays over the same point on the ground. This is usually
done to allow ground stations to aim antenna at a fixed point in the sky.
e. Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for short-
range communication. Infrared waves, having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and
another, a short-range communication system in on room cannot be affected by another
system in the next room.
When we use infrared remote control, we do not interfere with the use of the remote by
our neighbour. However, this same characteristic makes infrared signals useless for
long-range communication. In addition, we cannot use infrared waves outside a
building because the sun's rays contain infrared waves that can interfere with the
communication.
Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used to
setup a Local Area Network (LAN) are the most common type of network devices used by the
public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online
access is desired, a high-speed modem. Happily this is much less complicated than it might sound
to someone new to networking.
In a network, one computer is designated as the server, and the others, clients. The server is
connected to an external hub, which the clients are also connected to. Now that the computers each
have one foot in a common electronic door (the hub), they can use the hub to pass signals back
and forth. To direct these signals, the hub contains a device known as a router. The router is the
equivalent of an electronic traffic cop that handles data traffic between the computers.
A. Bridge
A connectivity device that forwards data based on a physical address. In networking terms,
a bridge filters and forwards packets by physical address. Bridges operate at the Network
Access Layer in the TCP/IP protocol stack.
B. Hub
A connectivity device to which network cables are attached to form a network segment. Hubs
typically do not filter data, but instead retransmit incoming data packets or frames to all parts.
Almost all networks today use a central hub or switch to which the computers on the network
connect. In a hubbed network, each computer is connected to the hub through a single line.
That makes adding a host to the network, or taking it off, a simple task.
Figure 2.8 Hub Network Device (REF : https://www.amazon.co.uk/D-Link-
USB-2-0-Ports-DUB-H7/dp/B0000B0DL7)
C. Switch
A switch is aware of addresses associated with each of its ports and forwards each incoming
data frame to the correct port. Switches can base forwarding decisions on guidelines that are
provided in the headers of the TCP/IP protocols. A switch, simplified, is a smarter version of
a hub. On a switch, as with a hub, each computer is connected through a single line. However,
the switch is smarter about where it sends data that comes in through one of its ports.
D. Router
A connectivity device that filters and forwards data based on a logical address. In the case of
TCP/IP networks, that would be the IP address. Routers are an essential part of any larger
TCP/IP network. In fact, without the development of network routers and TCP/IP routing
protocols, the Internet (the biggest network in the world) would not have become as extensive.
Routers play a vital role in controlling traffic and keeping the network efficient.
A modem is a hardware device that allows a computer to send and receive data over a
telephone line or a cable or satellite connection. In the case of transmission over an analog
telephone line, which was once the most popular way to access the internet, the modem
converts data between analog and digital formats in real time for two-way network
communication. In the case of the high-speed digital modems popular today, the signal is much
simpler and doesn't require the analog-to-digital conversion.
A network operating system (NOS) is a computer operating system system that is designed
primarily to support workstation, personal computer, and, in some instances, older terminal that
are connected on a local area network (LAN). Artisoft's LANtastic, Banyan VINES, Novell's
NetWare, and Microsoft's LAN Manager are examples of network operating systems. In addition,
some multi-purpose operating systems, such as Windows NT and Digital's OpenVMS come with
capabilities that enable them to be described as a network operating system.
A network operating system provides printer sharing, common file system and database
sharing, application sharing, and the ability to manage a network name directory, security, and
other housekeeping aspects of a network.
A. Artisoft’s LANtastic
B. Banyan VINES
Banyan Virtual Integrated Network Service (VINES) is a network operating system based on
proprietary protocol family. The protocol is basically derived from Xerox Network Systems
(XNS) protocols, where it uses a client-server architecture that enables clients to request
specified services like file and printer access from servers.
C. Novell’s NetWare
This network operating system is a protocol suite designed based on the XNS protocol
architecture. It provides comprehensive support to most of the desktop operating systems in
the market, including DOS, Windows, Macintosh, OS/2 and UNIX. Novell also supports the
local area networks and asynchronous wide area communications.
LAN Manager is a network operating system by Microsoft that works as a server application.
It runs under Microsoft OS/2, and was developed in conjunction with 3Com. The file server
may concurrently be used for other tasks like database services. In other words, the system
provides a good multi-tasking function. It also supports most desktop operating systems like
DOS, Windows and OS/2 clients. Currently, the LAN Manager feature has been superseded
by Microsoft Windows NT Server and most parts of the LAN Manager are being used in the
Windows NT and Windows 2000
E. Oracle Solaris
Oracle Solaris is the best enterprise operating system for Oracle Database and Java
applications. Focused enhancements across CPU, memory, file system, I/O, networking, and
security deliver the best database, middleware, and application performance for Oracle
workloads. Oracle Solaris is engineered for cloud security at every level. Antimalware
protection extends from hypervisor to application. Users can lock down systems and virtual
machines, while Silicon Secured Memory seamlessly prevents common security attacks such
as buffer over-reads and overwrites. One step, multi node compliance reporting means users
can spend more time innovating rather than auditing in your data center.
This is the design architecture of museum network system that using Local Area Network
(LAN). This museum use cable modem that functions as an two directions communication item.
Cable modem be on duty for providing connection to devices that is connected to cable modem.
The hub on this network system is a router. The router is connected to a modem and
switches that available in Server Room, Office Room, Technology Room, and Art Exhibition
Room. The router be on duty for routes for whom data packets is sending based on their IP
addresses.
A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large
number of ports imply less traffic) and performance. In every room, the switches are used for as
a connector to devices. Every devices are connected on switches can sending and / receiving data
one another. For example, if manager of finance want to sending data to ADM and warehouse
computer manager, the switch as a connector will continuing the data to ADM and warehouse
computer manager.
In this museum, wireless router is used for providing connection for connecting to Internet,
not only computer that is available in every floor, but visitors can access wireless router with their
own devices. Repeater be provided too. Repeater functions for extending distance of wireless
router.
III.2 Network Architecture
Network architecture is the complete framework of an organization’s computer network.
Network architecture provides the detail overview of a network. The architecture is emphasized
in a distributed computing environment and its complexity can not be understood with out a
framework.
3.2.1 Client-server architecture
The client-server architecture is a network architecture where there are as servers and
clients. A server is a system that provides data which requested by client. While a client is a system
that doing request data to server.
In the room art room, technology room, and office room there are computers which is
connected by transmission network media to a server. Computers can access data that available in
the server with server’s permission .
2. Office Room
Logitech G213
Keyboard
Logitech M237
Mouse
Logitech G213
Keyboard
Logitech M237
Mouse
Table 3.3 Technology Exhibition Room Hardware (REF :By our group)
Logitech G213
Keyboard
Logitech M237
Mouse
2. User 2 Computer Dell XPS Tower Special
Edition: Intel Core i5-8400
3.4.2 Software
Server Room
Common software
Microsoft Exel, Word,
Google Chrome, etc.
2. Office Room
Common software
Microsoft Exel, Word, Google
Chrome, etc.
III.5 IP Address
IP address is a group of binary number along 32-bit, which is divided up four segment and
every segment consist of 8-bit. IP address is identification from every host on Internet network.
1. Server room
IP Address Name Devices
192.155.101.1 Sever 1 Server
192.168.100.1 Main Admin Pc
Table 3.9 Server Room IP Address(REF :By our group)
2. Office room
IP Address Name Devices
192.168.100.2 ADM and Warehouse Pc
192.168.100.3 Manager of Personnel Pc
192.168.100.4 Manager of Finance Pc
192.168.100.5 Manager of Market Pc
68.90.134.10 Internet Office Room Wireless Router
192.155.0.103 User 5 Pc
Table 3.11 Technology Exhibition Room IP Address(REF :By our group)
3.9.2 Switch
A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large
number of ports imply less traffic) and performance. Switch is data link layer device. Switch can
perform error checking before forwarding data, that makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to correct port only. In other words,
switch divides collision domain of hosts, but broadcast domain remains same. In this project,
switches are used as connector between a bridge witch computers, ip phone, and a server.
3.7.4 Repeater
A repeater is a network device that retransmits a received signal with more power
and to an extended geographical or topological network boundary than what would be capable
with the original signal.
A repeater is implemented in computer networks to expand the coverage area of the
network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the
received/input signal to a higher frequency domain so that it is reusable, scalable and available.
Repeaters were introduced in wired data communication networks due to the limitation of
a signal in propagating over a longer distance and now are a common installation in wireless
networks for expanding cell size. Repeaters are also known as signal boosters. The repeaters are
used for extended signal distance in this museum
A cable modem is a device that enables you to hook up your PC to a local cable TV line
and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56
Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN)
and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone
service. A cable modem can be added to or integrated with a set-top box that provides your TV set
with channels for Internet access. In most cases, cable modems are furnished as part of the cable
access service and are not purchased directly and installed by the subscriber. Now known as Cable
Labs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a
standard interface for cable modems, the devices that handle incoming and outgoing data signals
between a cable TV operator and a personal or business computer or television set.
A cable modem has two connections: one to the cable wall outlet and the other to a PC or
to a set-top box for a TV set. Although a cable modem does modulation between analog and digital
signals, it is a much more complex device than a telephone modem. It can be an external device or
it can be integrated within a computer or set-top box. Typically, the cable modem attaches to a
standard 10BASE-T Ethernet card in the computer. All of the cable modems attached to a cable
TV company coaxial cable line communicate with a Cable Modem Termination System (CMTS)
at the local cable TV company office. All cable modems can receive from and send signals only
to the CMTS, but not to other cable modems on the line. Some services have the upstream signals
returned by telephone rather than cable, in which case the cable modem is known as a telco-return
cable modem.
The actual bandwidth for Internet service over a cable TV line is up to 27 Mbps on the
download path to the subscriber with about 2.5 Mbps of bandwidth for interactive responses in the
other direction. However, since the local provider may not be connected to the Internet on a line
faster than a T-carrier system at 1.5 Mpbs, a more likely data rate will be close to 1.5 Mpbs.
Windows Server 2016 will also replace Hyper-V snapshots with production
checkpoints, which allow administrators to roll back a VM to an earlier point in time
without having to restore from a backup. Unlike snapshots, checkpoints use Volume
Shadow Copy Services. The new version of Hyper-V in Windows Server 2016 will
support virtual Trusted Platform Module which allows a VM to be encrypted using
BitLocker.
III.9 Budget
3.9.1 Hardware
Price
Number Name Hardware Type
Logitech G213
Keyboard
IDR 545,000.00
Price
Number Name Hardware Type
Logitech G213
Logitech G213
Keyboard
IDR 545,000.00
Logitech M275
Mouse
IDR 159,000.00
3. User 3 Computer Lenovo Ideacentre Y900
3.9.2 Software