Vous êtes sur la page 1sur 46

PROJECT

“Architecture Design of Museum Network System”

Name :
Angelia Hanna Sirait (1820010307)
Joshua Theo Kurniawan Siregar (1820010104)
Pangeran Nicola Alfiano (1820010172)

Faculty :
Mr. Listyo Edi Prabowo
Preface
We thank to God for the blessings that he give to us, so we can complete this Project
with title “Architecture Design of Museum Network System ”. We have prepared this Project to
the maximum so we can make this Project as good as possible and we thanks to people who
helped us in making this Project.
We realize that there are still lack in the sentences writing formation and the grammar.
From that we accept all criticism and suggestions so we can make this Project better.
Finally, we hope this Project with the title “Design of Architecture Museum Network
System” useful can expanding your knowledge in networking system and help to solve a problem
in networking system. We hope our God can give the best thing for our lifes.
TABLE OF CONTENTS

PREFACE

TABLE OF CONTENTS

CHAPTER I: INTRODUCTION ............................................ Error! Bookmark not defined.

1.1 Background ............................................................... Error! Bookmark not defined.

1.2 Writing Objective ...................................................... Error! Bookmark not defined.

1.3 Problem Domain ....................................................... Error! Bookmark not defined.

1.4 Writing Methodology ................................................ Error! Bookmark not defined.

1.5 Writing Framework ................................................... Error! Bookmark not defined.

CHAPTER II: BASIC THEORY ............................................ Error! Bookmark not defined.

2.1 Hardware Definition .................................................. Error! Bookmark not defined.

2.2 Software Definition ................................................... Error! Bookmark not defined.

2.3 Introduction to Network ............................................ Error! Bookmark not defined.

2.4 Network Architecture ................................................ Error! Bookmark not defined.

2.6 Identifying Computer on a Network ......................... Error! Bookmark not defined.

2.7 Network Media .......................................................... Error! Bookmark not defined.

2.8 Network Devices ....................................................... Error! Bookmark not defined.

2.9 Network Operating System ....................................... Error! Bookmark not defined.

CHAPTER III : PROBLEM ANALYSIS ............................... Error! Bookmark not defined.

3.1 Analysis ..................................................................... Error! Bookmark not defined.

3.2 Network Design......................................................... Error! Bookmark not defined.


3.3 Networking Architecture ........................................... Error! Bookmark not defined.

3.4 Hardware and Software ............................................. Error! Bookmark not defined.

3.5 IP Address ................................................................. Error! Bookmark not defined.

3.6 Network Media .......................................................... Error! Bookmark not defined.

3.7 Network Operating System ....................................... Error! Bookmark not defined.

3.8 Network System Map ................................................ Error! Bookmark not defined.

3.9 Budgeting .................................................................. Error! Bookmark not defined.

TABLE OF FIGURE

TABLE OF TABLES

CHAPTER I. INTRODUCTION
TABLE OF Figure
TABLE OF TABLES
CHAPTER I. INTRODUCTION

I.1 Background

Usually, ordinary people view Internet as a cloud. They store data in one place and it comes
out from the place they want take it to on the other side. But the fact is network isn’t simple as
they think about it. A network is tens of thousands kilometers of fiber optic cable, hundreds of
thousands to millions of kilometers of copper wire, and hardware and software connecting them
all together in a redundant, fast, and self-sufficient network.

In this era, network is needed to fulfill many needs like searching information, storing data,
security, business, etc. Along with the development of era, technology has growing rapidly.
Network is past technology has been exposed, where this era, network can connect to many devices
without cable/wireless.

In this project, our group just focus on architecture of museum network.

I.2 Writing Objective

Our goal from making this Project “Design Architecture of Museum Network System” is
to fulfill the task from our lecture and we want to present you about:

A. The networking system in museum


B. The architecture and devices network is used
C. The computer network and utilities of software in Museum
D. The cost is needed to built the network system

I.3 Problem Domain

This Project is restricted about museum network system. But, be developed some important
points, that are:

A. The networking system, architecture and devices network is used in museum


B. The computer network and utilities of software in Museum
C. The cost is needed to built the network system
I.4 Writing Methodology

In writing this Project, we as authors this Project we use one of writing


methodology, that is literature study. There are two kind of literature studies we use,
that are searching on Internet, and read a book.

I.5 Writing Framework

CHAPTER I. INTRODUCTION

 Background, Writing Objective, Problem Domain, Writing Methodology, and Writing


Framework.

CHAPTER II. BASIC THEORY


CHAPTER II BASIC THEORY

II.1 Introduction About Hardware

In information technology, hardware is the physical aspect of computers,


telecommunications, and other devices. Internal hardware devices include motherboards, hard
drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and
scanners. The internal hardware parts of a computer are often referred to as components, while
external hardware devices are usually called peripherals.

Hardware devices can be classified four distinct types, that are:

A. Input Devices
Input devices are used to input raw data. They aid in feeding data such as text, images, and
audiovisual recordings. They even aid in file transfers between computers. For example mouse,
touchpad, keyboard, joystick, microphone, webcam, Ethernet hardware, etc.
B. Processing Devices
Output device are used for raw data is transformed into information. The microprocessor is
subdivided into three important units, which work together in order to accomplish its function.
The units are:
a. The control unit
It manage manages and supervises the operation of processor and other components
that are crucial in data manipulation.
b. Arithmetic and logic unit
The ALU is responsible for all arithmetic and logic operation like addition,
multiplication, subtraction, division, and comparison logic operation.
c. Register and cache
These are storage location inside the processor that responds to the instruction of the
control unit by moving relevant data around during processing.
C. Output Devices
Output devices are used to disseminate and display both data and information. Output is the
culmination of a cycle which starts with the input of raw data and processing. These
components are sub-categorized under softcopy and hardcopy output. Softcopy output includes
the intangible experience. The user derives visual satisfaction by reading a message through
display components or listens to audio files through speakers. On the other hand, hardcopy
output devices are tangible, like printouts of paper and 3D models
a. Softcopy
1) Monitor
2) Speakers
3) Ethernet cables
4) Optical drives
b. Hardcopy
1) Dot matrix printer
2) 3D printer
3) Inkjet printer
4) LaserJet printer
5) Thermal printer
D. Memory/ Storage Devices
Storage devices are components to save/store data. Storage is sub-divided under primary
and secondary memory and is ether volatile and non-volatile. Primary memory usually refers
to random-access memory (RAM). RAM is volatile, it’s mean retains data only when the
computer is powered up. The central processing unit (CPU) or accelerated processing unit
(APU) reads instruction stored in this memory and executes the as required. Read-only
memory (ROM) is a type of storage medium that permanently stores data on personal
computers (PCs) and other electronic devices. It contains the programming needed to start a
PC, which is essential for boot-up; it performs major input/output tasks and holds programs or
software instructions. Because ROM is read-only, it cannot be changed; it is permanent and
non-volatile, meaning it also holds its memory even when power is removed. RAM and ROM
are the examples from primary memory devices.
Secondary memory is a memory that data stored within secondary storage media (usually
disk drives) do not communicate directly with the microprocessor. Any data stored in such
media is first transferred to a RAM devices for processing to take place.

II.2 Introduction About Software


Software is a set of instructions or programs instructing a computer to do specific tasks.
Software is a generic term used to describe computer programs. Scripts, applications, programs
and a set of instructions are all terms often used to describe software. There are five types of
systems software, all designed to control and coordinate the procedures and functions of computer
hardware. They also enable functional interaction between hardware, software and the user.

A. Operating System

Operating system is a type of system software kernel that sits between computer hardware and
end user.

B. Device Drivers
Driver software is a type of system software which brings computer devices and peripherals to
life. Drivers make it possible for all connected components and external add-ons perform their
intended tasks and as directed by the OS. Without drivers, the OS would not assign any duties.
C. Firmware
Firmware is the operational software embedded within a flash, ROM, or EPROM memory chip
for the OS to identify it. It directly manages and controls all activities of any single hardware.
D. Programming Language Translator
These are intermediate programs relied on by software programmers to translate high-level
language source code to machine language code. The former is a collection of programming
languages that are easy for humans to comprehend and code (i.e., Java, C++, Python, PHP,
BASIC). The latter is a complex code only understood by the processor.
E. Utilities
Utilities are types of system software which sits between system and application software.
These are programs intended for diagnostic and maintenance tasks for the computer. They
come in handy to ensure the computer functions optimally. Their tasks vary from crucial data
security to disk drive defragmentation.

II.3 Introduction About Network

A network, in computing, is a group of two or more devices that can communicate. In


practice, a network is comprised of a number of different computer systems connected by physical
and/or wireless connections. The scale can range from a single PC sharing out basic peripherals to
massive data centers located around the World, to the Internet itself. Regardless of scope, all
networks allow computers and/or individuals to share information and resources.

Figure 1.1 Network(REF : https://techterms.com/definition/network)


Network be divided eleven kind of network, that are:
1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a
computer or two, phones, printers, tablets, etc., and revolves around one person in one
building. These types of networks are typically found in small offices or residences, and
are managed by one person or organization from a single device.
2. Local Area Network (LAN)
LANs are the most frequently discussed networks, one of the most common, one of the
most original and one of the simplest types of networks. LANs connect groups of
computers and low-voltage devices together across short distances (within a building or
between a group of two or three buildings in close proximity to each other) to share
information and resources. Enterprises typically manage and maintain LANs.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-
Fi. Typically seen in the same types of applications as LANs, these types of networks don’t
require that devices rely on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below),
these types of networks are typically seen in universities, large K-12 school districts or
small businesses. They can be spread across several buildings that are fairly close to each
other so users can share resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and incorporate
elements from both types of networks. MANs span an entire geographic area (typically a
town or city, but sometimes a campus). Ownership and maintenance is handled by either a
single person or company (a local council, a large company, etc.).
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer
physical distances. This allows computers and low-voltage devices to be remotely
connected to each other over one large network to communicate even when they’re miles
apart. The Internet is the most basic example of a WAN, connecting all computers together
around the world. Because of a WAN’s vast reach, it is typically owned and maintained by
multiple administrators or the public.
7. Storage Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several
servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage
resources away from the network and place them into their own high-performance network.
SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-
area networks include converged, virtual and unified SANs.
8. System Area Network (SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local
network that is designed to provide high-speed connection in server-to-server applications
(cluster environments), storage area networks (called “SANs” as well) and processor-to-
processor applications. The computers connected on a SAN operate as a single system at
very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be
integrated into structured cabling to overcome concerns about supporting traditional
Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-
to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from
one strand of singlemode optical fiber into multiple signals to serve users and devices.
10. Enterprise Private Network (EPN)
An enterprise private network is a computer network that helps enterprise companies with
a number of disparate offices connect those offices to each in a secure way over a network.
An enterprise private network is mainly set up to share computer resources.
These types of networks are built and owned by businesses that want to securely connect
its various locations to share computer resources.

Some of the advantages of an enterprise private network are:

 The messages are secure because they are encrypted.


 They are cost effective and scalable.
 They help to centralize IT resources.
 They enable business continuity.

11. Virtual Private Network (VPN)


By extending a private network across the Internet, a VPN lets its users send and receive
data as if their devices were connected to the private network – even if they’re not. Through
a virtual point-to-point connection, users can access a private network remotely

II.4 Network Architecture

Network Architecture is the complete framework of an organization's computer network.


The diagram of the network architecture provides a full picture of the established network with
detailed view of all the resources accessible. It includes hardware components used for
communication, cabling and device types, network layout and topologies, physical and wireless
connections, implemented areas and future plans. In addition, the software rules and protocols also
constitute to the network architecture. This architecture is always designed by a network
manager/administrator with coordination of network engineers and other design engineers. There
are three kind of network topologies that are :
A. Client Server
Client server is a computer network which one of or more computer be functioned as a server
or central. A server serve other computers which mentioned client. A service that be given
can in form of access Web, e-mail, etc. Client server many found on Internet network.
Nevertheless LAN or other networks can implementing client server.
B. Peer to Peer
Peer to peer is a computer network where every computer can be a server at as well a client.
So each computers able receiving and giving access from one computer to other computers.
Peer to peer many be implemented on LAN. Even though can be implemented on MAN, WAN,
or Internet, nevertheless this thing is less common. One of the reason is the management and
security.
C. Hybrid
A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies include a mix of bus topology, mesh topology, ring topology, star
topology, and tree topology.

II.5 Network Topology

Topology is a rules how to connecting computer (node) physically. Topology is a rules


how to connecting computer (node) physically. A network topology is the arrangement of a
network, including its nodes and connecting lines. There are two ways of defining network
geometry: the physical topology and the logical (or signal) topology. The physical topology of a
network is the actual geometric layout of workstations. There are several common physical
topologies, as described below and as shown in the illustrations.

A. Bus Topology

In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every otherworkstation in the
network.
Figure 2.2 Bus Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)

B. Start Topology

In the star network topology, there is a central computer or server to which all the workstations
are directly connected. Every workstation is indirectly connected to every other through the
central computer.

Figure 2.3 Star Topology (REF :


http://www.adalahcara.com/2014/09/macam-pengertian-
topologi-jaringan-komputer.html)

C. Ring Topology

In the ring network topology, the workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other pairs ofworkstations are indirectly
connected, the data passing through one or more intermediate nodes. If a Token Ring protocol
is used in a star or ring topology, the signal travels in only one direction, carried by a so-
called token from node to node.
Figure 2.4 Ring Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)

D. Mesh Topology

The mesh network topology employs either of two schemes, called full mesh and partial mesh.
In the full mesh topology, each workstation is connected directly to each of the others. In the
partial mesh topology, some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most data.

Figure 2.5 Mesh Topology (REF : http://www.adalahcara.com/2014/09/macam-


pengertian-topologi-jaringan-komputer.html)

E. Tree Topology

Tree topology Uses two or more stars networks connected together. The central computers of
the star networks are connected to a main bus. Thus, a tree network is a bus network of star
networks.
Figure 2.6 Tree Topology (REF : http://www.adalahcara.com/2014/09/macam-
pengertian-topologi-jaringan-komputer.html)

II.6 Identifying Computer on a Network

Any computers on a network can be identified by this two following method.

A. IP Address
IP is one of the computer network software (networking software) available in the system, and
is used in data communication in local area networks (LAN) and the Internet. An Internet
Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two
principal functions: host or network interface identification and location addressing.

B. MAC Address
A MAC address is a hardware identification number that uniquely identifies each device on a
network. The MAC address is manufactured into every network card, such as an Ethernet card
or Wi-Fi card, and therefore cannot be changed. In a local area network (LAN) or other
network, the MAC (Media Access Control) address is a computer's unique hardware number.
(On an Ethernet LAN, it's the same as the computer’s Ethernet address.) When the user is
connected to the Internet from the user’s computer (or host as the Internet protocol thinks of
it), a correspondence table relates it’s IP address to the computer's physical (MAC) address on
the LAN.

II.7 Network Media

Wireless networks are computer networks that are not connected by cables of any kind.
The use of a wireless network enables enterprises to avoid the costly process of introducing cables
into buildings or as a connection between different equipment locations. The basis of wireless
systems are radio waves, an implementation that takes place at the physical level of network
structure. Wireless networks use radio waves to connect devices such as laptops to the Internet,
the business network and applications. When laptops are connected to Wi-Fi hot spots in public
places, the connection is established to that business’s wireless network.

A. Wired Network
A wired network is a common type of wired configuration. Most wired networks use Ethernet
cables to transfer data between connected PCs. Wired network include Twisted Pair cable,
Coaxial cable, and fiber optic cable.
a. Twisted Pair cable
The most popular network cabling is Twisted pair. It is light weight, easy to install,
inexpensive and support many different types of network. It also supports the speed of
100 mps. Twisted pair cabling is made of pairs of solid or stranded copper twisted along
each other. The twists are done to reduce vulnerably to EMI and cross talk. The number
of pairs in the cable depends on the type. The copper core is usually 22-AWG or 24-
AWG, as measured on the American wire gauge standard. There are two types of
twisted pairs cabling.
b. Coaxial cable

Coaxial cable is very common & widely used commutation media. For example TV
wire is usually coaxial. Coaxial cable gets its name because it contains two conductors
that are parallel to each other. The center conductor in the cable is usually copper. The
copper can be either a solid wire or stranded martial. Outside this central Conductor is
a non-conductive material. It is usually white, plastic material used to separate the inner
Conductor form the outer Conductor. The other Conductor is a fine mesh made from
Copper. It is used to help shield the cable form EMI. Outside the copper mesh is the
final protective cover. (as shown in Fig) The actual data travels through the center
conductor in the cable. EMI interference is caught by outer copper mesh. There are
different types of coaxial cable vary by gauge & impedance. Gauge is the measure of
the cable thickness. It is measured by the Radio grade measurement, or RG number.
The high the RG number, the thinner the central conductor core, the lower the number
the thicker the core.

c. Fiber Optic cable

Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic
cable light only moves in one direction for two way communication to take place a
second connection must be made between the two devices. It is actually two stands of
cable. Each stand is responsible for one direction of communication. A laser at one
device sends pulse of light through this cable to other device. These pulses translated
into “1’s” and “0’s” at the other end. In the center of fiber cable is a glass stand or core.
The light from the laser moves through this glass to the other device around the internal
core is a reflective material known as CLADDING. No light escapes the glass core
because of this reflective cladding. Fiber optic cable has bandwidth more than 2 gbps
(Gigabytes per second)

B. Wireless Network
a. Radiowave

Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are normally
called radio waves. Radio waves are omnidirectional. When an antenna transmits radio
waves, they are propagated in all directions. This means that the sending and receiving
antennas do not have to be aligned. A sending antenna send waves that can be received by
any receiving antenna. The omnidirectional property has disadvantage, too. The radio
waves transmitted by one antenna are susceptible to interference by another antenna that
may send signal suing the same frequency or band. Radio waves, particularly with those
of low and medium frequencies, can penetrate walls. This characteristic can be both an
advantage and a disadvantage. It is an advantage because, an AM radio can receive signals
inside a building. It is a disadvantage because we cannot isolate a communication to just
inside or outside a building.

b. Microwave

Electromagnetic waves having frequencies between 1 and 300 GHz are called micro
waves. Micro waves are unidirectional. When an antenna transmits microwaves, they
can be narrowly focused. This means that the sending and receiving antennas need to
be aligned. The unidirectional property has an obvious advantage. A pair of antennas
can be aligned without interfering with another pair of aligned antennas.

The following describes some characteristics of microwaves propagation:

 Microwave propagation is line-of-sight. Since the towers with the mounted antennas
need to be in direct sight of each other, towers that are far apart need to be very tall.
 Very high-frequency microwaves cannot penetrate walls. This characteristic can be
a disadvantage if receivers are inside the buildings.
 The microwave band is relatively wide, almost 299 GHz. Therefore, wider sub-bands
can be assigned and a high date rate is possible.
 Use of certain portions of the band requires permission from authorities.

c. Terrestrial Microwave

For increasing the distance served by terrestrial microwave, repeaters can be installed
with each antenna .The signal received by an antenna can be converted into
transmittable form and relayed to next antenna as shown in below figure. It is an
example of telephone systems all over the world.
d. Satellite Microwave
This is a microwave relay station which is placed in outer space. The satellites are
launched either by rockets or space shuttles carry them. These are positioned 36000
Km above the equator with an orbit speed that exactly matches the rotation speed of
the earth. As the satellite is positioned in a geo-synchronous orbit, it is stationery
relative to earth and always stays over the same point on the ground. This is usually
done to allow ground stations to aim antenna at a fixed point in the sky.

e. Infrared Waves

Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for short-
range communication. Infrared waves, having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and
another, a short-range communication system in on room cannot be affected by another
system in the next room.

When we use infrared remote control, we do not interfere with the use of the remote by
our neighbour. However, this same characteristic makes infrared signals useless for
long-range communication. In addition, we cannot use infrared waves outside a
building because the sun's rays contain infrared waves that can interfere with the
communication.

II.8 Network Devices

Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used to
setup a Local Area Network (LAN) are the most common type of network devices used by the
public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online
access is desired, a high-speed modem. Happily this is much less complicated than it might sound
to someone new to networking.
In a network, one computer is designated as the server, and the others, clients. The server is
connected to an external hub, which the clients are also connected to. Now that the computers each
have one foot in a common electronic door (the hub), they can use the hub to pass signals back
and forth. To direct these signals, the hub contains a device known as a router. The router is the
equivalent of an electronic traffic cop that handles data traffic between the computers.
A. Bridge
A connectivity device that forwards data based on a physical address. In networking terms,
a bridge filters and forwards packets by physical address. Bridges operate at the Network
Access Layer in the TCP/IP protocol stack.

Figure 2.7 Bridge Network Device (REF :


https://www.wisegeek.com/what-is-a-network-bridge.htm)

B. Hub
A connectivity device to which network cables are attached to form a network segment. Hubs
typically do not filter data, but instead retransmit incoming data packets or frames to all parts.
Almost all networks today use a central hub or switch to which the computers on the network
connect. In a hubbed network, each computer is connected to the hub through a single line.
That makes adding a host to the network, or taking it off, a simple task.
Figure 2.8 Hub Network Device (REF : https://www.amazon.co.uk/D-Link-
USB-2-0-Ports-DUB-H7/dp/B0000B0DL7)

C. Switch

A switch is aware of addresses associated with each of its ports and forwards each incoming
data frame to the correct port. Switches can base forwarding decisions on guidelines that are
provided in the headers of the TCP/IP protocols. A switch, simplified, is a smarter version of
a hub. On a switch, as with a hub, each computer is connected through a single line. However,
the switch is smarter about where it sends data that comes in through one of its ports.

Figure 2.9 Switch Network Device (REF : https://www.lifewire.com/what-


is-a-network-switch-2618163)

D. Router

A connectivity device that filters and forwards data based on a logical address. In the case of
TCP/IP networks, that would be the IP address. Routers are an essential part of any larger
TCP/IP network. In fact, without the development of network routers and TCP/IP routing
protocols, the Internet (the biggest network in the world) would not have become as extensive.
Routers play a vital role in controlling traffic and keeping the network efficient.

Figure 2.10 Router Network Device (REF : https://www.lifewire.com/what-is-


a-network-switch-2618163)
E. Modem

A modem is a hardware device that allows a computer to send and receive data over a
telephone line or a cable or satellite connection. In the case of transmission over an analog
telephone line, which was once the most popular way to access the internet, the modem
converts data between analog and digital formats in real time for two-way network
communication. In the case of the high-speed digital modems popular today, the signal is much
simpler and doesn't require the analog-to-digital conversion.

Figure 2.11 Modem Network Device (REF : https://www.lelong.com.my/d-link-


wired-1-port-modem-router-dsl-526e-chocobozz-185737668-2016-12-Sale-P.htm)

II.9 Network Operating System

A network operating system (NOS) is a computer operating system system that is designed
primarily to support workstation, personal computer, and, in some instances, older terminal that
are connected on a local area network (LAN). Artisoft's LANtastic, Banyan VINES, Novell's
NetWare, and Microsoft's LAN Manager are examples of network operating systems. In addition,
some multi-purpose operating systems, such as Windows NT and Digital's OpenVMS come with
capabilities that enable them to be described as a network operating system.

A network operating system provides printer sharing, common file system and database
sharing, application sharing, and the ability to manage a network name directory, security, and
other housekeeping aspects of a network.
A. Artisoft’s LANtastic

LANtastic supports a wide variety of PC operating systems like Windows NT 4.0/2000/2003


(Workstation and/or Server), and Windows XP. It comes with an enhanced multi-platform
support. The installation and operation of the system is fast and user friendly, along with an
improved interface that allows all networked PCs to be able to communicate by just using the
Chat feature. Users are not required to employ a dedicated server or a full-time network
manager because the system is simple and easy to maintain.

B. Banyan VINES

Banyan Virtual Integrated Network Service (VINES) is a network operating system based on
proprietary protocol family. The protocol is basically derived from Xerox Network Systems
(XNS) protocols, where it uses a client-server architecture that enables clients to request
specified services like file and printer access from servers.

C. Novell’s NetWare

This network operating system is a protocol suite designed based on the XNS protocol
architecture. It provides comprehensive support to most of the desktop operating systems in
the market, including DOS, Windows, Macintosh, OS/2 and UNIX. Novell also supports the
local area networks and asynchronous wide area communications.

D. Microsoft’s LAN Manager

LAN Manager is a network operating system by Microsoft that works as a server application.
It runs under Microsoft OS/2, and was developed in conjunction with 3Com. The file server
may concurrently be used for other tasks like database services. In other words, the system
provides a good multi-tasking function. It also supports most desktop operating systems like
DOS, Windows and OS/2 clients. Currently, the LAN Manager feature has been superseded
by Microsoft Windows NT Server and most parts of the LAN Manager are being used in the
Windows NT and Windows 2000
E. Oracle Solaris

Oracle Solaris is the best enterprise operating system for Oracle Database and Java
applications. Focused enhancements across CPU, memory, file system, I/O, networking, and
security deliver the best database, middleware, and application performance for Oracle
workloads. Oracle Solaris is engineered for cloud security at every level. Antimalware
protection extends from hypervisor to application. Users can lock down systems and virtual
machines, while Silicon Secured Memory seamlessly prevents common security attacks such
as buffer over-reads and overwrites. One step, multi node compliance reporting means users
can spend more time innovating rather than auditing in your data center.

CHAPTER III PROBLEM ANALYSIS


III.1 Network Analysis
This Project containing the design network system at Museum. This Project using many
device and network device, where each device is connected to other device using network device
for shaping a form LAN (Local Area Network) for sharing files, Web browsing, monitoring the
Museum’s environment, etc.

3.1.1 Environment Abstraction


In this Project, author designing a museum network system. This museum is
consist four room, one room in first floor and three rooms in second floor. In the first
floor there is a room which mentioned as Art Exhibition Room. In this room, visitors
buy entry tickets and can use computer that has provided for web browsing and they
can use their devices too to connect to wireless router. The second floor used for
Server Room, Office Room, and Technology Exhibition Room. In Technology
Exhibition Room be used for show off technologies from the past era and the now
era, and visitors can searching article from computer and from their devices.

3.1.2 Design Architecture of Museum Network System


Figure 3.12 Architecture Design of Museum Network System(REF : Cisco Packet
Tracer)

This is the design architecture of museum network system that using Local Area Network
(LAN). This museum use cable modem that functions as an two directions communication item.
Cable modem be on duty for providing connection to devices that is connected to cable modem.

The hub on this network system is a router. The router is connected to a modem and
switches that available in Server Room, Office Room, Technology Room, and Art Exhibition
Room. The router be on duty for routes for whom data packets is sending based on their IP
addresses.

A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large
number of ports imply less traffic) and performance. In every room, the switches are used for as
a connector to devices. Every devices are connected on switches can sending and / receiving data
one another. For example, if manager of finance want to sending data to ADM and warehouse
computer manager, the switch as a connector will continuing the data to ADM and warehouse
computer manager.

In this museum, wireless router is used for providing connection for connecting to Internet,
not only computer that is available in every floor, but visitors can access wireless router with their
own devices. Repeater be provided too. Repeater functions for extending distance of wireless
router.
III.2 Network Architecture
Network architecture is the complete framework of an organization’s computer network.
Network architecture provides the detail overview of a network. The architecture is emphasized
in a distributed computing environment and its complexity can not be understood with out a
framework.
3.2.1 Client-server architecture
The client-server architecture is a network architecture where there are as servers and
clients. A server is a system that provides data which requested by client. While a client is a system
that doing request data to server.
In the room art room, technology room, and office room there are computers which is
connected by transmission network media to a server. Computers can access data that available in
the server with server’s permission .

III.3 Network Topology


3.3.1 Tree Topology
Tree topology is mentioned too star-bus topology or star/bus hybrid. Tree topology is a
combination from some star topology which connected with bus topology.
The network system in this Project use topology tree where there is a combination between
star and bus topology. The main hub in this topology is router that is connected to switches in
server room, art room, technology room, and office room.
III.4 Hardware and Software
3.4.1 Hardware
1. Server Room

Number Name Hardware Type

1. Admin computer Computer MSI Infinite A Intel

Keyboard Logitech G213

Mouse Logitech M237


2. Admin Phone IP Phone IP phone Cisco 7940

3. Server Server IBM Blade 86774TA

Table 3.1 Server Room Hardware (REF :By our group)

2. Office Room

Number Name Hardware Type

1. ADM and Warehouse Computer Alienware Aurora R7


computer
Keyboard Logitech G213

Mouse Logitech M237

2. Manager of Personnel Computer Alienware Aurora R7


computer
Keyboard Logitech G213

Mouse Logitech M237

3. Manager of finance pc Computer Lenovo Ideacentre Y900

Mouse Logitech G213

Keyboard Logitech M237

4. Manager of market Computer Dell XPS Tower Special


Edition: Intel Core i5-8400

Logitech G213
Keyboard
Logitech M237
Mouse

5. ADM and warehouse phone IP Phone IP phone Cisco 7940

6. Manager of personnel phone IP Phone IP phone Cisco 7940

7. Manager of finance phone IP Phone IP phone Cisco 7940


8. Manager of market phone IP Phone IP phone Cisco 7940

9. Printer 1 Printer PIXMA iP110

10. Printer 2 Printer PIXMA iP110

Table 3.2 Office Room Hardware (REF :By our group)

3. Technology Exhibition Room

Number Name Hardware Type

1. User 4 Computer Dell XPS Tower Special


Edition

Logitech G213
Keyboard
Logitech M237
Mouse

2. User 5 Computer Lenovo Ideacentre Y900

Keyboard Logitech G213

Mouse Logitech M237

Table 3.3 Technology Exhibition Room Hardware (REF :By our group)

4. Art Exhibition Room

Number Name Hardware Type

1. User 1 Computer Dell XPS Tower Special


Edition

Logitech G213
Keyboard
Logitech M237
Mouse
2. User 2 Computer Dell XPS Tower Special
Edition: Intel Core i5-8400

3. User 3 Computer Lenovo Ideacentre Y900

Mouse Logitech M237

Keyboard Logitech G213

4. Receptionist 1 Computer Lenovo Ideacentre Y900

Mouse Logitech M237


Logitech G213
Keyboard
ADVENT ADM16 Desktop
Microphone
Microphone
5. Receptionist 2 Computer Alienware Aurora R7

Mouse Logitech M237


Logitech G213
Keyboard
Microphone
ADVENT ADM16 Desktop
Microphone
6. Printer 1 Printer PIXMA iP110

7. Printer 2 Printer PIXMA iP110


Table 3.4 Art Exhibition Room Hardware (REF :By our group)

3.4.2 Software
Server Room

Number Name Software Type

Admin computer Operating System Windows 10 Pro

Antivirus Windows Defender


1.
Network monitor software WireShark

Common software
Microsoft Exel, Word,
Google Chrome, etc.

Server Network operating system Windows Server 2016


2.
Antivirus Windows defender

Table 3.5 Server Room Software (REF :By our group)

2. Office Room

Number Name Software Type

1. ADM and Warehouse Operating system Windows 10 Pro


computer
Antivirus Windows defender

Common software Microsoft Exel, Word, Google


Chrome, etc.

2. Manager of Personnel Operating system Windows 10 Pro


computer
Antivirus Windows defender
Common software
Microsoft Exel, Word, Google
Chrome, etc.

3. Manager of finance pc Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word, Google


Chrome, etc.

4. Manager of market Operating system Windows 10 Pro

Antivirus Windows defender

Common software
Microsoft Exel, Word, Google
Chrome, etc.

Table 3.6 Office Room


Software(REF :By our group)

3. Technology Exhibition Room

Number Name Software Type

1. User 4 Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word,


Google Chrome, etc.

2. User 5 Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word,


Google Chrome, etc.

Table 3.7 Technology Exhibition Room Software(REF :By our group)

4. Art Exhibition Room


Number Name Software Type

1. User 1 Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word, Google Chrome, etc.

2. User 2 Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word, Google Chrome, etc.

3. User 3 Operating system Windows 10 Pro

Antivirus Windows defender

Common software Microsoft Exel, Word, Google Chrome, etc.

4. Receptionist 1 Operating system Windows 10 Pro


Antivirus Windows defender
Common software Microsoft Exel, Word, Google Chrome, etc
5. Receptionist 2 Operating system Windows 10 Pro
Antivirus Windows defender
Common software Microsoft Exel, Word, Google Chrome, etc.
Table 3.8 Technology Exhibition Room Software(REF :By our group)

III.5 IP Address
IP address is a group of binary number along 32-bit, which is divided up four segment and
every segment consist of 8-bit. IP address is identification from every host on Internet network.
1. Server room
IP Address Name Devices
192.155.101.1 Sever 1 Server
192.168.100.1 Main Admin Pc
Table 3.9 Server Room IP Address(REF :By our group)

2. Office room
IP Address Name Devices
192.168.100.2 ADM and Warehouse Pc
192.168.100.3 Manager of Personnel Pc
192.168.100.4 Manager of Finance Pc
192.168.100.5 Manager of Market Pc
68.90.134.10 Internet Office Room Wireless Router

150.100.100.1 Printer 1 Printer

150.100.100.2 Printer 2 Printer


Table 3.10 Office Room IP Address(REF :By our group)

3. Technology exhibition room


IP Address Name Devices
192.100.0.1 Technology Exhibition Room
Wireless Router
Internet
192.155.0.103
User 4 Pc

192.155.0.103 User 5 Pc
Table 3.11 Technology Exhibition Room IP Address(REF :By our group)

4. Art exhibition room


IP Address Name Devices
192.168.0.100 User 3 Pc
192.168.0.101 User 2 Pc
192.168.0.102 User 1 Pc
192.153.1.21 Art Exhibition Room Wireless network
Internet
192.168.100.8 Receptionist 1 Pc
192.168.100.9 Receptionist 2 Pc
192.155.100.2 Printer 3 Printer
Table 3.12 Art Exhibition Room IP Address(REF :By our group)
III.6 Transmission Media Network
Transmission Media Network is pathway that carries the information from sender to
receiver. There are two types of transmission media network, that are wired transmission media
network and wireless transmission media network. Wired media is a transmission which is using
cable that sending data in the form of electrical signal. While wireless media is a transmission
media network without cable to sending data. The data is sent in the form of electromagnetic signal.
This Project use both of the transmission media network types.
Wired media be used is Twisted-pair cable. There are two types of Twisted-pair cable, that
are Copper Straight-Through and Copper Straight-Over. But in this project just use Copper
Straight-Thorough. Addition to, this project is using wireless transmission media network too.
Wireless transmission is used for connecting a device to wireless router for Internet activity.
III.7 Network Devices
3.7.1 Router
A router is a device like a switch that routes data packets based on their IP addresses.
Router is mainly a Network Layer device. Routers normally connect LANs and WANs together
and have a dynamically updating routing table based on which they make decisions on routing the
data packets. Router divide broadcast domains of hosts connected through it. Router is used in
this Project for as a hub in network.

Figure 3.13 The Hub of The Network System (REF :


https://www.lifewire.com/what-is-a-network-switch-2618163)

3.9.2 Switch
A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large
number of ports imply less traffic) and performance. Switch is data link layer device. Switch can
perform error checking before forwarding data, that makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to correct port only. In other words,
switch divides collision domain of hosts, but broadcast domain remains same. In this project,
switches are used as connector between a bridge witch computers, ip phone, and a server.

Figure 3.14 The Connector (REF : https://www.lifewire.com/what-is-a-


network-switch-2618163)

3.7.3 Wireless Router


A wireless router is a device in a wireless local area network (WLAN) that determines the
next network point to which a packet should be forwarded toward its destination. A wireless router
works in the same way as the router in a hard-wired home or business local area network (LAN),
but allows greater mobility for notebook or portable computers. The individual computers are
equipped with small wireless transceivers that can be plugged into either a Universal Serial Bus
(USB) port or a PC card slot. Wireless router is used in this museum for to connect devices for
web browser.

Figure 3.15 WI-FI (REF : https://www.pcmag.com/review/352074/tp-link-


archer-c7-ac1750-wireless-dual-band-gigabit-router)

3.7.4 Repeater
A repeater is a network device that retransmits a received signal with more power
and to an extended geographical or topological network boundary than what would be capable
with the original signal.
A repeater is implemented in computer networks to expand the coverage area of the
network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the
received/input signal to a higher frequency domain so that it is reusable, scalable and available.
Repeaters were introduced in wired data communication networks due to the limitation of
a signal in propagating over a longer distance and now are a common installation in wireless
networks for expanding cell size. Repeaters are also known as signal boosters. The repeaters are
used for extended signal distance in this museum

Figure 3.16 The Extender Distance of Signal (REF :


https://www.qtech.co.nz/shop/Wireless+Remote+Control+Systems/WP2P+Repea
ter%3Fsku=1-PD8811.html)

3.9.5 Cable Modem

A cable modem is a device that enables you to hook up your PC to a local cable TV line
and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56
Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN)
and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone
service. A cable modem can be added to or integrated with a set-top box that provides your TV set
with channels for Internet access. In most cases, cable modems are furnished as part of the cable
access service and are not purchased directly and installed by the subscriber. Now known as Cable
Labs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a
standard interface for cable modems, the devices that handle incoming and outgoing data signals
between a cable TV operator and a personal or business computer or television set.

A cable modem has two connections: one to the cable wall outlet and the other to a PC or
to a set-top box for a TV set. Although a cable modem does modulation between analog and digital
signals, it is a much more complex device than a telephone modem. It can be an external device or
it can be integrated within a computer or set-top box. Typically, the cable modem attaches to a
standard 10BASE-T Ethernet card in the computer. All of the cable modems attached to a cable
TV company coaxial cable line communicate with a Cable Modem Termination System (CMTS)
at the local cable TV company office. All cable modems can receive from and send signals only
to the CMTS, but not to other cable modems on the line. Some services have the upstream signals
returned by telephone rather than cable, in which case the cable modem is known as a telco-return
cable modem.

The actual bandwidth for Internet service over a cable TV line is up to 27 Mbps on the
download path to the subscriber with about 2.5 Mbps of bandwidth for interactive responses in the
other direction. However, since the local provider may not be connected to the Internet on a line
faster than a T-carrier system at 1.5 Mpbs, a more likely data rate will be close to 1.5 Mpbs.

Figure 3.16 The Extender Distance of Signal (REF :


https://www.qtech.co.nz/shop/Wireless+Remote+Control+Systems/WP2P+Repeater%3F
sku=1-PD8811.html)

III.8 Network Operating System

A highly anticipated feature of Windows Server 2016 is the inclusion of two


native containers: Windows Server Containers and Hyper-V Containers. Windows
Server Containers will run directly on the OS but are isolated from each other.
Hyper-V Containers provide enhanced isolation and run from a Microsoft Hyper-V
virtual machine (VM). Windows Server 2016 will also provide built-in support for
Docker, which can be used to manage both types of containers.

Windows Server 2016 will also replace Hyper-V snapshots with production
checkpoints, which allow administrators to roll back a VM to an earlier point in time
without having to restore from a backup. Unlike snapshots, checkpoints use Volume
Shadow Copy Services. The new version of Hyper-V in Windows Server 2016 will
support virtual Trusted Platform Module which allows a VM to be encrypted using
BitLocker.

III.9 Budget
3.9.1 Hardware

Price
Number Name Hardware Type

1. Admin computer Computer MSI Infinite A Intel IDR


23,890,000.00
Keyboard Logitech G213
IDR
Mouse Logitech M275 545,000.00
IDR
159,000.00
2. Admin Phone IP Phone IP phone Cisco 7940 IDR
1.550.000
3. Server Server IBM Blade E 86774TA IDR
44,222,500.00
2. Office Room
Number Name Hardware Type Price

1. ADM and Warehouse Computer Alienware Aurora R7 IDR 23,969,550.00


computer
Keyboard Logitech G213 IDR 545,000.00

Mouse Logitech M275


IDR 159,000.00
2. Manager of Personnel Computer Alienware Aurora R7 IDR 23,969,550.00
computer
Keyboard Logitech G213 IDR 545,000.00

Mouse Logitech M275 IDR 159,000.00

3. Manager of finance pc Computer Lenovo Ideacentre Y900 17,985,000.00

Mouse Logitech M275 IDR 159,000.00

Logitech G213
Keyboard
IDR 545,000.00

4. Manager of market Computer Dell XPS Tower Special IDR 15,749,850.00


Edition

Logitech G213 IDR 545,000.00


Keyboard
Logitech M275 IDR 159,000.00
Mouse

5. ADM and warehouse IP Phone IP phone Cisco 7940 IDR 1,550,000.00


phone

6. Manager of personnel IP Phone IP phone Cisco 7940 IDR 1,550,000.00


phone

7. Manager of finance IP Phone IP phone Cisco 7940 IDR 1,550,000.00


phone
8. Manager of market IP Phone IP phone Cisco 7940 IDR 1,550,000.00
phone

9. Printer 1 Printer PIXMA iP110 IDR 4,427,500.00

10. Printer 2 Printer PIXMA iP110 IDR 4,427,500.00

3. Technology Exhibition Room

Number Name Hardware Type Price

1. User 4 Computer Dell XPS Tower Special IDR 15,749,850.00


Edition
IDR 545,000.00
Logitech G213 IDR 159,000.00
Keyboard
Logitech M275
Mouse

2. User 5 Computer Lenovo Ideacentre Y900 17,985,000.00

Keyboard Logitech G213 IDR 545,000.00

Mouse Logitech M275 IDR 159,000.00

4. Art Exhibition Room

Price
Number Name Hardware Type

1. User 1 Computer Dell XPS Tower Special Edition IDR 15,749,850.00

Logitech G213

Keyboard Logitech M275


IDR 545,000.00
Mouse
IDR 159,000.00
2. User 2 Computer Dell XPS Tower Special IDR 15,749,850.00
Edition: Intel Core i5-8400

Logitech G213
Keyboard
IDR 545,000.00
Logitech M275
Mouse
IDR 159,000.00
3. User 3 Computer Lenovo Ideacentre Y900

Mouse Logitech M275 IDR 159,000.00

Keyboard Logitech G213 IDR 545,000.00

4. Receptionist 1 Computer Lenovo Ideacentre Y900 17,985,000.00

Mouse Logitech M275


Logitech G213 IDR 159,000.00
Keyboard IDR 545,000.00

5. Receptionist 2 Computer Alienware Aurora R7 IDR 23,969,550.00

Logitech M237 IDR 159,000.00


Mouse
Logitech G213 IDR 545,000.00

6. Printer 3 Printer PIXMA iP110 IDR 4,427,500.00

3.9.2 Software

Vous aimerez peut-être aussi