Minggu, 31 Oktober 2010

Komputer Virtual

Mungkin banyak dari kita yang masih belum mengenal software-software komputer virtual. Komputer virtual adalah sebuah software yang memiliki kemampuan untuk memvirtualisasikan satu atau lebih komputer dalam satu komputer. Dalam arti kata bahwa dengan komputer virtual ini, kita dapat mencoba melakukan installasi berbagai macam sistem operasi dalam satu komputer dengan aman tanpa takut terjadi kesalahan dalam melakukan instalasi yang bisa menyebabkan kehilangan data. Virtual Komputer berbeda dengan dual boot.

Dual Boot tidak memungkinkan kita untuk menjalankan semua Sistem Operasi secara bersamaan dalam satu waktu, sedangkan Virtual Komputer bisa 2 atau lebih jalan sekaligus. Selain itu manfaat komputer virtual dapat kita jadikan sebagai wahana belajar komputer percobaan untuk menguji aplikasi ataupun untuk mempelajari OS yang baru bagi kita. Nah cocok sekalikan dengan kita yang baru belajar, khususnya siswa atau mahasiswa.

Virtual komputer ini sering juga disebut sebagai virtual machine/CPU emulator/computer virtualizer/computer emulator/virtual PC, dll. Inti dari Virtual Komputer ini, mampu menghadirkan satu atau lebih komputer virtual lengkap dengan hard disk virtual dan perangkat hardware lainnya sehingga kita juga dapat membangun jaringan virtual antara semua komputer virtual dan komputer fisikal yang kita miliki. Sebagai gambaran, silahkan dilihat gambar diatas. Pada 1 komputer yang kita miliki bisa sekaligus menjalankan OS Windows 7dan XP dengan waktu yang bersamaan.

Langkah-langkah membuat Virtual PC adalah sebagai berikut :
1. Download Microsoft Virtual PC 2007 http://www.microsoft.com/windows/downloads/virtualpc/default.mspx

2. Download dan install!

3. Kemudian buka Microsoft Virtual PC,  Start>All Program>Microsoft Virtual PC





4. Maka tampilannya akan seperti dibawah ini.

5. Pilihlah create a virtual machine kemudian klik next!!!
 
6. Pilihlah Operating Sistem yang ingin anda install. Namanya bebas pada tutorial ini namanya 
“Windows XP Virtual”



7. Disini akan menginstall windows xp, pilih windows xp pada tampilan sbb;



8. untuk mengatur RAM yang digunakan pilih "Adjusting the RAM" kemudian atur RAMnya dengan cara menggesernya(disini RAM 512)




9. Selanjutnya untuk membuat Harddisk. klik A new Virtual Harddisk lalu dinext. Atur berapa kapasitas yang ingin anda jadikan harddisk pada komputer virtual (bebas). Sebesar 50 gb digunakan disini.





10. Klik Finish. Berikutnya adalah memasukkan Windows XP CD kedalam CD Rom drive dan start virtual machine.





11. Pastikan CD windows XP anda berada pada cdrom drive, dan start virtual machine.

Ada 2 cara menjalankan virtual machine. Pertama dengan mengklik virtual machine file (*.vmc) atau Klik start pada Virtual PC Console.
Note: beberapa setting pada virtual machine masih grayed out karena Guest OS belum terinstall dan belum memiliki software “Virtual Machine addition”.



12. Lakukan instalasi seperti biasa (bagaimana cara menginstalasi windows XP diluar dari tutorial ini).

13. Setelah OS terinstall dan anda dapat boot kedalam, waktunya menambahkan sebuah Virtual Machine Additions. Klik pada menu Action dan pilih “Install or Update Virtual Machine Additions”. anda akan mendapatkan warning, klik saja continue dan lakukan install. Setelah install selesai, restart system.
Note: Bila anda merasa cursor mouse terjebak dalam OS Guest (tidak bisa move ke OS Host) tekan saja tombol ALT yang disebelah kanan keyboard (jangan yang kiri!).





14. Selamat anda sudah membuat sebuah Virtual PC

*) Postingan Tambahan....
 Selanjutnya adalah dasar-dasar manipulasi file


1. Untuk mengcopy sebuah file dari host ke guest, klik dan drag sebuah file dari desktop/folder ke dalam virtual pc seperti pada gambar dibawah ini. Hal yang sama juga berlaku bila anda ingin mengcopy dari guest ke host.


16. Kelemahan dari cara diatas adalah bila anda ingin mengupdate file pada guest kemudian perubahan ini ingin juga diimplementasikan pada host maka anda akan sering click and drag. Cara lain yang lebih baik adalah membuat sebuah shared folder. Langkahnya adalah sebagai berikut:
1. Klik edit -> settings



3. lalu untuk mengakses shared folder, gunakanlah windows explorer pada guest operating system dan browse ke dari Y (atau drive letter lainnya bergantung dari mapping).


17. Menu setting juga dapat digunakan untuk mengedit nilai-nilai lain seperti besar memory etc.
Note:
1. USB Drive tidak didukung oleh virtual PC!
2. Ukuran file virtual PC cukup besar, bahkan sudah mencapai 1,4 gb padahal baru windows yang diinstall

Virtual CD/DVD

Virtual CD/DVD adalah semacam drive CD/DVD maya, yang mana komputer akan membacanya sebagai CD/DVD ROM, padahal drive CD/DVD tersebut tidak ada, Lalu apa kegunaan dari Virtual CD/DVD ?

Pernahkah anda memainkan sebuah game, dimana setiap kali anda bermain game (contohnya Need For Speed), anda diminta untuk memasukkan CD/DVDnya ? kalo blom pernah,, Silahkan dicoba memainkan Game seperti Need For Speed,, kalo udah pernah,, silahkan lanjut bacanya..

Untuk ngakalinnya biasanya kita mendownload cracknya dari internet, tapi kadangkala kita kesulitan untuk mencari cracknya di internet, juga beberapa game membaca image cd sebagai validasi untuk menggunakannya.. Nah,, untuk itulan kita membuat Virtual CD/DVD ini,,

Cara membuatnya cukup mudah,,
  1. Disini menggunakan Alcohol 52%
 2. Masukan CD/DVD yang akan diburning.
3. Tentukan Destination folder untuk penyimpanan CD/DVD virtual

4. Setelah terbaca oleh alcohol 52%, klik start untuk memburn ke cd virtual


6. setelah itu tampilannya akan seperti ini, CD/DVD yang tadi diburn telah disimpan dan berekstensi file .iso


6. untuk membuka file iso tadi kita bisa menggunakan software ultraiso atau yang lainnya, bila ultra iso sudah terinstall langkahnya cuma klik kanan difile open with ultra iso dan "mount"

Senin, 20 September 2010

Computer Network Topology

Topology describes the structure of a network or how a network is designed. This pattern is very closely related to media access and delivery methods used. There were highly dependent topology with geofrapis location of each terminal, the quality control needed in the communication or messaging, as well as the speed of data transmission. In the definition of topology is divided into two, namely the physical topology (physical topology), which indicates the position of the physical cabling and topology of logic (logical topology) which shows how a medium accessible by the host.The physical topology is commonly used in building a network is:
Point to point (Point to Point).Networking ketitik point is the most simple networks but can be widely used. Once the simplicity of this network, which is often not considered as a network but only an ordinary communication. In this case, both nodes have the same level position, so that any node can initiate and control the relationship in the network. Data sent from one node another conclusion as the recipient directly, such as between terminals with the CPU.
Star Network (Star Network).In a star configuration, some existing equipment will be linked into a central computer. Existing controls will be concentrated at one point, such as workload and set the settings of existing resources. All links should be related to the central data channel if you want to target other conclusion. In this case, when the center was down, then all terminals may also be disrupted. Star network model is relatively very simple, so widely used by the parties of the banks that typically have many branches in different locations. With the existence of this star configuration, then all sorts of activities that exist in the branch offices it can be properly controlled and coordinated. In addition, the education world too much advantage of this star networks to control the activities of their proteges.Excess· Damage on one channel only affect the channel network and the station adrift.· Security level is high.· Hold on a busy network traffic.Additions and reductions · station can be done easily.Shortage· If the node was malfunctioning, then the entire network to a halt.HandlingNeed · middle nodes prepared spare.


Ring Networks (Ring Network)In this network there are several devices are connected to one another and ultimately form the chart as well as a ring. Ring network does not have a point that acts as a central regulator or data traffic, all nodes have the same level. Data sent will go through several nodes, so arrive at the destination node. In the present data, the network can move in one or two directions. However, existing data remain moving in one direction at a time. First, existing messages will be delivered from other ketitik point in one direction. When encountered a failure, for example, there is damage on the existing equipment, so existing data will be sent by way of a second, then the message is transmitted in the opposite direction, and could ultimately end up at the intended place. Such a configuration is relatively more expensive when compared with the star network configuration. This is due, any existing node will act as a computer that will handle every application that it faces, and should be able to share resources on the existing network. In addition, the system is more suitable to use for systems that are not centralized (decentralized-system), which is not required to do a particular priority.

Tree Network (Network Tree)In tree networks, there are several levels of nodes (node). Central or higher level node, another node can be set lower level. Data sent to the central node first. For example to move from a computer with a node-3 node kekomputer-7 as well as in the figure, the data must pass through node-3, 5 and node-6 before ending at the node-7. Keungguluan network tree model like this is, can the formation of a group that is required at all times. For example, companies can form a group consisting of terminal bookkeeping, as well as on other groups formed to terminal sales. The weakness is, if the node is higher then does not work, then the other group who are below it eventually also became ineffective. How the network is relatively slow tree

Bus NetworkAnother configuration is known as a bus-network, suitable for areas that are not too large. Each computer (each node) will be connected by a communication cable through an interface. Each computer can communicate directly with computers or other equipment contained within the network, in other words, all nodes have the same position. In this case, the network is not dependent on the existing computer center, so that when one device or one node is destroyed, the system can still operate. Each node has an existing address or nature itself. So that access to the data from one node, the user or the user simply mentioning the address of the node in question. Bus topology advantages are the development of a network or adding new workstations can be done easily without disrupting the other workstations. The weakness of this topology is that if there is interference along the center of the entire cable network will be disrupted.

Plex Network (Network Combination)Network is a truly interactive, where every node has the ability to directly access not only to computers but also with other devices or nodes. In general, this network has a shape similar to a star network. Organization of existing data using the de-centralization, is to perform maintenance, use centralized facility.

Topology and logic are generally divided form the two types, namely:a. Broadcast TopologyIn simple terms can be described that is a host that sends data to all other hosts on the network media.b. Token Passing TopologiesSet the data transmission to the host through the media by using the token that regularly rotates in a whole host. Hosts can only transmit data only if that host has a token. By token of this, collision can be prevented.
Factors - factors that need consideration for the selection of topology is as follows:· Course feeWhat is the most efficient system is needed within the organization.· SpeedTo what extent has the needed speed in the system.· EnvironmentSuch as electricity or factors - other environmental factors, influencing the type of hardware used.· SizeUp to how big the size of the network. Does the network need the file server or a number of specialized servers.· ConnectivityDoes the other user who uses a laptop computer to access the network from various locations.
Diponegoro Student Blogs Just another weblog prima \ 's blog

    
* Home
    
* About
«TYPES OF COMPUTER NETWORKS GSM Radio Network Planning Process » Computer Network Topology
Topology describes the structure of a network or how a network is designed. This pattern is very closely related to media access and delivery methods used. There were highly dependent topology with geofrapis location of each terminal, the quality control needed in the communication or messaging, as well as the speed of data transmission. In the definition of topology is divided into two, namely the physical topology (physical topology), which indicates the position of the physical cabling and topology of logic (logical topology) which shows how a medium accessible by the host. The physical topology is commonly used in building a network is:
Point-to-Point (Point to point). Networking ketitik point is the most simple networks but can be widely used. Once the simplicity of this network, which is often not considered as a network but only an ordinary communication. In this case, both nodes have the same level position, so that any node can initiate and control the relationship in the network. Data sent from one node another conclusion as the recipient directly, such as between terminals with the CPU.
Star Network (Star Network). In a star configuration, some existing equipment will be linked into a central computer. Existing controls will be concentrated at one point, such as workload and set the settings of existing resources. All links should be related to the central data channel if you want to target other conclusion. In this case, when the center was down, then all terminals may also be disrupted. Star network model is relatively very simple, so widely used by the parties of the bank which usually have many branches in different locations. With the existence of this star configuration, then all sorts of activities that exist in the branch offices it can be properly controlled and coordinated. In addition, the education world too much advantage of this star networks to control the activities of their proteges. Excess · Damage on one channel only affect the channel network and the station adrift. · Security level is high. · Hold on a busy network traffic. Additions and reductions · station can be done easily. Shortage · If the node was malfunctioning, then the entire network to a halt. Handling · Prepared Need backup middle node. 


Ring Networks (Ring Network)In this network there are several devices are connected to one another and ultimately form the chart as well as a ring. Ring network does not have a point that acts as a central regulator or data traffic, all nodes have the same level. Data sent will go through several nodes, so arrive at the destination node. In the present data, the network can move in one or two directions. However, existing data remain moving in one direction at a time. First, existing messages will be delivered from other ketitik point in one direction. When encountered a failure, for example, there is damage on the existing equipment, so existing data will be sent by way of a second, then the message is transmitted in the opposite direction, and could ultimately end up at the intended place. Such a configuration is relatively more expensive when compared with the star network configuration. This is due, any existing node will act as a computer that will handle every application that it faces, and should be able to share resources on the existing network. In addition, the system is more suitable to use for systems that are not centralized (decentralized-system), which is not required to do a particular priority.

 Tree Network (Network Tree)In tree networks, there are several levels of nodes (node). Central or higher level node, another node can be set lower level. Data sent to the central node first. For example to move from a computer with a node-3 node kekomputer-7 as well as in the figure, the data must pass through node-3, 5 and node-6 before ending at the node-7. Keungguluan network tree model like this is, can the formation of a group that is required at all times. For example, companies can form a group consisting of terminal bookkeeping, as well as on other groups formed to terminal sales. The weakness is, if the node is higher then does not work, then the other group who are below it eventually also became ineffective. How the network is relatively slow tree

Bus NetworkAnother configuration is known as a bus-network, suitable for areas that are not too large. Each computer (each node) will be connected by a communication cable through an interface. Each computer can communicate directly with computers or other equipment contained within the network, in other words, all nodes have the same position. In this case, the network is not dependent on the existing computer center, so that when one device or one node is destroyed, the system can still operate. Each node has an existing address or nature itself. So that access to the data from one node, the user or the user simply mentioning the address of the node in question. Bus topology advantages are the development of a network or adding new workstations can be done easily without disrupting the other workstations. The weakness of this topology is that if there is interference along the center of the entire cable network will be disrupted.

Plex Network (Network Combination)Network is a truly interactive, where every node has the ability to directly access not only to computers but also with other devices or nodes. In general, this network has a shape similar to a star network. Organization of existing data using the de-centralization, is to perform maintenance, use centralized facility.

Topology and logic are generally divided form the two types, namely:a. Broadcast TopologyIn simple terms can be described that is a host that sends data to all other hosts on the network media.b. Token Passing TopologiesSet the data transmission to the host through the media by using the token that regularly rotates in a whole host. Hosts can only transmit data only if that host has a token. By token of this, collision can be prevented.
Factors - factors that need consideration for the selection of topology is as follows:· Course feeWhat is the most efficient system is needed within the organization.· SpeedTo what extent has the needed speed in the system.· EnvironmentSuch as electricity or factors - other environmental factors, influencing the type of hardware used.· SizeUp to how big the size of the network. Does the network need the file server or a number of specialized servers.· ConnectivityDoes the other user who uses a laptop computer to access the network from various locations.