Tuesday 17 July 2012

HARI KEMERDEKAAN


Hari Kebangsaan Malaysia


Yang Di-Pertuan Agong Tuanku Abdul Rahman ibni Almarhum Tuanku Muhammad dibawa menyaksikan perbarisan ketika Hari Kebangsaan Tanah Melayu

Akta Kemerdekaan Persekutuan Tanah Melayu 1957 (c. 60)

Hari Kebangsaan Malaysia disambut di seluruh negara pada setiap 31 Ogos setiap tahun bagi menandakan negara bebas daripada belenggu penjajahan sejak 1511. Hari kebangsaan merupakan peristiwa utama dan disambut secara besar-besaran dengan mengadakan perarakan warna warni, konsert, pertunjukan pentas, pertandingan dan pelbagai lagi pertunjukan yang diadakan di tempat-tempat yang ditetapkan setiap tahun. Pada 31 Ogos, 2007, Malaysia telah menyambut ulangtahun hari kemerdekaan yang ke-50.

Kemeriahan Hari Kebangsaan dapat dirasakan bermula menjelangnya pukul 12.00 malam di mana bunga api yang berwarna-warni bergemerlapan di udara. Begitu juga acara perbarisan yang diwakili oleh pelbagai agensi turut diadakan bagi memeriahkan lagi suasana hari tersebut. Hari kebangsaan disambut paling meriah di Kuala Lumpur terutama di Dataran Merdeka.

Sambutan hari kebangsaan secara besar-besaran juga dibuat di Putrajaya. Bangunan- bangunan perniagaan, rumah kediaman dan kereta-kereta akan memasang dan mengibarkan bendera Malaysia, Jalur Gemilang, dan ini menyemarakkan lagi suasana perayaan. Hari kebangsaan merupakan hari cuti am di Malaysia.


TahunTema
1970Muhibah dan    Perpaduan
1971Masyarakat     Progresif
1972Masyarakat Adil
1973Masyarakat Kebudayaan Malaysia
1974Sains dan Teknologi Alat Perpaduan
1975Masyarakat Berdikari
1976Ketahanan Rakyat
197720 Tahun Bersatu Maju
1978Kebudayaan Seni Perpaduan
1979Bersatu Berdisiplin
1980Berdisiplin Berbakti
1981Berdisiplin Berharmoni
1982Berdisiplin Giat Maju
1983Bersama ke Arah Kemajuan
1984Amanah Asas Kejayaan
1985Nasionalisme Teras Perpaduan
1986Bangsa Tegas Negara Teguh
1987Setia Bersatu Berusaha Maju
1988-1989Bersatu
1990Berjaya
1991Wawasan 2020
1992Wawasan Asas Kejayaan
1993Bersatu Menuju Wawasan
1994Nilai Murni Jayakan Wawasan
1995Jatidiri Penggerak Wawasan
1996Budaya Penentu Kecapaian
1997Akhlak Mulia Masyarakat Berjaya
1998Negara Kita Tanggungjawab Kita
1999Bersatu Ke Alaf Baru
2000-2006Keranamu Malaysia
2007Malaysiaku Gemilang
2008Perpaduan Teras Kejayaan
20091Malaysia - Rakyat Didahulukan, Pencapaian Diutamakan
20101Malaysia Menjana Tranformasi
20111Malaysia. Transformasi Berjaya, Rakyat Sejahtera.
20121Malaysia. Janji Ditepati[1]
Berikut merupakan tema-tema Hari Kebangsaan dari tahun 1970 sehingga kini.

Tuesday 24 April 2012


Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common type of network devices used by the public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed modem. Happily this is much less complicated than it might sound to someone new to networking.
In a network, one computer is designated as the server, and the others, clients. The server is connected to an external hub, which the clients are also connected to. Now that the computers each have one foot in a common electronic door (the hub), they can use the hub to pass signals back and forth. To direct these signals, the hub contains a device known as a router. The router is the equivalent of an electronic traffic cop that handles data traffic between the computers.
Sounds good, but how does the router know one computer from another? The answer is that every computer in the network must have a network card installed. These network devices each contain a unique address. In a hard-wired network, special cabling called Ethernet runs from the network card to the hub. In a wireless network the nNetwork cards identify themselves on the network, sending all requests to the router with the unique return-address included. The router reads the “To” address and “From” address, and routes the traffic accordingly. In other types of networks all requests made on the localnetwork are broadcast by the router to all machines on the network, but only the machine with the matching address responds, however this isn’t as secure because other machines can trap traffic that is not addressed to them.
Online access is optional in a local area network, but if included, a single online account can be shared by all computers on the network. When online access is available, the router not only directs traffic on the local network, but also handles requests made to the Internet and subsequent replies. The router acts as a gateway to the Internet, and also serves as ahardware firewall to keep unsolicited traffic from flowing back into the network from the wild.
One can add online access to a LAN by either attaching a router/hub to a high-speed modem, or by acquiring a high-speed modem that has a router/hub built-in. The high-speed modem must be compatible with the online service. Most modems are designed specifically for use with DSL, cable or fiber optics, though some models might be made to work with more than one technology, such as being DSL and cable compatible.
When setting up a LAN all network devices must be compatible. If building a hard-wired LAN using Ethernet cabling, the network cards will be designed with an Ethernet port. If building awireless LAN, all network devices must not only be designed for wireless use, but must speak the same wireless language or protocol. As of spring 2009 the fastest and most current protocol available is 802.11n, while the older protocol still in widespread use is 802.11g. The router/modem and network cards must all be compatible with the same protocol to communicate with one another.
Wireless network devices can also carry Wi-Fi® certification, guaranteed to be fully compliant with the standards or protocol(s) that the product supports. Wi-Fi certification comes from the Wi-Fi Alliance, the organization responsible for developing wireless protocols. Many wireless network devices are marketed as being compatible with one or more protocols, but lack certification. The guarantee might be an important consideration when setting up a business LAN, but probably isn’t a concern for home LANs.etwork cards and router/hub communicate using radio waves.

Sunday 22 April 2012


What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.

 MainTypes of Physical Topologies

The following sections discuss the physical topologies used in networks and other related topics.

 BusLinear

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Fig. 1. Linear Bus topology

Advantages Linear Bus Topology

  • Easy to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

  • Entire network shuts down if there is a break in the main cable.
  • Terminators are required at both ends of the backbone cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

Star

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Fig. 2. Star topology

Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the hubs, etc.

Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.
Fig. 3. Tree topology

Advantages of a Tree Topology

  • Point-to-point wiring for individual segments.
  • Supported by several hardware and software venders 

    Disadvantages of a Tree Topology

  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks, the entire segment goes down.
  • More difficult to configure and wire than other topologies.

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.
NOTE: This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule.The speed of networking switches is vastly improved over older technologies, and while every effort should be made to limit network segment traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no impact to the network.

Considerations When Choosing a Topology

  • Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators.
  • Length of cable needed. The linear bus network uses shorter lengths of cable.
  • Future growth. With a star topology, expanding a network is easily done by adding another concentrator.
  • Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies.

Summary Chart

Physical Topology Common Cable   Common Protocol
Linear Bus Twisted Pair
Coaxial
Fiber
Ethernet
Star Twisted Pair        
Fiber
Ethernet
Tree Twisted Pair
Coaxial
Fiber
Ethernet

Sunday 18 March 2012

motherboard

storage

In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor. There are two general usages.
1) Storage is frequently used to mean the devices and data connected to the computer through input/output operations - that is, hard disk and tape systems and other forms of storage that don't include computer memory and other in-computer storage. For the enterprise, the options for this kind of storage are of much greater variety and expense than that related to memory. This meaning is probably more common in the IT industry than meaning 2.
2) In a more formal usage, storage has been divided into: (1) primary storage, which holds data in memory (sometimes called random access memory or RAM


) and other "built-in" devices such as the processor's L1 cache, and (2) secondary storage, which holds data on hard disks, tapes, and other devices requiring input/output operations.
Primary storage is much faster to access than secondary storage because of the proximity of the storage to the processor or because of the nature of the storage devices. On the other hand, secondary storage can hold much more data than primary storage.
In addition to RAM, primary storage includes read-only memory (ROM) and L1 and L2 cachememory. In addition to hard disks, secondary storage includes a range of device types and technologies, including diskettes, Zip drives, redundant array of independent disks (RAID) systems, and holographic storage. Devices that hold storage are collectively known asstorage media.
A somewhat antiquated term for primary storage is main storage and a somewhat antiquated term for secondary storage is auxiliary storage. Note that, to add to the confusion, there is an additional meaning for primary storage that distinguishes actively used storage from backup storage.

output divice

Output devices are things we use to get information OUT of a computer.
Here are some examples of output devices.
Monitor - A monitor is the screen on which words, numbers, and graphics can be seem.  The monitor is the most common output device.
Compact Disk - Some compact disks can be used to put information on.  This is called burning information to a CD.
NOTE:  A CD can also be an input device.
Printer - A printer prints whatever is on the monitor onto paper.  Printers can print words, numbers, or pictures.
Speaker - A speaker gives you sound output from your computer.  Some speakers are built into the computer and some are separate.
Disk Drives - A disk drive is used to record information from the computer onto a floppy disk or CD.
Floppy Disk - A floppy disk is used to record information on.  The information is stored on the floppy disk and can be used later or used on another computer.
Headphones - Headphones give sound output from the computer.  They are similar to speakers, except they are worn on the ears so only one person can hear the output at a time.

input device

Input devices are things we use to put information INTO a computer.
Here are some examples of input devices.
Note:  An APPLICATION is a type of computer program.
Some applications are word processing, spreadsheets, databases, and games.



Camera - most cameras like this are used during live conversations.  The camera transmits a picture from one computer to another, or can be used to record a short video.
Compact Disc (CD) - CDs store information.  The CD can then be put into another computer, and the information can be opened and added or used on the second computer.
Note:  A CD-R or CD-RW can also be used as an OUTPUT device.

Keyboard - The keyboard is a way to input letters or numbers into different applications or programs.  A keyboard also has special keys that help operate the computer.
Mouse - The mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications.
Digital Camera - A digital camera can be used to take pictures.  It can be hooked up to a computer to transfer the pictures from the camera to the computer.  Some digital cameras hold a floppy disk, and the floppy disk can be taken out of the camera and put directly into the computer.
Drawing Tablet - A drawing tablet is similar to a white board, except you use a special pen to write on it and it's connected to the computer.  Then the word or image you draw can be saved on the computer.
Microphone - A microphone is used to record sound.  The sound is then saved as a sound file on the computer.
Scanner - A scanner is used to copy pictures or other things and save them as files on the computer. 
Disk Drive - A disk drive can hold a CD or a floppy disk.  It reads the information on the disk so that the computer can use it.
Joystick - A joystick is used to move the cursor from place to place, and to click on various items in programs.  A joystick is used mostly for computer games.
Touch Screen - A touch screen is a computer screen or other screen that you can touch with your finger to enter information.  Examples of touch screens include a smart board, a microwave, a dishwasher, or an ATM at a bank.
Bar Code Scanner - A bar code scanner scans a little label that has a bar code on it.  The information is then saved on the computer.  Bar code scanners are used in libraries a lot.