Planning and Cabling Network

Leave a comment

Device Selection Factor

Deciding What Switch to use (read: to Buy :p )

Selecting a Router

We need to match the characteristics of the router to its purpose. Similar to the switch, cost and interface types and speeds must be considered as well. Additional factors for choosing a router include:

  • Expandability: bisa di tambah2in ga ?? sama kek motor…bisa di kasi aksesoris lagi ga…nambah port ?? nambah modul ???
  • Media: mo pake Ethernet ?? serial?? Coaxial ??? ato kedua2nya…??
  • Operating System Features: Depending on the version of the operating system, the router can support certain features and services such as:
    • Security
    • Quality of Service (QoS)
    • Voice over IP (VoIP)
    • Routing multiple Layer 3 protocols
    • Special services such as Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP)

Juniper Router J2350

For the selection of devices, the budget is an important consideration. Routers can be expensive based on interfaces and features needed. Additional modules, such as fiber-optics, can increase the costs. The media used to connect to the router should be supported without needing to purchase additional modules

LAN Cabling

When planning the installation of LAN cabling, there are four physical areas to consider:

  • Work area
  • Telecommunications room, also known as the distribution facility
  • Backbone cabling, also known as vertical cabling
  • Distribution cabling, also known as horizontal cabling
    • Total length : contoh > FastEthernet hanya bisa 100m SEBELUM sinyal elektromagnetiknya mulai melemah

Each media type has its advantages and disadvantages. Some of the factors to consider are:

  • Cable length – Does the cable need to span across a room or from building to building?
  • Cost – Does the budget allow for using a more expensive media type? (use Fiber Optic maybe ?? wkwkwk)
  • Bandwidth – Does the technology used with the media provide adequate bandwidth?
  • Ease of installation – Does the implementation team have the ability to install the cable or is a vendor required? (use Wireless ???)
  • Susceptible to EMI/RFI – Is the local environment going to interfere with the signal?

Typically, when connecting different types of devices, use a straight-through cable. And when connecting the same type of device, use a crossover cable.

Straight-Through = buat Komputer “vs” Switch, Switch “vs” Router (dipakai buat yg berbeda jenis)

Cross-Over = Switch “vs” Switch, Router “vs” Router, Komputer “vs” Router (koq Komputer dengan Router ?? Router itu punya CPU sama kek Komputer…JADIIII anggep Router itu computer juga…dan memang computer kan bisa dijadiin Router juga kan ??)

Many devices allow the UTP Ethernet port to be set to MDI or MDIX. This can be done in one of three ways, depending on the features of the device:

  1. On some devices, ports may have a mechanism that electrically swaps the transmit and receive pairs. The port can be changed from MDI to MDIX by engaging the mechanism.
  2. As part of the configuration, some devices allow for selecting whether a port functions as MDI or as MDIX.
  3. Many newer devices have an automatic crossover feature.

This feature allows the device to detect the required cable type and configures the interfaces accordingly. On some devices, this auto-detection is performed by default. Other devices require an interface configuration command for enabling MDIX auto-detection. (jadi fitur MDI/MDIX itu kek lo masukin kabel straight dari switch ke switch….otomatis switch jadiin cross over,klo ga sala Router ga ada Fitur MDI/MDIX secara default de, switch ada, jadi mesti di konfig sendiri)

*RJ-11 = kabel telepon

Winchester konektor yang diatas biasanya terdapat di ISP untuk CSU/DSU

CSU/DSU (Channel Service Unit/Data Service Unit) = Hardware device yang meng konversi frame data digital dari LAN ke WAN atau sebaliknya

DSL Router..biasanya si buat ADSL (Asymmetric Digital Subscriber Line), tapi gambar yg diatas adalah versi Cisco….MAHAL PASTINYA…mending yang diabang2 elektronik…beli modem bang !! hahaha

The following terms describe the types of devices that maintain the link between a sending and a receiving device:

  • Data Communications Equipment (DCE) – A device that supplies the clocking services to another device. Typically, this device is at the WAN access provider end of the link.
  • Data Terminal Equipment (DTE) – A device that receives clocking services from another device and adjusts accordingly. Typically, this device is at the WAN customer or user end of the link.

If a serial connection is made directly to a service provider or to a device that provides signal clocking such as a channel service unit/data service unit (CSU/DSU), the router is considered to be data terminal equipment (DTE) and will use a DTE serial cable. (pokoknya yang buat clock rate adalah DCE)

DCEs and DTEs are used in WAN connections. The communication via a WAN connection is maintained by providing a clock rate that is acceptable to both the sending and the receiving device. In most cases, the telco or ISP provides the clocking service that synchronizes the transmitted signal.

For example, if a device connected via a WAN link is sending its signal at 1.544 Mbps, each receiving device must use a clock, sending out a sample signal every 1/1,544,000th of a second. The timing in this case is extremely short. The devices must be able to synchronize to the signal that is sent and received very quickly.

By assigning a clock rate to the router, the timing is set. This allows a router to adjust the speed of its communication operations, thereby synchronizing with the devices connected to it.

*nanti ada kasus tentang interface serial…”shut”..”no shut”…”protocol down”…”administratively down”…bla bla bla…nih link buat liat kasus serial kabel

Switch (yang manageable…bisa dipasangin IP…ya itu gunanya..untuk bisa di telnet trus di manage/konfig)

There are many reasons to divide a network into subnets:

  • Manage Broadcast Traffic – Broadcasts can be controlled because one large broadcast domain is divided into a number of smaller domains. Not every host in the system receives every broadcast.
  • Different Network Requirements – If different groups of users require specific network or computing facilities, it is easier to manage these requirements if those users who share requirements are all together on one subnet.
  • Security – Different levels of network security can be implemented based on network addresses. This enables the management of access to different network and data services.

Yang terhubung ke 1 switch…BIASANYA dijadikan satu subnet

Yang point-to-point kek interface port router ke interface port router yang lain…jadiin 1 subnet (contoh /30…/30 berarti ada 2 host aja…. dan

Calculating Address

Without VLSM


How to configure Router/Switch (Under Windows XP)

we will usually use HyperTerminal because most varieties of Windows have it. This program can be found under All Programs > Accessories > Communications. Select HyperTerminal.

Open HyperTerminal, confirm the chosen serial port number, and then configure the port with these settings:

  • Bits per second: 9600 bps
  • Data bits: 8
  • Parity: None
  • Stop bits: 1
  • Flow control: None

How to configure Router/Switch (Under Windows Vista, 7, Linux)

use Putty / SecureCRT…

  • bisa telnet
  • atau Serial (liat dulu di serial / COM port berapa kepasang di komputer….cara liatnya klik kanan my computer –> properties –> device manager

Ethernet (802.3)


Important Note: Ethernet dalam istilah Computer Network (IEEE 802.3) adalah teknologi layer 2 (data link) untuk menghantarkan data dalam suatu Local Area Network (LAN) dengan membaca MAC Address (dalam bentuk frame), jadi bukan sebuah mesin, alat, atau kabel yang seperti kebanyakan orang bilang

Ethernet itu adalah sebuah protocol

Ethernet Frame Field (di dalam data Ethernet yang dikirim Switch…ada apa aja sih??)

warning: most of this article words are in english…wkwkwk

The Preamble (7 bytes) and Start Frame Delimiter (SFD) (1 byte) fields digunakan untuk sending dan receiving. 8 byte pertama dari frame Ethernet digunakan untuk memberitahu lawan “bicara” bahwa mereka siap untuk menerima atau mengirim frame.

The Destination MAC Address field (6 bytes) is the identifier for the intended recipient. Seperti yang kita tahu bahwa alamat ini digunakan layer 2 (data link) untuk membantu devices menentukan apakah sebuah frame yang ditujukan kepada mereka. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame.

Length field (or Type Field) defines the exact length of the frame’s data field. This is used later as part of the FCS to ensure that the message was received properly. If the purpose of the field is to designate a type as in Ethernet II, the Type field describes which protocol is implemented. (apakah Ethernet II ini lebih baik daripada Ethernet biasa ataukah Ethernet II ini maksudnya adalah FastEthernet yang digunakan sekarang ini, gw kurang tau…feel free to provide me with the Information)

The Data and Pad field (46 – 1500 bytes) contains the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. All frames must be at least 64 bytes long. If a small packet is encapsulated, the Pad is used to increase the size of the frame to this minimum size.

The Frame Check Sequence (FCS) field (4 bytes) is used to detect errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame.

*gw ga ajarin CRC, out of field gw…liat aja di Wikipedia

Initially, Ethernet was implemented as part of a bus topology. Every network device was connected to the same, shared media. In low traffic or small networks, this was an acceptable deployment. The main problem to solve was how to identify each device. The signal could be sent to every device, but how would each device identify if it were the intended receiver of the message?

using MAC Address Structure

MAC Address = 48 bit size

The MAC address value is a direct result of IEEE-enforced rules for vendors to ensure globally unique addresses for each Ethernet device (kita bisa bilang…ini nomor/alamat Mesin). The rules established by IEEE require any vendor that sells Ethernet devices to register with IEEE. The IEEE assigns the vendor a 3-byte code, called the Organizationally Unique Identifier (OUI) (ada 1 pertanyaan CCNA Exam tentang ginian loh…wkwkw kampret kan..ginian jg ditanyain).

IEEE requires a vendor to follow two simple rules:

  • All MAC addresses assigned to a NIC or other Ethernet device must use that vendor’s assigned OUI as the first 3 bytes.
  • All MAC addresses with the same OUI must be assigned a unique value (vendor code or serial number) in the last 3 bytes.

The MAC address is often referred to as a burned-in address (BIA) because it is burned into ROM (Read-Only Memory) on the NIC. This means that the address is encoded into the ROM chip permanently – it cannot be changed by software. (makanya kadang disebut Physical Address)

However, when the computer starts up, the NIC copies the address into RAM. When examining frames, it is the address in RAM that is used as the source address to compare with the destination address. The MAC address is used by the NIC to determine if a message should be passed to the upper layers for processing. (makanya ada software2/hardware2 buat duplikat MAC address…contohnya aja TP-LINK…ada tuh buat duplicate mac address…biasanya buat Internetan pake Cable modem kek FastNet)

Figure 1 Taken from

The source device sends the data through the network. Each NIC in the network views the information to see if the MAC address matches its physical address. If there is no match, the device discards the frame. When the frame reaches the destination where the MAC of the NIC matches the destination MAC of the frame, the NIC passes the frame up the OSI layers, where the decapsulation process take place.

All devices connected to an Ethernet LAN have MAC-addressed interfaces. Different hardware and software manufacturers might represent the MAC address in different hexadecimal formats. The address formats might be similar to 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800 (klo lo liat2 sama…Cuma beda penempatan titk, dash, sama titik dua aja). MAC addresses are assigned to workstations, servers, printers, switches, and routers any device that must originate and/or receive data on the network.

Hexadecimal Numbering on Ethernet

View MAC Address

Ketik di command prompt > ipconfig /all

Sekarang….coba search…di , MAC address lo siapa yang bikin (LAN Card/ NIC lo manufakturnya siapa?? Dari ketik ipconfig /all, alamat MAC uda diketahui kan ?? nah…3 HURUF pertama adalah kode dari vendor / manufaktur LAN Card / NIC lo)

Oh iya…sebelum lupa….

Ketika host send frame…untuk bisa sampai ke tujuan, tergantung tipe koneksinya (Unicast, Broadcast, Multicast)

  1. Klo UNICAST= switch/router akan baca DESTINATION MAC & IP Address
  2. Klo Multicast = switch/router akan baca DESTINATION MAC Address & IP Multicast (
  3. Klo Broadcast = switch/router akan baca BROADCAST MAC & IP Address (FF-FF-FF-FF-FF-FF (dan ga ada IP sama sekali) & 192.168.1. [255] ) – 255: broadcast (kalau subnet mask/prefix nya adalah /24, klo /23, /25, itu itung lagi..bisa dengan VLSM)

Media Access Control in Ethernet (CSMA/CD) – The Process

Collision Domain

Karena metode CSMA/CD sewaktu2 bisa saja terjadi collision, maka kita perlu tahu…daerah mana yang sering terjadi collision

Hub (Multi Port Repeater) = yaitu alat untuk menghubungkan device satu dengan yang lain, 1 Hub = 1 Collision Domain (dikarenakan Hub adalah network devices tipe lama), kalau ga ngerti…penjelasannya ada di bawah ini (Switch)

Switch = fungsi sama dengan Hub, hanya saja karena Switch adalah teknologi baru, dia bisa menghubungkan device yang 1 dengan yang lain dengan resiko ZERO collision, kenapa ?? karena tiap port dalam switch adalah 1 collision domain tersendiri, koq bisa tiap 1 port adalah 1 domain collision sedangkan Hub adalah 1 collision domain tanpa perduli jumlah portnya ??? karena switch bisa menggunakan teknologi multiplexing (memecah data dan mentransfernya tanpa harus tabrakan dengan packet lain), kelemahan dari multiplexing adalah, lebih lambat transfer datanya (kan dipecah2 dulu / segmentasi)

The electrical signal that is transmitted takes a certain amount of time (latency) to propagate (travel) down the cable

Ethernet with throughput speeds of 10 Mbps and slower are asynchronous. An asynchronous communication in this context means that each receiving device will use the 8 bytes of timing information to synchronize the receive circuit to the incoming data and then discard the 8 bytes.

Ethernet implementations with throughput of 100 Mbps and higher are synchronous. Synchronous communication in this context means that the timing information is not required. However, for compatibility reasons, the Preamble and Start Frame Delimiter (SFD) fields are still present.

Type of Ethernet (lebih lengkap)

ARP Process – Mapping IP to MAC Address

ARP means Address Resolution Protocol (Mapping IP to MAC Address), ARP inilah yg dipakai ketika suatu host ingin menemukan host lainnya untuk mengirim datanya

ARP-How it works:

NO ARP Entry at First

Broadcast ARP Frame

Unicast Frame from (owner of destination frame)

Adding MAC Address of Destination Host to its ARP Cache


Standar ARP “ping” (di windows sih) itu dalah 2 menit, jika “tetangga” menjawab, akan ditambah jadi 10 menit, untuk bisa ping2an lagi

As a broadcast frame, an ARP request is received and processed by every device on the local network. On a typical business network, these broadcasts would probably have minimal impact on network performance. However, if a large number of devices were to be powered up and all start accessing network services at the same time, there could be some reduction in performance for a short period of time. For example, if all students in a lab logged into classroom computers and attempted to access the Internet at the same time, there could be delays. (Overhead on the Media)

In some cases, the use of ARP can lead to a potential security risk. ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP requests. An attacker forges the MAC address of a device and then frames can be sent to the wrong destination. (Security)

Manually configuring static ARP associations is one way to prevent ARP spoofing. Authorized MAC addresses can be configured on some network devices to restrict network access to only those devices listed.

*untuk Spoofing dan ARP Poisoning nanti akan kita pelajari

Older Entries