Max Beff's Homepage

PENDIDIKAN




COMPUTER ARCHITECHTURE
DATA COMM
PC NETWORKING



COMPUTER ARCHITECTURE


a) What are  microprocessor?

A microprocessor or processing unit (CPU) is an integrated circuit 
built on a tiny piece of silicon. In order to function as a computer, 
the processor requires a power supply, a clock and memory.  It 
contains thousands, or even millions, of transistors, which are 
interconnected via superfine traces of aluminum. The transistors 
work together to store and manipulate data so that the 
microprocessor can perform a wide variety of useful functions. 		
   The particular functions a microprocessor performs are dictated 
by software. The microprocessor is comprised of a single integrated 
circuit, which is a matrix of transistors and other electrical circuit. 
These are design like a “legs”  to fastern the chip to the fiberglass 
circuit board which sits inside the computer and to carry electrical 
impulses into and out of the chip . 					
   The type of CPU determine its processing power,how fast it can 
execute various instructions. Most of the processor and CPU today 
can executes millions of instruction per second. It also determines 
the precise repertoire of instruction the computer understand and 
therefore which it can run. The speed of microprocessor depend on 
it value. For example a 32 bit microprocessor that run at 50 MHz is 
more power than 16 bit microprocessor that run at 25 MHz.

b) Why do we need them?

ENIAC was the first computer invented in 1946 and weighed 30 tons. 
Its used around 160 kW power to start the computer.  One of the 
reason why we need microprocessor is to reduce the size of computer,
inexpensive and easily replaceable design component.  The most 
important reason is to reduce power supply implemented.
The first microprocessor Intel 4004 is develop only take 5 volt. 
One of the most common tasks microprocessors perform is to serve as
the "brains" inside personal computers, but they deliver 
"intelligence" to countless other devices as well. 

c) When did they come about?

In the late 1960s, many scientist had discussed the possibility 
of the computer on a chip, but nearly everyone felt that 
integreted circuit technology was not yet ready to support such 
a chip . Intel’s Ted Hoff felt differently; he was the first 
person to recognize that the new silicon –gated MOS technology 
might make a single chip CPU possible .
Hoff and the intel team developed such an architecture with 
just over 2,300 transistors in an area of only 3 by 4 milimetres. 
With its 4 bit CPU , command register , decoder , decoding 
control , control monitoring of machine commands and interim 
register , it can performed about 60,000 calculations in a second.
 Intels introduced the worlds first commercial microprocessor the 
4004 , in November 1971 . The Pioneer 10 spacecraft  used the 4004
 microprocessor , it was launched on March 2, 1972 and was the 
first spacecraft and microprocessor to enter the Asteroid Belt.

d) Who invented and manufactured them?

The microprocessor was invented by Ted Hoff at Intel. The 4-bit 
4004 processor, released in November 1971 was revolutionary 
because for the first time most of the logic elements used in 
a computer we placed on a single chip. In addition, it was 
programmable. The 8086, the progenitor of the x86 architecture, 
was released in June, 1978. It was a 16 bit microprocessor 
with 29,000 transistors, it has gone through several iterations 
in the 80286, 80386, 80486 to the present day flagship processor, 
the Pentium. The 60 MHz Pentium delivers roughly 380 times the 
performance of a 4.77MHz 8086 with only 100 times transistor 
count, a four-fold improvement in the process technology. 

e) How it works?

The Bus Unit is the place where instructions flow in and out 
of the microprocessor from the computer's main memory. Here 
on this tiny silicon chip are millions of switches and pathways 
that help your computer make important decisions and perform 
helpful tasks. To help you understand how the microprocessor 
does its job, you will go step by step through a simple task 
on the chip. For the purpose of this demonstration, you will 
add two numbers together while watching the microprocessor 
do its magic. You will complete this task in four easy steps 
and you may review each step as many times as you want. 
Remember, each part of the processor has a special task.
For the basic Intel 386 microprecessor it comprised of six 
main components, namely prefect unit, paging unit, segment 
unit, decode unit, bus interface unit and execution unit. 
Each performing a saperate task. Prefect Unit  it accused 
up next software instruction for the CPU. When CPU finished 
its screen test,the prefect ask for the next instruction. 
The second and third components are called a paging and 
segments unit. They know the exact memory location of the 
next instruction and it is retreived by asking the bus 
interface unit to find it from rims. Let say ADD 2+2 
instruction, the bus interface unit passed the instruction 
to prefetch unit  than from prefetch unit route to decode 
unit which translate it into language of the processor can 
understand. Finally the instruction is transferred to the 
execution unit which carry up the results of the software 
commond . The results is then sent back to paging unit or 
segment unit and bus unit finally to it correct location 
in the PC memory.

f) How Chips Are Made

PreparationThe images below represent just some of the 
ingredients used to build microprocessors. Read the 
description of each image to learn more about important 
ingredients like silicon, which is fundamental to making 
microprocessors. 
 	Silicon Wafers cut from an ingot of pure silicon, 
are used by Intel to make microprocessors. Silicon, the 
primary ingredient of beach sand, is a semiconductor of 
electricity. Semiconductors are materials that can be 
altered to be either a conductor or an insulator. 
 	Chemicals and gases are used throughout the 
chip-making process. Some, like hexamethyldisilazane, 
are complex and difficult to pronounce. Others, such 
as boron, are simple elements found in the Periodic 
Table of the Elements. 
 	Metals, such as aluminum and copper, are used 
to conduct the electricity throughout the microprocessor. 
Gold is also used to connect the actual chip to its 
package. 
 	Ultraviolet (UV) Light has very short wavelengths 
and is just beyond the violet end of the visible spectrum. 
UV light is used to expose patterns on the layers of the 
microprocessor in a process much like photography. 
 	Masks used in the chip-making process are like 
stencils. When used with UV light, masks create the various 
circuit patterns on each layer of the microprocessor.

FabricationMicroprocessors are built in layers on a 
silicon wafer through various processes using chemicals, 
gases, and light. Although several microprocessors are 
built on a single wafer, our demonstration will build 
only a small piece of a microprocessor. Let's take a 
closer look... 	
On the wafer, the first layer of silicon dioxide is 
grown by exposing it to extreme heat and gas. This 
growth is similar to the way rust grows on metal 
when exposed to water. The silicon dioxide on the 
wafer, however, grows much faster and is too thin 
to be seen by the naked eye. The wafer is then coated 
with a substance called photoresist. Photoresist becomes 
soluble when exposed to ultraviolet light. 	

Layering

In a process called photolithography, ultraviolet light 
is then passed through a patterned mask, or stencil, 
onto the silicon wafer. The mask protects parts of the 
wafer from the light. The light turns the exposed areas 
into a gooey layer of photoresist. Each layer on the 
microprocessor uses a mask with a different pattern. 

Etching

The gooey photoresist is completely dissolved by a solvent. 
This reveals a pattern of photoresist made by the mask on 
the silicon dioxide. The revealed silicon dioxide is 
etched away with chemicals. 	
The rest of the photoresist is removed. This process 
leaves ridges of silicon dioxide on the silicon wafer base. 	
LayersTo begin another layer, a second, thinner layer of 
silicon dioxide is grown over the ridges and etched areas 
of the wafer base. Then, a layer of polysilicon and 
another layer of photoresist are applied. 	
 
Ultraviolet light is then passed through a second mask, 
exposing a new pattern on the photoresist. 	
 
The photoresist is dissolved with solvent to expose the 
polysilicon and silicon dioxide, which are then etched 
away with chemicals. 	
 	
The remaining photoresist is removed, leaving ridges of 
polysilicon and silicon dioxide. 	
Ion ImplantationThrough a process called ion implantation 
(also called doping), the exposed areas of the silicon 
wafer are bombarded with various chemical impurities 
called ions. Ions are implanted in the silicon wafer 
to alter the way silicon in these areas conducts 
electricity. 	
Layers upon LayersThe layering and masking processes 
are repeated, creating windows that allow for connections 
to be made between the layers. 	
 
Atoms of metal are deposited on the wafer, filling the windows. 
Another masking and etching stage leaves strips of the metal 
that make the electrical connections. 	
 
Roughly 20 layers are connected to form the microprocessor's 
circuitry in a 3-dimensional structure. The exact number of 
layers on a wafer depends on the design of the microprocessor. 	
Multiple ProcessorsSo far, we've built only a tiny portion 
of a microprocessor. In reality, making microprocessors is 
much more complex, demanding more than 250 steps. Consequently, 
hundreds of identical microprocessors are created in batches 
on a single wafer. 	
 

g) Comparison between market leader

Pentium-4 was released for production on Nov 20, 2000. The 
Pentium-4 is fabricated in Intel's 0.18 micron CMOS process. 
Its die size is 217 mm2, power consumption is 50W. The 
Pentium 4 is available in 1.4GHz and 1.5Hz bins. At 1.5GHz 
the microprocessor delivers 535 SPECint2000 and 558 SPECfp2000 
of performance. Pentium-4 is the first completely new x86-processor 
design from Intel since the Pentium PRO processor, with its P6 
micro-architecture, was introduced in 1995. Pentium-4' 
micro-architecture is known as NetBurst. 
It has many interesting features.- Compared to the Intel 
Pentium-III processor, Intel's NetBurst micro-architecture 
doubles the pipeline depth to 20 stages. In addition to the 
L1 8 KB data cache, the Pentium 4 processor includes an 
Execution Trace Cache that stores up to 12 K decoded 
micro-ops in the order of program execution. The on-die 
256KB L2-cache is non-blocking, 8-way set associative. It 
employs 256-bit interface that delivers data transfer rate 
of 48 GB/s at 1.5 GHz. 
The Pentium 4 processor expands the floating-point registers 
to a full 128-bit and adds an additional register for data 
movement. Pentium-4' NetBurst micro-architecture introduces 
Internet Streaming SIMD Extensions 2 (SSE2). This extends 
the SIMD capabilities that MMX technology and SSE 
technology delivered by adding 144 new instructions. 
These instructions include 128-bit SIMD integer arithmetic 
and 128-bit SIMD double-precision floating-point 
operations. Pentium 4 processor's 400 MHz (100 MHz "quadpumped") 
system bus provides up to 3.2 GB/s of bandwidth. The bus 
is fed by dual PC800 Rambus channel. 
This compares to 1.06 GB/s delivered on the Pentium-III 
processor's 133-MHz system bus. Two Arithmetic Logic Units 
(ALUs) on the Pentium 4 processor are clocked at twice 
the core processor frequency. This allows basic integer 
instructions such as Add, Subtract, Logical AND, Logical 
OR, etc. to execute in a half clock cycle. The integer 
register file runs also runs at the double frequency.

Reference:
·	www.chip.com.my
·	Tabak,D.,multiprocessor, Eaglewood Cliffs, NJ:Prentice Hall, 1990
·	http://ece.uprm.edu/~micro2/history/links.htm
·	http://www.intel.com.education/teachtech/learning/chips/
·	http://inventors.about.com/library/inventors/blmicroprocessor.htm
·	http://www.toplink/eletronicl/computer.html
·	J.R Gibson, Electronic Logic Circuits,Edward Arnold Ltd,London,1993

ATAS

DATA COMM

- Bluetooth Technology	

Bluetooth technology revolutionizes the personal connectivity
market by providing freedom from wired connections that 
enabling links between mobile computers, mobile phones, 
portable handheld devices, and connectivity to the Internet. 
Interface, synchronize, and  exchange. As a wireless, 
Bluetooth technology redefines the very way in experience 
connectivity. 

Bluetooth wireless technology is supported by product and 
application development in a wide range of market segments, 
including software developers, silicon vendors, peripheral 
and camera manufacturers, mobile PC manufacturers and 
handheld device developers, consumer electronics 
manufacturers, car manufacturers, and test and measurement 
equipment manufacturers.

Bluetooth wireless technology can works everywhere. Hardware 
that complies with the Bluetooth wireless specification ensures 
communication compatibility worldwide. As a low-cost, 
low-power solution with industry-wide support, Bluetooth 
wireless technology allows you to bring connectivity everywhere.

1.1 Bluetooth History

Bluetooth was invented in 1994 by L. M. Ericsson of Sweden. 
The standard is named after Harald Blaatand "Bluetooth" II, 
king of Denmark 940-981A.
The Bluetooth Special Interest Group (SIG)was founded by
Ericsson,IBM,Intel,Nokia and Toshiba in February 1998, to 
develop an open specification for short-range wireless 
connectivity . The group is now promoted by 3COM, Microsoft, 
Lucent and Motorola also . More than 1900 companies have 
joined the SIG.

2.0 What is Bluetooth

Bluetooth is the name given to a new technology standard using 
short-range radio links, intended to replace the cable(s) 
connecting portable and/or fixed electronic devices. The 
standard defines a uniform structure for a wide range of 
devices to communicate with each other, with minimal user 
effort. Its key features are robustness, low complexity, 
low power and low cost. The technology also offers wireless 
access to LANs, PSTN, the mobile phone network and the 
internet for a host of home appliances and portable handheld 
interfaces.
The standard is aimed at achieving global acceptance such 
that any Bluetooth device, anywhere in the world, can 
connect to other Bluetooth devices in its proximity, 
regardless of brand. Bluetooth enabled electronic devices 
connect and communicate wirelessly via short-range, ad hoc 
networks called piconets. Each unit can simultaneously 
communicate with up to seven other units per piconet. Moreover, 
each unit can simultaneously belong to several piconets. 
These piconets are established dynamically and automatically 
as Bluetooth devices enter and leave the radio proximity. 

2.1 Bluetooth Wireless Technology

Bluetooth wireless technology is a worldwide specification 
for a small-form factor, low-cost radio solution that provides 
links between mobile computers, mobile phones, other portable 
handheld devices, and connectivity to the Internet. The 
specification is developed, published and promoted by the 
Bluetooth Special Interest Group (SIG).

2.2 Bluetooth SIG

The Bluetooth Special Interest Group (SIG), a trade association 
comprised of leaders in the telecommunications, computing, 
and network industries, is driving development of the technology 
and bringing it to market. The Bluetooth SIG promoters 
include 3Com, Agere, Ericsson, IBM, Intel, Microsoft, 
Motorola, Nokia and Toshiba, and hundreds of Associate 
and Adopter member companies.

3.0 Bluetooth Wireless-capable Product

While the possibilities are nearly endless for the 
applications of the technology, some of the current 
capabilities include:
.   	Eliminating the need for wired connections between 
        electronic  products and accessories.
. 	Exchanging files, business cards, calendar 
         appointments, etc. with of Bluetooth users.
. 	Transfering and synchronizing files between devices.
. 	Connecting to localized content services in public 
        areas.
. 	Functioning as remote controls, keys, tickets and 
        e-cash wallets

4.0 Bluetooth wireless specification

The Bluetooth wireless specification defines a low-power, 
low-cost technology that provides a standardized platform 
for eliminating cables between mobile devices and 
facilitating connections between products.

Unlike many other wireless standards, the Bluetooth 
wireless specification includes both link layer and 
application layer definitions for product developers. 
Radios that comply with the Bluetooth wireless 
specification operate in the unlicensed, 2.4 GHz radio 
spectrum ensuring communication compatibility worldwide. 
These radios use a spread spectrum, frequency hopping, 
full-duplex signal at up to 1600 hops/sec. The signal 
hops among 79 frequencies at 1 MHz intervals to give 
a high degree of interference immunity.

While point-to-point connections are supported, the 
specification allows up to seven simultaneous connections 
to be established and maintained by a single radio.

The intergration of Bluetooth wireless technology brings 
new functionality to an entire range of familiar product 
while also setting the stage for entirely unique 
applications with Revolutionary Connectivity implications.
Devices enabled with Bluetooth wireless technology 
will be able to: 

 	.Free electronic accessories and peripherals from 
         wired connections.
 	.Exchange files, business cards, and calendar 
         appointments.
 	.Transfer and synchronize data wirelessly.
 	.Take advantage of localized content services in 
         public areas.
 	.Function as remote controls, keys, tickets and 
         e-cash wallets.

5.0 System Requirements

The Bluetooth system is now recognized more than just a 
cable replacement technology. Varous innovative usage 
models have openned up new areas where Bluetooth can 
be used. These also impose many requirements on the system, 
some of which are:
 
 	There should be a universal framework that 
offers means to access information across a diverse 
set of devices (for example, PDA's, laptops, PC's, 
mobile phones, home appliances etc.)in a seamless, 
user friendly and efficient manner. 

 	Available for collaboration between devices, 
in the proximity of one another, where every device 
provides its inherent function based on its form, 
user interface,cost and power.

 	The standard must enable the devices to establish 
ad hoc connections. Also, introduced is the the 
ünconscious connectivity" paradigm , where devices 
can connect to those in proximity almost without 
any user command or interaction. This shall allow 
utilization of various information recourses for the 
benefit of the user. 
	
 	Support for both data and voice is expected 
as these are two most important kinds of information 
being transmitted over networks today. (The requirements 
of video and streaming multimedia are also being 
imposed on the future versions of Bluetooth). 
 	The communications should offer similar 
protection as in cables. There should not be any 
compromises on security in switching over to wireless. 

6.0 System Architecture

The system architecture for Bluetooth has been 
segmented into various almost independent layers 
for conceptual ease of description. These layers are 
described in detail in the core Bluetooth specifications. 
The design specifications also describe certain 
properties for certain common classes of applications 
to be implemented over Bluetooth to achieve uniformity 
across diverse manufacturers. These are described in 
profiles of the Bluetooth Specification. 
The figure shows that the protocol stack consists of a 
radio layer at the bottom which forms the physical 
connection interface. The baseband and Link Manager 
Protocol(LMP) that reside over it are basically meant 
to establish and control links between Bluetooth devices. 

These three bottom layers are typically implemented in 
hardware/firmware. The Host Controller layer is required 
to interface the Bluetooth hardware to the upper 
protocol-L2CAP(Logical Link Control and Adaptation Protocol). 
The host controller is required only when the L2CAP 
resides in software in the host. If the L2CAP is also 
on the Bluetooth module, this layer may not be required 
as then the L2CAP can directly communicate with the 
LMP and baseband. Applications reside above L2CAP. 
The following subsections give a brief description 
of each layer. 

8.0 Baseband

The baseband is the layer that controls the radio. 
The frequency hopsequences are provided by this layer. 
Baseband also takes care of lower level encryption for 
secure links. The packet handling over the wireless 
link is the responsibility of Baseband. Two types of 
links can be established: 

 	SCO: Synchronous Connection Oriented. These 
             links are meant for synchronous data-typically voice. 
 	ACL: Asynchronous Connection less. These links may be 
             used for data transfer applications, which 
             do not require a synchronous link. 

The baseband provides the functionalities required for 
devices to synchronize their clocks and establish 
connections. Inquiry procedures for discovering the 
addresses of devices in proximity are also provided. 
Error correction for packets is provided depending on 
the type of packet. Various packet types are specified 
for some common applications, differing in their 
data capacity and error correction.

 9.0 Logical Link Control and Adaptation Protocol

This is the protocol with which most applications would 
interact unless a host controller is used. The basic 
functions of the L2CAP are: 


9.1 Multiplexing 

The protocol must allow multiple applications to use a 
link between two devices simultaneously. 

9.2 Segmentation and Reassembly 

The protocol must reduce the size of packets provided 
by applications to the size of packets accepted by 
Baseband. L2CAP itself accepts packet sizes upto 64kb 
but the baseband packets can accept a payload of at 
most 2745 bits. The reverse procedure, that of combining 
the segmented packets in the proper order, has to be 
carried out for received packets. 

9.3 Quality of Service 

L2CAP allows applications to demand QoS on certain 
parameters like peak bandwidth, latency and delay 
variation. L2CAP checks if the link is capable of 
providing it and provides it if possible. 
Basically, L2CAP provides the network layer functions 
to applications and higher protocols. 
Host Controller Interface
 
10.0 Conclusions

The above sections described some of the important 
considerations in the design of the Bluetooth standard. 
There are however a lot of other considerations such as 
the avoidance of collisions and satisfying the radio 
spectrum regulations. 

Today in human technology, all communication become 
wireless and someday we will cannot find any communication 
using cable and it will make a lot of modernization in 
data communication. 
  
 
11.0 References:

1.	Bluetooth Special Interest Group, "Specifications 
        of the Bluetooth System: Core", Version 1.0.B, July 
        1999. Bluetooth Special Interest Group, "Specifications 
        of the  Bluetooth System: Profiles", Version 1.0.B, 
        July 1999.
2.	Haartsen, Mahmoud Naghshineh, Jon Inouye, Olaf J. 
        JOeressen and Warren Allen, Bluetooth: Vision Goals 
        and Architechture , Mobile Computing and Communications 
        Review, Vol. 1, Number 2,(1997). 
3.	Jaap Haartsen, BLUETOOTH-The universal radio 
        interface for ad hoc, wireless connectivity,Ericsson 
        Review, Number 3, 1998, pp 110-117. 
4.	Kris Fleming, Uma Gadamsetty, Robert J Hunter, 
        Srikanth Kambhatla, Sridhar Rajagopal and Sundaram 
        Ramakesavan, Architectural Overview of Intel's 
        Bluetooth Software Stack, Intel Technology Journal, 
        Q2 2000. 
5.	Jaap Haartsen, The Bluetooth Radio System,IEEE 
        Personal Communications, February 2000. 
6.	http://www.bluetooth.com/dev/specifications.asp
7.	http://www.bluetooth.com/util/faq4.asp
8.	http://e-www.motorola.com/webapp/sps/site/homepage.jsp?      
        nodeId=03M0ymVXlR5
9.	http://www.nokia.com/bluetooth/whatis.html
10.	http://www.zdnet.co.uk/news/specials/1999/04/bluetooth/
 
Simple Questions With Answers 

Q1: What is Bluetooth technology?
Bluetooth wireless technology is a worldwide specification 
for a small-form factor, low-cost radio solution that 
provides links between mobile computers, mobile phones, 
other portable handheld devices, and connectivity to the 
Internet. The specification is developed, published and 
promoted by the Bluetooth Special Interest Group (SIG).

Q2: What is the Bluetooth SIG?
The Bluetooth Special Interest Group (SIG), a trade 
association comprised of leaders in the telecommunications, 
computing, and network industries, is driving development 
of the technology and bringing it to market. The 
Bluetooth SIG promoters include 3Com, Agere, Ericsson, 
IBM, Intel, Microsoft, Motorola, Nokia and Toshiba, 
and hundreds of Associate and Adopter member companies.

Q3: What are the differences between Wi-Fi (IEEE 802.11b) 
and the Bluetooth wireless technology?
The Bluetooth wireless technology and Wi-Fi are complementary 
technologies. The Bluetooth wireless technology is designed 
to replace cables between cell phones, laptops, and other 
computing and communication devices within a 10-meter 
range. Wi-Fi is wireless Ethernet; it provides an 
extension or replacement of wired networks for dozens 
of computing devices.

Q4. What forms the host and what is the host controller 
in a Bluetooth device?
The host is the device which wants to use Bluetooth for its
communication requirements. It could be a laptop, a headphone, 
a PDA or  any other device. The host controller is a 
special module on the Bluetooth hardware which  formats 
the data packets being communicated from the host to the 
Bluetooth module into a format suitable for the link 
between the host and the module.

Q5. How is the situaion handed if two devices launch an 
inquiry simultaneously?
When two devices start an inquiry simultaneously, then 
they cannot discover each other in that inquiry sequence. 
(They do not cause collissions for other devices as the 
inquiry hop sequence is different for the two devices). 
To prevent the devices never being able to discover 
each other, the specification requires that the interval 
between two inquiries be random. This ensures that the 
two devices which collided once will not collide again 
in the next inquiry. 


ATAS
 


PC NETWORKING


CCITT 

CCITT (Commite' Consultatif International de Telegraphique et Telephonique)   

CCITT adalah sebuah organisasi yang bekerjasama dengan organisai standard
dalam mewujudkan satu bahasa standard yang diguna dalam sistem komunikasi. 

Antara standard yang di hasilkan ialah V.XX  seperti V.21 dan V.24 juga
standard X.n seperti X.25 .


IEEE
IEEE (Institute of Electrical and Electronics Engineers, Inc.)

IEEE adalah Institut teknikal profesional yang terbesar di dunia. 
Ia membiayai persidangan teknikal , simposium dan mesyuarat di seluruh 
dunia . Mereka menerbitkan kertas kerja berkenaan elektrik, elektronik
dan kejuruteraan komputer dan juga sains komputer di seluruh dunia.

Antara bidang yang diterokai  termasuklah Aeroangkasa, komputer dan 
komunikasi, teknologi bioperubatan, kuasa elektrik dan elektronik pengguna . 


DoD

DoD (Department of Defence)

DoD adalah satu badan ketenteraan Amerika Syarikat yang bertanggungjawab
 dalam menguruskan banyak standard perisiaan kejuruteraan.








ANSI

ANSI (American National Standards Institute)

ANSI adalah sebuah pertubuhan kerajaan Amerika Syarikat yang 
bertanggungjawab untuk mengesahkan standard yang digunakan dalam 
berbagai bidang termasuk komputer dan komunikasi. 

Antara standard yang disahkan oleh ANSI adalah American Standard 
Code for Information Interchange (ASCII).



EIA

EIA (Electronic Industries Association)

EIA terdiri daripada organisasi individu  yang bersetuju dengan
standard-standard penghantaran data seperti EIA/TIA-232 
dahulu dikenali sebagai RS-232)

SPX/IPX

SPX/IPX (Sequenced Packet Exchange/ Internetwork Packet Exchange)

Is a networking protocol develop by Novell that interconnects 
networks that use Novells NetWare environments client and 
servers.IPX is a datagram or packet protocols and is connectionless 
(that is it doesn’t reqire that a connection be maintained during 
an exchanged of packets).IPX uses the 48 bit MAC address to 
uniquely identify the machine.The SPX handles the packet once it 
is on the wire and manages packet acknowledgement.Microsoft calls 
their version of  IPX/SPX “NWLink”.It is a very widely used today.





TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol)

Adalah bahasa komunikasi utama ataupun protokol kepada internet. 
Digunakan juga sebagai protokol komunikasi dalam rangkaian 
persendirian seperti intranet dan  extranet.

TCP/IP mempunyai 2 layer program. Layer pertama  Transmission 
Control Protocol (TCP),  menukarkan data atau fail kepada 
packets yang lebih kecil yang akan dihantar melalui internet 
dan kemudian diterima oleh TCP layer pada penerima yang akan 
menukar kembali packets tersebut kepada data atau fail asal. 

Layer kedua , Internet Protocol (IP), mengendali alamat pada 
setiap packet dan memandu packet kepada destinasi yang tepat. 
Setiap  pintu laluan komputer pada sistem rangkaian memeriksa 
alamat ini untuk memastikan alamat untuk setiap data dihantar.

Antara aplikasi yang menggunakan TCP/IP adalah TCP/IP adalah 
World Wide Web's Hypertext Transfer Protocol  (HTTP)  File 
Transfer Protocol (FTP), Telnet dan Simple Mail Transfer 
Protocol (SMTP). 
 

SMB

SMB (Server Message Block)

Satu protokol yang menyediakan satu kaedah untuk permohonan 
pelanggan(client) didalam komputer dimana pelanggan(client) 
boleh membaca, menulis kedalam fail dan juga memohon perkhidmatan 
daripada program server didalam rangkaian komputer.

Boleh access ke dalam fail melalui pembekal kawalan seperti 
sumber-sumber yang lain termasuk mesin pencetak dan “mail slots”.
Dari sini pelanggan akan dapat membuat, mencipta dan 
mengemaskini fail .


Boleh berkomunikasi dengan sebarang program server yang 
telah diprogramkan untuk menerima permohonan pelanggan SMB.



NetBIOS
NetBIOS (Network Basic Input/Output System)

NetBIOS adalah program yang membenarkan aplikasi-aplikasi pada 
komputer yang berlainan untuk berkomunikasi melalui Local Area 
Network LAN. Ia dicipta oleh syarikat IBM untuk rangkaian 
komputer generasi awal.

NetBIOS digunakan dalam rangkaian Ethernet, token ring dan 
Windows NT 
NetBIOS juga termasuk  session layer  dan  transport layer 
didalam (OSI) model. 

NetBIOS menyediakan  2 mod komunikasi
 Session
Dua komputer menghasilkan sambungan untuk “conversation” , 
membenarkan mesej yang besar dikendalikan. Mempunyai  
“error detection” dan “recovery”.

 Datagram
Datagram adalah "connectionless" (mesej dihantar secara 
bersendirian), mesej adalah lebih kecil dan aplikasi 
bertanggungjawab untuk error detection dan recovery.

NetBEUI 

NetBEUI (NetBIOS Extended User Interface)

Satu versi yang dihasilkan oleh NetBIOS yang membenarkan 
komputer berkomunikasi diantara Local Area Network. Ia merupakan 
versi baru NetBIOS dan  pilihan terbaik untuk berkomunikasi 
diantara single LAN. 

Seperti NetBIOS, NetBEUI juga tidak menyokong untuk laluan 
mesej bagi rangkaian-rangkaian yang lain. Ia dibangunkan oleh 
IBM untuk LAN Manager dan telah diambil oleh Microsoft untuk 
Windows NT. Ia turut digunakan oleh Hewlett-Packard & DEC.

ATAS


What is Local Talk?

	All macintosh computers have had local talk hardware and 
software built into their system since1984. Local Talk is easy to 
set up and requires a minimal h/ware investrment for Macintoshes, 
but it has had little impact into the IBM world, making local 
talk cards expensive for computers.


Hardware

Connecting a macintosh to a local talk network are easy. All 
that’s is needed is an active network jack, a teleconnector, 
wire and resistor as well as documentation and other information.

Software

Just as local talk h/ware is built into Macintosh h/ware, the 
s/ware components are built into the  MacOS. The following 
s/ware is required for local talk network connectivity.

Network control panel :
	
.	MacTCP (needed for TCP/IP protocols)
.	Sharring set up
.	File Shariing Monitor (needed for file shatrring)
.	Users and groups (needed for several file sharring)

Network Extension :

.	Apple Share
.	Network Extension
.	Apple Built-In Ethernet (needed for Enthernet)
.	Ether Talk Phase 2 (needed for Ethernet)



Local Talk Daisy Chains

A simple Local Talk network can be one computer connected to 
a printer or two computers connected together. Local Talk 
connects computers in a “daisy chain”
, one network device is plugged into another, forming a 
long line of devices. The end of chains must be terminated 
and cannot be joint to make a circle.
 
FDDI 

FDDI (Fiber Distributed Data Interface) is a standard for data 
transmission on fiber optic lines in a local area network (LAN) 
that can extend in range up to 200 km (124 miles). The FDDI 
protocol is based on the token ring protocol. In addition to 
being large geographically, an FDDI local area network can 
support thousands of users. 

An FDDI network contains two token rings, one for possible 
backup in case the primary ring fails. The primary ring offers 
up to 100 Mbps capacity. If the secondary ring is not needed 
for backup, it can also carry data, extending capacity to 
200 Mbps. The single ring can extend the maximum distance; 
a dual ring can extend 100 km (62 miles). Today however,
comparable speeds are available using cooper cable . The 
cooper version of FDDI is known as CDDI 

FDDI is a product of American National Standards Committee 
X3-T9 and conforms to the Open Systems Interconnection (OSI) 
model of functional layering. It can be used to interconnect 
LANs using other protocols. FDDI-II is a version of FDDI 
that adds the capability to add circuit-switched service 
to the network so that voice signals can also be handled. 
Work is underway to connect FDDI networks to the developing 
Synchronous Optical Network (SONET).

In FDDI , access is limited by time . A station may send a 
many frames as it can within its allocated access period , 
with the provision that real- time data will sent first . 
To implement this access mechanism , FDDI differentiates
between two types of  data frames : synchronous and 
asynchronous . Synchronous here refers to information that 
is real-time , while asynchronous refers to information 
that is not . This frames usually called S-frames and A-frames .

FDDI defines three times register to control circulation . 
The three registers is called synchronous allocation(SA) . 
target token rotation time (TTRT) and absolut maximum time (AMT).
 

Terangkan secara ringkas tentang wireless LAN.

.	Advantage
.	Disadvantage

A wireless LAN is one in which a mobile user can connect to a 
local area network (LAN) through a wireless (radio) connection. 
A standard, IEEE 802.11, specifies the technologies for wireless 
LANs. The standard includes an encryption method, the Wired 
Equivalent Privacy algorithm. 

High-bandwidth allocation for wireless will make possible a 
relatively low-cost wiring of classrooms in the United States. 
A similar frequency allocation has been made in Europe. 
Hospitals and businesses are also expected to install wireless 
LAN systems where existing LANs are not already in place. 

Using technology from the Symbionics Networks, Ltd., a wireless 
LAN adapter can be made to fit on a Personal Computer Memory Card 
Industry Association (PCMCIA) card for a laptop or notebook computer.


Introduction

A wireless local area network (LAN) is a flexible data 
communications system implemented as an extension to, or as 
an alternative for, a wired LAN. Using radio frequency (RF) 
technology, wireless LANs transmit and receive data over the 
air, minimizing the need for wired connections. Thus, wireless 
LANs combine data connectivity with user mobility.
Wireless LANs have gained strong popularity in a number of 
vertical markets, including the health-care, retail, manufacturing,
warehousing, and academia. These industries have profited from 
the productivity gains of using hand-held terminals and 
notebook computers to transmit real-time information to 
centralized hosts for processing. Today wireless LANs are 
becoming more widely recognized as a general-purpose connectivity 
alternative for a broad range of business customers. Business 
Research Group, a market research firm, predicts a sixfold 
expansion of the worldwide wireless LAN market by the year 
2000, reaching more than $2 billion in revenues.


WhyWireless?

           The widespread reliance on networking in business and 
the meteoric growth of the Internet and online services are 
strong testimonies to the benefits of shared data and shared 
resources. With wireless LANs, users can access shared 
information without looking for a place to plug in, and network 
managers can set up or augment networks without installing or 
moving wires. Wireless LANs offer the following productivity, 
convenience, and cost advantages over traditional wired networks: 
.	Mobility: Wireless LAN systems can provide LAN users 
        with access to real-time information anywhere in their 
        organization. This mobility supports productivity and service 
        opportunities not possible with wired networks. 
.	Installation Speed and Simplicity: Installing a 
        wireless LAN system can be fast and easy and can eliminate 
        the need to pull cable through walls and ceilings. 
.	Installation Flexibility: Wireless technology allows 
        the network to go where wire cannot go. 
.	Reduced Cost-of-Ownership: While the initial investment 
        required for wireless LAN hardware can be higher than the 
        cost of wired LAN hardware, overall installation expenses and 
        life-cycle costs can be significantly lower. Long-term cost 
        benefits are greatest in dynamic environments requiring 
        frequent moves and changes. 
.	Scalability: Wireless LAN systems can be configured 
        in a variety of topologies to meet the needs of specific 
        applications and installations. Configurations are easily 
        changed and range from peer-to-peer networks suitable for a 
        small number of users to full infrastructure networks of 
        thousands of users that enable roaming over a broad area. 

 
How Wireless LANs Are Used in the Real World

            Wireless LANs frequently augment rather than 
replace wired LAN networks—often providing the final few 
meters of connectivity between a wired network and the mobile 
user. The following list describes some of the many applications 
made possible through the power and flexibility of wireless LANs: 
.	Doctors and nurses in hospitals are more productive 
        because hand-held or notebook computers with wireless LAN 
        capability deliver patient information instantly. 
.       Consulting or accounting audit teams or small workgroups
        increase productivity with quick network setup. 
.	Students holding class on a campus greensward access 
        the Internet to consult the catalog of the Library of Congress. 
.	Network managers in dynamic environments minimize the 
        overhead caused by moves, extensions to networks, and other 
        changes with wireless LANs. 
.	Training sites at corporations and students at 
        universities use wireless connectivity to ease access to 
        information, information exchanges, and learning. 
.	Network managers installing networked computers in older 
        buildings find that wireless LANs are a cost-effective network 
        infrastructure solution. 
.	Trade show and branch office workers minimize setup 
        requirements by installing pre-configured wireless LANs needing 
        no local MIS support. 

Wireless LAN Technology

Manufacturers of wireless LANs have a range of technologies 
to choose from when designing a wireless LAN solution. Each 
technology comes with its own set of advantages and limitations.
Narrowband Technology
A narrowband radio system transmits and receives user information 
on a specific radio frequency. Narrowband radio keeps the radio 
signal frequency as narrow as possible just to pass the information.
Undesirable crosstalk between communications channels is avoided by 
carefully coordinating different users on different channel 
frequencies.
A private telephone line is much like a radio frequency. When 
each home in a neighborhood has its own private telephone line, 
people in one home cannot listen to calls made to other homes. 
In a radio system, privacy and noninterference are accomplished 
by the use of separate radio frequencies. The radio receiver 
filters out all radio signals except the ones on its designated 
frequency. 
From a customer standpoint, one drawback of narrowband 
technology is that the end-user must obtain an FCC license 
for each site where it is employed.

Spread Spectrum Technology
           
Most wireless LAN systems use spread-spectrum technology, a 
wideband radio frequency technique developed by the military 
for use in reliable, secure, mission-critical communications 
systems. Spread-spectrum is designed to trade off bandwidth 
efficiency for reliability, integrity, and security. In other 
words, more bandwidth is consumed than in the case of 
narrowband transmission, but the tradeoff produces a signal 
that is, in effect, louder and thus easier to detect, provided 
that the receiver knows the parameters of the spread-spectrum 
signal being broadcast. If a receiver is not tuned to the right 
frequency, a spread-spectrum signal looks like background noise. 
There are two types of spread spectrum radio: frequency hopping 
and direct sequence.

Frequency-Hopping Spread Spectrum Technology

             Frequency-hopping spread-spectrum (FHSS) uses a 
narrowband carrier that changes frequency in a pattern known 
to both transmitter and receiver. Properly synchronized, the 
net effect is to maintain a single logical channel. To an 
unintended receiver, FHSS appears to be short-duration impulse 
noise.

Direct-Sequence Spread Spectrum Technology

             Direct-sequence spread-spectrum (DSSS) generates a 
redundant bit pattern for each bit to be transmitted. This bit 
pattern is called a chip (or chipping code). The longer the chip, 
the greater the probability that the original data can be recovered 
(and, of course, the more bandwidth required). Even if one or more 
bits in the chip are damaged during transmission, statistical 
techniques embedded in the radio can recover the original data 
without the need for retransmission. To an unintended receiver, 
DSSS appears as low-power wideband noise and is rejected 
(ignored) by most narrowband receivers.

Infrared Technology

            A third technology, little used in commercial 
wireless LANs, is infrared. Infrared (IR) systems use very 
high frequencies, just below visible light in the 
electromagnetic spectrum, to carry data. Like light, IR 
cannot penetrate opaque objects; it is either directed 
(line-of-sight) or diffuse technology. Inexpensive directed 
systems provide very limited range (3 ft) and typically are 
used for personal area networks but occasionally are used in 
specific wireless LAN applications. High performance directed 
IR is impractical for mobile users and is therefore used only 
to implement fixed sub-networks. Diffuse (or reflective) IR 
wireless LAN systems do not require line-of-sight, but cells 
are limited to individual rooms.

How Wireless LANs Work

             Wireless LANs use electromagnetic airwaves 
(radio or infrared) to communicate information from one point 
to another without relying on any physical connection. Radio 
waves are often referred to as radio carriers because they 
simply perform the function of delivering energy to a remote 
receiver. The data being transmitted is superimposed on the 
radio carrier so that it can be accurately extracted at the 
receiving end. This is generally referred to as modulation of 
the carrier by the information being transmitted. Once data 
is superimposed (modulated) onto the radio carrier, the radio 
signal occupies more than a single frequency, since the 
frequency or bit rate of the modulating information adds to the 
carrier.
Multiple radio carriers can exist in the same space at the same 
time without interfering with each other if the radio waves are 
transmitted on different radio frequencies. To extract data, a 
radio receiver tunes in one radio frequency while rejecting 
all other frequencies.
In a typical wireless LAN configuration, a transmitter/receiver 
(transceiver) device, called an access point, connects to the 
wired network from a fixed location using standard cabling. At 
a minimum, the access point receives, buffers, and transmits 
data between the wireless LAN and the wired network infrastructure. 
A single access point can support a small group of users and 
can function within a range of less than one hundred to 
several hundred feet. The access point (or the antenna attached 
to the access point) is usually mounted high but may be mounted 
essentially anywhere that is practical as long as the desired 
radio coverage is obtained.

ATAS




  {pengenalan}{muzik}{galeri}{ other link...}

  {Isi Buku Pelawat}{Lihat Buku Pelawat}