• Recent Post

  • RSS R o o t s e c u r e

    • Sony's $15 million PSN hacking settlement pays out in free games
      Way back in 2011, PlayStation Network services and websites went dark due to "an external intrusion." Anonymous claimed responsibility, names, passwords and possible payment information was lost in a data breach, and everybody in general had a bad time.Tags: SonyPSNIndustry NewsLaw and Order […]
    • Firm says vulnerability in Tails contained in I2P component
      A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace. Exodus Intelligence of Austin, Texas, said its short clip shows how the real IP address of a Tails user can be revealed using the flaw. The company sa […]
    • Mass exploit of WordPress plugin backdoors sites running Joomla, Magento, too
      As many as 50,000 websites have been remotely commandeered by attackers exploiting a recently patched vulnerability in a popular plugin for the WordPress content management system, security researchers said Wednesday.Tags: WordpressSecurity […]
    • StubHub: Hackers Hijacked 1,000 Accounts
      The Associated Press reports that hackers were able to access more than 1,000 StubHub accounts. The hackers were then able to use those accounts to buy tickets from the online reseller. The company claims its own security wasn’t actually compromised. Instead, cyber thieves got their hands on user info through other sites before entering using that same accou […]
    • Chinese city sealed off after man dies from bubonic plague
      The Chinese city of Yumen in Gansu province in China was sealed off Tuesday for nine days (ending today) after a man died of bubonic plague,  South China Post reports, based on a report by China Central Television. “Other reports said the 38-year-old victim had come across a dead marmot on July 13. He is said to have chopped it up to feed to his dog, but dev […]
    • Twitter workforce diversity report: 'We have a lot of work to do'
      In the wake of the NSA revelations last year, anyone and everyone in tech started publishing transparency reports about data requests. Now the thing to do is apparently reveal statistics about corporate diversity -- most of which have not panned out to be the greatest selling points. Nevertheless, Twitter is the latest in big tech to share the ethnic and gen […]
    • Man kicked off Southwest flight after tweeting about rude gate agent
      Public relations aren't the strong point of most airlines, but Southwest took it to an entirely new level recently after a tense incident between a passenger and a rude Southwest gate agent -- which led to hostilities, thinly veiled threats, and forcibly deleted tweets.Tags: TwitterIndustry News […]
    • 15 Minutes Might Be the Ideal Meeting Length
      A meeting that drones on and on is hardly productive. Keeping a meeting to 15 minutes is ideal for the same reason that TED talks are maxed out at 18 minutes: attention span and memory. You might be thinking that 15 minutes is way too short for a meeting, but Kevan Lee at Fast Company explains a couple reasons why it's perfect:Tags: Industry News […]
    • Are you broke? Good with electronics? Build a better AC/DC box, get back in black with $1m
      There's a million dollars in prizes up for grabs from Google and the Institute of Electrical and Electronics Engineers (IEEE) for the clever clogs who can build a direct current (DC) to alternating current (AC) converter that's the size of a laptop. The Little Box Challenge aims to solve one of the dilemmas in modern-day power supply – that many so […]
    • Is Hiding Your Wireless SSID Really More Secure?
      Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there. This myth has been around for a very long time, and we aren’t expecting everybody to receive this news with happy agreement. You’re we […]

Cyrus Rico

.::Everything Must Be Share::.

Cara Membuat Jaringan LAN

kali ini saya ingin membahas tentang cara membuat JARINGAN LAN .Apabila sobat di rumah mempunyai komputer lebih dari satu, dan masing-masing komputer ingin terhubung antara satu dengan yang lainnnya supaya bisa sharing data, printer, sharing koneksi internet dll, kita bisa lakukan dengan membuat jaringan komputer LAN ( Local Area Network ) sederhana..

Kalau pada postingan yang lalu digunakan koneksi adhoc wireless, pada postingan kali ini kita gunakan koneksi kabel yaitu menggunakan kabel data UTP (Unshielded twisted pair), yaitu standard kabel untuk koneksi jaringan LAN.
Komputer yang dipakai pada saat ini umumnya sudah dilengkapi denganLAN Card atau disebut juga NIC (Network Interface Controller), atauEthernet Card.

• Kalau jumlah komputer yang akan dikoneksikan hanya dua buah, kita hanya cukup menyediakan satu buah kabel UTP dengan panjang sesuai jarak antara komputernya yang di kedua ujung kabelnya telah dipasangi konektor RJ-45(standard konektor untuk kabel LAN UTP) dengan konfigurasi Cross/ silang.

• Kalau Jumlah komputer yang akan dikoneksikan lebih dari 2 buah, maka kita harus menambahkan suatu alat yang bernama Switch atau Hub. Pada saat ini harga sebuah switch untuk standard rumahan sudah sangat terjangkau .
Dari masing – masing komputer dihubungkan ke switch menggunakan kabel UTP dengan konektor RJ-45 di kedua ujungnya dengan konfigurasiStraight/lurus.

• Pemasangan konektor pada kabel UTP bisa dibuat sendiri, tetapi untuk mudahnya sobat tinggal pergi saja ke toko komputer yang juga menyediakan peralatan jaringan, dan tinggal bilang untuk membeli kabel UTP sekalian pasangkan konektornya dengan konfigurasi cross/silang untuk koneksi komputer ke komputer(dua buah komputer), ataustraight/lurus untuk koneksi lebih dari 2 komputer /menggunakan switch.



Konfigurasi Alamat IP (Internet Protocol / TCP IP )
Agar dapat saling berkomunikasi , masing – masing komputer harus diberi alamai IP

• Masuk ke Network Connection (Start–>Control Panel –>Network Connection )
• Pilih/dobel klik Local Area Connection
• Dobel klik pada Internet Protocol (TCP / IP)
• Klik Use The following IP address, kemudian isi IP address dan subnet Mask
Misal,
komputer1 IP Address : 192.168.0.1
komputer2 IP Address : 192.168.0.2
komputer3 IP Address : 192.168.0.3
komputer4 IP Address : 192.168.0.4
dst..
Subnet Mask harus sama : 255.255.255.0

Untuk mengetahui berhasil tidaknya koneksi lakukan perintah ping dari komputer satu ke komputer lainnya
Misal dari komputer1 ke komputer2 :
• Di Komputer1 : Klik Start –>Klik Run–>ketik CMD –> klik OK, maka akan tampil Command Prompt
• Ketik ping 192.168.0.2 tekan enter
harus ada Reply dari komputer2
•Lakukan perintah yang sama untuk mengetahui koneksi ke komputer yang lainnya.

Semoga Bermanfaat

sumber : http://komputertipstrik.blogspot.com

Categories: Jaringan