This document discusses access networks and technologies. It covers local loops in PSTN networks including leased lines, voice-band modems, ISDN, DSL, and fiber access. Cable TV networks and how they provide data access are described. Local area networks including Ethernet, token ring protocols, and structures are explained. Finally, wireless access technologies like radio access networks are mentioned. The document provides an overview of various wired and wireless access network technologies.
What is VLC
Visible light & Spectrum
VLC process
-Transmitter
-Receiver
-Modulation
VLC characteristics
Comparison with RF & IR
Demerits of VLC
Applications
What is VLC
Visible light & Spectrum
VLC process
-Transmitter
-Receiver
-Modulation
VLC characteristics
Comparison with RF & IR
Demerits of VLC
Applications
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Diplomado en Linea
Fundamentos de Telecomunicaciones y Redes de Información.
Módulo I. Fundamentos de Telecomunicaciones
http://www.fundacionteleddes.org
IEEE - Standards.
Ethernet Logical Link Control (LLC) and Media Access Control (MAC) sublayers.
Historic Ethernet: The foundation for Ethernet technology in 1970 was Alohanet.
Early Ethernet Media used coaxial cable to connect computers in a bus topology. It was known as Thicknet (10BASE5) and Thinnet (10BASE2).
Ethernet Collision Management.
There are two styles of Ethernet framing: IEEE 802.3 (original) and the revised IEEE 802.3 (Ethernet).
CSMA/CD, Carrier Sensle, Multiple Access, Collision Detection, JAM Signal and Random Backoff.
Ethernet Timing and latency.
Bit Time: The period of time required for a bit to be placed and sensed on the media.
Slot Time: is the time it takes for an electronic pulse to travel the length of the maximum theoretical distance between two nodes.
Inter-frame spacing.
Ethernet Types
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Diplomado en Linea
Fundamentos de Telecomunicaciones y Redes de Información.
Módulo I. Fundamentos de Telecomunicaciones
http://www.fundacionteleddes.org
IEEE - Standards.
Ethernet Logical Link Control (LLC) and Media Access Control (MAC) sublayers.
Historic Ethernet: The foundation for Ethernet technology in 1970 was Alohanet.
Early Ethernet Media used coaxial cable to connect computers in a bus topology. It was known as Thicknet (10BASE5) and Thinnet (10BASE2).
Ethernet Collision Management.
There are two styles of Ethernet framing: IEEE 802.3 (original) and the revised IEEE 802.3 (Ethernet).
CSMA/CD, Carrier Sensle, Multiple Access, Collision Detection, JAM Signal and Random Backoff.
Ethernet Timing and latency.
Bit Time: The period of time required for a bit to be placed and sensed on the media.
Slot Time: is the time it takes for an electronic pulse to travel the length of the maximum theoretical distance between two nodes.
Inter-frame spacing.
Ethernet Types
an industrial training taken at BSNL CTTC Kolkata covered the whole syllabus of the training (Switching system, SDH, Optical Fibre Cable, GSM, CDMA, ISDN, IN networks, PCM, Broadband DSL Technology, IP fundamentals) Overviews of the total topics all the advantages and Disadvantages.
-Dhrubajyoti Adak(Camellia Institute of Technolgy)
Design and Fiber Installation for University Campus Systemijtsrd
The health of a network depends on the quality of proper installation of the network infrastructure. The main aim of this research is to understand the basic aspects of a modern telecommunication network structure. Signal degradation dominants the performance of the fiber installation. By using MATLAB software, simulation results for signal degradation such as attenuation, dispersion and nonlinear effects are discussed. OTRD Optical Time Domain Reflectometer is a valuable tool for field engineers and service providers to monitor and detect the faults between access network and CO Central Office in real world analysis. In this paper, an overview related to the operation and function of a PON Passive Optical Network and required components to implement the fiber communication system are also described. Naing Naing Kyaw "Design and Fiber Installation for University Campus System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26812.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26812/design-and-fiber-installation-for-university-campus-system/naing-naing-kyaw
These slides present various communications and measurement technology applied for smart grid. Later of the class I will present the same at advance level.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Chapter 14 teknologi jaringan akses
1. Sistem Telekomunikasi
S1 Teknik Elektro
Fakultas Teknik dan Ilmu Komputer
Universitas Teknokrat Indonesia
Semester Genap
2018/2019
2. Teknologi Jaringan Akses
(Amarudin, S.Kom., M.Eng.)
Chapter 14
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
3. Tujuan Pembelajaran
Mahasiswa dapat menjelaskan:
• Perbedaan Jaringan Akses dan Jaringan Transmisi
• Local loop pada PSTN
• Cable TV Network
• LAN (Local Area Network)
• Wireless Access
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
4. Jaringan Telekomunikasi:
Jaringan Akses dan Jaringan Transmisi
2
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
5. 3
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
Jaringan Telekomunikasi:
Jaringan Akses dan Jaringan Transmisi
6. Access Network
• The access network provides the connection between
the subscriber’s premises and the local exchange.
• This connection is commonly referred to as the
last mile.
• Technologies used in the access network are:
– the basic local loop, the fixed wireless local loop, and the
digital subscriber loop (forming the PSTN),
– cellular (forming the PLMN),
– fiber-based techniques such as fiber to home (FTTH),
– other broadband access techniques.
4
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
7. Teknologi Jaringan Akses
1. Local loop pada PSTN
– Leased Line
– Voice-Band Modem
– ISDN
– DSL
– Fiber Cable Access
2. Cable TV Network
3. LAN (Local Area Network)
4. Wireless Access 5
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
8. Jaringan Akses pada PSTN
• Jaringan akses/lokal pada PSTN disebut localloop
atau subscriber loop.
• Pada awalnya hanya menyediakan layanan komunikasi suara
(voice communications).
• Lalu berkembang menyediakan layanan:
– Leased Line
– Voice-Band Modems
– ISDN (Integrated Services Digital Network)
– DSL (Digital Subscriber Line)
• Klasifikasi dan istilahnya di Indonesia:
– Jarlokat (jaringan lokal akses tembaga)
– Jarlokar (jaringan lokal akses radio)
– Jarlokaf (jaringan lokal akses fiber)
6
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
9. Arsitektur Jarlokat
7
MDF = Main distribution frame;
DP = Distribution point;
RK = Rumah kabel;
KTB = Kotak terminal batas
KTB
KTB
DP
DP
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
10. Leased Line
• The leased line is connected all the time, but dial-up or
switched lines are connected only on demand.
• Leased lines can be used for voice
(telephone), data or Internet services.
• Leased lines are available at speeds of 64 kbit/s, 128
kbit/s, 256 kbit/s, 512kbit/s, 1 Mbit/s, 2 Mbit/s, 4 Mbit/s,
8 Mbit/s,
16 Mbit/s, T1(1.544 Mbit/s), or E1(2.048
Mbit/s).
8
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
12. Voice-Band Modem
• The word modem comes from the combination of the two devices,
modulator and demodulator.
• Modulation converts a digital signal into an analog signal for
transmission through a channel, and demodulation performs the
conversion back to the original digital baseband data signal.
• Voice-band modems are needed when an analog voice channel of the
telephone network is used for data transmission.
• The frequency band of the voice channel is 300 to 3,400 Hz and the
baseband digital information is transferred to this band through CW
modulation.
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
14. Integrated Services Digital Network
(ISDN)
• ISDN is a set of communication standards for simultaneous digital
transmission of voice, video, data, and other network services over the
traditional circuits of the PSTN.
• The key feature of ISDN is that it integrates speech and
data on the same lines.
• The ISDN provides switched end-to-end digital n×64 kbps circuits
that we can use for voice or data.
– Basic rate interface (BRI) = 2B + D = (2x64 + 16) kbps
= 144 kbps
– Primary rate interface (PRI)
Eropa, PRI = 30B + 2D = (32x64) kbps = 2,048 Mbps Amerika, PRI =
23B + D + framing= (24x64 + 8) kbps = 1,544 MBps
12
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
16. Digital Subscriber Line (DSL)
• In the DSL (digital subscriber line or digital subscriber
loop) techniques, data and speech are separated at the
local exchange site.
• The speech portion is connected to the switching (PSTN).
• The data portion is connected to the data network for
Internet access.
• Applications of DSL: remote access to data center, Internet
access, and interconection of LANs.
• Term xDSL refers to different variations of DSL, such as
ADSL, HDSL, and RADSL.
14
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
23. Fiber Cable Access
Fiber to the x (FTTX) is including:
• fiber-to-the-node (FTTN)
• fiber-to-the-curb (FTTC)
• fiber-to-the-building (FTTB)
• fiber-to-the-home (FTTH)
21
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
25. Teknologi Jaringan Akses
1. Local loop pada PSTN
– Leased Line
– Voice-Band Modem
– ISDN
– DSL
– Fiber Cable Access
2. Cable TV Network
3. LAN (Local Area Network)
4. Wireless Access
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
26. Cable TV Network
• Jaringan TV kabel adlh jaringan televisi berbayar yg layanan
utamanya menyediakan layanan siaran televisi.
• Dlm perkembangannya kemudian dpt dipakai juga utk akses
komunikasi data.
• Medium transmisinya utk distribusi siaran TV ke pelanggan-
pelanggan biasanya berupa fiber optik dan kabel coaxial.
• Link satelit dipakai oleh provider utk menerima siaran TV dari
stasiun televisi.
• Namun, di lapangan televisi berbayar yg pelanggannya
langsung menerima siaran dari satelit terkadang juga disebut
TV kabel.
24
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
28. 26
Jaringan TV Kabel plus
Komunikasi Data
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
29. Teknologi Jaringan Akses
1. Local loop pada PSTN
– Leased Line
– Voice-Band Modem
– ISDN
– DSL
– Fiber Cable Access
2. Cable TV Network
3. LAN (Local Area Network)
4. Wireless Access
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
30. Local Area Network (LAN)
• LANs provide high-data-rate communications between computers,
for example, inside one building.
• Because of the high transmission capacity (10 Mbps or higher) only
short distances are allowed. The typical maximum transmission distance
is a few hundred meters.
• LANs can be interconnected to make up a wide-area corporate network
using switching devices (switches or bridges) or routers.
• The bridges or switches interconnect separate LAN segments and switch
frames from one segment to another with the help of a local hardware
address that is stored in the interface unit of each computer.
• Routers are devices that use network layer addresses for the routing of
packets and they are used to connect LANs to other networks, for
example, to the Internet. Routers can also be used to interconnect LANs
that use different technologies.
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
31. Two Basic Structures of LANs
29
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
32. LANs Protocols
• Special protocols are standardized to make sure that only one
computer transmits at a time.
• The complex standards of LANs specify OSI layer 1, the physical layer,
and the so-called medium access sublayer (MAC) of layer 2 (the data
link layer).
• The basic task of these protocols is to connect acomputer to
another via a shared medium as if they were connected by a point-
to-point cable.
• The most common LAN is the Ethernet, which has been standardized
as ISO 8802-3 or ANSI/IEEE 802-3.
• An Ethernet LAN is logically a bus although its physical structure is
often a star where all stations are connected to wiring center called a
hub.
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
33. LANs Protocols (lanjutan)
• Another common LAN is the token ring, developed by IBM, and it is
standardized as ISO 8802-5 or IEEE 802-5.
• The typical data rate of this LAN is 16 Mbps.
• In a token ring network, only a computer holding a special short frame
called a token is able to transmit to the ring.
• Physically the token ring is always built as a star although logically it still
makes up a ring.
• The token ring has some technical advantages over the Ethernet (no
collisions, better bandwidth utilization, and deterministic operation)
but it is much more complicated because of the token management
and thus more expensive.
31
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
34. Multiple-Access Scheme
of the Ethernet
• The MAC layer in the Ethernet is defined in ISO 8802-3/ IEEE 802.3 and
this access method is called CSMA/CD.
• Carrier sense (CS) means that a workstation senses the channel and
does not transmit if it is not free.
• Multiple access (MA) means that many workstations share the
same channel.
• Collision detection (CD) means that each station is capable of
detecting a collision that occurs if more than one station transmits at
the same time. In the case of a collision, the workstation that detects
it immediately stops transmitting and transmits a burst of random
data to ensure that all other stations detect the collision as well.
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
35. Frame Structure of the Ethernet
33
Header Trailer
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
36. Hub untuk Ethernet
34
Topologi logik : bus (broadcast)
Topologi fisik : star
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
41. Teknologi Jaringan Akses
1. Local loop pada PSTN
– Leased Line
– Voice-Band Modem
– ISDN
– DSL
– Fiber Cable Access
2. Cable TV Network
3. LAN (Local Area Network)
4. Wireless Access
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
42. Wireless
Access
Jaringan Akses Nirkabel (Wireless) dpt
berupa:
• Radio access network on PLMN
(cellular systems)
• Mobile Satellites Communications
• WLL (Wireless Local Loop)
• Wireless LAN
• WiMAX (Worldwide Interoperability for
Microwave Access) 40
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
46. WLL (Wireless Local Loop)
44
(a)
Overview of a WLLsystem
(b)
Typical WLL system components
at the customer premises
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
47. Cellular Systems vs WLL Systems
45
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
48. WLAN
(Wireless Local AreaNetwork)
• WLAN berasal dari jaringan komputer
berbasis IP (internet protocol).
• Standar WLAN adlh keluarga standar IEEE
802.11, yaitu: IEEE 802.11a, IEEE 802.11b,
IEEE 802.11g, IEEE 802.11n, dll.
• Pita frekuensi yg digunakan adlh unlicense
frequency band 2.4 GHz dan 5 GHz.
• Disebut jg dgn WiFi (Wireless Fidelity).
46
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
50. WiMAX
(Worldwide Interoperability for
Microwave Access)
• WiMAX adalah istilah utk jaringan
berbasis Standar IEEE 802.16
• Disebut jg Broadband Wireless Access (BWA)
• Dikategorikan ke dlm MAN (metropolitan area
network)
• Standar IEEE 802.16d Fixed WiMAX (3G)
• Standar IEEE 802.16e Mobile WiMAX (3.9G)
• Standar IEEE 802.16m WiMAX-2 (4G) 48
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia
54. Referensi
Tarmo Anttalainen, Introduction to Telecommunications Network Engineering,
2nd Edition, Artech House, 2003.
Nihal Kularatna & Dileeka Dias, Essentials of Modern Telecommunications
Systems, Artech House, 2003.
Anu Gokhale, Introduction to Telecommunications, Delmar Thomson Learning,
2004.
Uke Kurniawan Usman, Pengantar Ilmu Telekomunikasi, Penerbit Informatika,
2010.
Muhammad Daud Nurdin, Bahan Kuliah Sistem Telekomunikasi 2015/2016
(lengkap), available : http://repository.unimal.ac.id/2596/, accessed on 2019.
Amarudin, S.Kom., M.Eng., Fakultas Teknik dan Ilmu Komputer, Universitas Teknokrat Indonesia