konsep & perkembangan jaringan komputerfrdaus/penelusuraninformasi/file-pdf/... · klasifikasi...
TRANSCRIPT
Konsep & PerkembanganJaringan Komputer
DR. Mohammad Iqbal
Kuliah Umum Jaringan KomputerUniversitas Gunadarma
27 Desember 2011
Zaman Batu sampai Zaman JaringanKomputer
Penemuan Batu – besi -, …, - otomotif –listrik – telepon - pesawat jet -… JaringanKomputer telah mengubah fundamental gaya hidup manusia.
Tidak perlu keluarrumah, untuk :
1.Ke kantor2.belanja3.Entertainment4.Pendidikan
Virtual reality akanmemuaskan kebutuhan kitauntuk :� Games� Turisme� Sosialisasi
Mengapa Studi Jaringan Komputer itupenting?
Hampir semua area komputansi adalah network-based. Contoh :
Distributed computingDistributed databasesDistributed storageRoboticsDistributed Games
Bidang yang perkembangannya sangat cepatKesempatan karir yang luas : Google, Facebook, eBay, Microsoft, Cisco, HP, Intel, dll.
Konsep Dasar JaringanKlasifikasi PerangkatKoneksi ke JaringanKomputer
• End-user devices• Network devices
1. End-user devices perangkatyang memberikan service langsung di sisi user : Komputer, printer, scanner, dll.
2. Network devices perangkatyang mengkoneksikan end-user devices satu sama lain untukmemungkinkan berkomunikasi.
8
Repeater
A repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by transmission loss due to attenuation. A repeater does not
perform intelligent routing.
9
Hub
Hubs concentrate connections. In other words, they take a group of hosts and allow the network to see them as a single unit.
This is done passively, without any other effect on the data transmission.
Active hubs not only concentrate hosts, but they also regenerate signals.
10
Bridge
Bridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LANs.
Not only do bridges connect LANs, but they also perform a check on the data to determine whether it should cross the bridge or not. This makes each part of the network more
efficient.
11
Workgroup Switch
Workgroup switches add more intelligence to data transfer management.
Switches can determine whether data should remain on a LAN or not, and they can transfer the data to the connection that needs that data.
12
RouterRouters have all capabilities of the previous devices. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and
manage data transfers.They can also connect to a WAN, which allows them to connect LANs that are separated by
great distances.
13
“The Cloud”
The cloud is used in diagrams to represent where the connection to the internet is. It also represents all of the
devices on the internet.
14
B-Topologi Jaringan
Network topology defines the structure of the network.
1.The physical topology, which is the actual layout of the wire or media.
2.The logical topology, which defines how the media is accessed by the hosts for sending data.
18
Wireless LAN Organizations and Standards
In cabled networks, IEEE is the prime issuer of standards for wireless networks. The standards have been created within the framework of the regulations created by the Federal Communications Commission (FCC).
A key technology contained within the 802.11 standard is Direct Sequence Spread Spectrum (DSSS).
21
SAN (Storage Area Network)
A SAN is a dedicated, high-performance network used to move data between servers and storage resources.
Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.
22
Virtual Private Network
A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN,
a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel
between the telecommuter’s PC and a VPN router in the headquarters.
24
D - OSI (Open System Interconnection) Reference Model
To address the problem of networks increasing in size and in number, the International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to create a network model that would help network builders implement networks that could communicate and work together and therefore, released the OSI reference model in 1984.
25
The OSI Reference Model
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
The OSI Model will be used throughout
your entire networking career!
HarusIngat!!
26
Layer 7 - The Application Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This layer deal with networking applications.
Examples:• Email• Web browsers
PDU - User Data
27
Layer 6 - The Presentation Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This layer is responsible for presenting the data in the required format which may include:• Encryption• Compression
PDU - Formatted Data
28
Layer 5 - The Session Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This layer establishes, manages, and terminates sessions between two communicating hosts.
Example:• Client Software
( Used for logging in)
PDU - Formatted Data
29
Layer 4 - The Transport Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This layer breaks up the data from the sending host and then reassembles it in the receiver.
It also is used to insure reliable data transport across the network.
PDU - Segments
30
Layer 3 - The Network Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Sometimes referred to as the “Cisco Layer”.
Makes “Best Path Determination”decisions based on logical addresses (usually IP addresses).
PDU - Packets
31
Layer 2 - The Data Link Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This layer provides reliable transit of data across a physical link.
Makes decisions based on physical addresses (usually MAC addresses).
PDU - Frames
32
Layer 1 - The Physical Layer
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host.
Examples:• CAT5 (what we have)• Coaxial (like cable TV)• Fiber optic
PDU - Bits
Tren dan Perkembangan JaringanKomputer
1. Network Security2. Mobile Networking3. Wireless Networking4. Energy Efficient Networking5. Multimedia Networking6. Datacenter Networking7. Next Generation Internet
Topik ini berdasarkan aktivitas riset di industri sepertiInternet Engineering Task Force (IETF), Internet Research TaskForce (IRTF), dan Institution of Electrical and ElectronicEngineering (IEEE)
1 – Network SecurityNo authentication:
DNS attack, contoh: seluruh YouTube traffic diarahkan ke “black hole” di Pakistan. [Domain Name System (DNS) is used to convert names like www.youtube.com to Internet Protocol (IP) Addresses, e.g., 128.23.45.56]
Phishing: memasukkan informasi personal di fake websitesSpamCyber warfare
PhishingEmail dari bank dan layanan financial diarahkanke fake websites,sepertihttp://www.bankofamerica.com sesungguhnyadikirim ke http://hackers.comLayanan “free public wireless” dapat pula mengoleksi passwords user yang akses.
Spam200 milliar messages/hari, 88-90% adalahemail.81% spam tentang farmasiMembebani bisnis sekitar $100 miliarpada tahun 2007Dikirimkan via Botnets dari komputeryang terinfeksi.
Ref: http://en.wikipedia.org/wiki/Email_spam
Cyber WarfareNegara-negara melakukanpenetrasi komputer satu samalain.Merupakan domain kelima darimodern warfare (setelah darat, laut, udara dan ruang angkasa)
2009, US set up pusat komandocyber commandUK, China, Russia, Israel, North Korea memiliki pusat komandoyg mirip US.Pentagon menghabiskan $100 juta di 6bulan pertama 2009 untuk memperbaiki kehancurandari cyber attacks.
Ref: http://en.wikipedia.org/wiki/Cyber_war
Contoh : Nov 2010, hackers yang mengaku sebagai “Indian Cyber Army” attacked Websites Pakistan. Des 2010, “Pakistan Cyber Army” menyerang Indian Central Bureau of Intelligence.Nov 2011, Iran menangkap 6 pesawat pengintai US
2 – Mobile NetworkingSmart Phones (Blackberry, iPhone, Android Phones), Net book, Laptop
Mobile komputerMobility: tetap di dalam koneksinetworking session dimanapunberada. Istilah kita : Online terus…Mobile ≠ Wireless.Wired mobility : Mulai download dikantor/kampus dan diteruskan saatdi rumahNetwork telpon selular didesainuntuk mobility tapi Internet protocol belum.
Slot data ≠ slot voice
3 - Wireless NetworkingWireless (WiFi) dapat tersebardimanapun berada.Lebih banyak Cell phones dari POTS. Proyeksi Rasionya akan menjadi 4-to-1 pada 2012.Sistem pengkabelan lebih mahal daritanpa kabel Wireless AccessPengembangan Teknologi WIFI Saatini :
4G: 1Gbps Metropolitan Area Networks (LTE-Advanced, WiMAX V2)Vehicular Networking (802.11p)Ad-hoc Wireless NetworksTV Band (700 MHz) networkingAudio/Video over Wi-Fi (802.11aa)
4 - Energy Efficient NetworkingInternet didesain dgn asumsi semuahost up setiap waktu tanpa henti.Kita tidak bisa mematikan router kita.Industri komputer menghasilkangreen house gases sebanyak industripenerbanganSatu komputer server sederhana = satu mobil SUV dengan konsumsi 15 mil/gallon (6km/liter)Kita membutuhkan desain protokolyang mengizinkan nodes untuk dapatberhenti jika tidak bekerja.Energy Efficient Ethernet:
Mematikan sebagian besar sirkuitsampai bit data selanjutnya tibaDelay-Tolerant Networking: Router dapat menyimpan data jika next hop ditemukan sedang mati
5 - Multimedia NetworkingTrend:
Audio/Video over networksEntertainment on cellular phonesHome EntertainmentMovies on DemandYouTube, dailymotion - VoD, live
Isu:Timing and synchronizationPeer to peer streamingStream reservationMedia caching
6 - Datacenter Networking1. Cloud Computing:
Application via Internet (Google Docs)Computing via Internet (Amazon EC3)Storage and backup via Internet
2. Isu:Inter-Cloud Provider Networking: High-speed links on demandPolicy, Security, QoS issues (Multi-organizational ownership)
3. Data Center Networking: Optimalisasi Ethernet untuk data centers
Congestion control pada Multi-Gigabit SpeedsMicro-seconds transaction delays
7 – Internet Next GenerationInternet 1.0: Before Commercialization
20 tahun pertama (1969-1989)No Security, Optimal routing, infrastruktur kepemilikan tunggal
Internet 2.0: After Commercialization1989-2009Security, Policy based routing: ISP, infrastruktur kepemilikan banyakpihak, tidak ada pengetahuan tipologi& sumber daya internal tiap jaringanyang terhubung
Internet 3.0:20 tahun selanjutnyaKepemilikan berdasarkan users, content (object oriented), dan host, kekuatan berbagi content dan Service NegotiationMobility user dan distributed data (data mining system)
Trend Next generation InternetHampir semua top 50 Internet sites adalah berbasiskan services[Alexa]Akses ke Smart Phones: BB, iPhone, Nokia, Android AppsNew globally distributed services, Games, application ; Apple store, android market, BB Application…Clouds next generation, …
Jaringan Komputer dibutuhkan untukmendukung secara efisien terhadap Instalasi
dan pengantaran/distribusi SERVICERef: Top 500 sites on the web, http://www.alexa.com/topsites
7 Fitur Kunci Internet Service
1. Replication: Multiple datacenter tampil(seakan-akan) dalam satu database besar
2. Fault Tolerance: Connect ke B jika A sedangdown
7 Fitur Kunci Internet Service3. Load Balancing: 50% untuk A, 50% untuk B4. Traffic Engineering: 80% pada Path A, 20%
pada Path B5. Server Mobility: Memindahkan service antar
clouds, Dynamic Setup Networking sebagaiService
6. User Mobility: Gaming/Video/audio… tidakberhenti saat user berpindah tempat.
7. Security: Menjaga aspek-aspek Provenance, Authentication, Privacy, ...
Apa dan Bagaimana Kesempatan kita?
E-commerce : tidak hanya pada website, tapi juga jejaring sosialContent providerApplication service provider : create, customize, maintenance Internet service provider : wireless, ADSL,…Security service provider : pengawasan…