konsep & perkembangan jaringan komputerfrdaus/penelusuraninformasi/file-pdf/... · klasifikasi...

48
Konsep & Perkembangan Jaringan Komputer DR. Mohammad Iqbal Kuliah Umum Jaringan Komputer Universitas Gunadarma 27 Desember 2011

Upload: nguyenkhanh

Post on 06-Apr-2018

229 views

Category:

Documents


1 download

TRANSCRIPT

Konsep & PerkembanganJaringan Komputer

DR. Mohammad Iqbal

Kuliah Umum Jaringan KomputerUniversitas Gunadarma

27 Desember 2011

Outline

Konsep Dasar JaringanTren dan Perkembangan JaringanApa dan bagaimana selanjutnya ?

Zaman Batu sampai Zaman JaringanKomputer

Penemuan Batu – besi -, …, - otomotif –listrik – telepon - pesawat jet -… JaringanKomputer telah mengubah fundamental gaya hidup manusia.

Tidak perlu keluarrumah, untuk :

1.Ke kantor2.belanja3.Entertainment4.Pendidikan

Virtual reality akanmemuaskan kebutuhan kitauntuk :� Games� Turisme� Sosialisasi

Mengapa Studi Jaringan Komputer itupenting?

Hampir semua area komputansi adalah network-based. Contoh :

Distributed computingDistributed databasesDistributed storageRoboticsDistributed Games

Bidang yang perkembangannya sangat cepatKesempatan karir yang luas : Google, Facebook, eBay, Microsoft, Cisco, HP, Intel, dll.

Konsep Dasar JaringanKlasifikasi PerangkatKoneksi ke JaringanKomputer

• End-user devices• Network devices

1. End-user devices perangkatyang memberikan service langsung di sisi user : Komputer, printer, scanner, dll.

2. Network devices perangkatyang mengkoneksikan end-user devices satu sama lain untukmemungkinkan berkomunikasi.

A-Network DeviceNetwork interface card

Sistem PengkabelanSistem tanpa kabel

7

Networking Device

8

Repeater

A repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by transmission loss due to attenuation. A repeater does not

perform intelligent routing.

9

Hub

Hubs concentrate connections. In other words, they take a group of hosts and allow the network to see them as a single unit.

This is done passively, without any other effect on the data transmission.

Active hubs not only concentrate hosts, but they also regenerate signals.

10

Bridge

Bridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LANs.

Not only do bridges connect LANs, but they also perform a check on the data to determine whether it should cross the bridge or not. This makes each part of the network more

efficient.

11

Workgroup Switch

Workgroup switches add more intelligence to data transfer management.

Switches can determine whether data should remain on a LAN or not, and they can transfer the data to the connection that needs that data.

12

RouterRouters have all capabilities of the previous devices. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and

manage data transfers.They can also connect to a WAN, which allows them to connect LANs that are separated by

great distances.

13

“The Cloud”

The cloud is used in diagrams to represent where the connection to the internet is. It also represents all of the

devices on the internet.

14

B-Topologi Jaringan

Network topology defines the structure of the network.

1.The physical topology, which is the actual layout of the wire or media.

2.The logical topology, which defines how the media is accessed by the hosts for sending data.

15

1- Physical Topologies

16

2 - Logical Tipologies - Sebaran Area Data Network (LAN, MAN, WAN,)

17

LAN (Local-area network )

18

Wireless LAN Organizations and Standards

In cabled networks, IEEE is the prime issuer of standards for wireless networks. The standards have been created within the framework of the regulations created by the Federal Communications Commission (FCC).

A key technology contained within the 802.11 standard is Direct Sequence Spread Spectrum (DSSS).

19

Cellular Topology for Wireless

20

WAN (Wide-area networks)

21

SAN (Storage Area Network)

A SAN is a dedicated, high-performance network used to move data between servers and storage resources.

Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.

22

Virtual Private Network

A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN,

a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel

between the telecommuter’s PC and a VPN router in the headquarters.

23

C - Bandwidth

24

D - OSI (Open System Interconnection) Reference Model

To address the problem of networks increasing in size and in number, the International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to create a network model that would help network builders implement networks that could communicate and work together and therefore, released the OSI reference model in 1984.

25

The OSI Reference Model

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

The OSI Model will be used throughout

your entire networking career!

HarusIngat!!

26

Layer 7 - The Application Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer deal with networking applications.

Examples:• Email• Web browsers

PDU - User Data

27

Layer 6 - The Presentation Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer is responsible for presenting the data in the required format which may include:• Encryption• Compression

PDU - Formatted Data

28

Layer 5 - The Session Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer establishes, manages, and terminates sessions between two communicating hosts.

Example:• Client Software

( Used for logging in)

PDU - Formatted Data

29

Layer 4 - The Transport Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer breaks up the data from the sending host and then reassembles it in the receiver.

It also is used to insure reliable data transport across the network.

PDU - Segments

30

Layer 3 - The Network Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Sometimes referred to as the “Cisco Layer”.

Makes “Best Path Determination”decisions based on logical addresses (usually IP addresses).

PDU - Packets

31

Layer 2 - The Data Link Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer provides reliable transit of data across a physical link.

Makes decisions based on physical addresses (usually MAC addresses).

PDU - Frames

32

Layer 1 - The Physical Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host.

Examples:• CAT5 (what we have)• Coaxial (like cable TV)• Fiber optic

PDU - Bits

Tren dan Perkembangan JaringanKomputer

1. Network Security2. Mobile Networking3. Wireless Networking4. Energy Efficient Networking5. Multimedia Networking6. Datacenter Networking7. Next Generation Internet

Topik ini berdasarkan aktivitas riset di industri sepertiInternet Engineering Task Force (IETF), Internet Research TaskForce (IRTF), dan Institution of Electrical and ElectronicEngineering (IEEE)

1 – Network SecurityNo authentication:

DNS attack, contoh: seluruh YouTube traffic diarahkan ke “black hole” di Pakistan. [Domain Name System (DNS) is used to convert names like www.youtube.com to Internet Protocol (IP) Addresses, e.g., 128.23.45.56]

Phishing: memasukkan informasi personal di fake websitesSpamCyber warfare

PhishingEmail dari bank dan layanan financial diarahkanke fake websites,sepertihttp://www.bankofamerica.com sesungguhnyadikirim ke http://hackers.comLayanan “free public wireless” dapat pula mengoleksi passwords user yang akses.

Spam200 milliar messages/hari, 88-90% adalahemail.81% spam tentang farmasiMembebani bisnis sekitar $100 miliarpada tahun 2007Dikirimkan via Botnets dari komputeryang terinfeksi.

Ref: http://en.wikipedia.org/wiki/Email_spam

Cyber WarfareNegara-negara melakukanpenetrasi komputer satu samalain.Merupakan domain kelima darimodern warfare (setelah darat, laut, udara dan ruang angkasa)

2009, US set up pusat komandocyber commandUK, China, Russia, Israel, North Korea memiliki pusat komandoyg mirip US.Pentagon menghabiskan $100 juta di 6bulan pertama 2009 untuk memperbaiki kehancurandari cyber attacks.

Ref: http://en.wikipedia.org/wiki/Cyber_war

Contoh : Nov 2010, hackers yang mengaku sebagai “Indian Cyber Army” attacked Websites Pakistan. Des 2010, “Pakistan Cyber Army” menyerang Indian Central Bureau of Intelligence.Nov 2011, Iran menangkap 6 pesawat pengintai US

2 – Mobile NetworkingSmart Phones (Blackberry, iPhone, Android Phones), Net book, Laptop

Mobile komputerMobility: tetap di dalam koneksinetworking session dimanapunberada. Istilah kita : Online terus…Mobile ≠ Wireless.Wired mobility : Mulai download dikantor/kampus dan diteruskan saatdi rumahNetwork telpon selular didesainuntuk mobility tapi Internet protocol belum.

Slot data ≠ slot voice

3 - Wireless NetworkingWireless (WiFi) dapat tersebardimanapun berada.Lebih banyak Cell phones dari POTS. Proyeksi Rasionya akan menjadi 4-to-1 pada 2012.Sistem pengkabelan lebih mahal daritanpa kabel Wireless AccessPengembangan Teknologi WIFI Saatini :

4G: 1Gbps Metropolitan Area Networks (LTE-Advanced, WiMAX V2)Vehicular Networking (802.11p)Ad-hoc Wireless NetworksTV Band (700 MHz) networkingAudio/Video over Wi-Fi (802.11aa)

4 - Energy Efficient NetworkingInternet didesain dgn asumsi semuahost up setiap waktu tanpa henti.Kita tidak bisa mematikan router kita.Industri komputer menghasilkangreen house gases sebanyak industripenerbanganSatu komputer server sederhana = satu mobil SUV dengan konsumsi 15 mil/gallon (6km/liter)Kita membutuhkan desain protokolyang mengizinkan nodes untuk dapatberhenti jika tidak bekerja.Energy Efficient Ethernet:

Mematikan sebagian besar sirkuitsampai bit data selanjutnya tibaDelay-Tolerant Networking: Router dapat menyimpan data jika next hop ditemukan sedang mati

5 - Multimedia NetworkingTrend:

Audio/Video over networksEntertainment on cellular phonesHome EntertainmentMovies on DemandYouTube, dailymotion - VoD, live

Isu:Timing and synchronizationPeer to peer streamingStream reservationMedia caching

6 - Datacenter Networking1. Cloud Computing:

Application via Internet (Google Docs)Computing via Internet (Amazon EC3)Storage and backup via Internet

2. Isu:Inter-Cloud Provider Networking: High-speed links on demandPolicy, Security, QoS issues (Multi-organizational ownership)

3. Data Center Networking: Optimalisasi Ethernet untuk data centers

Congestion control pada Multi-Gigabit SpeedsMicro-seconds transaction delays

7 – Internet Next GenerationInternet 1.0: Before Commercialization

20 tahun pertama (1969-1989)No Security, Optimal routing, infrastruktur kepemilikan tunggal

Internet 2.0: After Commercialization1989-2009Security, Policy based routing: ISP, infrastruktur kepemilikan banyakpihak, tidak ada pengetahuan tipologi& sumber daya internal tiap jaringanyang terhubung

Internet 3.0:20 tahun selanjutnyaKepemilikan berdasarkan users, content (object oriented), dan host, kekuatan berbagi content dan Service NegotiationMobility user dan distributed data (data mining system)

Trend Next generation InternetHampir semua top 50 Internet sites adalah berbasiskan services[Alexa]Akses ke Smart Phones: BB, iPhone, Nokia, Android AppsNew globally distributed services, Games, application ; Apple store, android market, BB Application…Clouds next generation, …

Jaringan Komputer dibutuhkan untukmendukung secara efisien terhadap Instalasi

dan pengantaran/distribusi SERVICERef: Top 500 sites on the web, http://www.alexa.com/topsites

7 Fitur Kunci Internet Service

1. Replication: Multiple datacenter tampil(seakan-akan) dalam satu database besar

2. Fault Tolerance: Connect ke B jika A sedangdown

7 Fitur Kunci Internet Service3. Load Balancing: 50% untuk A, 50% untuk B4. Traffic Engineering: 80% pada Path A, 20%

pada Path B5. Server Mobility: Memindahkan service antar

clouds, Dynamic Setup Networking sebagaiService

6. User Mobility: Gaming/Video/audio… tidakberhenti saat user berpindah tempat.

7. Security: Menjaga aspek-aspek Provenance, Authentication, Privacy, ...

Apa dan Bagaimana Kesempatan kita?

E-commerce : tidak hanya pada website, tapi juga jejaring sosialContent providerApplication service provider : create, customize, maintenance Internet service provider : wireless, ADSL,…Security service provider : pengawasan…

Selesai untuk saat ini...

Terima kasih atas perhatian, Ada pertanyaan ?