Konsep & Perkembangan
Jaringan Komputer
DR. Mohammad Iqbal
Ku lia h Um u m Ja r in ga n Kom pu t e r
Un ive r sit a s Gu n a da r m a
Outline
Konsep Dasar Jaringan
Tren dan Perkembangan Jaringan
Zaman Batu sampai Zaman Jaringan
Komputer
Penemuan
Batu – besi -, …, - otomotif –
Mengapa Studi Jaringan Komputer itu
penting?
Hampir semua area komputansi adalah net w
ork-based. Contoh :
Distributed computing Distributed databases Distributed storage Robotics
Distributed Games
Konsep Dasar Jaringan
yang memberikan servicelangsung di sisi user :
Komputer, printer, scanner, dll. 2 . N e t w or k de vice s perangkat
yang mengkoneksikan end- user devices satu sama lain untuk
A-Network Device
Network interface card
7
Repeater
A repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by
9
Hub
Hubs concentrate connections. In other words, they take a
group of hosts and allow the network to see them as a single unit.
This is done passively, without any other effect on the data transmission.
Active hubs not only
Bridge
Bridges convert network transmission data formats as well as perform basic data transmission management. Bridges,
as the name implies, provide connections between LANs.
Not only do bridges connect LANs, but they also perform a
check on the data to determine whether it should cross the bridge or not. This makes each part of the network more
11
Workgroup Switch
Workgroup switches
add more intelligence to data transfer
management.
Switches can determine whether data should
remain on a LAN or not, and they can transfer the data to the
Router
Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate multiple
connections, convert data transmission formats, and manage data transfers.They can also connect to a WAN, which allows them to connect LANs that are separated by
13
“The Cloud”
The cloud is used in diagrams to represent where the connection to the internet is. It also represents all of the
B-Topologi Jaringan
Network topology defines the structure of the network.
1 . Th e ph ysica l t opology, which is the actual layout of the wire or media.
2 . Th e logica l t opology, which defines how the media is accessed by the hosts for sending
15
17
Wireless LAN Organizations and Standards
In cabled networks, IEEE is the prime issuer of standards for wireless networks. The standards have been created within the framework of the regulations created by the Federal
Communications Commission (FCC).
19
21
SAN (Storage Area Network)
A SAN is a dedicated, high-performance
network used to move data between servers and storage resources.
Because it is a separate, dedicated network, it
avoids any traffic conflict between clients and
Virtual Private Network
A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN,
a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel
23
D - OSI (Open System
Interconnection) Reference Model
To address the problem of networks
in cr e a sin g in siz e a n d in n u m be r
, the
International Organization for
25
The OSI Reference Model
27
Layer 6 - The Presentation Layer
29
Layer 4 - The Transport Layer
31
Layer 2 - The Data Link Layer
Tren dan Perkembangan Jaringan
Komputer
1.
Network Security
2.
Mobile Networking
3.
Wireless Networking
4.
Energy Efficient Networking
5.
Multimedia Networking
6.
Datacenter Networking
7.
Next Generation Internet
Topik ini berdasarkan aktivitas riset di industri seperti
Internet Engineering Task Force (IETF), Internet Research Task Force (IRTF), dan Institution of Electrical and Electronic
1 – Network Security
No aut hent icat ion
:
DNS attack, contoh: seluruh YouTube traffic diarahkan ke “black hole” di Pakistan.
[Domain Name System (DNS) is used to convert names like www.youtube.com to Internet Protocol (IP) Addresses, e.g., 128.23.45.56]
Phishing: memasukkan informasi personal
Phishing
Email dari bank dan layanan financial diarahkan ke fake w ebsit es,seperti
http://www.bankofamerica.com sesungguhnya dikirim ke http://hackers.com
Spam
200 milliar messages/hari, 88-90% adalah
email.
81% spam tentang farmasi
Membebani bisnis sekitar $100 miliar
pada tahun 2007
Cyber Warfare
Negara-negara melakukan
penetrasi komputer satu sama lain.
Merupakan domain kelima dari
m odern w arfare (setelah darat, laut, udara dan ruang angkasa)
2009, US set up pusat komando
cyber com m and
UK, China, Russia, Israel, North Korea memiliki pusat komando yg mirip US.
Pentagon menghabiskan $100 juta di 6bulan pertama 2009 untuk memperbaiki kehancuran mengaku sebagai “Indian Cyber Army” attacked Websites Pakistan.
D e s 2 0 1 0, “Pakistan Cyber Army” menyerang Indian
2 – Mobile Networking
Smart Phones (Blackberry, iPhone,
Android Phones), Net book, Laptop
Æ Mobile komputer
Mobility: tetap di dalam koneksi
net working session dimanapun
berada. Istilah kita : Online t erus…
Mobile ≠ Wireless.
Wired m obilit y : Mulai download di kantor/kampus dan diteruskan saat di rumah
3 - Wireless Networking
Wireless (WiFi) dapat tersebar
dimanapun berada.
Lebih banyak Cell phones dari POTS.
Proyeksi Rasionya akan menjadi 4-to-1 pada 204-to-12.
Sistem pengkabelan lebih mahal dari tanpa kabel Æ Wireless Access
Pengembangan Teknologi WIFI Saat ini :
4G: 1Gbps Metropolitan Area
Networks (LTE-Advanced, WiMAX V2)
Vehicular Networking (802.11p)
Ad-hoc Wireless Networks
TV Band (700 MHz) networking
4 - Energy Efficient Networking
Internet didesain dgn asumsi semua
host up setiap waktu tanpa henti.
Kita tidak bisa mematikan router
kita.
Industri komputer menghasilkan
green house gases sebanyak industri penerbangan
Satu komputer server sederhana =
satu mobil SUV dengan konsumsi 15 mil/gallon (6km/liter)
Kita membutuhkan desain protokol
5 - Multimedia Networking
Trend:
Audio/Video over networks
Entertainment on cellular phones
Home Entertainment Movies on Demand
YouTube, dailymotion - VoD, live
Isu:
Timing and synchronization Peer to peer streaming
6 - Datacenter Networking
1. Cloud Computing:
Applicat ion via Internet (Google Docs)
Com put ing via Internet (Amazon EC3)
St orage and backup via Internet
2. Isu:
Inter-Cloud Provider Networking: High-speed links on demand
7 – Internet Next Generation
Internet 1.0: Before Com m ercializat ion
20 tahun pertama (1969-1989)
No Security, Optimal routing, infrastruktur kepemilikan tunggal
Internet 2.0: Aft er Com m ercializat ion
1989-2009
Security, Policy based routing: ISP, infrastruktur kepemilikan banyak
pihak, tidak ada pengetahuan tipologi & sumber daya internal tiap jaringan yang terhubung
Internet 3.0:
20 tahun selanjutnya
Kepemilikan berdasarkan users,
content (obj ect orient ed), dan host, kekuatan berbagi content dan Service Negot iat ion
Trend Next generation Internet
Hampir semua top 50 Internet
sites adalah berbasiskan services
[Alexa]
Akses ke Smart Phones: BB,
iPhone, Nokia, Android Apps New globally distributed
services, Games, application ; Apple store, android market, BB Application…
7 Fitur Kunci Internet Service
1 . Re plica t ion: Multiple datacenter tampil (seakan-akan) dalam satu database besar
2 . Fa u lt Tole r a n ce: Connect ke B jika A sedang
7 Fitur Kunci Internet Service
3 . Loa d Ba la n cin g: 50% untuk A, 50% untuk B
4 . Tr a ffic En gin e e r in g: 80% pada Path A, 20% pada Path B
5 . Se r ve r M obilit y: Memindahkan service antar clouds, Dynam ic Set up Æ Networking sebagai Service
Apa dan Bagaimana Kesempatan kita?
E-commerce : tidak hanya pada website,
tapi juga jejaring sosial
Content provider
Application service provider : create,
customize, maintenance