Konsep Perkembangan Jaringan Komputer
Konsep & Perkembangan Jaringan Komputer DR. Mohammad Iqbal
Ku lia h Um u m Ja r in ga n Kom pu t e r Un ive r sit a s Gu n a da r m a Outline
Konsep Dasar Jaringan
Tren dan Perkembangan Jaringan
Apa dan bagaimana selanjutnya ? Zaman Batu sampai Zaman Jaringan Komputer
Penemuan Batu – besi -, …, - otomotif –
listrik – telepon - pesawat jet -… JaringanKomputer telah mengubah fundamental
gaya hidup manusia.Tida k pe r lu k e lu a r V ir t u a l r e a lit y akan r u m a h , u n t u k : memuaskan kebutuhan kita
1. Ke kantor untuk : 2. belanja
Games
3. Entertainment Turisme
Mengapa Studi Jaringan Komputer itu penting?
Hampir semua area komputansi adalah net work-
based. Contoh :
Distributed computing
Distributed databases
Distributed storage
Robotics
Distributed Games
Bidang yang perkembangannya sangat cepat
Kesempatan karir yang luas : Google, Facebook,
eBay, Microsoft, Cisco, HP, Intel, dll.
Konsep Dasar Jaringan
Kla sifik a si Pe r a n gk a t Kon e k si k e Ja r in ga n Kom pu t e r
- • End-user devices Network devices
- 1 .
En d- u se r de vice s perangkat yang memberikan service langsung di sisi user : Komputer, printer, scanner, dll.
2 .
N e t w or k de vice s perangkat yang mengkoneksikan end- user devices satu sama lain untuk memungkinkan berkomunikasi.
A-Network Device
Network interface card
Sistem Pengkabelan
Sistem tanpa kabel
Networking Device
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation. A repeater does not
perform intelligent routing .
Hub Hubs concentrate connections
In other words, they take a group of hosts and allow the network to see them as a single unit.
This is done passively, without any other effect on the data transmission.
Active hubs not only concentrate hosts, but they also regenerate signal s.
Bridge
Bridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LA Ns. Not only do bridges connect LANs, but they also perform a check on the da ta to determine whether it should cross the bridge or not. This makes each part of the network more
efficient.
Workgroup Switch
Workgroup switches add more intelligence to data transfer management.
Switches can determine whether data should remain on a LAN or not , and they can transfer the data to the connection that needs
Router
Routers have all capabilities of the previous devices.
Routers can regenerate signals, concentrate multiple
connections, convert data transmission formats, and
manage data transfers .They can also connect to a WAN,
which allows them to connect LANs that are separated by
great distances.
“The Cloud”
The cloud is used in diagrams to represent where the
connection to the internet is. It also represents all of the
devices on the internet.
B-Topologi Jaringan
Network topology defines the structure of the network.
1 . Th e ph ysica l t opology , which is the actual layout of the wire or media.
, which defines how the
2 . Th e logica l t opology
media is accessed by the hosts for sending data.
2 - Logical Tipologies - Sebaran Area
Data Network (LAN, MAN, WAN,)LAN (Local-area network )
Wireless LAN Organizations and Standards
In cabled networks, IEEE is the prime issuer of standards for wireless networks. The standards have been created within the framework of the regulations created by the Federal Communications Commission (FCC).
A key technology contained within the 802.11 standard is Direct Sequence Spread Spectrum (DSSS).
Cellular Topology for Wireless
WAN (Wide-area networks)
SAN (Storage Area Network)
A SAN is a dedicated, high-performance network used to move data between servers and storage resources.
Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.
Virtual Private Network
A VPN is a private network that is constructed within a public
network infrastructure such as the global Internet. Using VPN,
a telecommuter can access the network of the company
headquarters through the Internet by building a secure tunnel
between the telecommuter’s PC and a VPN router in the
headquarters.
C - Bandwidth
D - OSI (Open System Interconnection) Reference Model
To address the problem of networks , the in cr e a sin g in siz e a n d in n u m be r International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to cr e a t e a n e t w or k that would help network builders m ode l implement networks that could communicate and work together and therefore, released the OSI reference
The OSI Reference Model
7 Applica t ion
Th e OSI M ode l w ill
6 Pr e se n t a t ion
be u se d t h r ou gh ou t
5 Se ssion
you r e n t ir e n e t w or k in g ca r e e r !
4 Tr a n spor t
3 N e t w or k
H a r u s
2 D a t a Lin k
I n ga t !!
1 Ph ysica l
Layer 7 - The Application Layer
7 Applica t ion
6 Pr e se n t a t ion
5 Se ssion
- Em a il
- W e b br ow se r s
4 Tr a n spor t
3 N e t w or k
2 D a t a Lin k
1 Ph ysica l
Th is la ye r de a l w it h n e t w or k in g a pplica t ion s. Ex a m ple s:
PD U - Use r D a t a
Layer 6 - The Presentation Layer
7 Applica t ion
6 Pr e se n t a t ion
5 Se ssion
- En cr ypt ion
- Com pr e ssion
4 Tr a n spor t
3 N e t w or k
2 D a t a Lin k
1 Ph ysica l
Th is la ye r is r e spon sible for pr e se n t in g t h e da t a in t h e r e qu ir e d for m a t w h ich m a y in clu de :
PD U - For m a t t e d D a t a
Layer 5 - The Session Layer
7 Applica t ion
6 Pr e se n t a t ion
5 Se ssion
4 Tr a n spor t
- Clie n t Soft w a r e ( Use d for loggin g in ) PD U - For m a t t e d D a t a
3 N e t w or k
2 D a t a Lin k
1 Ph ysica l
Th is la ye r e st a blish e s, m a n a ge s, a n d t e r m in a t e s se ssion s be t w e e n t w o com m u n ica t in g h ost s. Ex a m ple :
Layer 4 - The Transport Layer
7 Applica t ion Th is la ye r br e a k s u p t h e da t a fr om t h e se n din g
6 Pr e se n t a t ion h ost a n d t h e n r e a sse m ble s it in t h e
5 Se ssion r e ce ive r .
4 Tr a n spor t I t a lso is u se d t o in su r e
3 N e t w or k r e lia ble da t a t r a n spor t
2 D a t a Lin k a cr oss t h e n e t w or k .
1 Ph ysica l PD U - Se gm e n t s
Layer 3 - The Network Layer
7 Applica t ion
6 Pr e se n t a t ion
5 Se ssion
4 Tr a n spor t
3 N e t w or k
2 D a t a Lin k
1 Ph ysica l Som e t im e s r e fe r r e d t o a s t h e “Cisco La ye r ”. M a k e s “Be st Pa t h D e t e r m in a t ion ” de cision s ba se d on logica l a ddr e sse s ( u su a lly I P a ddr e sse s) . PD U - Pa ck e t s
Layer 2 - The Data Link Layer
7 Applica t ion
6 Pr e se n t a t ion
5 Se ssion
4 Tr a n spor t
3 N e t w or k
2 D a t a Lin k
1 Ph ysica l
Th is la ye r pr ovide s r e lia ble t r a n sit of da t a a cr oss a ph ysica l lin k . M a k e s de cision s ba se d on ph ysica l a ddr e sse s ( u su a lly M AC a ddr e sse s) . PD U - Fr a m e s
Layer 1 - The Physical Layer Th is is t h e ph ysica l m e dia t h r ou gh w h ich t h e da t a
7 Applica t ion
r e pr e se n t e d a s e le ct r on ic sign a ls, is se n t fr om t h e sou r ce
6 Pr e se n t a t ion h ost t o t h e de st in a t ion h ost .
5 Se ssion
Ex a m ple s:
4 Tr a n spor t
- CAT5 ( w h a t w e h a ve )
- Coa x ia l ( lik e ca ble TV)
3 N e t w or k
- Fibe r opt ic
2 D a t a Lin k
PD U - Bit s
1 Ph ysica l
Tren dan Perkembangan Jaringan Komputer 1
Network Security 2. Mobile Networking 3. Wireless Networking 4. Energy Efficient Networking 5. Multimedia Networking 6. Datacenter Networking 7. Next Generation Internet
Topik ini berdasarkan aktivitas riset di industri seperti Internet Engineering Task Force (IETF), Internet Research Task
1 – Network Security
No aut hent icat ion:
DNS attack, contoh: seluruh YouTube traffic diarahkan ke “black hole” di Pakistan.
[Domain Name System (DNS) is used to convert names like www.youtube.com to Internet Protocol (IP) Addresses, e.g., 128.23.45.56]
Phishing: memasukkan informasi personal di fake websit es
Spam
Cyber warfare
Phishing
Email dari bank dan layanan financial diarahkan ke fake websit es,seperti http://www.bankofamerica.com sesungguhnya dikirim ke http://hackers.com
Layanan “free public wireless” dapat pula mengoleksi passwords user yang akses. Spam
200 milliar messages/hari, 88-90% adalah email.
81% spam tentang farmasi
Membebani bisnis sekitar $100 miliar pada tahun 2007
Dikirimkan via Bot n e t s dari komputer yang terinfeksi.
Ref: http://en.wikipedia.org/wiki/Email_spam
Cyber Warfare Negara-negara melakukan penetrasi komputer satu sama lain.
Merupakan domain kelima dari m odern w arfare (setelah darat, laut, udara dan ruang angkasa)
2009, US set up pusat komando cyber com m and
UK, China, Russia, Israel, North Korea memiliki pusat komando yg mirip US.
Pentagon menghabiskan $100 juta di 6bulan pertama 2009 untuk memperbaiki kehancuran dari cyber attacks.
Ref: http://en.wikipedia.org/wiki/Cyber_war Contoh : N ov 2 0 1 0 , hackers yang mengaku sebagai “Indian Cyber Army” attacked Websites Pakistan.
D e s 2 0 1 0 , “Pakistan Cyber Army” menyerang Indian Central Bureau of Intelligence.
2 – Mobile Networking
Smart Phones (Blackberry, iPhone,Android Phones), Net book, Laptop Æ Mobile komputer Mobility: tetap di dalam koneksi net working session dimanapun
berada. Istilah kita : Online t erus…
Mobile ≠ Wireless. Wired m obilit y : Mulai download di kantor/kampus dan diteruskan saat di rumah
Network telpon selular didesain untuk mobility tapi Internet protocol belum.
Slot data
≠ slot voice
3 - Wireless Networking
Wireless (WiFi) dapat tersebar dimanapun berada. Lebih banyak Cell phones dari POTS.Proyeksi Rasionya akan menjadi 4-to- 1 pada 2012.
Sistem pengkabelan lebih mahal dari tanpa kabel Æ Wireless Access
Pengembangan Teknologi WIFI Saat ini :
4G: 1Gbps Metropolitan Area Networks (LTE-Advanced, WiMAX V2)
Vehicular Networking (802.11p)
Ad-hoc Wireless Networks
TV Band (700 MHz) networking
Audio/Video over Wi-Fi (802.11aa)
4 - Energy Efficient Networking Internet didesain dgn asumsi semua host up setiap waktu tanpa henti. Kita tidak bisa mematikan router kita. Industri komputer menghasilkan green house gases sebanyak industri penerbangan
Satu komputer server sederhana = satu mobil SUV dengan konsumsi 15 mil/gallon (6km/liter)
Kita membutuhkan desain protokol yang mengizinkan nodes untuk dapat berhenti jika tidak bekerja.
Energy Efficient Ethernet:
Mematikan sebagian besar sirkuit sampai bit data selanjutnya tiba
Delay-Tolerant Networking: Router
5 - Multimedia Networking
Trend:
Audio/Video over networks Entertainment on cellular phones Home Entertainment Movies on Demand
YouTube, dailymotion - VoD, live
Isu:
Timing and synchronization Peer to peer streaming Stream reservation Media caching
6 - Datacenter Networking
1. Cloud Computing:
Applicat ion via Internet (Google Docs)
Com put ing via Internet (Amazon EC3)
St orage and backup via Internet
2. Isu:
Inter-Cloud Provider Networking: High-speed links on demand
Policy, Security, QoS issues (Multi- organizational ownership)
3. Data Center Networking: Optimalisasi Ethernet untuk data centers
Congestion control pada Multi- Gigabit Speeds
7 – Internet Next Generation
Internet 1.0: Before Com m ercializat ion
20 tahun pertama (1969-1989)
No Security, Optimal routing, infrastruktur kepemilikan tunggal
Internet 2.0: Aft er Com m ercializat ion
1989-2009
Security, Policy based routing: ISP, infrastruktur kepemilikan banyak pihak, tidak ada pengetahuan tipologi & sumber daya internal tiap jaringan yang terhubung
Internet 3.0:
20 tahun selanjutnya
Kepemilikan berdasarkan users, content (obj ect orient ed), dan host, kekuatan berbagi content dan Service Negot iat ion Trend Next generation Internet
Hampir semua top 50 Internet sites adalah berbasiskan services [Alexa]
Akses ke Smart Phones: BB, iPhone, Nokia, Android Apps
New globally distributed services, Games, application ; Apple store, android market, BB Application…
Clouds next generation, …
Ja r in ga n Kom pu t e r dibu t u h k a n u n t u k
m e n du k u n g se ca r a e fisie n t e r h a da p I n st a la si
1 . Re plica t ion : Multiple datacenter tampil
(seakan-akan) dalam satu database besar
2 . Fa u lt Tole r a n ce : Connect ke B jika A sedang
dow n
3 . Loa d Ba la n cin g: 50% untuk A, 50% untuk B
4 . Tr a ffic En gin e e r in g: 80% pada Path A, 20%
pada Path B
5 . Se r ve r M obilit y: Memindahkan service antar
clouds, Dynam ic Set up Æ Networking sebagai Service
6 . Use r M obilit y: Gaming/Video/audio… tidak berhenti saat user berpindah tempat.
7 . Se cu r it y: Menjaga aspek-aspek Provenance, Authentication, Privacy, ...
Apa dan Bagaimana Kesempatan kita?
E-commerce : tidak hanya pada website, tapi juga jejaring sosial
Content provider
Application service provider : create, customize, maintenance
Internet service provider : wireless, ADSL,…
Security service provider : pengawasan…
Selesai untuk saat ini...
Terima kasih atas perhatian,