Konsep Perkembangan Jaringan Komputer

  Konsep & Perkembangan Jaringan Komputer DR. Mohammad Iqbal

  Ku lia h Um u m Ja r in ga n Kom pu t e r Un ive r sit a s Gu n a da r m a Outline ‡

  Konsep Dasar Jaringan ‡

  Tren dan Perkembangan Jaringan ‡

  Apa dan bagaimana selanjutnya ? Zaman Batu sampai Zaman Jaringan Komputer ‡

  

Penemuan Batu – besi -, …, - otomotif –

listrik – telepon - pesawat jet -… Jaringan

Komputer telah mengubah fundamental

gaya hidup manusia.

  Tida k pe r lu k e lu a r V ir t u a l r e a lit y akan r u m a h , u n t u k : memuaskan kebutuhan kita

  1. Ke kantor untuk : 2. belanja

  Games

  3. Entertainment Turisme

  Mengapa Studi Jaringan Komputer itu penting? ‡

  Hampir semua area komputansi adalah net work-

  based. Contoh : „

  Distributed computing

  „

  Distributed databases

  „

  Distributed storage

  „

  Robotics

  „

  Distributed Games

  ‡

  Bidang yang perkembangannya sangat cepat

  

‡ Kesempatan karir yang luas : Google, Facebook,

eBay, Microsoft, Cisco, HP, Intel, dll.

  

Konsep Dasar Jaringan

‡

  Kla sifik a si Pe r a n gk a t Kon e k si k e Ja r in ga n Kom pu t e r

  • End-user devices Network devices

  • 1 .

  En d- u se r de vice s perangkat yang memberikan service langsung di sisi user : Komputer, printer, scanner, dll.

  2 .

  N e t w or k de vice s perangkat yang mengkoneksikan end- user devices satu sama lain untuk memungkinkan berkomunikasi.

  

A-Network Device

‡

  Network interface card ‡

  

Sistem Pengkabelan

‡

  Sistem tanpa kabel

  Networking Device

  Repeater

A repeater is a network device used to regenerate a signal.

  

Repeaters regenerate analog or digital signals distorted by

transmission loss due to attenuation. A repeater does not

perform intelligent routing .

Hub Hubs concentrate connections

  In other words, they take a group of hosts and allow the network to see them as a single unit.

  This is done passively, without any other effect on the data transmission.

  Active hubs not only concentrate hosts, but they also regenerate signal s.

Bridge

  Bridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LA Ns. Not only do bridges connect LANs, but they also perform a check on the da ta to determine whether it should cross the bridge or not. This makes each part of the network more

efficient.

Workgroup Switch

  Workgroup switches add more intelligence to data transfer management.

  Switches can determine whether data should remain on a LAN or not , and they can transfer the data to the connection that needs

  Router

Routers have all capabilities of the previous devices.

  

Routers can regenerate signals, concentrate multiple

connections, convert data transmission formats, and

manage data transfers .They can also connect to a WAN,

which allows them to connect LANs that are separated by

great distances.

  “The Cloud”

The cloud is used in diagrams to represent where the

connection to the internet is. It also represents all of the

devices on the internet.

B-Topologi Jaringan

  Network topology defines the structure of the network.

  1 . Th e ph ysica l t opology , which is the actual layout of the wire or media.

  , which defines how the

  2 . Th e logica l t opology

  media is accessed by the hosts for sending data.

  

2 - Logical Tipologies - Sebaran Area

Data Network (LAN, MAN, WAN,)

  LAN (Local-area network )

Wireless LAN Organizations and Standards

  In cabled networks, IEEE is the prime issuer of standards for wireless networks. The standards have been created within the framework of the regulations created by the Federal Communications Commission (FCC).

  A key technology contained within the 802.11 standard is Direct Sequence Spread Spectrum (DSSS).

  Cellular Topology for Wireless

  WAN (Wide-area networks)

SAN (Storage Area Network)

  A SAN is a dedicated, high-performance network used to move data between servers and storage resources.

  Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.

Virtual Private Network

  

A VPN is a private network that is constructed within a public

network infrastructure such as the global Internet. Using VPN,

a telecommuter can access the network of the company

headquarters through the Internet by building a secure tunnel

between the telecommuter’s PC and a VPN router in the

headquarters.

  C - Bandwidth

D - OSI (Open System Interconnection) Reference Model

  To address the problem of networks , the in cr e a sin g in siz e a n d in n u m be r International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to cr e a t e a n e t w or k that would help network builders m ode l implement networks that could communicate and work together and therefore, released the OSI reference

The OSI Reference Model

  7 Applica t ion

Th e OSI M ode l w ill

  6 Pr e se n t a t ion

  be u se d t h r ou gh ou t

  5 Se ssion

  you r e n t ir e n e t w or k in g ca r e e r !

  4 Tr a n spor t

  3 N e t w or k

H a r u s

  2 D a t a Lin k

  I n ga t !!

  1 Ph ysica l

Layer 7 - The Application Layer

  7 Applica t ion

  6 Pr e se n t a t ion

  5 Se ssion

  • Em a il
  • W e b br ow se r s

  4 Tr a n spor t

  3 N e t w or k

  2 D a t a Lin k

  1 Ph ysica l

  Th is la ye r de a l w it h n e t w or k in g a pplica t ion s. Ex a m ple s:

  PD U - Use r D a t a

Layer 6 - The Presentation Layer

  7 Applica t ion

  6 Pr e se n t a t ion

  5 Se ssion

  • En cr ypt ion
  • Com pr e ssion

  4 Tr a n spor t

  3 N e t w or k

  2 D a t a Lin k

  1 Ph ysica l

  Th is la ye r is r e spon sible for pr e se n t in g t h e da t a in t h e r e qu ir e d for m a t w h ich m a y in clu de :

  PD U - For m a t t e d D a t a

Layer 5 - The Session Layer

  7 Applica t ion

  6 Pr e se n t a t ion

  5 Se ssion

  4 Tr a n spor t

  • Clie n t Soft w a r e ( Use d for loggin g in ) PD U - For m a t t e d D a t a

  3 N e t w or k

  2 D a t a Lin k

  1 Ph ysica l

  Th is la ye r e st a blish e s, m a n a ge s, a n d t e r m in a t e s se ssion s be t w e e n t w o com m u n ica t in g h ost s. Ex a m ple :

Layer 4 - The Transport Layer

  7 Applica t ion Th is la ye r br e a k s u p t h e da t a fr om t h e se n din g

  6 Pr e se n t a t ion h ost a n d t h e n r e a sse m ble s it in t h e

  5 Se ssion r e ce ive r .

  4 Tr a n spor t I t a lso is u se d t o in su r e

  3 N e t w or k r e lia ble da t a t r a n spor t

  2 D a t a Lin k a cr oss t h e n e t w or k .

  1 Ph ysica l PD U - Se gm e n t s

Layer 3 - The Network Layer

  7 Applica t ion

  6 Pr e se n t a t ion

  5 Se ssion

  4 Tr a n spor t

  3 N e t w or k

  2 D a t a Lin k

  1 Ph ysica l Som e t im e s r e fe r r e d t o a s t h e “Cisco La ye r ”. M a k e s “Be st Pa t h D e t e r m in a t ion ” de cision s ba se d on logica l a ddr e sse s ( u su a lly I P a ddr e sse s) . PD U - Pa ck e t s

Layer 2 - The Data Link Layer

  7 Applica t ion

  6 Pr e se n t a t ion

  5 Se ssion

  4 Tr a n spor t

  3 N e t w or k

  2 D a t a Lin k

  1 Ph ysica l

  Th is la ye r pr ovide s r e lia ble t r a n sit of da t a a cr oss a ph ysica l lin k . M a k e s de cision s ba se d on ph ysica l a ddr e sse s ( u su a lly M AC a ddr e sse s) . PD U - Fr a m e s

Layer 1 - The Physical Layer Th is is t h e ph ysica l m e dia t h r ou gh w h ich t h e da t a

  7 Applica t ion

  r e pr e se n t e d a s e le ct r on ic sign a ls, is se n t fr om t h e sou r ce

  6 Pr e se n t a t ion h ost t o t h e de st in a t ion h ost .

  5 Se ssion

  Ex a m ple s:

  4 Tr a n spor t

  • CAT5 ( w h a t w e h a ve )
  • Coa x ia l ( lik e ca ble TV)

  3 N e t w or k

  • Fibe r opt ic

  2 D a t a Lin k

  PD U - Bit s

  1 Ph ysica l

Tren dan Perkembangan Jaringan Komputer 1

  Network Security 2. Mobile Networking 3. Wireless Networking 4. Energy Efficient Networking 5. Multimedia Networking 6. Datacenter Networking 7. Next Generation Internet

  Topik ini berdasarkan aktivitas riset di industri seperti Internet Engineering Task Force (IETF), Internet Research Task

  1 – Network Security ‡

  No aut hent icat ion: „

  DNS attack, contoh: seluruh YouTube traffic diarahkan ke “black hole” di Pakistan.

  [Domain Name System (DNS) is used to convert names like www.youtube.com to Internet Protocol (IP) Addresses, e.g., 128.23.45.56]

  ‡ Phishing: memasukkan informasi personal di fake websit es

  ‡ Spam

  ‡ Cyber warfare

  Phishing ‡

  Email dari bank dan layanan financial diarahkan ke fake websit es,seperti http://www.bankofamerica.com sesungguhnya dikirim ke http://hackers.com

  ‡

  Layanan “free public wireless” dapat pula mengoleksi passwords user yang akses. Spam ‡

  200 milliar messages/hari, 88-90% adalah email.

  ‡ 81% spam tentang farmasi

  ‡ Membebani bisnis sekitar $100 miliar pada tahun 2007

  ‡ Dikirimkan via Bot n e t s dari komputer yang terinfeksi.

  ‡ Ref: http://en.wikipedia.org/wiki/Email_spam

  Cyber Warfare ‡ Negara-negara melakukan penetrasi komputer satu sama lain.

  ‡ Merupakan domain kelima dari m odern w arfare (setelah darat, laut, udara dan ruang angkasa)

  „ 2009, US set up pusat komando cyber com m and

  „ UK, China, Russia, Israel, North Korea memiliki pusat komando yg mirip US.

  „ Pentagon menghabiskan $100 juta di 6bulan pertama 2009 untuk memperbaiki kehancuran dari cyber attacks. ‡

  Ref: http://en.wikipedia.org/wiki/Cyber_war Contoh : N ov 2 0 1 0 , hackers yang mengaku sebagai “Indian Cyber Army” attacked Websites Pakistan.

  D e s 2 0 1 0 , “Pakistan Cyber Army” menyerang Indian Central Bureau of Intelligence.

  

2 – Mobile Networking

‡ Smart Phones (Blackberry, iPhone,

  Android Phones), Net book, Laptop Æ Mobile komputer ‡ Mobility: tetap di dalam koneksi net working session dimanapun

berada. Istilah kita : Online t erus…

  ‡ Mobile ≠ Wireless. ‡ Wired m obilit y : Mulai download di kantor/kampus dan diteruskan saat di rumah

  ‡ Network telpon selular didesain untuk mobility tapi Internet protocol belum.

  „ Slot data

≠ slot voice

  

3 - Wireless Networking

‡ Wireless (WiFi) dapat tersebar dimanapun berada. ‡ Lebih banyak Cell phones dari POTS.

  Proyeksi Rasionya akan menjadi 4-to- 1 pada 2012.

  ‡ Sistem pengkabelan lebih mahal dari tanpa kabel Æ Wireless Access

  ‡ Pengembangan Teknologi WIFI Saat ini :

  „

  4G: 1Gbps Metropolitan Area Networks (LTE-Advanced, WiMAX V2) „

  

Vehicular Networking (802.11p)

„

  Ad-hoc Wireless Networks „

  TV Band (700 MHz) networking „

  Audio/Video over Wi-Fi (802.11aa)

  4 - Energy Efficient Networking ‡ Internet didesain dgn asumsi semua host up setiap waktu tanpa henti. ‡ Kita tidak bisa mematikan router kita. ‡ Industri komputer menghasilkan green house gases sebanyak industri penerbangan

  ‡ Satu komputer server sederhana = satu mobil SUV dengan konsumsi 15 mil/gallon (6km/liter)

  ‡ Kita membutuhkan desain protokol yang mengizinkan nodes untuk dapat berhenti jika tidak bekerja.

  ‡ Energy Efficient Ethernet: „

  Mematikan sebagian besar sirkuit sampai bit data selanjutnya tiba „

  Delay-Tolerant Networking: Router

  

5 - Multimedia Networking

‡

  Trend:

  „ Audio/Video over networks „ Entertainment on cellular phones „ Home Entertainment „ Movies on Demand „

  YouTube, dailymotion - VoD, live ‡

  Isu:

  „ Timing and synchronization „ Peer to peer streaming „ Stream reservation „ Media caching

  

6 - Datacenter Networking

  1. Cloud Computing: „

  Applicat ion via Internet (Google Docs)

  „ Com put ing via Internet (Amazon EC3)

  „ St orage and backup via Internet

  2. Isu: „

  Inter-Cloud Provider Networking: High-speed links on demand „

  Policy, Security, QoS issues (Multi- organizational ownership)

  3. Data Center Networking: Optimalisasi Ethernet untuk data centers

  „ Congestion control pada Multi- Gigabit Speeds

  

7 – Internet Next Generation

‡

  Internet 1.0: Before Com m ercializat ion

  „ 20 tahun pertama (1969-1989)

  „ No Security, Optimal routing, infrastruktur kepemilikan tunggal

  ‡ Internet 2.0: Aft er Com m ercializat ion

  „ 1989-2009

  „ Security, Policy based routing: ISP, infrastruktur kepemilikan banyak pihak, tidak ada pengetahuan tipologi & sumber daya internal tiap jaringan yang terhubung

  ‡ Internet 3.0: „

  20 tahun selanjutnya „

  Kepemilikan berdasarkan users, content (obj ect orient ed), dan host, kekuatan berbagi content dan Service Negot iat ion Trend Next generation Internet ‡

  Hampir semua top 50 Internet sites adalah berbasiskan services [Alexa]

  ‡

  Akses ke Smart Phones: BB, iPhone, Nokia, Android Apps

  ‡

  New globally distributed services, Games, application ; Apple store, android market, BB Application…

  ‡

  Clouds next generation, …

  

Ja r in ga n Kom pu t e r dibu t u h k a n u n t u k

m e n du k u n g se ca r a e fisie n t e r h a da p I n st a la si

  1 . Re plica t ion : Multiple datacenter tampil

  (seakan-akan) dalam satu database besar

  

2 . Fa u lt Tole r a n ce : Connect ke B jika A sedang

dow n

  

3 . Loa d Ba la n cin g: 50% untuk A, 50% untuk B

4 . Tr a ffic En gin e e r in g: 80% pada Path A, 20%

  pada Path B

  5 . Se r ve r M obilit y: Memindahkan service antar

  clouds, Dynam ic Set up Æ Networking sebagai Service

  6 . Use r M obilit y: Gaming/Video/audio… tidak berhenti saat user berpindah tempat.

  7 . Se cu r it y: Menjaga aspek-aspek Provenance, Authentication, Privacy, ...

Apa dan Bagaimana Kesempatan kita?

  ‡ E-commerce : tidak hanya pada website, tapi juga jejaring sosial

  ‡ Content provider

  ‡ Application service provider : create, customize, maintenance

  ‡ Internet service provider : wireless, ADSL,…

  ‡ Security service provider : pengawasan…

  Selesai untuk saat ini...

  

Terima kasih atas perhatian,