Upload
mawanilpaparazzo
View
72
Download
3
Tags:
Embed Size (px)
Citation preview
Komunikasi Data Komunikasi Data dan Jaringan dan Jaringan
Dr. Mohammad Mustafa Dr. Mohammad Mustafa SarinantoSarinanto
Program Pasca Sarjana Ilmu Komputer Universitas Budi Luhur - Jakarta
Materi Pendahuluan
Materi Perkuliahan Sesi Materi Perkuliahan Sesi II
Minggu ke 1 : Minggu ke 1 : The Data Communications IndustryThe Data Communications Industry Minggu ke 2 : Minggu ke 2 : Data Communications Concepts Data Communications Concepts Minggu ke 3 : Basic Data Communication Minggu ke 3 : Basic Data Communication
Technology Technology Minggu ke 4 : Minggu ke 4 : Local Area Networks (LAN)Local Area Networks (LAN) Minggu ke 5 : Voice Communication Concepts & Minggu ke 5 : Voice Communication Concepts &
TechnologyTechnology Minggu ke 6 : Wide Area Networking (WAN) Minggu ke 6 : Wide Area Networking (WAN)
Concepts, Architectures, and ServicesConcepts, Architectures, and Services Minggu ke 7 : UTSMinggu ke 7 : UTS
2222
Materi Perkuliahan Sesi Materi Perkuliahan Sesi IIII Minggu ke 8 : Minggu ke 8 : Internetworking (LAN Internetworking (LAN
Communications Protocols)Communications Protocols) Minggu ke 9 : Minggu ke 9 : Internetworking (Advance TCP/IP Internetworking (Advance TCP/IP
Network Design)Network Design) Minggu ke 10 : Data Communication Operating Minggu ke 10 : Data Communication Operating
Systems Systems Minggu ke 11 : The Network Development Life Minggu ke 11 : The Network Development Life
Cycle (NDLC)Cycle (NDLC) Minggu ke 12 :Network ManagementMinggu ke 12 :Network Management Minggu ke 13 :Minggu ke 13 : Network Security Network Security Minggu ke 14 : UASMinggu ke 14 : UAS
3333
Text BookText Book James E. Goldman & Philips James E. Goldman & Philips
T. Rawles, T. Rawles, Applied Data Applied Data Communications : A Communications : A Busines Oriented Busines Oriented Approach, 4Approach, 4thth edition edition, John , John Wiley & Sons Inc, 2004Wiley & Sons Inc, 2004
Larry L. Peterson & Bruce S. Larry L. Peterson & Bruce S. Davie, Davie, Computer Computer Networks : A System Networks : A System Approach, 2Approach, 2ndnd edition, edition, Morgan Kauffman, 2000Morgan Kauffman, 2000
4444
PenilaianPenilaian Quiz (10%)Quiz (10%) Tugas (20%)Tugas (20%) Ujian Tengah Semester (30%)Ujian Tengah Semester (30%) Ujian Akhir Semester (40%)Ujian Akhir Semester (40%)
5555
Tujuan PerkuliahanTujuan PerkuliahanKuliah ini terdiri dari dua topik utama yang saling Kuliah ini terdiri dari dua topik utama yang saling mendukung yakni teknologi komunikasi data dan mendukung yakni teknologi komunikasi data dan jaringan komputer. Fokus teknologi komunikasi data jaringan komputer. Fokus teknologi komunikasi data memberikan wawasan terhadap implementasi jaringan memberikan wawasan terhadap implementasi jaringan komunikasi data dalam jaringan skala luas, sebagai komunikasi data dalam jaringan skala luas, sebagai salah satu infrastruktur teknologi informasi penting salah satu infrastruktur teknologi informasi penting untuk jaringan korporat. Sedangkan fokus jaringan untuk jaringan korporat. Sedangkan fokus jaringan komputer membahas model dan teknik implementasi komputer membahas model dan teknik implementasi jaringan komputer.jaringan komputer.
6666
Tujuan PerkuliahanTujuan Perkuliahan Memahami struktur industri komunikasi data dan telekomunikasi Memahami struktur industri komunikasi data dan telekomunikasi
sebagai bagian dari public services.sebagai bagian dari public services. Mengerti mengenai peranan standard dalam industri dan teknologi Mengerti mengenai peranan standard dalam industri dan teknologi
komunikasi data.komunikasi data. Mengerti konsep dasar dan teknologi komunikasi data, termasuk Mengerti konsep dasar dan teknologi komunikasi data, termasuk
komponen perangkat penting.komponen perangkat penting. Mengerti konsep dasar dan teknologi jaringan lokal (LANs) dan Mengerti konsep dasar dan teknologi jaringan lokal (LANs) dan
jaringan luas (WANs).jaringan luas (WANs). Mengerti fungsi dan struktur protokol suatu jaringan berdasarkan Mengerti fungsi dan struktur protokol suatu jaringan berdasarkan
model OSI dan TCP/IP.model OSI dan TCP/IP. Memahami rancangan jaringan komputer berdasarkan protokol Memahami rancangan jaringan komputer berdasarkan protokol
TCP/IP.TCP/IP. Mampu menyusun model analisa dan implementasi suatu proyek Mampu menyusun model analisa dan implementasi suatu proyek
jaringan komputer berdasarkan berbagai model IPO, NDLC dll.jaringan komputer berdasarkan berbagai model IPO, NDLC dll. Memahami manajemen operasionil suatu jaringan komputer dengan Memahami manajemen operasionil suatu jaringan komputer dengan
fokus pada fokus pada network managementnetwork management dan dan network securitynetwork security..
7777
Jaringan dan Jaringan dan Pengaturan Dunia Maya Pengaturan Dunia Maya
Paradigma lama : Pengelola jaringan Paradigma lama : Pengelola jaringan adalah ‘Tukang’adalah ‘Tukang’
Paradigma baru : Pengelola jaringan Paradigma baru : Pengelola jaringan adalah ‘Penguasa Informasi’adalah ‘Penguasa Informasi’
The Data The Data Communication Communication
IndustryIndustryMateri Perkuliahan IMateri Perkuliahan I
9999
What is Data CommunicationsWhat is Data Communications
““The encoded transmission of data or The encoded transmission of data or information via electrical, optical, or information via electrical, optical, or wireless means between computers or wireless means between computers or network processors.” network processors.”
10101010
Informasi Pada Abad 21Informasi Pada Abad 21 Pada Pada abad 21 “knowledge” akan menjadi Pada Pada abad 21 “knowledge” akan menjadi
sumber daya yang lebih “powerful” dibanding sumber daya yang lebih “powerful” dibanding kapital dan sumberdaya alamkapital dan sumberdaya alam
Munculnya Munculnya Information SocietyInformation Society dan dan Knowledge Knowledge Base SocietyBase Society
Peran informasi, sebagai input dan sekaligus Peran informasi, sebagai input dan sekaligus output dari Iptek, menjadi semakin penting output dari Iptek, menjadi semakin penting dalam era knowledge-based economydalam era knowledge-based economy
Teknologi Informasi menjadi pilar utama dalam Teknologi Informasi menjadi pilar utama dalam pembangun peradaban manusiapembangun peradaban manusia
11111111
Price of a call
High
Local Fixed Line
Operator
LongDistanceOperator
LongDistanceOperator
InternationalLong Distance
Local FixedLine Voice
Wireless/Cellular
GlobalSatellite IP-based
Services
Direct Broadcast
Multimedia/Broadband
Pergeseran Paradigma Teknologi Komunikasi Data
Mobility
High
Low
Circa 1990: Market Definition Future: Market DefinitionHigh
Low
Distance Bandwidth Req.
Low LowHigh
Adapted From AT Kearney
The paradigm shift from Price-Distance toward Mobility-Bandwidth Driven by the technology advancements and the sift of the user’s needs
Regulatory barriers
12121212
e-TV
GSM/GPRS/CDMA
PDA
PC
3A .... Anytime, Anywhere, Anyhow
The New Paradigm...
07.00 h 19.00 h 21.00 h 24.00 h
13131313
The New Paradigm.......Convergence3C .... Communications, Computing, and Content
Mobile/Cellular Phone
Web/ Internet
Terrestrial Broadcast
Multimedia Platform
VideoData/Text Voice/Sound
Main Frame Super Computer
Computer Cluster
80-an 90-an
2000
Content
Communications
InteractiveInteractiveMultimediaMultimedia
Dig
ital
Info
rmat
ion
DigitalInformation
Digital
Information
Computing
0
500
1000
1500
2000
Mobile
1990 2000 2010
Fixed
Skala normal (million US$)
Internet
14141414
How to manage & control this convergence ?How to manage & control this convergence ?
MultimediaMultimediaPlatformPlatform
Media Access Device Application
communicate
do business
stay informed
get entertained
shop
go to the bank
get insured
15151515
VoiceData
Video
Push to TalkVoice ConferenceVoice mail
Music on lineRing back tone
Work Collaboration
SMSEmailBrowsingTransactionTelemeteringRemote monitoring Imaging
Video messagingVideo game
Online TVVideo streaming
MM messagingMM conferenceMM browsing
MM game
Video phone
Data Communication Business and Data Communication Business and Service Service
Telecommunications Sector
Information Technology
Sector
Media Sector
ConvergenceConvergence
16161616
The Data The Data Communication Communication
Distribution and MediaDistribution and Media Mobile
Cellular Web/Internet
TV/Video
17171717
The Data Communication The Data Communication Applications (RFID)Applications (RFID)
18181818
The Data Communication The Data Communication Applications (Wireless Applications (Wireless
Communication)Communication)
19191919
WANWAN MANMAN LANLAN PANPAN
3G3GWCDMAWCDMA
GPRSGPRSEDGEEDGE
WiMAXWiMAX802.16802.16
Real BroadbandReal Broadband
Wi-FiWi-Fi802.11802.11<300ft.<300ft.
UWBUWBandand
BluetoothBluetooth
Pervasive Connectivity:Pervasive Connectivity:Wireless Technologies Will Co-Wireless Technologies Will Co-
ExistExist
RFID/RFID/TAGTAG
****
*Other brands and names are the property of their respective owners.*Other brands and names are the property of their respective owners.
The Result: Optimal ConnectivityThe Result: Optimal Connectivity
20202020
21212121
HumanHumanResourcesResources
DevelopmentDevelopment
GoodGoodGovernanceGovernanceData communication Data communication
and and ICT IndustryICT Industry
Indonesia Government Indonesia Government PolicyPolicy
Sumber : Sambutan Presiden dalam ICT Conference 3 Mei 2005
Information Society and Knowledge Based Society
Information and Communication Technology
Membangun masa depan Indonesia yang lebih aman dan damai, lebih adil dan demokratis serta lebih sejahtera
Education :
-Added Value
-E-Literacy
E-Government
E-Procurement
E-Commerce
E-Business
The Data Communication The Data Communication Industry DevelopmentIndustry Development
StackholdersStackholders RegulationRegulation StandardizationStandardization Driving ForceDriving Force Competency (HRD)Competency (HRD)
22222222
Stackholders of the Data Stackholders of the Data Communications IndustryCommunications Industry
The Data Communications industry has many The Data Communications industry has many stakeholders with complex relationshipsstakeholders with complex relationships
23232323
The Regulatory ProcessThe Regulatory Process
Two tightly dependent components in a constant Two tightly dependent components in a constant and ongoing state of change are the and ongoing state of change are the regulatoryregulatory and and carriercarrier components. components.
The regulatory component represents local, The regulatory component represents local, state, and federal agencies charged with state, and federal agencies charged with regulating telecommunications, regulating telecommunications,
The carrier component represents companies The carrier component represents companies such as telephone and cable TV companies that such as telephone and cable TV companies that sell transmission services.sell transmission services.
24242424
The Regulatory ProcessThe Regulatory Process
This interaction is a rather formal process This interaction is a rather formal process of a series of proposals, also known as of a series of proposals, also known as tariffs.tariffs.
Tariffs are submitted to state and federal Tariffs are submitted to state and federal regulatory agencies by carriers, and regulatory agencies by carriers, and rulings and approvals are issued in returnrulings and approvals are issued in return
25252525
The Regulatory ProcessThe Regulatory Process
Carriers and agencies interact in the Carriers and agencies interact in the formation of tariffs.formation of tariffs.
26262626
The Importance of StandardsThe Importance of Standards
Without standards, data communications would Without standards, data communications would be nearly impossiblebe nearly impossible
Standards Standards allow multiple vendors to allow multiple vendors to manufacture competing products that work manufacture competing products that work together effectively. together effectively.
End-users can be confident that devices will End-users can be confident that devices will operate as specified and will interoperate operate as specified and will interoperate successfully. successfully.
Standards can have a tremendous potential Standards can have a tremendous potential economic impact on vendorseconomic impact on vendors
27272727
Technology and Standards DevelopmentTechnology and Standards Development
The development of a standard generally lags The development of a standard generally lags the development of the technology.the development of the technology.
28282828
The Standards ProcessThe Standards Process
1. 1. Recognition of the need for a standardRecognition of the need for a standard
2. 2. Formation of some type of committee or Formation of some type of committee or task force task force
3. 3. Information/recommendation gathering Information/recommendation gathering phase phase
4. 4. Tentative/alternative standards issued Tentative/alternative standards issued
5. 5. Feedback on tentative/alternative standards Feedback on tentative/alternative standards
6. 6. Final standards issuedFinal standards issued
7. 7. Compliance with final standardsCompliance with final standards
29292929
Driving Forces in the Driving Forces in the Datacomm IndustryDatacomm Industry
30303030
The Top-Down ApproachThe Top-Down Approach
Business needs drive solutions.Business needs drive solutions.
31313131
The OSI ModelThe OSI Model
The ISO has developed a framework for The ISO has developed a framework for organizing networking technology and protocol organizing networking technology and protocol solutions known as the open systems solutions known as the open systems interconnection (OSI) network reference model. interconnection (OSI) network reference model.
The The OSI Model OSI Model consists of a hierarchy of 7 consists of a hierarchy of 7 layers that loosely group the functional layers that loosely group the functional requirements for communication between two requirements for communication between two computing devices.computing devices.
The OSI ModelThe OSI Model
The power of the OSI Model, officially known as The power of the OSI Model, officially known as ISO Standard 7489, lies in its openness and ISO Standard 7489, lies in its openness and flexibility. flexibility.
It can be used to organize and define protocols It can be used to organize and define protocols involved in communicating between two involved in communicating between two computing devices located in the same room as computing devices located in the same room as effectively as two devices located on opposite effectively as two devices located on opposite sides of the world.sides of the world.
It is It is thethe reference mode in the world of reference mode in the world of telcommunicationstelcommunications
ProtocolsProtocols
A A protocol protocol is a set of rules that govern is a set of rules that govern communication between hardware and/or communication between hardware and/or software components.software components.
There are many well known as well as a There are many well known as well as a few obscure protocols used in few obscure protocols used in telecommunications.telecommunications.
OSI Model OverviewOSI Model Overview
Mapping the OSI modelMapping the OSI model
The OSI model maps to the Internet model and The OSI model maps to the Internet model and corresponding protocols.corresponding protocols.
The OSI modelThe OSI model
Network analysts literally talk in terms of the OSI model. Network analysts literally talk in terms of the OSI model. When troubleshooting network problems, the network When troubleshooting network problems, the network
analyst starts with the physical layer and ensures that analyst starts with the physical layer and ensures that protocols and interfaces are operational at each layer. protocols and interfaces are operational at each layer.
Another benefit of the OSI model is that it allows Another benefit of the OSI model is that it allows discussion about the interconnection of two networks or discussion about the interconnection of two networks or computers in common terms without dealing in computers in common terms without dealing in proprietary vendor jargonproprietary vendor jargon
Physical LayerPhysical Layer
responsible for the establishment, responsible for the establishment, maintenance and termination of physical maintenance and termination of physical connections between communicating connections between communicating devices. devices.
transmits and receives a stream of bits. transmits and receives a stream of bits. no data recognition at the physical layer.no data recognition at the physical layer.
Data Link LayerData Link Layer
responsible for providing protocols that deliver responsible for providing protocols that deliver reliable point-to-point connectionsreliable point-to-point connections
organizing the bit stream into structured organizing the bit stream into structured framesframes which add addressing and error checking which add addressing and error checking information. information.
Additional information added to the front of data Additional information added to the front of data is called a is called a headerheader, ,
information added to the back of data is called a information added to the back of data is called a trailertrailer. .
Data link layer protocols provide error detection, Data link layer protocols provide error detection, notification, and recoverynotification, and recovery
Data Link Layer (NIC’s)Data Link Layer (NIC’s)
Data-link layer frames are built within the Data-link layer frames are built within the network interface card network interface card installed in a computer installed in a computer according to the pre-determined frame layout according to the pre-determined frame layout particular to the network architecture of the particular to the network architecture of the installed network interface card. installed network interface card.
Network interface cards are given a unique Network interface cards are given a unique address in a format determined by their network address in a format determined by their network architecture. architecture.
These addresses are usually assigned and pre-These addresses are usually assigned and pre-programmed by the NIC manufacturer.programmed by the NIC manufacturer.
Data Link Layer – Sub LayersData Link Layer – Sub Layers
The IEEE 802 committee split the data-link layer The IEEE 802 committee split the data-link layer into two sub-layersinto two sub-layers : :
media access control media access control or or MAC sub-layer MAC sub-layer interfaces with the physical layer and is interfaces with the physical layer and is represented by protocols which define how the represented by protocols which define how the shared local area network media is to be shared local area network media is to be accessed by the many connected computersaccessed by the many connected computers
logical link control logical link control or or LLC sub-layer LLC sub-layer and is and is represented by a single IEEE 802 protocol (IEEE represented by a single IEEE 802 protocol (IEEE 802.2). 802.2).
LLC Sub-LayerLLC Sub-Layer
Splitting the data-link layer into two sub-layers Splitting the data-link layer into two sub-layers offers transparency to the upper layers (network offers transparency to the upper layers (network and above) while allowing the MAC sub-layer and above) while allowing the MAC sub-layer protocol to vary independently. protocol to vary independently.
This allows a given network operating system to This allows a given network operating system to run equally well over a variety of different run equally well over a variety of different network architectures as embodied in network network architectures as embodied in network interface cardsinterface cards
Network LayerNetwork Layer
network layer network layer protocols are responsible for the protocols are responsible for the establishment, maintenance, and termination of establishment, maintenance, and termination of end-to-end network links. end-to-end network links.
Network layer protocols are required when Network layer protocols are required when computers that are not physically connected to computers that are not physically connected to the same LAN must communicate. the same LAN must communicate.
Network layer protocols are responsible for :Network layer protocols are responsible for : providing network layer (end-to-end) providing network layer (end-to-end) addressingaddressing
schemes and schemes and for enabling for enabling inter-network routinginter-network routing of network layer of network layer
data data packets.packets.
Network Layer (Packets v. Frames)Network Layer (Packets v. Frames)
The term The term packetspackets is usually associated is usually associated with with network layer protocolsnetwork layer protocols while the term while the term framesframes is usually associated with is usually associated with data link data link layer protocolslayer protocols..
Transport LayerTransport Layer transport layer transport layer protocols are responsible for protocols are responsible for
providing reliability for the end-to-end network providing reliability for the end-to-end network layer connections. layer connections.
Transport layer protocols provide end-to-end error Transport layer protocols provide end-to-end error recovery and flow control. recovery and flow control.
Transport layer protocols also provide mechanisms Transport layer protocols also provide mechanisms for sequentially organizing multiple network layer for sequentially organizing multiple network layer packets into a coherent packets into a coherent message.message.
Session LayerSession Layer
Session layer Session layer protocols are responsible for protocols are responsible for establishing, maintaining, and terminating establishing, maintaining, and terminating sessions between user application programs. sessions between user application programs.
SessionsSessions are are interactive dialoguesinteractive dialogues between between networked computers and are of particular importance networked computers and are of particular importance to distributed computing applications in a client/server to distributed computing applications in a client/server environmentenvironment
Presentation LayerPresentation Layer
Presentation layer Presentation layer protocols provide an protocols provide an interface between user applications and various interface between user applications and various presentation-related services required by those presentation-related services required by those applications. applications.
For example, data encryption/decryption For example, data encryption/decryption protocols are considered presentation layer protocols are considered presentation layer protocols as are protocols that translate between protocols as are protocols that translate between encoding schemes such as ASCII to EBCDICencoding schemes such as ASCII to EBCDIC
Application LayerApplication Layer
include utilities and network based services that include utilities and network based services that support end-user application programs. support end-user application programs.
the best examples of application layer protocols the best examples of application layer protocols are the OSI protocols X.400 and X.500. are the OSI protocols X.400 and X.500.
DNS, Domain Name Service, which is an DNS, Domain Name Service, which is an Internet protocol that resolves a computer's Internet protocol that resolves a computer's common or domain name to a specific IP common or domain name to a specific IP address, is also considered an application layer address, is also considered an application layer protocolprotocol
The Top-Down Approach to The Top-Down Approach to Information Systems DevelopmentInformation Systems Development
Networking and Telecomm in the ISD context.Networking and Telecomm in the ISD context.
49494949
Certification Certification
Certification as an indication of mastery of Certification as an indication of mastery of a particular technology may be important a particular technology may be important in some employment situations.in some employment situations.
There are a number of well known There are a number of well known certifications.certifications.
50505050
Certification ConcernsCertification Concerns
The amount of practical, hands-on experience The amount of practical, hands-on experience required to earn a given certification.required to earn a given certification.
The amount of continuing education and The amount of continuing education and experience required to retain a certification.experience required to retain a certification.
Vendor-specific certifications do not provide the Vendor-specific certifications do not provide the broad background required for today’s broad background required for today’s multivendor internetworks.multivendor internetworks.
51515151
Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals
52525252
Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals
Understand and can speak “business.”Understand and can speak “business.” Demonstrate an ability to own and solve Demonstrate an ability to own and solve
business problems in a partnership rather business problems in a partnership rather than consultative role.than consultative role.
Demonstrate an ability to look outside their Demonstrate an ability to look outside their own expertise for solutions.own expertise for solutions.
Exhibit an understanding of the need for Exhibit an understanding of the need for lifelong learning. lifelong learning.
53535353
Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals
Demonstrate an ability to evaluate technology Demonstrate an ability to evaluate technology with a critical eye as to cost/benefit and potential with a critical eye as to cost/benefit and potential for significant business impact.for significant business impact.
Understand comparative value and proper Understand comparative value and proper application of available network services application of available network services
Can work effectively with carriers to see that Can work effectively with carriers to see that implementations are completed properly and implementations are completed properly and cost effectively.cost effectively.
Communicate effectively, verbally and orally, Communicate effectively, verbally and orally, with both technically oriented and management with both technically oriented and management personnel.personnel.
54545454
AssignmentAssignment
Reading Chapter 1 & 2Reading Chapter 1 & 2 Cerita ttg topik yang diminati dalam Cerita ttg topik yang diminati dalam
bidang TIKbidang TIK