55
Komunikasi Data Komunikasi Data dan Jaringan dan Jaringan Dr. Mohammad Mustafa Dr. Mohammad Mustafa Sarinanto Sarinanto Program Pasca Sarjana Ilmu Komputer Universitas Budi Luhur - Jakarta Materi Pendahuluan

Minggu Ke 1 Sarinanto 21 Agt 2010

Embed Size (px)

Citation preview

Page 1: Minggu Ke 1 Sarinanto 21 Agt 2010

Komunikasi Data Komunikasi Data dan Jaringan dan Jaringan

Dr. Mohammad Mustafa Dr. Mohammad Mustafa SarinantoSarinanto

Program Pasca Sarjana Ilmu Komputer Universitas Budi Luhur - Jakarta

Materi Pendahuluan

Page 2: Minggu Ke 1 Sarinanto 21 Agt 2010

Materi Perkuliahan Sesi Materi Perkuliahan Sesi II

Minggu ke 1 : Minggu ke 1 : The Data Communications IndustryThe Data Communications Industry Minggu ke 2 : Minggu ke 2 : Data Communications Concepts Data Communications Concepts Minggu ke 3 : Basic Data Communication Minggu ke 3 : Basic Data Communication

Technology Technology Minggu ke 4 : Minggu ke 4 : Local Area Networks (LAN)Local Area Networks (LAN) Minggu ke 5 : Voice Communication Concepts & Minggu ke 5 : Voice Communication Concepts &

TechnologyTechnology Minggu ke 6 : Wide Area Networking (WAN) Minggu ke 6 : Wide Area Networking (WAN)

Concepts, Architectures, and ServicesConcepts, Architectures, and Services Minggu ke 7 : UTSMinggu ke 7 : UTS

2222

Page 3: Minggu Ke 1 Sarinanto 21 Agt 2010

Materi Perkuliahan Sesi Materi Perkuliahan Sesi IIII Minggu ke 8 : Minggu ke 8 : Internetworking (LAN Internetworking (LAN

Communications Protocols)Communications Protocols) Minggu ke 9 : Minggu ke 9 : Internetworking (Advance TCP/IP Internetworking (Advance TCP/IP

Network Design)Network Design) Minggu ke 10 : Data Communication Operating Minggu ke 10 : Data Communication Operating

Systems Systems Minggu ke 11 : The Network Development Life Minggu ke 11 : The Network Development Life

Cycle (NDLC)Cycle (NDLC) Minggu ke 12 :Network ManagementMinggu ke 12 :Network Management Minggu ke 13 :Minggu ke 13 : Network Security Network Security Minggu ke 14 : UASMinggu ke 14 : UAS

3333

Page 4: Minggu Ke 1 Sarinanto 21 Agt 2010

Text BookText Book James E. Goldman & Philips James E. Goldman & Philips

T. Rawles, T. Rawles, Applied Data Applied Data Communications : A Communications : A Busines Oriented Busines Oriented Approach, 4Approach, 4thth edition edition, John , John Wiley & Sons Inc, 2004Wiley & Sons Inc, 2004

Larry L. Peterson & Bruce S. Larry L. Peterson & Bruce S. Davie, Davie, Computer Computer Networks : A System Networks : A System Approach, 2Approach, 2ndnd edition, edition, Morgan Kauffman, 2000Morgan Kauffman, 2000

4444

Page 5: Minggu Ke 1 Sarinanto 21 Agt 2010

PenilaianPenilaian Quiz (10%)Quiz (10%) Tugas (20%)Tugas (20%) Ujian Tengah Semester (30%)Ujian Tengah Semester (30%) Ujian Akhir Semester (40%)Ujian Akhir Semester (40%)

5555

Page 6: Minggu Ke 1 Sarinanto 21 Agt 2010

Tujuan PerkuliahanTujuan PerkuliahanKuliah ini terdiri dari dua topik utama yang saling Kuliah ini terdiri dari dua topik utama yang saling mendukung yakni teknologi komunikasi data dan mendukung yakni teknologi komunikasi data dan jaringan komputer. Fokus teknologi komunikasi data jaringan komputer. Fokus teknologi komunikasi data memberikan wawasan terhadap implementasi jaringan memberikan wawasan terhadap implementasi jaringan komunikasi data dalam jaringan skala luas, sebagai komunikasi data dalam jaringan skala luas, sebagai salah satu infrastruktur teknologi informasi penting salah satu infrastruktur teknologi informasi penting untuk jaringan korporat. Sedangkan fokus jaringan untuk jaringan korporat. Sedangkan fokus jaringan komputer membahas model dan teknik implementasi komputer membahas model dan teknik implementasi jaringan komputer.jaringan komputer.

6666

Page 7: Minggu Ke 1 Sarinanto 21 Agt 2010

Tujuan PerkuliahanTujuan Perkuliahan Memahami struktur industri komunikasi data dan telekomunikasi Memahami struktur industri komunikasi data dan telekomunikasi

sebagai bagian dari public services.sebagai bagian dari public services. Mengerti mengenai peranan standard dalam industri dan teknologi Mengerti mengenai peranan standard dalam industri dan teknologi

komunikasi data.komunikasi data. Mengerti konsep dasar dan teknologi komunikasi data, termasuk Mengerti konsep dasar dan teknologi komunikasi data, termasuk

komponen perangkat penting.komponen perangkat penting. Mengerti konsep dasar dan teknologi jaringan lokal (LANs) dan Mengerti konsep dasar dan teknologi jaringan lokal (LANs) dan

jaringan luas (WANs).jaringan luas (WANs). Mengerti fungsi dan struktur protokol suatu jaringan berdasarkan Mengerti fungsi dan struktur protokol suatu jaringan berdasarkan

model OSI dan TCP/IP.model OSI dan TCP/IP. Memahami rancangan jaringan komputer berdasarkan protokol Memahami rancangan jaringan komputer berdasarkan protokol

TCP/IP.TCP/IP. Mampu menyusun model analisa dan implementasi suatu proyek Mampu menyusun model analisa dan implementasi suatu proyek

jaringan komputer berdasarkan berbagai model IPO, NDLC dll.jaringan komputer berdasarkan berbagai model IPO, NDLC dll. Memahami manajemen operasionil suatu jaringan komputer dengan Memahami manajemen operasionil suatu jaringan komputer dengan

fokus pada fokus pada network managementnetwork management dan dan network securitynetwork security..

7777

Page 8: Minggu Ke 1 Sarinanto 21 Agt 2010

Jaringan dan Jaringan dan Pengaturan Dunia Maya Pengaturan Dunia Maya

Paradigma lama : Pengelola jaringan Paradigma lama : Pengelola jaringan adalah ‘Tukang’adalah ‘Tukang’

Paradigma baru : Pengelola jaringan Paradigma baru : Pengelola jaringan adalah ‘Penguasa Informasi’adalah ‘Penguasa Informasi’

Page 9: Minggu Ke 1 Sarinanto 21 Agt 2010

The Data The Data Communication Communication

IndustryIndustryMateri Perkuliahan IMateri Perkuliahan I

9999

Page 10: Minggu Ke 1 Sarinanto 21 Agt 2010

What is Data CommunicationsWhat is Data Communications

““The encoded transmission of data or The encoded transmission of data or information via electrical, optical, or information via electrical, optical, or wireless means between computers or wireless means between computers or network processors.” network processors.”

10101010

Page 11: Minggu Ke 1 Sarinanto 21 Agt 2010

Informasi Pada Abad 21Informasi Pada Abad 21 Pada Pada abad 21 “knowledge” akan menjadi Pada Pada abad 21 “knowledge” akan menjadi

sumber daya yang lebih “powerful” dibanding sumber daya yang lebih “powerful” dibanding kapital dan sumberdaya alamkapital dan sumberdaya alam

Munculnya Munculnya Information SocietyInformation Society dan dan Knowledge Knowledge Base SocietyBase Society

Peran informasi, sebagai input dan sekaligus Peran informasi, sebagai input dan sekaligus output dari Iptek, menjadi semakin penting output dari Iptek, menjadi semakin penting dalam era knowledge-based economydalam era knowledge-based economy

Teknologi Informasi menjadi pilar utama dalam Teknologi Informasi menjadi pilar utama dalam pembangun peradaban manusiapembangun peradaban manusia

11111111

Page 12: Minggu Ke 1 Sarinanto 21 Agt 2010

Price of a call

High

Local Fixed Line

Operator

LongDistanceOperator

LongDistanceOperator

InternationalLong Distance

Local FixedLine Voice

Wireless/Cellular

GlobalSatellite IP-based

Services

Direct Broadcast

Multimedia/Broadband

Pergeseran Paradigma Teknologi Komunikasi Data

Mobility

High

Low

Circa 1990: Market Definition Future: Market DefinitionHigh

Low

Distance Bandwidth Req.

Low LowHigh

Adapted From AT Kearney

The paradigm shift from Price-Distance toward Mobility-Bandwidth Driven by the technology advancements and the sift of the user’s needs

Regulatory barriers

12121212

Page 13: Minggu Ke 1 Sarinanto 21 Agt 2010

e-TV

GSM/GPRS/CDMA

PDA

PC

3A .... Anytime, Anywhere, Anyhow

The New Paradigm...

07.00 h 19.00 h 21.00 h 24.00 h

13131313

Page 14: Minggu Ke 1 Sarinanto 21 Agt 2010

The New Paradigm.......Convergence3C .... Communications, Computing, and Content

Mobile/Cellular Phone

Web/ Internet

Terrestrial Broadcast

Multimedia Platform

VideoData/Text Voice/Sound

Main Frame Super Computer

Computer Cluster

80-an 90-an

2000

Content

Communications

InteractiveInteractiveMultimediaMultimedia

Dig

ital

Info

rmat

ion

DigitalInformation

Digital

Information

Computing

0

500

1000

1500

2000

Mobile

1990 2000 2010

Fixed

Skala normal (million US$)

Internet

14141414

Page 15: Minggu Ke 1 Sarinanto 21 Agt 2010

How to manage & control this convergence ?How to manage & control this convergence ?

MultimediaMultimediaPlatformPlatform

Media Access Device Application

communicate

do business

stay informed

get entertained

shop

go to the bank

get insured

15151515

Page 16: Minggu Ke 1 Sarinanto 21 Agt 2010

VoiceData

Video

Push to TalkVoice ConferenceVoice mail

Music on lineRing back tone

Work Collaboration

SMSEmailBrowsingTransactionTelemeteringRemote monitoring Imaging

Video messagingVideo game

Online TVVideo streaming

MM messagingMM conferenceMM browsing

MM game

Video phone

Data Communication Business and Data Communication Business and Service Service

Telecommunications Sector

Information Technology

Sector

Media Sector

ConvergenceConvergence

16161616

Page 17: Minggu Ke 1 Sarinanto 21 Agt 2010

The Data The Data Communication Communication

Distribution and MediaDistribution and Media Mobile

Cellular Web/Internet

TV/Video

17171717

Page 18: Minggu Ke 1 Sarinanto 21 Agt 2010

The Data Communication The Data Communication Applications (RFID)Applications (RFID)

18181818

Page 19: Minggu Ke 1 Sarinanto 21 Agt 2010

The Data Communication The Data Communication Applications (Wireless Applications (Wireless

Communication)Communication)

19191919

Page 20: Minggu Ke 1 Sarinanto 21 Agt 2010

WANWAN MANMAN LANLAN PANPAN

3G3GWCDMAWCDMA

GPRSGPRSEDGEEDGE

WiMAXWiMAX802.16802.16

Real BroadbandReal Broadband

Wi-FiWi-Fi802.11802.11<300ft.<300ft.

UWBUWBandand

BluetoothBluetooth

Pervasive Connectivity:Pervasive Connectivity:Wireless Technologies Will Co-Wireless Technologies Will Co-

ExistExist

RFID/RFID/TAGTAG

****

*Other brands and names are the property of their respective owners.*Other brands and names are the property of their respective owners.

The Result: Optimal ConnectivityThe Result: Optimal Connectivity

20202020

Page 21: Minggu Ke 1 Sarinanto 21 Agt 2010

21212121

HumanHumanResourcesResources

DevelopmentDevelopment

GoodGoodGovernanceGovernanceData communication Data communication

and and ICT IndustryICT Industry

Indonesia Government Indonesia Government PolicyPolicy

Sumber : Sambutan Presiden dalam ICT Conference 3 Mei 2005

Information Society and Knowledge Based Society

Information and Communication Technology

Membangun masa depan Indonesia yang lebih aman dan damai, lebih adil dan demokratis serta lebih sejahtera

Education :

-Added Value

-E-Literacy

E-Government

E-Procurement

E-Commerce

E-Business

Page 22: Minggu Ke 1 Sarinanto 21 Agt 2010

The Data Communication The Data Communication Industry DevelopmentIndustry Development

StackholdersStackholders RegulationRegulation StandardizationStandardization Driving ForceDriving Force Competency (HRD)Competency (HRD)

22222222

Page 23: Minggu Ke 1 Sarinanto 21 Agt 2010

Stackholders of the Data Stackholders of the Data Communications IndustryCommunications Industry

The Data Communications industry has many The Data Communications industry has many stakeholders with complex relationshipsstakeholders with complex relationships

23232323

Page 24: Minggu Ke 1 Sarinanto 21 Agt 2010

The Regulatory ProcessThe Regulatory Process

Two tightly dependent components in a constant Two tightly dependent components in a constant and ongoing state of change are the and ongoing state of change are the regulatoryregulatory and and carriercarrier components. components.

The regulatory component represents local, The regulatory component represents local, state, and federal agencies charged with state, and federal agencies charged with regulating telecommunications, regulating telecommunications,

The carrier component represents companies The carrier component represents companies such as telephone and cable TV companies that such as telephone and cable TV companies that sell transmission services.sell transmission services.

24242424

Page 25: Minggu Ke 1 Sarinanto 21 Agt 2010

The Regulatory ProcessThe Regulatory Process

This interaction is a rather formal process This interaction is a rather formal process of a series of proposals, also known as of a series of proposals, also known as tariffs.tariffs.

Tariffs are submitted to state and federal Tariffs are submitted to state and federal regulatory agencies by carriers, and regulatory agencies by carriers, and rulings and approvals are issued in returnrulings and approvals are issued in return

25252525

Page 26: Minggu Ke 1 Sarinanto 21 Agt 2010

The Regulatory ProcessThe Regulatory Process

Carriers and agencies interact in the Carriers and agencies interact in the formation of tariffs.formation of tariffs.

26262626

Page 27: Minggu Ke 1 Sarinanto 21 Agt 2010

The Importance of StandardsThe Importance of Standards

Without standards, data communications would Without standards, data communications would be nearly impossiblebe nearly impossible

Standards Standards allow multiple vendors to allow multiple vendors to manufacture competing products that work manufacture competing products that work together effectively. together effectively.

End-users can be confident that devices will End-users can be confident that devices will operate as specified and will interoperate operate as specified and will interoperate successfully. successfully.

Standards can have a tremendous potential Standards can have a tremendous potential economic impact on vendorseconomic impact on vendors

27272727

Page 28: Minggu Ke 1 Sarinanto 21 Agt 2010

Technology and Standards DevelopmentTechnology and Standards Development

The development of a standard generally lags The development of a standard generally lags the development of the technology.the development of the technology.

28282828

Page 29: Minggu Ke 1 Sarinanto 21 Agt 2010

The Standards ProcessThe Standards Process

1. 1. Recognition of the need for a standardRecognition of the need for a standard

2. 2. Formation of some type of committee or Formation of some type of committee or task force task force

3. 3. Information/recommendation gathering Information/recommendation gathering phase phase

4. 4. Tentative/alternative standards issued Tentative/alternative standards issued

5. 5. Feedback on tentative/alternative standards Feedback on tentative/alternative standards

6. 6. Final standards issuedFinal standards issued

7. 7. Compliance with final standardsCompliance with final standards

29292929

Page 30: Minggu Ke 1 Sarinanto 21 Agt 2010

Driving Forces in the Driving Forces in the Datacomm IndustryDatacomm Industry

30303030

Page 31: Minggu Ke 1 Sarinanto 21 Agt 2010

The Top-Down ApproachThe Top-Down Approach

Business needs drive solutions.Business needs drive solutions.

31313131

Page 32: Minggu Ke 1 Sarinanto 21 Agt 2010

The OSI ModelThe OSI Model

The ISO has developed a framework for The ISO has developed a framework for organizing networking technology and protocol organizing networking technology and protocol solutions known as the open systems solutions known as the open systems interconnection (OSI) network reference model. interconnection (OSI) network reference model.

The The OSI Model OSI Model consists of a hierarchy of 7 consists of a hierarchy of 7 layers that loosely group the functional layers that loosely group the functional requirements for communication between two requirements for communication between two computing devices.computing devices.

Page 33: Minggu Ke 1 Sarinanto 21 Agt 2010

The OSI ModelThe OSI Model

The power of the OSI Model, officially known as The power of the OSI Model, officially known as ISO Standard 7489, lies in its openness and ISO Standard 7489, lies in its openness and flexibility. flexibility.

It can be used to organize and define protocols It can be used to organize and define protocols involved in communicating between two involved in communicating between two computing devices located in the same room as computing devices located in the same room as effectively as two devices located on opposite effectively as two devices located on opposite sides of the world.sides of the world.

It is It is thethe reference mode in the world of reference mode in the world of telcommunicationstelcommunications

Page 34: Minggu Ke 1 Sarinanto 21 Agt 2010

ProtocolsProtocols

A A protocol protocol is a set of rules that govern is a set of rules that govern communication between hardware and/or communication between hardware and/or software components.software components.

There are many well known as well as a There are many well known as well as a few obscure protocols used in few obscure protocols used in telecommunications.telecommunications.

Page 35: Minggu Ke 1 Sarinanto 21 Agt 2010

OSI Model OverviewOSI Model Overview

Page 36: Minggu Ke 1 Sarinanto 21 Agt 2010

Mapping the OSI modelMapping the OSI model

The OSI model maps to the Internet model and The OSI model maps to the Internet model and corresponding protocols.corresponding protocols.

Page 37: Minggu Ke 1 Sarinanto 21 Agt 2010

The OSI modelThe OSI model

Network analysts literally talk in terms of the OSI model. Network analysts literally talk in terms of the OSI model. When troubleshooting network problems, the network When troubleshooting network problems, the network

analyst starts with the physical layer and ensures that analyst starts with the physical layer and ensures that protocols and interfaces are operational at each layer. protocols and interfaces are operational at each layer.

Another benefit of the OSI model is that it allows Another benefit of the OSI model is that it allows discussion about the interconnection of two networks or discussion about the interconnection of two networks or computers in common terms without dealing in computers in common terms without dealing in proprietary vendor jargonproprietary vendor jargon

Page 38: Minggu Ke 1 Sarinanto 21 Agt 2010

Physical LayerPhysical Layer

responsible for the establishment, responsible for the establishment, maintenance and termination of physical maintenance and termination of physical connections between communicating connections between communicating devices. devices.

transmits and receives a stream of bits. transmits and receives a stream of bits. no data recognition at the physical layer.no data recognition at the physical layer.

Page 39: Minggu Ke 1 Sarinanto 21 Agt 2010

Data Link LayerData Link Layer

responsible for providing protocols that deliver responsible for providing protocols that deliver reliable point-to-point connectionsreliable point-to-point connections

organizing the bit stream into structured organizing the bit stream into structured framesframes which add addressing and error checking which add addressing and error checking information. information.

Additional information added to the front of data Additional information added to the front of data is called a is called a headerheader, ,

information added to the back of data is called a information added to the back of data is called a trailertrailer. .

Data link layer protocols provide error detection, Data link layer protocols provide error detection, notification, and recoverynotification, and recovery

Page 40: Minggu Ke 1 Sarinanto 21 Agt 2010

Data Link Layer (NIC’s)Data Link Layer (NIC’s)

Data-link layer frames are built within the Data-link layer frames are built within the network interface card network interface card installed in a computer installed in a computer according to the pre-determined frame layout according to the pre-determined frame layout particular to the network architecture of the particular to the network architecture of the installed network interface card. installed network interface card.

Network interface cards are given a unique Network interface cards are given a unique address in a format determined by their network address in a format determined by their network architecture. architecture.

These addresses are usually assigned and pre-These addresses are usually assigned and pre-programmed by the NIC manufacturer.programmed by the NIC manufacturer.

Page 41: Minggu Ke 1 Sarinanto 21 Agt 2010

Data Link Layer – Sub LayersData Link Layer – Sub Layers

The IEEE 802 committee split the data-link layer The IEEE 802 committee split the data-link layer into two sub-layersinto two sub-layers : :

media access control media access control or or MAC sub-layer MAC sub-layer interfaces with the physical layer and is interfaces with the physical layer and is represented by protocols which define how the represented by protocols which define how the shared local area network media is to be shared local area network media is to be accessed by the many connected computersaccessed by the many connected computers

logical link control logical link control or or LLC sub-layer LLC sub-layer and is and is represented by a single IEEE 802 protocol (IEEE represented by a single IEEE 802 protocol (IEEE 802.2). 802.2).

Page 42: Minggu Ke 1 Sarinanto 21 Agt 2010

LLC Sub-LayerLLC Sub-Layer

Splitting the data-link layer into two sub-layers Splitting the data-link layer into two sub-layers offers transparency to the upper layers (network offers transparency to the upper layers (network and above) while allowing the MAC sub-layer and above) while allowing the MAC sub-layer protocol to vary independently. protocol to vary independently.

This allows a given network operating system to This allows a given network operating system to run equally well over a variety of different run equally well over a variety of different network architectures as embodied in network network architectures as embodied in network interface cardsinterface cards

Page 43: Minggu Ke 1 Sarinanto 21 Agt 2010

Network LayerNetwork Layer

network layer network layer protocols are responsible for the protocols are responsible for the establishment, maintenance, and termination of establishment, maintenance, and termination of end-to-end network links. end-to-end network links.

Network layer protocols are required when Network layer protocols are required when computers that are not physically connected to computers that are not physically connected to the same LAN must communicate. the same LAN must communicate.

Network layer protocols are responsible for :Network layer protocols are responsible for : providing network layer (end-to-end) providing network layer (end-to-end) addressingaddressing

schemes and schemes and for enabling for enabling inter-network routinginter-network routing of network layer of network layer

data data packets.packets.

Page 44: Minggu Ke 1 Sarinanto 21 Agt 2010

Network Layer (Packets v. Frames)Network Layer (Packets v. Frames)

The term The term packetspackets is usually associated is usually associated with with network layer protocolsnetwork layer protocols while the term while the term framesframes is usually associated with is usually associated with data link data link layer protocolslayer protocols..

Page 45: Minggu Ke 1 Sarinanto 21 Agt 2010

Transport LayerTransport Layer transport layer transport layer protocols are responsible for protocols are responsible for

providing reliability for the end-to-end network providing reliability for the end-to-end network layer connections. layer connections.

Transport layer protocols provide end-to-end error Transport layer protocols provide end-to-end error recovery and flow control. recovery and flow control.

Transport layer protocols also provide mechanisms Transport layer protocols also provide mechanisms for sequentially organizing multiple network layer for sequentially organizing multiple network layer packets into a coherent packets into a coherent message.message.

Page 46: Minggu Ke 1 Sarinanto 21 Agt 2010

Session LayerSession Layer

Session layer Session layer protocols are responsible for protocols are responsible for establishing, maintaining, and terminating establishing, maintaining, and terminating sessions between user application programs. sessions between user application programs.

SessionsSessions are are interactive dialoguesinteractive dialogues between between networked computers and are of particular importance networked computers and are of particular importance to distributed computing applications in a client/server to distributed computing applications in a client/server environmentenvironment

Page 47: Minggu Ke 1 Sarinanto 21 Agt 2010

Presentation LayerPresentation Layer

Presentation layer Presentation layer protocols provide an protocols provide an interface between user applications and various interface between user applications and various presentation-related services required by those presentation-related services required by those applications. applications.

For example, data encryption/decryption For example, data encryption/decryption protocols are considered presentation layer protocols are considered presentation layer protocols as are protocols that translate between protocols as are protocols that translate between encoding schemes such as ASCII to EBCDICencoding schemes such as ASCII to EBCDIC

Page 48: Minggu Ke 1 Sarinanto 21 Agt 2010

Application LayerApplication Layer

include utilities and network based services that include utilities and network based services that support end-user application programs. support end-user application programs.

the best examples of application layer protocols the best examples of application layer protocols are the OSI protocols X.400 and X.500. are the OSI protocols X.400 and X.500.

DNS, Domain Name Service, which is an DNS, Domain Name Service, which is an Internet protocol that resolves a computer's Internet protocol that resolves a computer's common or domain name to a specific IP common or domain name to a specific IP address, is also considered an application layer address, is also considered an application layer protocolprotocol

Page 49: Minggu Ke 1 Sarinanto 21 Agt 2010

The Top-Down Approach to The Top-Down Approach to Information Systems DevelopmentInformation Systems Development

Networking and Telecomm in the ISD context.Networking and Telecomm in the ISD context.

49494949

Page 50: Minggu Ke 1 Sarinanto 21 Agt 2010

Certification Certification

Certification as an indication of mastery of Certification as an indication of mastery of a particular technology may be important a particular technology may be important in some employment situations.in some employment situations.

There are a number of well known There are a number of well known certifications.certifications.

50505050

Page 51: Minggu Ke 1 Sarinanto 21 Agt 2010

Certification ConcernsCertification Concerns

The amount of practical, hands-on experience The amount of practical, hands-on experience required to earn a given certification.required to earn a given certification.

The amount of continuing education and The amount of continuing education and experience required to retain a certification.experience required to retain a certification.

Vendor-specific certifications do not provide the Vendor-specific certifications do not provide the broad background required for today’s broad background required for today’s multivendor internetworks.multivendor internetworks.

51515151

Page 52: Minggu Ke 1 Sarinanto 21 Agt 2010

Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals

52525252

Page 53: Minggu Ke 1 Sarinanto 21 Agt 2010

Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals

Understand and can speak “business.”Understand and can speak “business.” Demonstrate an ability to own and solve Demonstrate an ability to own and solve

business problems in a partnership rather business problems in a partnership rather than consultative role.than consultative role.

Demonstrate an ability to look outside their Demonstrate an ability to look outside their own expertise for solutions.own expertise for solutions.

Exhibit an understanding of the need for Exhibit an understanding of the need for lifelong learning. lifelong learning. 

53535353

Page 54: Minggu Ke 1 Sarinanto 21 Agt 2010

Critical Skills for Data Communications Critical Skills for Data Communications ProfessionalsProfessionals

Demonstrate an ability to evaluate technology Demonstrate an ability to evaluate technology with a critical eye as to cost/benefit and potential with a critical eye as to cost/benefit and potential for significant business impact.for significant business impact.

Understand comparative value and proper Understand comparative value and proper application of available network services application of available network services

Can work effectively with carriers to see that Can work effectively with carriers to see that implementations are completed properly and implementations are completed properly and cost effectively.cost effectively.

Communicate effectively, verbally and orally, Communicate effectively, verbally and orally, with both technically oriented and management with both technically oriented and management personnel.personnel.

54545454

Page 55: Minggu Ke 1 Sarinanto 21 Agt 2010

AssignmentAssignment

Reading Chapter 1 & 2Reading Chapter 1 & 2 Cerita ttg topik yang diminati dalam Cerita ttg topik yang diminati dalam

bidang TIKbidang TIK