Anda di halaman 1dari 50

Komunikasi, Jaringan, &

Pengamanannya

Williams, B.K, Stacy C. Sawyer (2007).


Using Information Technology: A
Practical Introduction to Computers &
Communications. Seventh Edition,
McGraw-Hill, New York. ISBN-13: 978-0- 1
07-110768-6
Learning Outcomes

Pada akhir pertemuan ini, diharapkan mahasiswa


akan mampu :
• menjelaskan pengertian komunikasi/
telekomunikasi, dan jaringan; perbedaan
antara data analog dan digital; jenis-jenis
media komunikasi,menjelaskan kegunaan
dan jenis-jenis media komunikasi nirkabel,
ancaman dan pengamanan jaringan, serta
teknologi komunikasi di masa depan.

2
Outline Materi

• Dari era Analog ke Era Digital


• Jaringan
• Kabel Komunikasi Media
• Media Komunikasi Nirkabel
• Cyberthreats, Hackers, & Perlindungan
• Komunikasi Masa Depan

3
From the Analog to the
Digital Age
• sinyal analog menggunakan
variasi bentuk gelombang Sine Wave
untuk mengirimkan informasi
• Dalam sinyal FM
frekuensinya bervariasi 1

• Dalam sinyal AM 0.5

Amplitudonya bervariasi 0

-0.5 Amplitude
• Radio mengirim sinyal
dengan cara ini -1

S1
• Cahaya bekerja dengan cara
ini
• Mendengar dan telepon Frequency
bekerja dengan cara ini
• Modem bekerja dengan cara
ini
6-4
From the Analog to the
Digital Age
• Sinyal digital mengirim data
dalam bentuk 0 & 1
• • Komputer menggunakan
sinyal digital
Digital Signal
• • foto koran termasuk digital
karena mereka terdiri dari titik- 1

titik kecil
Data

0 S1
1
5
9
13

17

25
21

29

33

41
37
Time

6-5
From the Analog to the
Digital Age
• komputer menggunakan sinyal digital, tapi saluran telepon
menggunakan analog, modem di gunakan untuk
menerjemahkan sinyal dari digital ke analog, mengirimkan
sinyal sepanjang saluran telepon, kemudian
menerjemahkannya kembali dari analog ke digital di ujung
lain
• Proses ini disebut "modulasi / demodulasi"
• Modulasi berarti untuk menerjemahkan dari digital ke
analog
• Demodulasi berarti untuk menerjemahkan dari analog ke
digital
• Modem harus melakukan semua untuk menggunakan
saluran telepon standar suara analog
6-6
From the Analog to the
Digital Age
• Tape recorder, suara, dan alat musik merupakan sinyal
analog sedangkan CD menggunakan sinyal digital
• Untuk membakar CD dari jam session, peralatan rekaman
digital harus mengkonversi dari analog ke digital
• contoh perubahan dari Analog ke Digital converter,sampel
suara dan mengkonversi ketinggian gelombang ke suatu
nomor
• Sampel dari gelombang suara yang diambil pada interval
teratur - sekitar 44.100 kali setiap detik
• Karena sampel digital diputar kembali lebih cepat daripada
telinga kita mendengar,jadi kedengarannya kepada kita
seperti gelombang suara terus menerus tunggal

6-7
From the Analog to the
Digital Age
• Contoh sinyal digital yang lain adalah serupa
dengan menampilkan film
• Film menampilkan gambar diam (frame)
• Tapi mereka menunjukkan kepada mereka begitu
cepat sehingga mata kita tidak dapat bereaksi
dalam waktu
• Jadi untuk kita serangkaian gambar diam terlihat
seperti gerakan kontinyu
• Apakah Anda pernah melihat di film ketika mereka
menunjukkan ban mobildalam gerakan mereka
kadang-kadang tampak bergerak mundur?
6-8
Networks
• Sebuah sistem komputer yang saling berhubungan,
telepon, atau perangkat komunikasi lainnya yang dapat
berkomunikasi dengan satu sama lain dan berbagi
aplikasi dan data
• Sebelum kita memiliki jaringan komputer, orang
menggunakan "sneakernet" untuk berbagi data antara
komputer
• Orang pertama menyimpan dokumen mereka ke disket
• Kemudian dia berjalan ke orang ke 2 di meja yang lain
dan disknya di serahkan untuk orang ke 2
• Orang 2 memuat disk ke komputer mereka untuk
membaca dan mengedit dokumen

6-9
Networks

• Sejak zaman "sneakernet", jaringan telah


menjadi standar. memungkinkan kita untuk:
• Berbagi perangkat perangkat seperti printer
laser
• Berbagi program dan data
• Gunakan e-mail dan program komunikasi
lainnya
• informasi penting Backup karena disimpan
secara terpusat
• Akses berbagi database
6-10
Networks

• WAN – Wide Area Network • Mencakup wilayah geografis yang


luas, seperti negara atau dunia
• Mencakup kota atau pinggiran kota
• MAN – Metropolitan Area • Menyambung komputer dan
Network perangkat di daerah geografis
terbatas seperti gedung, kantor,
• LAN – Local Area Network
atau sekelompok bangunan di
dekatnya
• Menggunakan kabel, kabel, atau
koneksi nirkabel untuk link
• HAN – Home Area Network perangkat rumah tangga digital
• Menggunakan jarak pendek
teknologi nirkabel dapat terhubung's
pribadi individu elektronik seperti
• PAN – Personal Area Network ponsel,, MP3 player PDA, notebook
PC, dan printer

6-11
Networks
• Client/Server
– Terdiri dari klien, yang merupakan komputer yang
meminta data, dan server, yang adalah komputer yang
menyediakan data
– File server seperti disk drive yang terhubung dengan
jaringan
– Database server menyimpan data namun tidak
menyimpan program
– server terhubung dengan satu atau lebih printer dan
mengontrol antrian, (yang mana di print duluan)
– Mail server mengelola email
• Peer-to-Peer
– Semua komputer di jaringan berkomunikasi langsung
dengan satu sama lain tanpa bergantung pada server
– Untuk lebih sedikit dari 25 PC
6-12
Networks

• Peer-to-Peer (continued)
– Lebih murah daripada client / server karena server
biasanya lebih mahal dari PC
– sering ada masalah seperti tidak mengetahui siapa
yang memiliki dokumen dan file.
– Terlalu lambat untuk digunakan di kantor-kantor yang
lebih besar

• Pertimbangan hukum
• Men-download materi berhak cipta tanpa membayar
melanggar undang-undang hak cipta

Watch out! 6-13 Don’t download illegally!


Networks
Intranets, Extranets, VPNs
• Intranets
– Organisasi swasta jaringan yang menggunakan
infrastruktur dan standar internet dan web
• Extranets
– Private Internet yang terhubung hanya internal tetapi
juga personil yang tidak dipilih pemasok dan pihak-
pihak strategis lainnya
• Virtual Private Networks
– Swasta jaringan yang menggunakan jaringan publik,
biasanya internet, dapat terhubung situs remote

6-14
Network Components

• Connections
– Wired – twisted-pair, coaxial cable, or fiber-optic
– Wireless – infrared, microwave (Bluetooth), broadcast
(Wi-Fi) or satellite
• Hosts & Nodes
– Host: the central computer that controls the network
o
Node: perangkat yang terpasang ke jaringan
• Packets
– Format untuk mengirimkan pesan elektronik
– panjang blok tetap data untuk transmisi
6-15
Network Components

• Protocols
– Himpunan konvensi yang mengatur pertukaran data antara
perangkat keras dan / atau komponen perangkat lunak
dalam jaringan komunikasi
– Dibangun ke dalam perangkat keras atau perangkat lunak
yang Anda gunakan
– Mengatur desain dan transmisi paket standar
– Contohnya adalah:
– TCP / IP untuk LAN dan internet
– AppleTalk untuk jaringan Mac
– SIP untuk Voice over IP (VoIP)
– CDMA untuk ponsel
– IPX untuk jaringan Novell
6-16
Network Packets
• TCP/IP Packets carry four types of information
– Alamat pengirim (sumber nomor IP)
– Alamat penerima yang dimaksud (nomor IP tujuan)
– Jumlah paket data asli dipecah menjadi
• Hal ini terjadi karena jumlah data PC pengiriman dapat jauh
lebih besar daripada ruang dalam satu paket
• Jadi data harus dapat dipecah dalam satu atau lebih paket
• Kemudian paket harus diberi nomor seperti 1 dari 6, 2 dari 6,
3 dari 6, 4 dari 6, 5 dari 6, dan 6 dari 6
– Packet jumlah dan info urutan untuk setiap paket
• Paket mungkin tiba out of order (1, 6, 3, 2, 5, 4 misalnya)
• Informasi ini digunakan untuk resequence paket dan
menempatkan mereka kembali dalam urutan yang benar (1,
2, 3, 4, 5, 6) sehingga mereka bisa dibaca

6-17
Network Devices

• Daisy • Digunakan dalam-to-peer jaringan peer -


koneksi langsung dari satu PC ke yang
Chain
berikutnya

• Hub
• Pusat Digunakan dalam LAN kecil untuk
menghubungkan PC dan bagian lainnya, LAN
satu sama lain. mengalihkan ke semua port
• Switch • Digunakan dalam yang lebih besar, LAN
sibuk - lebih cepat dibanding hub karena di
gunakan hanya untuk satu tujuan

6-18
Network Devices

• Digunakan untuk menghubungkan


• Bridge
dua jaringan dengan tipe yang sama
• Menghubungkan dua jaringan yang
• Gateway berbeda jenis
• Router • Menghubungkan beberapa LAN
bersama. Router merupakan tulang
punggung internet
• Backbone • Rute utama yang menghubungkan
semua gateway, router, dan komputer
lain dalam sebuah organisasi

19
Network Topologies

• Bus – all nodes are connected to a single wire or cable


• Ring – all nodes are connected in a continuous loop
• Star – all nodes are connected melalui a central host

6-20
Network
Dua cara utk mencegah Tabrakan Data
• Tabrakan terjadi ketika dua data paket akan
berlawanan arah pada media bersama
• Ethernet – deals with collisions
– All devices send data at once
– Collisions happen regularly
– Data akan di kirim ulang sampai data itu tiba
• Token ring – menghindari collisions
– Devices take turns sending data $$$
– Token is sent around the ring Pricier than
Ethernet
– Tunggu untuk mendapatkan token, kemudian
mengirim data
6-21
Wired Communications Media

• Media Komunikasi membawa sinyal


melintasi jalur komunikasi
– Twisted-Pair Wire
• 2 helai kawat tembaga saling membelit satu sama lain
• Memutar mengurangi interferensi (crosstalk) dari sinyal listrik
• kecepatannya sekitar 1-128 Megabits per detik
– Coaxial Cable
• kawat tembaga dibungkus dengan perisai logam dan
kemudian di cover plastik eksternal
• Digunakan untuk TV kabel dan kabel sinyal listrik internet
• Membawa suara dan data hingga 200 megabit per detik

6-22
Wired Communications Media

• Communications media continued


– Fiber-optic cable
• Puluhan atau ratusan helai tipis dari kaca atau
plastik yang mengirimkan berkas cahaya, bukan
listrik
• Dapat mengirimkan hingga 2 gigabit per detik
• Lebih mahal daripada twisted-pair atau coax
• Lebih ringan dan lebih tahan lama daripada
twisted-pair atau coax
• Lebih sulit untuk memasang daripada twisted-pair
atau coax

6-23
Wired Communications
Media for the home
• Ethernet
– Pull Cat5 cables through the house (yourself or contractor)
– Connect to PC’s Ethernet network interface card (nic)
– For several PCs, get a hub or switch to connect them all
– 10 or 100 megabits per second
• HomePNA
– Uses existing telephone wiring and jacks
– Membutuhkan HomePNA nic di PC Anda
– Speeds of 10 – 240 megabits per second
• Homeplug
– Uses existing home electrical lines
– Speeds of 14 megabits per second
6-24
Wireless Communications Media
• Electromagnetic spectrum of radiation is the basis of all
telecommunications signals
– Includes the longest radio waves (9 kHz) and audio waves (sound),
up through gamma rays that come from nuclear decay (thousands of
gigahertz)
– Radio-frequency spectrum is the part of the electromagnetic spectrum
that we use for radio communication

6-25
Wireless Communications Media
Bandwidth
• Narrowband (or Voiceband)
– Used for regular telephone communications
– Transmission rate < 100 kilobits per second
• Medium Band
– Used for long-distance data transmission or to connect
mainframe and midrange computers
– Transmission rate 100 kb to 1 megabit per second
• Broadband
– For high-speed data and high-quality audio and video
– Transmission rate 1 megabit per second to 100 megabits
per second
• US households get 4 – 5 MB while Japanese get 100 MB
per second

6-26
Wireless Communications
Media
• Infrared Transmission
– Sends signals using infrared light
– Frequencies are too low to see (1-4 Mbits per second)
• Broadcast Radio
– AM/FM, CB, ham, cellphones, police radio
– Sends data over long distances using a transmitter
and a receiver
• Microwave Radio
– Superhigh frequency radio waves (1 gigahertz)
– Requires line-of-sight transmitters and receivers
• Communications Satellites

6-27
Wireless
Communications Media
• Communications Satellites
– These are microwave relay stations in orbit around the earth
- Uplinking: transmitting a signal from ground station to a satellite
– Cover broad service area
– Cost $300 million to $700 million each + launch costs
– Can be placed at different heights: GEO, MEO, LEO
• GEO – geostationary earth orbit
– 22,300 miles up above earth
– Always above equator
• MEO – medium-earth orbit
– 5,000 – 10,000 miles up
• LEO – low-earth orbit
– 200 – 1,000 miles up
– Has less signal delay than GEO, MEO satellites

6-28
Wireless Communications Media
GPS
• Global Positioning System
– 24 earth-orbiting satellites continuously transmitting timed
radio signals
– Each satellite circles earth twice each day at 11,000 miles
up
– GPS receivers pick up transmissions from up to 4 satellites
and pinpoint the receiver’s location
– Accurate within 3 – 50 feet, with a norm of 10 feet
accuracy
– GPS receivers contain map files that are displayed based
on the GPS position to guide users
– Many GPS receivers have speech chips, too

6-29
Wireless Communications Media
One-way Pagers
• One-way pagers are radio receivers that receive
data sent from a special radio transmitter
– Radio transmitter sends out signals over the special
frequency
– Pagers are tuned to that frequency
– When a particular pager hears its own code, it
receives and displays the message
Discussion Question: Why do airplane rules require you to turn off pagers and
cellphones during flight?
Answer: Pilots use radar and radio to determine their position and
communicate with ground control. Pager and cellphone signals use radio, too,
and competing signals can interfere with each other

6-30
Wireless Communications Media
Long-Distance Wireless
• Two-way pagers: Blackberry and Treo
• 1G: First Generation Cellular
– Analog cellphones
– Designed for voice communication using a system of
hexagonal ground-area cells around transmitter-
receiver cell towers
– Good for voice – less effective for data due to handing
off
• 2G: Second Generation Cellular
– Use same network of cell towers to send voice and
data in digital form over the airwaves
– Required digital receivers on original analog celltowers

6-31
Wireless Communications Media
2G Wireless

• There are two competing, incompatible


standards
– CDMA – Code Division Multiple Access
• Transmission rates 14.4 kilobits per second
• Used by Verizon and Sprint
– GSM – Global System for Mobile Communications
• Transmission rates of 9.6 kilobits per second
• Used by Cingular and T-Mobile, as well as Western Europe,
Middle East and Asia
• US GSM and European GSM use different frequencies

6-32
Wireless Communications Media
2.5G Wireless
• Data speeds of 300–100 kilobits per
second
– GPRS – General Packet Radio Service
• An upgrade to 2.5G
• Speeds of 30 – 50 kilobits per second
– EDGE is Enhanced Data for Global Evolution
• A different 2.5G upgrade
• Speeds of up to 236 kilobits per second

6-33
Wireless Communications Media
3G Wireless
• Third generation wireless
– High speed data: 144 kilobits per second up to 2
megabits per second
Discussion
– Accept e-mail with attachments Question: If your
– Display color video and still pictures cellphone can
download and
– Play music play music, do
– Two important upgrades: you still need an
i-pod?
• EV-DO – Evolution Data Only
– Average speeds of 400 – 700 kilobits per second, peaks of 2
megabits per second
• UMTS – Universal Mobile Telecommunications System
– Average speed of 220 – 320 kilobits per second

6-34
Wireless Communications Media
Short-range Wireless
• Local Area Networks
– Range 50 – 150 feet
– Include Wi-Fi (802.11) type networks
• Personal Area Networks
– Range 30 – 32 feet
– Use Bluetooth, Ultra wideband, and wireless USB
• Home Automation networks
– Range 100 – 250 feet
– Use Insteon, Zigbee, and Z-Wave standards

6-35
Wireless Communications Media
Short-range Wireless

• Wi-Fi (802.11) networks


– Wi-Fi b, a, and g correspond to 802.11b, 802.11a, and 802.11g
– 802.11 is an IEEE wireless technical specification
– 802.11b is older, transmits 11 megabits per second
– 802.11a is faster than b but with weaker security than g
– 802.11g is 54 megabits per second and transmits 50 ft
– Wi-Fi n with MIMO extends range of Wi-Fi using multiple
transmitting and receiving antennas – 200 megabits per second
for up to 150 ft
• Warning! Security is disabled by default on Wi-Fi

6-36
Wireless Communications Media
Short-range Wireless

• Wi-Fi Security
– Why is it disabled by default?
• So non-technical users can get Wi-Fi working more easily
– Why should this bother me?
• A person with a $50 antenna can eavesdrop on everything
your computer sends over wireless from a block or two away
• This is called “wardriving”
– To read more about this problem, follow these links
• http://www.webopedia.com/TERM/W/wardriving.html
• http://www.wardriving.com/

6-37
Wireless Communications Media
Personal Area Wireless
• Bluetooth
– Short-range wireless standard to link cellphones, PDAs,
computers, and peripherals at distances up to 30 ft
– Named after King Harald Bluetooth, the Viking who
unified Denmark and Norway
– Transmits 720 kilobits per second
– When Bluetooth devices come into range of each other,
they negotiate. If they have information to exchange,
they form a temporary wireless network
– Bluetooth can also be used to eavesdrop on networks
– Turn it off on your cellphone unless you need it at that
time

6-38
Wireless Communications Media
Personal Area Wireless
• Ultra Wideband (UWB)
– Developed for military radar systems
– Operates in 480 megabit per second range up to 30 ft
– Uses a low power source to send out millions of
bursts of radio waves each second
– 100 times as fast as Bluetooth
• Wireless USB
– USB is the most used interface on PCs
– The wireless version could be a hit
– Range of 32 ft and maximum data rate of > 480
megabits per second
6-39
Wireless Communications Media
Short-Range Wireless for Home
• Insteon
– Combines electronic powerline and wireless technology
– Can send data at 13.1 kilobits per second with 150 ft range
– Replaces X10
• ZigBee
– Entirely wireless very power-efficient technology
– Can send data at 128 kilobits per second with 250 ft range
• Z-Wave
– Entirely wireless power-efficient technology
– Can send data at 127 kilobits per second to range of 100 ft
– Allows you to remotely program your house!

6-40
Cyberthreats, Hackers, &
Safeguards
• Problem: internet was begun to foster
collaboration among universities and scientists.
They trusted each other. No security was built into
the internet.
• Problem: the internet is open-access and is used
by some people who are not trustworthy, who take
advantage of the lack of built-in safeguards.
• Problem: Most people connect to the internet and
use their computers in LANs. All it takes is one
computer on a LAN that has been compromised
for all computers on it to be vulnerable.
6-41
Cyberthreats, Hackers, &
Safeguards
• Denial of Service Attacks
– Consist of making repeated requests of a computer or
network device, thereby overloading it and causing
legitimate requests to be ignored
– Used to target particular companies or individuals
• Worms
– A program that copies itself repeatedly into a
computer’s memory or disk drive
– May copy itself so much it crashes the infected
computer
– Famous worms include: Code Red, SQL Slammer,
Nimda, MyDoom, Sasser
– Primarily target PCs running Microsoft Windows

6-42
Cyberthreats, Hackers, &
Safeguards
• Viruses
– A deviant program that hides on a floppy, hard
drive, CD, or e-mail that causes unexpected side
effects such as destroying or corrupting data
– Viruses self-replicate and try to secretly distribute
themselves to other systems
– Famous viruses include the “I Love You” virus
– Viruses are published at the rate of about one per
day
– To see what the latest ones are, go to
• http://www.symantec.com/avcenter/vinfodb.html
6-43
Cyberthreats, Hackers, &
Safeguards
• Trojan Horses
– Programs that pretend to be a useful program
such as a free game or screensaver.
– Carry viruses or malicious instructions that
damage your computer or install a backdoor
or spyware
– Backdoors and spyware allow others to
access your computer without your
knowledge

6-44
Cyberthreats, Hackers, &
Safeguards
• How they spread
– Via e-mail attachments
– By infected floppies or CDs
– By clicking on infiltrated websites
– By downloading from infected files from websites
– Through infiltrated Wi-Fi hotspots
– From one infected PC on a LAN to another
• What can you do about it?
– Install anti-virus software and subscribe to the
automatic anti-virus update service

6-45
Cyberthreats, Hackers, &
Safeguards
• Hackers are either
– Computer enthusiasts, people who enjoy learning about
programming and computers (good)
– People who gain unauthorized access to computers or
networks, often for fun or to see if they can (not good)
• Crackers
– Malicious hackers who break into computers for
malicious purposes
• Script kiddies are technically unsophisticated teenagers who
use downloadable software for perform break-ins
• Hacktivists are hacker activists who break into systems for a
political purpose
• Black-hat hackers are those who break into computers to
steal or destroy information or to use it for illegal profit
• Cyberterrorists attack computer systems so as to bring
physical or financial harm to groups, companies, or nations

6-46
Cyberthreats, Hackers, &
Safeguards
• Safeguards
– Use antivirus software, and keep it current
– Install a firewall to monitor network traffic and filter out
undesirable types of traffic and undesirable sites
– Use robust passwords –
• Minimum 8 characters with letters, numbers, characters
• 4cats is not a good password, but f0UrK@tTz is
– Install antispyware software
– Encrypt financial and personal records so only you
can read them
– Back up your data, so if your PC is attacked and must
be reformatted, you can restore your data
– Never download from a website you don’t trust
– Consider Biometric authentication

6-47
Cyberthreats, Hackers, &
Safeguards
• Encryption
– The process of altering readable data into unreadable
form to prevent unauthorized access
• Uses powerful mathematical ciphers to create coded
messages that are difficult to break
– Two forms:
• Private Key encryption means the same secret key is used
by both the sender and receiver to encrypt and decrypt a
message
• Public Key encryption means that two keys are used
– The public key of the recipient is published and is used by the
sender to encrypt the message
– The private key of the recipient is secret and is the only way to
decrypt the message

6-48
Future of Communications

• This is a big area of development


• There is a lot of money to be made from faster
and more secure broadband communications
• Areas of development include
– Global high-speed low—orbital satellite networks for
rural internet and voice connectivity
– 4G wireless technology
– Photonics to speed up fiber-optic lines
– Software-defined radio
– Grid computing

6-49
Kesimpulan

• Tugas, silahkan di simpulkan dari slide


yang ada di pertemuan ini..dikumpulkan
minggu depan, nim genap menggunakan
tinta hitam dan ganjil tinta biru !!

50

Anda mungkin juga menyukai