Introduction - Gadjah Mada University
Download
Report
Transcript Introduction - Gadjah Mada University
Introduction
to Computer Network and
Data Communication
Widyawan
Learning agenda
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Introduction to Computer Networks
OSI
Application Layer
Transport Layer (TCP/UDP)
IP Address
IP Address, Sub-netting, NAT
Data Link Layer
Mid Semester
Physical Layer
Ethernet
Routing Protocol: static and dynamic
Planning and Cabling Network
Wireless
Management, monitoring and optimizations
Presentation
Final Exam
Assessment
40
% tasks
60 % exam (mid and final)
Books
CCNAB,
Cisco Press
Network+, Sybex
Requirements
Active
Learn English
75 % of attendance
Team work
In this session
Describe how networks impact our daily
lives.
Describe the role of data networking in the
human network.
Describe the characteristics of network
architectures: fault tolerance, scalability,
quality of service and security.
A Little Bit of History
In
the mid 1960s, mainframe computers were stand
alone devices. Computers from different
manufactures were unable to communicate each
other.
1969 – ARPANET, first packet switched network
consist of UCLA, Stanford, UC Santa Barbara and
Utah University
1971 – first email program
1980’s – Local Area Networks (LANs)
1990’s – WWW / Internetworking
Network Now
Communication is almost as important to us as our reliance on air, water, food, and shelter.
Early data networks: character-based
information between connected computer
systems.
Current networks have evolved to carry voice,
video streams, text, and graphics
Converged onto a common platform. Enable
communication instantaneously.
Global communities.
Communication in a Network
Centric World
Forecast
Route and Map
Online Banking
World News
Social Network
Instant messaging
Real
time communication
between 2 or more people
based on typed text
Weblogs
Email
Leisure
(Blogs)
Change the way we learn
Change the way we work
What is Communication
Communication is successful when the message
May
have
to agree
on and
the language
Agree on the
method
used
already
received
confirmedused
Before beginning to communicate with each
other, we establish rules or agreements to
govern the conversation.
These rules, or protocols, must be followed in
order for the message to be successfully
delivered and understood.
The techniques that are used in network
communications share these fundamentals with
human conversations
The Internet Architecture
Fault Tolerance
Scalability
QOS
Security
Fault Tolerance
Limits the impact of a hardware or
software failure and can recover quickly
when such a failure occurs
Depend on redundant links, or paths,
between the source and destination of a
message
Fault Tolerance
Circuit Switching
Packet Switching
Scalability
Scalability in Internet Architecture
Peers
Distributed
Hierarchical
QoS
Mekanisme kontrol yang mampu
memberikan prioritas yang berbeda pada
aliran data/user yang berbeda, atau
menjamin kualitas aliran data sesuai
permintaan dari program aplikasi
QoS Example
Priority in QoS
Security
Network Security
Ensure
confidentiality through use of
User authentication
Data encryption
Maintain
communication integrity through use of
Digital signatures
Ensure
availability through use of
Firewalls
Redundant network architecture
Hardware without a single point of failure
Element in Network
Devices
These
are used to
communicate with one
another
Medium
This
is how the devices
are connected together
Messages
Information
that travels
over the medium
Rules
Governs
how messages
flow across network
Network Devices
Devices in Network
Review Papers
Network-based
application
(example :e-learning) or
Internet 2
You can find your own source of papers
Put reference where appropriate
Use proper references
Primary Source
Secondary source: PhD thesis, journal paper, monograph,
book
You should not use Wikipedia