Sei sulla pagina 1di 25

Computer Network

Sritrusta Sukaridhoto
Why Computer Network ???

 Stand alone Computer ….

FOR WHAT ???


Something interesting from
Computer Network ???

 Easiness
 No distance
 Mobility
 Efficient
Network Administrator,…

 Advantages  Disadvantages
 Good salary  ERROR, then
 Control other people want to kill
peoples YOU !!!
 Faster than others
 Relax
Study…

 Basic network theory


 OSI Layer
 Network devices
 Routing
 Network security
 Programming
Study…

 Network Skill
 Operating system
 Server – Client
 Router, Switch, Cabling, etc (network devices)
 Hacking not Cracking
 Certificate
 Experience
 Time can answer ???
Open System
Interconnection (OSI)
 A model defines the stages
or tasks of a protocol as it
prepares to send data
 Open meaning standards
available to all.
 The model is devided into
seven distinct layers
 Each subsequent layer
should perform a well-
defined function and the
layer boundaries are
designed to minimize the
information flow across the
interfaces
OSI Model Layers
 Application Layer
 Provides a user interface (examples: HTTP,
SMTP)
 Includes file, print, database, app. Services
 Presentation Layer
 Presents the data (example: JPEG)
 Includes encryption, compression and
translation services
 Session Layer
 Keeps different applications data separate
OSI Model Layers

 Transport Layer
 Provides reliable delivery
 Performs error detection
 Includes end to end connection
 Network Layer
 Provides logical addressing
 Routing layer
OSI Model Layers

 Data Link Layer


 Combines packets into bytes then into frames
 Performs error detection (not correction)
 Provides Media access addressing (point-to-
point)
 Media Access Control and Data Link Control
 Physical Layer
 Moves bits between devices
Keys Layers of the OSI Model
OSI Model and Protocols
Network Devices

 Wired  Wireless
Router, Switch, Hub, Modem,

TCP/IP
TCP/IP
Operating Systems
Network Security

 Firewall
Hacking NOT cracking
}
if (setsockopt(sockfd,SOL_SOCKET,SO_REUSEADDR,&yes,sizeof(int)) == -1)
{
perror("setsockopt");
exit(1);

Programming }

my_addr.sin_family = AF_INET; // host byte order


my_addr.sin_port = htons(MYPORT); // short, network byte order
my_addr.sin_addr.s_addr = INADDR_ANY; // automatically fill with my IP
memset(&(my_addr.sin_zero), '\0', 8); // zero the rest of the struct
if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr))
== -1) {
/* perror("bind");
** server.c -- a stream socket server demo exit(1);
*/ }
#include <stdio.h> if (listen(sockfd, BACKLOG) == -1) {
#include <stdlib.h> perror("listen");
#include <unistd.h> exit(1);
#include <errno.h> }
#include <string.h> sa.sa_handler = sigchld_handler; // reap all dead processes
#include <sys/types.h> sigemptyset(&sa.sa_mask);
#include <sys/socket.h> sa.sa_flags = SA_RESTART;
#include <netinet/in.h> if (sigaction(SIGCHLD, &sa, NULL) == -1) {
#include <arpa/inet.h> perror("sigaction");
#include <sys/wait.h> exit(1);
#include <signal.h> }
#define MYPORT 3490 // the port users will be connecting to while(1) { // main accept() loop
#define BACKLOG 10 // how many pending connections queue will hold sin_size = sizeof(struct sockaddr_in);
void sigchld_handler(int s) if ((new_fd = accept(sockfd, (struct sockaddr *)&their_addr,
{ &sin_size)) == -1) {
while(wait(NULL) > 0); perror("accept");
} continue;
int main(void) }
{ printf("server: got connection from %s\n",
int sockfd, new_fd; // listen on sock_fd, new connection on new_fd inet_ntoa(their_addr.sin_addr));
struct sockaddr_in my_addr; // my address information if (!fork()) { // this is the child process
struct sockaddr_in their_addr; // connector's address information close(sockfd); // child doesn't need the listener
int sin_size; if (send(new_fd, "Hello, world!\n", 14, 0) == -1)
struct sigaction sa; perror("send");
int yes=1; close(new_fd);
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) { exit(0);
perror("socket"); }
exit(1); close(new_fd); // parent doesn't need this
}
return 0;
}
Server - Client
Certificate
EEPIS Computer Network

 Lab Jaringan Komputer


 Ka. Lab: Sritrusta Sukaridhoto
 Gedung D4 lt. 3
 UPT Jaringan Komputer
 Ka. UPT: Nonot H
 Network Admin: Sukaridhoto, Amang
 Webmaster: Udinharun
 Gedung IT lt. 2
Thank You…

Potrebbero piacerti anche