Sei sulla pagina 1di 40

Chapter 1

What is a network?
•What is a network?
• Two or more connected computers that can share resources such as
data and applications, office machines, an Internet connection, or
some combination of these. *example: FIK printers
The Local Area Network (LAN)

• Local area network (LAN) is usually restricted to spanninga particular


geographic location such as an office building, a single department
within a corporate office, or even a home office.
• Back in the day, you couldn’t put more than 30 workstations on a
LAN,
• Because of technological advances, all that’s changed now, and we’re
not nearly as restricted in regard to both a LAN’s size and the distance
a LAN can span. Even so, it’s still best to split a big LAN into smaller
logical zones known as workgroups to make administration easier.
The Local Area Network (LAN)

• Workgroup Vs Domain

The meaning of the term workgroup in this context is slightly differen


than when the term is used in contrast to domains. In that context a
workgroup is a set of devices with no security association with one
another (whereas in a domain they do have that association). In this
context, we simply mean they physically are in the same network
segment.
The Local Area Network (LAN)

• Workgroup Vs Domain

The meaning of the term workgroup in this context is slightly


different than when the term is used in contrast to domains.
In that context a workgroup is a set of devices with no
security association with one another (whereas in a domain
they do have that association).

Where is WORKGROUP and DOMAIN settings?


Common Network Components
• Workstations – a PC
• Servers – a PC that serve
• Hosts – any device on network that has IP
• File server Stores and dispenses files
• Mail server The network’s post office; handles email functions
• Print server Manages printers on the network
• Web server Manages web-based activities by running Hypertext Transfer Protocol
• (HTTP) for storing web content and accessing web pages
• Fax server The “memo maker” that sends and receives paperless faxes over the network
• Application server Manages network applications
• Telephony server Handles the call center and call routing and can be thought of as a
• sophisticated network answering machine
• Remote access server Provides remote users with access to the network through modems
• and an IP connection
• Proxy server Handles tasks in the place of other machines on the network
Hosts
It can be kind of confusing because when people refer to
hosts, they really can be referring to almost any type of
networking devices—including workstations , servers, and
network devices with IP addresses.

Related terms. local host, remote host, etc.


WAN
WAN vs LAN

• WANs usually need a router port or ports.


• WANs span larger geographic areas and/or can link disparate locations.
• WANs are usually slower.
• We can choose when and how long we connect to a WAN. A LAN is all or
nothing— our workstation is either connected permanently to it or not at
all, although most of us have dedicated WAN links now.
• WANs can utilize either private or public data transport media such as
phone lines.
WAN
Internet vs Intranet
• We get the word Internet
from the term
internetwork. An
internetwork is a type of
LAN and/or WAN that
connects a bunch of
networks, or intranets.
Network Architecture
Peer-to-Peer vs Client-Server

Network Topologies
* Star * Ring * Mesh
* Point-to-point * Point-to-multipoint
* Hybrid
TUGAS ESAI #1:
"Sejarah jaringan dan Internet",
Esai 700 kata tentang sejarah jaringan
dan internet dari tahun 1950an hingga sekarang.
Hari pertemuan pertama minggu depan jam 12 siang. NO PLAGIARISM.
Email file docx ke:

joeyuan.mambu@unklab.ac.id
Kirimkan dengan format dan sblm tgl deadline , lain
dari itu TIDAK AKAN DI TERIMA
Subject email:
“COMNET1X TUGAS1 NAMA LENGKAP ANDA”
attach file, nama file:
“COMNET1X TUGAS1 NAMA LENGKAP ANDA.DOCX”
ASSIGNMENT #1:
Assignment, discuss about IOT and 5G technology:
write an essay 800 words with proper citation (IEEE). Send to
joeyuan.mambu@unklab.ac.id
On 12 o’clock next week meeting. No late submission/no excuse.

Subject email:
“COMNET2x TUGAS1 YOUR FULL NAME”
attach file, nama file:
“COMNET2x TUGAS1 YOUR FULL NAME.DOCX

Other than above format will not be accepted


Chapter 2
Internetworking Models (OSI Layer)
• When networks first came into being, computers could usually
communicate only with computers from the same manufacturer. For
example, companies ran either a complete
• DECnet solution or an IBM solution—not both together. In the late
1970s, the Open Systems Interconnection (OSI) reference model was
created by the International
• Organization for Standardization (ISO) to break through this barrier.
The OSI model was meant to help vendors create interoperable
network devices and software in the form of protocols so that
different vendor networks could work with each other
Advantages of Reference Models
The OSI model is hierarchical, and the same benefits and advantages
can apply to any layered model. The primary purpose of all such
models, especially the OSI model, is to allow different vendors’
networks to interoperate.
Advantages of using the OSI layered model include, but are not limited
to, the following:
• Simpler components The OSI model divides the network
communication process into smaller and simpler components, thus
aiding component development, design, and troubleshooting.
• Multiple-vendor development It allows multiple-vendor
development through standardization of network components.
Advantages of Reference Models
• Encourages Industry Standardization : It encourages industry
standardization by defining what functions occur at each layer of the
model.
• Full Communication : It allows various types of network hardware
and software to communicate.
• Independent Development: It prevents changes in one layer from
affecting other layers, so it doesn’t hamper development and makes
application programming easier.
7 Layers of the OSI Model
Examples
Layer Example
7.) Application HTTP, FTP, SMTP, POP3, IMAP
6.) Presentation ASCII, JPEG, PGP,
5.) Session BOOTP, NetBIOS, DHCP, DNS
4.) Transport TCP, UDP, SPX
3.) Network IP, IPX, ICMP , Router, Firewall
2.) Data Link Ethernet, Token Ring, Frame Relay,
Switch
1.) Physical Bits, Interfaces, Hubs
Encapsulation
• Data exists at each layer contained within a
unit called a Protocol Data Unit (PDU).
• The process by which data moves between
PDU types is called Encapsulation
• PDU move through interfaces between
layers using Service Access Points (SAP)
PDU’s And the OSI Model
Layer 1: The Physical Layer
• Defines physical medium and interfaces
• Determines how bits are represented
• Controls transmission rate & bit synchronization
• Controls transmission mode: simplex, half-duplex, & full duplex
• PDU: Bits
• Devices: hubs, cables, connectors
Layer 2: The Data Link Layer
• Keeps Link alive & provides connection for upper layer protocols
• PDU: Frames
• Sublayers: MAC (framing, addressing, & MAC) & LLC (logical link
control – gives error control & flow control)
• Devices: switches, bridges, NIC’s
Layer 3: The Network Layer
• PDU: Packet
• End to end delivery of packets
• Creates logical paths and Path determination (routing)
• IP addressing
• Devices: routers, firewalls
• Protocol: IP, ICMP, ARP, RARP

ICMP (Destination Unreachable) message


ICMP: ping and traceroute
How ARP work (IP and MAC)
Layer 4: The Transport Layer
• PDU: Segment
• Service Point Address (more often called a port) used to track
multiple sessions between the same systems. SPA’s are used to allow
a node to offer more than one service (i.e. it could offer both mail
and web services)
• This layer is why you have to specify TCP or UDP when dealing with
TCP/IP
The Transport Layer (cont.)
• Must reassemble segments into data using sequence numbers
• Can use either connectionless or connection oriented sessions (UDP
vs TCP)
• Connectionless sessions rely on upper layer protocols for error control
and are often used for faster less reliable links
• Ex: UDP
The Transport Layer (cont.)
• Connection oriented sessions require the sender to first request a
connection, the receiver to acknowledge the connection, and that
they negotiate how much data can be sent/received before its
reception is acknowledged (TCP)
• Uses acknowledgements & retransmission for error correction
• Example: TCP (used by things like telnet, http)
• Popular port Number:
– FTP: 21,20 – file transfer
– HTTP: 80 – protocol web client/browser
– HTTPS: 443 – secure http
– POP3: 110 – PULL email
– SMTP:25,26 – SEND email
– IMAP4: 143 – PULL email
– DNS: 53 – translate domain ke ip dan sebaliknya
– DHCP: 67 – gives IP Address to host

Eg. Browser and web server


ftp client and ftp client
Pop /imap, smtp on Mail client &
Web-based mail client – gmail server
Layer 5: The Session Layer
• PDU: Data (from here on up)
• Sometimes called the dialog controller, this layer establishes,
maintains, and terminates sessions between applications
• Defines checkpoints for acknowledgements during sessions between
applications
• Provides atomization – Multiple connections can be treated as one
virtual session. If one fails or is terminated, all should be terminated.
• Ex: RPC, X-Windows, LDAP, NFS
Layer 6: The
Presentation Layer
• Data formatting, translation,
encryption, and compression
• Ex: ASCII, EBCDIC, HTML, JPEG
Layer 7: The Application Layer
• Provides communication services to applications
• Ex: HTTP, FTP, SMTP
• Software: Brower, FTP Client/Server, Mail Client/Server

Potrebbero piacerti anche