Lecture2

26
What is Communication People have many ways to communicate: Verbal/ non Verbal Face to face/ over the telephone Handwritten Letter Chatting Requires Common Rules

Transcript of Lecture2

Page 1: Lecture2

What is Communication

People have many ways to communicate:

– Verbal/ non Verbal

– Face to face/ over the telephone

– Handwritten Letter

– Chatting

Requires Common Rules

Page 2: Lecture2

The rules of communications are Protocol.

Some of the protocols required for communication to occur include:

- Sender & receiver

- Method of communicating (face to face, phone, letter, photo and so on)

- Language and Grammar

- Speed & Timing of delivery

- Confirmation / Acknowledgement requirements

Page 3: Lecture2

Element of Network

1. Rules / Agreement ( PROTOCOL): Rules or agreement govern how the messages are sent, directed, received and interpreted.

2. Message: The messages or unit of information travel from one device to another.

3. Medium: a means of interconnecting devices, a medium can transport the messages from one device to another.

4. Device: devices on the network exchange messages with each other

Page 4: Lecture2

Early networks had varying standards and as a result could not communicate easily wit each other.

People use many technologies and devices that they do not understand.

Computer networks are similar. Two people communicating on end devices in different networks can do so only if many complex processes are succesfully completed.

Page 5: Lecture2

Message

Message:

The messages or unit of information travel from one device to another.

Message is a generic term that encompasses web pages, email, instant messages, telephone calls & other form of communication.

The message must be one that the network can carry.

Page 6: Lecture2

The messages must be supported in software at the end device.

It does not matter whether the message is: text, voice, or video because all form are converted into bits, binary-coded digital signals, to be carried over a wirelles , copper, or fiber optic connection.

The digital signal can change with the media, but the original message content will remain intact.

Page 7: Lecture2

Medium

Medium that physically carries the message can change several times between the sender & receiver.

Network connections can be wired or wirelless.

Page 8: Lecture2

In wired connections the medium is either copper with electrical signals or optical fiber with light signals.

The copper medium includes cables :

twisted pair telephone wire, coaxial cable, or Category 5 unshielded twisted pair (UTP)

Optical fibers, thin strands of glass or plastic that carry light signals

Page 9: Lecture2

UTP Cat 5

Page 10: Lecture2

In wirelles connection the medium is: Earth's atmosphere / space, and the signals are microwave.

Wireless media can include the home wireless connection between a wireless router & computer with wireless network card, the terrestrial wireless connection between 2 ground stations, or the communication between devices on earth & sattelite

Page 11: Lecture2

Devices

Many devices : switch and router, work to see the message is properly directed from the source (originating device) to the destination device.

At the destination network there can be more switches, cable or wireless router that will deliver the instant message to the receiver.

Page 12: Lecture2

Rules

As communication process happen, tens of thousands of process can happen in a single second.

To work properly, the network process must be controlled. Rules govern every step of the process, from the way cables are designed to the way digital signals are sent. These rules are called Protocols

Page 13: Lecture2

Rules

Most common:

TCP Transmission Control Protocol

IP Internet ProtocolService Protocol / Rule

WWW Hyper Text Transfer Protocol

Email SMTP and POP

Instant Message XMPP & OSCAR

Ip Telephony SIP

Page 14: Lecture2

Network Architecture

Syarat-syarat desain yg baik: Fault Tolerance Scalability QoS (Quality of Service) Security

Page 15: Lecture2

Fault Tolerance

Fault tolerance:

Sistem harus tetap berjalan meskipun beberapa komponen mengalami kegagalan.

Key Factor: -Redundancy: Duplikasi peralatan & media

Page 16: Lecture2

Fault Tolerant Network Architecture

Circuit-Switched Connection-Oriented Networks

Packet-Switched Connectionless Networks

Message –block of data - Packets

Page 17: Lecture2

Scalability

Kemampuan network untuk tumbuh dan bereaksi terhadap perubahan masa mendatang.

Page 18: Lecture2

Scalable Network Architecture

Scalable network mampu untuk tumbuh tanpa adanya perubahan fundamental pada inti /core.

Contoh:

Internet is a collection of many private and public network interconnected by routers.

Page 19: Lecture2

Quality of Service (QoS)

Menunjukkan performance level dari service yang ditawarkan melalui network.

Eg:

Live Video or Voice dapat memerlukan lbh banyak resource drpd email.

Because many techs are converged onto 1 platform, the separation of types of services on that platform can allow higher priority for one service over another.

Page 20: Lecture2

Menyediakan QoS

Qos :

Mengacu kpd mekanisme yang mengatur congested network traffic.

Congestion is caused when the demand on network resource exceeds the available capacity.

Network bandwidth is the measure of the data-carrying capacity of the network.

With Qos, the manager can manage the priority.

Page 21: Lecture2

Network Security

Menjadi esential ketika publik hrs mempunyai rasa aman ketika mengakses internet.

Contoh:

Melakukan financial transaction.- Untuk personal information memerlukan privasi melalui:

- Encripted messages.

- Security devices to control network access.

Page 22: Lecture2

Providing Network Security

1. Securing the Network Infrastructure means: protecting the devices from outside contact

Contoh: -locking computer room door, password protection.

2. Securing the Network Content means: protection of data stored on network devices & the protection of packets carryind data into or out of the network.

Page 23: Lecture2

CIA

1. Confidentiality

2. Integrity

3. Availability

Page 24: Lecture2

Ensuring Confidentiality

Data privacy is maintained by allowing only the intended and authorized recipient- individual, proces, or device to read the data.

Biasanya: User Authentication,

-Menggunakan password yang susah ditebak.

-Mengganti password secara berkala.

Page 25: Lecture2

Maintaining Communication Integrity

Data integrity means:

Menjamin bhw informasi tidak di Alter dalam pentransmisiannya dari origin ke destinasi.

Informasi dikorupsi secara sengaja atau tak sengaja sblm sampai tujuan.

Source Integrity:

Adalah jaminan bahwa identitas sender sdh divalidasi. User or device fakes the identity & supply inccorect information to recipient.

Page 26: Lecture2

Ensuring Availability

Meyakinkan bahwa resource tersedia kepada authorized user / pemakai.

Contoh:

Serangan virus komputer, Denial of Service (DoS) dpt membuat network menjadi Down.

Tools:

-AntiVirus SoftWare

-Firewall: analyze traffic enterring and exiting a network.