Pertemuan 11
Pertemuan 11
Introduction: 1-2
Jaringan Komputer pada DCC
Introduction: 1-3
Topologi Jaringan Komputer pada Scada Lv. 3
Server Svr
Dispatcher Engineer GPS Offline
Scada DMS
Database
Introduction: 1-4
The Internet: a “nuts and bolts” view
Billions of connected mobile network
computing devices: national or global ISP
▪ hosts = end systems
▪ running network apps at
Internet’s “edge”
• Interconnected ISPs
▪ protocols are everywhere Skype
IP
Streaming
video
• control sending, receiving of
messages local or
regional ISP
• e.g., HTTP (Web), streaming video,
Skype, TCP, IP, WiFi, 4G, Ethernet home network content
provider
▪ Internet standards HTTP network datacenter
network
WiFi
Introduction: 1-7
What’s a protocol?
Human protocols: Network protocols:
▪ “what’s the time?” ▪ computers (devices) rather than humans
▪ “I have a question” ▪ all communication activity in Internet
▪ introductions governed by protocols
Introduction: 1-8
What’s a protocol?
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
enterprise
network
Introduction: 1-10
A closer look at Internet structure
mobile network
enterprise
network
Introduction: 1-11
A closer look at Internet structure
mobile network
▪ interconnected routers
▪ network of networks enterprise
network
Introduction: 1-12
Access networks and physical media
Q: How to connect end systems mobile network
national or global ISP
to edge router?
▪ residential access nets
▪ institutional access networks (school,
company)
local or
▪ mobile access networks (WiFi, 4G/5G) regional ISP
Introduction: 1-13
Access networks: Home
wireless
devices
to/from headend or
central office
often combined
in single box
Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
Introduction: 1-16
Internet structure: a “network of networks”
access access
net net
access
net
access
access net
net
access
access net
net
global
access
net
ISP access
net
access
net
access
net
access
net
access
net
access access
net access net
net
Introduction: 1-17
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net
peering link
access
net
access access
net access net
net
Introduction: 1-18
Internet structure: a “network of networks”
… and content provider networks (e.g., Google, Microsoft, Akamai) may
run their own network, to bring services, content close to end users
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A
access ISP C
net
access
net
access
net
regional ISP access
net
access access
net access net
net
Introduction: 1-19
Network security
▪ field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
▪ Internet not originally designed with (much) security in
mind
• original vision: “a group of mutually trusting users attached to a
transparent network” ☺
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction: 1-20
Bad guys: malware
▪ malware can get in host from:
• virus: self-replicating infection by receiving/executing object
(e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving object that
gets itself executed
▪ spyware malware can record keystrokes, web sites visited, upload
info to collection site
▪ infected host can be enrolled in botnet, used for spam or
distributed denial of service (DDoS) attacks
Introduction: 1-21
Bad guys: denial of service
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts
Introduction: 1-22
Bad guys: packet interception
packet “sniffing”:
▪ broadcast media (shared Ethernet, wireless)
▪ promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by
A C
A C
Introduction: 1-25
Internet protocol stack
▪ application: supporting network applications
• IMAP, SMTP, HTTP
application
▪ transport: process-process data transfer
• TCP, UDP transport
▪ network: routing of datagrams from source to
destination network
• IP, routing protocols
link
▪ link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
▪ physical: bits “on the wire”
Introduction: 1-26
source
message M application Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-27
ISO/OSI reference model
Two layers not found in Internet
application
protocol stack!
presentation
▪ presentation: allow applications to
interpret meaning of data, e.g., encryption, session
compression, machine-specific conventions transport
▪ session: synchronization, checkpointing, network
recovery of data exchange link
▪ Internet stack “missing” these layers! physical
• these services, if needed, must be
implemented in application The seven layer OSI/ISO
reference model
• needed?
Introduction: 1-28