0% found this document useful (0 votes)
22 views28 pages

Pertemuan 11

Uploaded by

mukhlisnurafifi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views28 pages

Pertemuan 11

Uploaded by

mukhlisnurafifi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Sistem Pengaman, Kontrol Pengawasan

dan Akuisisi Data


Materi: Jaringan Komputer di SCADA

Dr. Arief Kurniawan

Sebagian Materi dambil dari Extra Slide buku : Computer Networking:


A Top-Down Approach
8th edition, Global Edition
Jim Kurose, Keith Ross
Copyright © 2022 Pearson Education
Ltd
Introduction: 1-1
Jaringan Komputer pada UID Jawa Timur

Introduction: 1-2
Jaringan Komputer pada DCC

Introduction: 1-3
Topologi Jaringan Komputer pada Scada Lv. 3
Server Svr
Dispatcher Engineer GPS Offline
Scada DMS
Database

Introduction: 1-4
The Internet: a “nuts and bolts” view
Billions of connected mobile network
computing devices: national or global ISP
▪ hosts = end systems
▪ running network apps at
Internet’s “edge”

Packet switches: forward


local or
packets (chunks of data) Internet
regional ISP
▪ routers, switches
home network content
Communication links provider
network datacenter
▪ fiber, copper, radio, satellite network

▪ transmission rate: bandwidth


Networks enterprise
▪ collection of devices, routers, network
links: managed by an organization
Introduction: 1-5
“Fun” Internet-connected devices

Pacemaker & Monitor


Tweet-a-watt:
monitor energy use
Amazon Echo
IP picture frame Web-enabled toaster +
weather forecaster
Internet
refrigerator
Slingbox: remote
control cable TV
Security Camera AR devices
sensorized,
bed
Internet phones mattress Others?
Fitbit
Introduction: 1-6
The Internet: a “nuts and bolts” view
mobile network
4G
▪ Internet: “network of networks” national or global ISP

• Interconnected ISPs
▪ protocols are everywhere Skype
IP
Streaming
video
• control sending, receiving of
messages local or
regional ISP
• e.g., HTTP (Web), streaming video,
Skype, TCP, IP, WiFi, 4G, Ethernet home network content
provider
▪ Internet standards HTTP network datacenter
network

• RFC: Request for Comments Ethernet

• IETF: Internet Engineering Task TCP


Force enterprise
network

WiFi
Introduction: 1-7
What’s a protocol?
Human protocols: Network protocols:
▪ “what’s the time?” ▪ computers (devices) rather than humans
▪ “I have a question” ▪ all communication activity in Internet
▪ introductions governed by protocols

… specific messages sent


Protocols define the format, order of
… specific actions taken
when message received, messages sent and received among
or other events network entities, and actions taken
on msg transmission, receipt

Introduction: 1-8
What’s a protocol?
A human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time

Q: other human protocols?


Introduction: 1-9
A closer look at Internet structure
mobile network

Network edge: national or global ISP

▪ hosts: clients and servers


▪ servers often in data centers
local or
regional ISP

home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-10
A closer look at Internet structure
mobile network

Network edge: national or global ISP

▪ hosts: clients and servers


▪ servers often in data centers
local or
Access networks, physical media: regional ISP

▪wired, wireless communication links home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-11
A closer look at Internet structure
mobile network

Network edge: national or global ISP

▪ hosts: clients and servers


▪ servers often in data centers
local or
Access networks, physical media: regional ISP

▪wired, wireless communication links home network content


provider
network datacenter

Network core: network

▪ interconnected routers
▪ network of networks enterprise
network

Introduction: 1-12
Access networks and physical media
Q: How to connect end systems mobile network
national or global ISP
to edge router?
▪ residential access nets
▪ institutional access networks (school,
company)
local or
▪ mobile access networks (WiFi, 4G/5G) regional ISP

What to look for: home network content


provider
network
▪ transmission rate (bits per second) of access datacenter
network
network?
▪ shared or dedicated access among users?
enterprise
network

Introduction: 1-13
Access networks: Home
wireless
devices

to/from headend or
central office
often combined
in single box

cable or DSL modem

WiFi wireless access router, firewall, NAT


point (54, 450 Mbps)
wired Ethernet (1 Gbps)
Introduction: 1-14
Access networks: enterprise networks

Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers

▪ companies, universities, etc.


▪ mix of wired, wireless link technologies, connecting a mix of switches
and routers (we’ll cover differences shortly)
▪ Ethernet: wired access at 100Mbps, 1Gbps, 10Gbps
▪ WiFi: wireless access points at 11, 54, 450 Mbps
Introduction: 1-15
Links: physical media
▪ bit: propagates between Twisted pair (TP)
transmitter/receiver pairs
▪ two insulated copper wires
▪ physical link: what lies • Category 5: 100 Mbps, 1 Gbps Ethernet
between transmitter & • Category 6: 10Gbps Ethernet
receiver
▪ guided media:
• signals propagate in solid
media: copper, fiber, coax
▪ unguided media:
• signals propagate freely,
e.g., radio

Introduction: 1-16
Internet structure: a “network of networks”

access access
net net
access
net
access
access net
net
access
access net
net

global
access
net
ISP access
net

access
net
access
net

access
net
access
net
access access
net access net
net

Introduction: 1-17
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A

access
net
IXP ISP B access
net

access ISP C
net
access
net

access
net
peering link
access
net
access access
net access net
net

Introduction: 1-18
Internet structure: a “network of networks”
… and content provider networks (e.g., Google, Microsoft, Akamai) may
run their own network, to bring services, content close to end users
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A

Content provider network


access
net
IXP ISP B access
net

access ISP C
net
access
net

access
net
regional ISP access
net
access access
net access net
net

Introduction: 1-19
Network security
▪ field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
▪ Internet not originally designed with (much) security in
mind
• original vision: “a group of mutually trusting users attached to a
transparent network” ☺
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction: 1-20
Bad guys: malware
▪ malware can get in host from:
• virus: self-replicating infection by receiving/executing object
(e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving object that
gets itself executed
▪ spyware malware can record keystrokes, web sites visited, upload
info to collection site
▪ infected host can be enrolled in botnet, used for spam or
distributed denial of service (DDoS) attacks

Introduction: 1-21
Bad guys: denial of service
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic

1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target

from compromised
hosts
Introduction: 1-22
Bad guys: packet interception
packet “sniffing”:
▪ broadcast media (shared Ethernet, wireless)
▪ promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by

A C

src:B dest:A payload


B

Wireshark software used for our end-of-chapter labs is a (free) packet-sniffer


Introduction: 1-23
Bad guys: fake identity

IP spoofing: send packet with false source address

A C

src:B dest:A payload

… lots more on security (throughout, Chapter 8)


Introduction: 1-24
Protocol “layers” and reference models
Networks are complex,
with many “pieces”: Question:
▪ hosts is there any hope of
▪ routers organizing structure of
▪ links of various media network?
▪ applications
▪ protocols
▪ hardware, software
…. or at least our
discussion of networks?

Introduction: 1-25
Internet protocol stack
▪ application: supporting network applications
• IMAP, SMTP, HTTP
application
▪ transport: process-process data transfer
• TCP, UDP transport
▪ network: routing of datagrams from source to
destination network
• IP, routing protocols
link
▪ link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
▪ physical: bits “on the wire”
Introduction: 1-26
source
message M application Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical

switch

destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-27
ISO/OSI reference model
Two layers not found in Internet
application
protocol stack!
presentation
▪ presentation: allow applications to
interpret meaning of data, e.g., encryption, session
compression, machine-specific conventions transport
▪ session: synchronization, checkpointing, network
recovery of data exchange link
▪ Internet stack “missing” these layers! physical
• these services, if needed, must be
implemented in application The seven layer OSI/ISO
reference model
• needed?
Introduction: 1-28

You might also like