Professional Documents
Culture Documents
Bab 4-5 Merge
Bab 4-5 Merge
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Sistem Operasi
2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Sistem Operasi / Operating System
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
ELEMEN SISTEM KOMPUTER
◼ Sebuah sistem komputer terdiri dari beberapa
komponen sebagai berikut :
◼ Processor.
Main Memory.
Using Information Technology, 11e
◼ Modul I/O.
◼ Sistem BUS.
◼ Antar komponen dalam sistem komputer bekerja
sama untuk menjalankan fungsi utama sistem
komputer yaitu untuk menjalankan program.
permanen) (RAM)
◼ Modul I/O
◼ Memindahkan data antara komputer dan lingkungan eksternalnya,
misalnya peralatan komunikasi, memory eksternal, dll
◼ Sistem BUS
◼ Beberapa struktur dan mekanisme yang melakukan komunikasi antara
processor, main memory, dan modul I/O.
• Perangkat keras
• CPU, RAM, storage (harddisk, floppy disk, CDROM, dsb), piranti
I/O (printer, scanner, dsb)
• Operating System
• Mengontrol dan mengkoordinasikan penggunaan hardware dari
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tujuan OS
• Convenience : user merasakan kemudahan dan kenyamanan dalam
penggunaan (windows) dengan konsep GUI (graphic user interface)
tampilan yang kita lihat.
• Tinggal klik kalo di windows (tidak perlu menghapal perintahnya)
• Linux : make script base harus diketik nama folder/nama files
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Menyediakan user interface : menu menu di windows/Microsoft .
Tampilan untuk user
• Menyediakan program execution : yang menjalankan perintah (cetak,
save, dll)
• Menyediakan I/O operations : media masuk (device input keyboard)
Using Information Technology, 11e
• Resource manager
• User Interface / antar muka,
• Coordinator
• Guardian, melindungi file dan memberi pengawasan pada
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis Platform & OS
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Macam-Macam Sistem Operasi
➢Desktop/Server :
Windows (Bill Gates), Linux, Solaris, BSD, IBM
OS/2, Mac OS X, dll
Using Information Technology, 11e
➢Mobile :
iOS, Android, Windows Mobile, Symbian,
Blackberry, dll
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Windows* Bill gates
data dapat dipakai bersama dan dapat dipindahkan dari satu aplikasi
ke aplikasi lainnya dengan mudah.
➢ Investasi yang menarik, artinya semaikin banyak produk software
yang mendukung sistem operasi ini.
➢ fasilitas multithreading dan pre-emptive multitasking sehingga
kinerja multitasking lebih reponsif. Dengan fasilitas ini beberapa
program dapat dijalankan secara bersamaan
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
iOS Steve Jobs
➢ Sistem operasi besutan Apple ini merajai share sistem operasi mobile
dengan penggunaan handset Apple yang cukup luas juga seperti iPhone,
iPod Touch, dan iPad.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Android
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Symbian (pada Nokia) David Edwin Potter
perangkat)
➢ API mendukung terhadap komunikasi dan tingkah laku yang umum pada
hardware yang dapat digunakan oleh objek aplikasi lain. Hal ini
dimungkinkan karena API merupakan objek antarmuka yang didefenisikan
pada level aplikasi, yang berisikan prosedur dan fungsi (dan juga variabel
serta struktur data) yang mengelola/memanggil kernel dimana sebagai
penghubung antara software dan hardware.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Blackberry OS Mike Lazaridis
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Windows Mobile
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
LINUX
Linus Benedict Torvalds
sistem operasi ini dapat dan di perbolehkan untuk di copy dan perbanyak
sebanyak mungkin karena so ini termasuk legal dan berlisensi.
• Kebanyakan dari para programer menggunakan sistem operasi linux untuk
berkerja karena sistem operasi ini memberikan kebebasan bagi
penggunanya untuk memperoleh kode sumber (source code) dan bebas
untuk dapat mengubahnya.
• Linux vs windows :
• Linux lebih terbuka, bisa diatur sesuai keinginan
• GUI/Script base bias disetting dan banyak jenisnya
• Keamanaan lebih aman Linux (dari virus)
• Linux (script base) lebih ringan dan tidak memakan pemrosesan dan Ram
• Kekurangan : saat install app gaada versi linux
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Sun Solaris
Andy Bechtolsheim
(sudah dibeli oracle)
• Desain awal Sun Workstation adalah Sun-1 yang dikonsep oleh Andy
Bechtolsheim ketika ia lulus kuliah di Stanford University di Palo Alto,
California.
• Solaris merupakan suatu operasi system turunan asli dari varian kernel Unix
yang dikembangkan pada tahun 1969 oleh American Telephone and
Using Information Technology, 11e
dikategorikan dengan :
• S-U-M-T
Contohnya Windows, MacOS, dsb.
• M-U-M-T
Contohnya Unix, Linux, Windows dengan aplikasi metaframe
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Operating System
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Operating System
Berdasarkan jenis software, sistem operasi
dibedakan berdasarkan:
• Perangkat Lunak Bebas (Free Software)
• Perangkat Lunak Open Source
• Perangkat Lunak Public Domain
• Perangkat Lunak Copylefted
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
FUNGSI DASAR SISTEM OPERASI
• Menjembatani hubungan antara hardware dan program
aplikasi yang dijalankan user.
• Mengatur dan mengawasi penggunaan perangkat keras
oleh user dan berbagai program aplikasi (Resource
allocator).
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3 Komponen Penting yang biasanya terdapat pada setiap Sistem
Operasi
➢ Kernel
➢ File (Sistem Berkas dan File System)
➢ Shell (User Interface)
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Kernel
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tentang Kernel
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Kernel di OS Windows
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Lebih jauh dengan Kernel
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis-Jenis Desain Kernel
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
File
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
File System
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
File system di OS Windows
Tahukah Anda bahwa setiap file system di atas memiliki keunikan.
Berikut ini uraian secara singkatnya:
yang mampu dibaca pada root directory: 512 file, sedangkan pada
nondirektori sebesar 65.335, tidak mendukung long file
names(hanya format 8.3) dan file security,
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
File system di OS Windows
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
WinFS
◼ WinFS (singkat untuk Windows Future Storage) adalah kode nama untuk
penyimpanan data dan berdasarkan sistem manajemen database relasional,
dikembangkan oleh Microsoft dan didemokan pertama kali pada tahun 2003
sebagai lanjutan penyimpanan subsistem untuk sistem operasi Microsoft Windows.
Using Information Technology, 11e
◼ WinFS bukan file sistem. Ia direncanakan untuk database yang beroperasi di atas
NTFS.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
User Interface (Shell)
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
GUI vs. Command Line Interface
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Struktur Penyimpanan
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cache Memory
Misalnya pipeline burst cache yang biasa ada di komputer awal tahun
90-an. Akan tetapi seiring menurunnya biaya produksi die atau wafer
dan untuk meningkatkan kinerja, cache ditanamkan di prosesor.
◼Memori ini biasanya dibuat berdasarkan desain memori statik.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Prinsif Kerja Cache Memory
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Random Access Memory
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Memori Ekstensi
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Struktur Penyimpanan
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Perangkat Lunak
45
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perangkat Lunak/ Software
“Jika tidak ada kode program, berarti bukan perangkat lunak.” Yang
tersebut di atas merupakan definisi sederhananya;
• Jika suatu program bebas, maka dapat disertakan pada sebuah
sistem operasi bebas seperti GNU, atau versi bebas dari sistem
GNU/Linux.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perbedaan katagori Perangkat Lunak
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• SOFTWARE
Using Information Technology, 11e
48
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
49
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Dasar Pemrogaman Web
lainnya.
- Bebas platform
- informasi dapat disajikan oleh browser web pada sistem
operasi apa saja.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Sejarah Lahirnya Web
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Bagaimana WWW bekerja….?
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis-jenis website
◼ Jenis-jenis web berdasarkan sifatnya adalah :
1. Website Dinamis, merupakan sebuah website yang menyediakan content atau isi yang selalu berubah-rubah setiap
saat, misalnya website berita, seperti, kompas.com, detik.com, lintasberita.com, kapanlagi.com
2. Website statis, merupakan website yang contentnya jarang diubah. Misalnya, web profil organisasi.
1. Server side, merupakan website yang menggunakan bahasa pemrograman yang tergantung kepada tersedianya
server, Seperti PHP, ASP dan sebagainya. Jika tidak ada sever, website yang dibangun menggunakan bahasa
pemrograman diatas tidak dapat berfungsi sebagaimana mestinya.
2. Client side, adalah website yang tidak membutuhkan server dalam mennjalankannya, cukup diakses melalui browser
saja.Misalnya HTML, CSS, Javascript, dll.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengertian Jaringan
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Manfaat Jaringan
• Resource Sharing
• Reliabilitas tinggi dengan menyimpan data di bbrp tempat
• Menghemat uang
• Skalabilitas yaitu kemampuan untuk meningkatkan kinerja
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perkembangan Internet
Using Information Technology, 11e
59
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 4 Topics
Using Information Technology, 11e
60
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perkembangan dari Era Analog ke Digital
Using Information Technology, 11e
61
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perkembangan dari Era Analog ke Digital
Using Information Technology, 11e
62
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perkembangan dari Era Analog ke Digital
Using Information Technology, 11e
63
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
64
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
65
telekomunikasi.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
66
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
67
kelebihannya :
Relatif murah, setting lebih mudah, tingkat
keamanan relatif tinggi.
kekurangannya :
Instalasi yang kurang terencana bisa terlihat acak-
acakan dikarenakan kabel yang tidak tertata.
Kurang fleksibel jika ada ekspansi
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
68
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Teknologi Wireless (Nirkabel)
Teknologi wireless (nirkabel) adalah koneksi antar satu perangkat dengan perangkat lainnya tanpa
menggunakan media kabel, namun menggunakan media gelombang radio sebagai media
penghubungnya.
Kelebihan Jaringan dengan menggunakan teknologi wireless
Biaya pemeliharaan jaringan wireless murah
Jaringan wireless murah dalam pengembangannya
Jaringan wireless murah dan mudah untuk relokasinya
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Perangkat elektronik yang sudah dipasang WiFi didalamnya
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
71
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
72
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis-Jenis Jaringan Komputer
Berdasarkan Topologi (1/3)
1. Star
Masing-masing PC dihubungkan secara langsung ke hub/server.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis-Jenis Jaringan Komputer
Berdasarkan Topologi (2/3)
2. Bus
Menggunakan sebuah kabel terpusat di mana seluruh workstation dan
server dihubungkan.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jenis-Jenis Topologi Jaringan
Berdasarkan Topologi (3/3)
3. Ring
Semua workstation dan server dihubungkan sehingga terbentuk suatu pola
lingkaran atau cincin.
Tiap workstation atau server akan menerima dan melewatkan informasi
dari satu komputer ke komputer lain, bila alamat yang dimaksud sesuai
maka informasi diterima dan bila tidak informasi akan dilewatkan..
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Perangkat Jaringan
Cakupan :
1. Pengenalan Switch & Fungsi
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Switch
Tampak Depan
Using Information Technology, 11e
Tampak Belakang
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Switch
Tipe Switch
Managed Switch - Ada Fungsi Vlan (Membagi Segment
jaringan) +
- Konfigurasi mudah di kustomisasi (+)
- Dapat di remote (+)
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Switch
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fungsi Switch
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fungsi Switch
pengecekan pada Mac address table. Yang dicek oleh switch ialah
terdapat pada port berapa Mac address tujuan dari data frame.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fungsi Switch
kondisi looping ini dapat dicegah dengan menutup/memblok salah satu port
yang terkoneksi, misalnya pada switch 1 menutup port eth2 dan pada switch
2 menutup port eth1. Sehingga data dapat sampai ke tujuan tanpa dan tidak
berputar-putar saja.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Router
Tampak Depan
Using Information Technology, 11e
Tampak Belakang
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Router
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fungsi Router
Fungsi Router
Routing Kemampuan merutekan Paket data ke lokasi/destination
yang dituju
DHCP Server Dynamic Host Configuration Protocol
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengenalan Firewall / UTM
Using Information Technology, 11e
Fungsi UTM/Firewall
IDS Intrusion Detection System
IPS Intrusion Prevention System
VPN Virtual Private Network
Firewall Membatasi Hak akses IP/Port/User
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jaringan/ Network
87
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
88
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
IP Address
172.217.24.110
Internet
157.240.13.35
Using Information Technology, 11e
192.168.100.4
89
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
IP Address
192.168.100.20
90
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Badan Internasional Pengelola IP
91
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengertian Keamanan Jaringan
92
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Prinsip Keamanan Jaringan
• Confidentiality:
Mensyaratkan bahwa informasi (data) hanya bisa diakses oleh pihak yang memiliki wewenang.
• Integrity
Mensyaratkan bahwa informasi hanya dapat diubah oleh pihak yang memiliki wewenang.
• Availability
Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan.
Using Information Technology, 11e
• Authentication
Mensyaratkan bahwa pengirim suatu informasi dapat diidentifikasi dengan benar dan ada jaminan
bahwa identitas yang didapat tidak palsu.
• Nonrepudiation
Mensyaratkan bahwa baik pengirim maupun penerima informasi tidak dapat menyangkal
pengiriman dan penerimaan pesan.
93
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ancaman Jaringan
94
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Kategori Gangguan:
❑ Interruption
Suatu aset dari suatu sistem diserang sehingga menjadi tidak tersedia atau tidak dapat dipakai oleh yang berwenang.
Contohnya adalah perusakan/modifikasi terhadap piranti keras atau saluran jaringan.
❑ Interception
Suatu pihak yang tidak berwenang mendapatkan akses pada suatu aset. Pihak yang dimaksud bisa berupa orang,
program, atau sistem yang lain. Contohnya adalah penyadapan terhadap data dalam suatu jaringan.
Using Information Technology, 11e
❑ Modification
Suatu pihak yang tidak berwenang dapat melakukan perubahan terhadap suatu aset. Contohnya adalah perubahan
nilai pada file data, modifikasi program sehingga berjalan dengan tidak semestinya, dan modifikasi pesan yang sedang
ditransmisikan dalam jaringan.
❑ Fabrication
Suatu pihak yang tidak berwenang menyisipkan objek palsu ke dalam sistem. Contohnya adalah pengiriman pesan
palsu kepada orang lain.
95
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Masalah Keamanan Wireless
melalui Bluetooth
• Pencurian fisik access point
• Penyadapan data -> man in middle attack
• DoS
• Malware
96
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pengamanan Jaringan WiFi
• Segmentasi jaringan
• Aktifkan MAC Address Filtering
• Ganti Password Administrator Default
• Aktifkan Enkripsi
Using Information Technology, 11e
97
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
tren serangan siber
Hacking Phising
Usaha mendapatkan akses tidak sah ke sistem, Upaya untuk mendapatkan informasi data seseorang
baik untuk membahayakan sistem atau mencuri dengan teknik pengelabuan. Targetnya adalah data pribadi,
informasi sensitif yang tersedia pada komputer. data akun (username dan password), dan data finansial
1 3
Using Information Technology, 11e
2 Cyber Attack
Trend
4
Data Breach Video Conference Hijacking
Insiden keamanan di mana data dan informasi Usaha untuk melakukan eksploitasi sistem
seorang pengguna device telah diakses tanpa komunikasi secara Video Conference dengan
adanya otorisasi tujuan mengganggu atau merusak sistem
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Teknik Mengamankan Jaringan:
❑ Prevention (pencegahan)
Kebanyakan dari ancaman akan dapat ditepis dengan mudah, walaupun keadaan yang benar benar 100% aman
belum tentu dapat dicapai. Akses yang tidak diinginkan kedalam jaringan komputer dapat dicegah dengan
memilih dan melakukan konfigurasi layanan (services) yang berjalan dengan hati-hati.
❑ Observation (observasi)
Ketika sebuah jaringan komputer sedang berjalan, dan sebuah akses yang tidak diinginkan dicegah, maka proses
Using Information Technology, 11e
perawatan dilakukan. Perawatan jaringan komputer harus termasuk melihat isi log yang tidak normal yang dapat
merujuk ke masalah keamanan yang tidak terpantau. System IDS dapat digunakan sebagai bagian dari proses
observasi tetapi menggunakan IDS seharusnya tidak merujuk kepada ketidak-pedulian pada informasi log.
❑ Response (respon)
Bila sesuatu yang tidak diinginkan terjadi dan keamanan suatu system telah berhasil disusupi, maka personil
perawatan harus segera mengambil tindakan. Tergantung pada proses produktifitas dan masalah yang
menyangkut dengan keamanan maka tindakan yang tepat harus segera dilaksanakan.
99
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats, Security, & Privacy Issues
100
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats, Security, & Privacy Issues
4. MAMAKAI ENCRYPTION
101
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Security Assesment
❖Penetration Test
Penetration test adalah proses melakukan eksplorasi dan
eksploitasi lebih jauh ke dalam sistem target setelah megetahui
bug atau security hole yang di report pada proses vulnerability
assessment.
102
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.