MUSIK dan IT memiliki nilai seni yang tinggi
Tampilkan postingan dengan label jaringan n internet. Tampilkan semua postingan
Tampilkan postingan dengan label jaringan n internet. Tampilkan semua postingan

04 Juni 2011

Transfer File Menggunakan Secure Copy (SCP)

         Sedikit sharing buat temen2 yang ingin mengkopi data dari komputer yang terhubung ke jaringan, disini saya melakukan percobaan dengan menggunakan distro linux ubuntu10.10, dengan cara menggabungkan 2 komputer dengan metode peer to peer, artikel ini banyak saya kutip dari berbagai sumber di internet,


berikut syntak2nya pada console :


  1. Copy File dari komputer kita ke komputer remote (server)  $ scp /path/folder/namafileyangmaudikirim username@ip_server:/folder/tempat/menyimpan 
  2.  Copy File dari komputer remote / server ke komputer kita $scp userbane@ipataudomain:/folder/yang/mau/dikopi/namafilenya /path/pc/lokal/
  3. Copy File dari komputer remote yang satu ke komputer remote lainnya$scp username@ip_server1:/folder/tempat/menyimpan/nama/file username@ip_server2:/folder/tempat/menyimpan/nama/file
  4.  Cara ini digunakan apabila Port SSh sudah berubah dari defaultnya 22. scp -P port_ssh username@ipatauhost:/folder/tempat/menyimpan
  5. Kemudian apabila ternyata kita menginginkan bisa meng copy seluruh isi folder (termasuk mungkin ada folder didalam folder tersebut kita bisa gunakan opsi -r (recursive) scp -r username@ip_tempat_file:/folder/tempat/menyimpan/file/* ./
  6.  Yang ini adalah trik apabila anda mendownload file dengan scp tetapi tidak menginginkan seluruh bandwidth terpakai hanya untuk download. scp -l bandwidthlimit username@ip_tempat_file:/folder/tempat/menyimpan/file/* ./
  7. Sementara yang satu ini bisa anda pergunakan apabila anda ingin melakukan eksekusi suatu file setelah upload. ssh username@ip_tempat_file tar -zxvf nama_file.tgz  
atau anda ingin ngasih tau user di box tujuan bahwa anda telah selesai copy file
ssh username@ip_tempat_file ‘wall “uy copy file nya udah beres”‘

 
Secure Copy atau SCP merupakan fasilitas untuk melakukan transfer data secara terenkripsi dari satu komputer ke komputer lainnya. Protokol ini berjalan pada port 22, dan membutuhkan akses shell (apabila linux) pada kedua server.
Karena paket data yang ditransfer terlebih dahulu dienkripsi, maka akan terjadi degradasi kecepatan transfer data tersebut, sekitar 60-70% lebih lambat dari pada apabila menggunakan FTP ataupun wget dari HTTP.
Berikut beberapa contoh penggunaan SCP untuk melakukan transfer data; 
Gantikan username dengan username anda di pc remote dan
ip.address.pc.remote dengan ip address pc remote. Sesuaikan juga informasi path dan nama file dengan kondisi anda.

  1. Kopi “file.txt” dari komputer remote ke komputer lokal kita; view sourceprint? scp username@ip.address.pc.remote:/path/di/pc/remote/file.txt /path/pc/lokal/Kopi “file.txt” 
  2. dari komputer lokal ke komputer remote;view sourceprint? scp /path/pc/lokal/file.txt username@ip.address.pc.remote:/path/di/pc/remote/
  3. Kopi direktori “dirlokal” di pc local ke dalam direktori “dirremote” di pc remote view sourceprint? scp -r /path/pc/lokal/dirlokal username@ip.address.pc.remote:/path/di/pc/remote/dirremote
  4.  Kopi “file.txt” di pc remote A ke pc remote B sourceprint?  scp username@ip.address.pc.A:/path/pc/A/file.txt username@ip.address.pc.B:/path/di/pc/B/ 


 
Mengkopi secara recursive isi direktori dapat dilakukan dengan *, begitu juga denga multiple file dapat dilakukan melalui filter regex lainnya.
=======================================================
Tips meng copy file dari mesin ke mesin linux dalam satu jaringan
Kita dapat mengcopykan file atau directory dengan beberapa cara di linux.Bisa memakai rsync bisa juga dengan scp. Dalam kasus ini adalah kita ingin mengcopikan file PacketTracer5_generic.tar.gz.1 dari local direktory (misal directory /home/popi/PacketTracer5_generic.tar.gz.1) ke mesin remote dengan ip =192.168.0.156 di directory /home/popi2/ dengan menggunakan scp.
  1. Syaratnya adalah kita perlu mengetahui password pada mesin di remote dengan user popi2.
  2. Kedua mesin terkoneksi dengan TCP/IP perintahnya adalah: sudo scp /home/popi/PacketTracer5_generic.tar.gz.1 popi2@192.168.0.156:/home/popi2/



24 Agustus 2010

IP address

TCP/IP adalah salah satu jenis protokol yg memungkinkan kumpulan komputer untuk berkomunikasi dan bertukar data didalam suatu  network (jaringan).
IP address adalah alamat yang diberikan pada jaringan komputer yang menggunakan protokol TCP/IP.IP address terdiri atas 32 bit angka biner yang dapat dituliskan sebagai empat kelompok angka desimal yang dipisahkan oleh tanda titik seperti 192.168.0.1

tabel 1.1 contoh ip address



01 Agustus 2010

MURAH DAN MUDAH MEMBANGUN JARINGAN INTERNET

Jaringan computer berbasis internet sudah sangat dibutuhkan semua kalangan, baik dikampus, sekolah , kantor atau bahkan usaha warnet dan game online. Oleh sebab itu, sangat penting untuk mendisain jaringan computer agar menjadi handal, murah dan efisien.
Akan tetapi murah bukan berarti murahan. Dengan membaca buku ini, anda dapat menggantikan dedicated router yang harganya selangit dengan LRP LEAF bearing yang gratis tanpa mengurangi fungsi dan kinerja jaringan itu sendiri. Linux Router Project Leaf Bearing adalah distro mini linux yang dapat dijalankan hanya dengan disket dan PC lama yang mungkin bagi kita sudah tidak layak lagi untuk digunakan.
Isi buku ini juga bisa dijadikan referensi karena penulis menggabungkan permasalahan dari beberapa buku, baik itu terbitan luar maupun local serta dari hasil beberapa penelitian yang dilakukan.
Silahkan download filenya secara lengkap dari link dibawah ini, semoga bermanfaat…

download file lengkap

ADMINISTRASI JARINGAN KOMPUTER

Mempunyai jaringan computer yang aman tentunya menrupakan keinginan oleh setiap administrator jaringan. Salah satu cara yang dipilih oleh administrator adalah menggunakan linux sebagai system operasi untuk computer server. Pada computer client ,ternyata tidak mudah untuk merubah dari system operasi yang lama ke linux dengan berbagai fator dan sebab. Untuk itu diperlukan solusi agar pengguna tetap dapat menggunakan system operasi lama di computer client, namun administrator bisa menggunakan linux di computer server.
Solusi untuk itu adalah mengkombinasikan system operasi yang ada didalam jaringan computer. Beberapa client tetap dapat menggunakan windows meskipun jaringan computer yang digunakan menggunakan linux. Kombinasi inilah yang biasanya ditemukan dilapangan. Selain menjadi experiment yang menarik, kombinasi tersebut merupakan solusi yang masuk akal dan merupakan win-win solution. Pengguna tidak terlalu dipaksa untuk beralih system operasi terburu buru dan administrator dapat segera memanfaatkan kehandalan linux sebagai sever jaringan computer. Buku ini membahas mengenai administrasi jaringan computer dengan server linux, namun client berbasis windows98,200,xp dan linux. Proses autentikasi computer client berada di server,begitu pula dengan proses backup, pengaturan kuota tiap user, dan proses administrasi jaringan computer lainnya.
Silahkan download filenya secara lengkap dari link dibawah ini, semoga bermanfaat…
download file lengkap

31 Juli 2010

SISTEM KEAMANAN KOMPUTER

Dewasa ini,tidak ada sisi kehidupan manusia yang tidak menggunakan computer. Akibatnya,timbul suatu kebutuhan sekuriti untuk system computer. Kita telah banyak mendengar kejadian pada dunia computer khususnya jaringan internet,yang menghadapi serangan virus,worm,Trojan,dos,web deface,pembajakan software,sampai dengan masalah pencurian kartu kredit.

Oleh karena itu system keamanan computer sangat krusial,suatu usaha pencegahan dan pendeteksian penggunaan computer secara tidak sah juga diperlukan. Dengan mmembuat system keamanan computer maka kita akan melindungi data agar tidak dapat dibaca oleh orang yang tidak berhak tidak menyisipkan atau menghapus data.

Buku ini akan menceritakan konsep dasar dari suatu system kemanan computer, kkhususnya yang berbasis pada internet. Materi yang dibahas meliputi dasar mengapa kita perlu peduli terhadap keamanan, mengenal dunia underground,cracker dan hacker, membahas cara membangun firewall sebagai perlindungan dari kejahatan internet, antisipasi dan strategi keamanan. System keamanan yang berbasis pada internet, strategi backup hingga membuat policy. Buku ini layak menjadi pegangan anda yang bergelut di dunia computer-baik sebagai pemerhati ,praktisi,mahasiswa bahkan masyarakat umum.

Silahkan download filenya secara lengkap dari link dibawah ini, semoga bermanfaat…

.download_file

18 Juli 2010

local area network (LAN)

Definition: A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet or other WAN. Most local area networks are built with relatively inexpensive hardware such as Ethernet cables, network adapters, and hubs. Wireless LAN and other more advanced LAN hardware options also exist.
Specialized operating system software may be used to configure a local area network. For example, most flavors of Microsoft Windows provide a software package called Internet Connection Sharing (ICS) that supports controlled access to LAN resources.
The term LAN party refers to a multiplayer gaming event where participants bring their own computers and build a temporary LAN.
Also Known As: local area network
Examples:
The most common type of local area network is an Ethernet LAN. The smallest home LAN can have exactly two computers; a large LAN can accommodate many thousands of computers. Many LANs are divided into logical groups called subnets. An Internet Protocol (IP) "Class A" LAN can in theory accommodate more than 16 million devices organized into subnets.

course : www.compnetworking.about.com

Early history


 Early computation

The earliest known tool for use in computation was the abacus, and it was thought to have been invented in Babylon circa 2400 BCE. Its original style of usage was by lines drawn in sand with pebbles. This was the first known computer and most advanced system of calculation known to date - preceding Greek methods by 2,000 years. Abaci of a more modern design are still used as calculation tools today.
In 1115 BCE, the South Pointing Chariot was invented in ancient China. It was the first known geared mechanism to use a differential gear, which was later used in analog computers. The Chinese also invented a more sophisticated abacus from around the 2nd century BCE, known as the Chinese abacus.
In the 5th century BCE in ancient India, the grammarian Pāṇini formulated the grammar of Sanskrit in 3959 rules known as the Ashtadhyayi which was highly systematized and technical. Panini used metarules, transformations and recursions.
The Antikythera mechanism is believed to be the earliest known mechanical analog computer.[2] It was designed to calculate astronomical positions. It was discovered in 1901 in the Antikythera wreck off the Greek island of Antikythera, between Kythera and Crete, and has been dated to circa 100 BC. Technological artifacts of similar complexity did not reappear until the 14th century, when mechanical astronomical clocks appeared in Europe.[3]
Mechanical analog computing devices appeared again a thousand years later in the medieval Islamic world. Examples of devices from this period include the equatorium by Arzachel,[4] the mechanical geared astrolabe by Abū Rayhān al-Bīrūnī,[5] and the torquetum by Jabir ibn Aflah.[6] Muslim engineers built a number of Automata, including some musical automata that could be 'programmed' to play different musical patterns. These devices were developed by the Banū Mūsā brothers[7] and Al-Jazari[8] Muslim mathematicians also made important advances in cryptography, such as the development of cryptanalysis and frequency analysis by Alkindus.[9]
When John Napier discovered logarithms for computational purposes in the early 17th century, there followed a period of considerable progress by inventors and scientists in making calculating tools. Around 1640, Blaise Pascal, a leading French mathematician, constructed the first mechanical adding device[10] based on a design described by Greek mathematician Hero of Alexandria.[11]
None of the early computational devices were really computers in the modern sense, and it took considerable advancement in mathematics and theory before the first modern computers could be designed.

[edit] Algorithms

In the 7th century, Indian mathematician Brahmagupta gave the first explanation of the Hindu-Arabic numeral system and the use of zero as both a placeholder and a decimal digit.
Approximately around the year 825, Persian mathematician Al-Khwarizmi wrote a book, On the Calculation with Hindu Numerals, that was principally responsible for the diffusion of the Indian system of numeration in the Middle East and then Europe. Around the 12th century, there was translation of this book written into Latin: Algoritmi de numero Indorum. These books presented newer concepts to perform a series of steps in order to accomplish a task such as the systematic application of arithmetic to algebra. By derivation from his name, we have the term algorithm.Algorithm-is the computer in using a mathematical equation.

[edit] Binary logic

Around the 3rd century BC, Indian mathematician Pingala discovered the binary numeral system. In this system, still used today in all modern computers, a sequence of ones and zeros can represent any number.
In 1703, Gottfried Leibnitz developed logic in a formal, mathematical sense with his writings on the binary numeral system. In his system, the ones and zeros also represent true and false values or on and off states. But it took more than a century before George Boole published his Boolean algebra in 1854 with a complete system that allowed computational processes to be mathematically modeled.
By this time, the first mechanical devices driven by a binary pattern had been invented. The industrial revolution had driven forward the mechanization of many tasks, and this included weaving. Punched cards controlled Joseph Marie Jacquard's loom in 1801, where a hole punched in the card indicated a binary one and an unpunched spot indicated a binary zero. Jacquard's loom was far from being a computer, but it did illustrate that machines could be driven by binary systems.

[edit] Birth of computer science

Before the 1920s, computers (sometimes computors) were human clerks that performed computations. They were usually under the lead of a physicist. Many thousands of computers were employed in commerce, government, and research establishments. Most of these computers were women, and they were known to have a degree in calculus. Some performed astronomical calculations for calendars.
After the 1920s, the expression computing machine referred to any machine that performed the work of a human computer, especially those in accordance with effective methods of the Church-Turing thesis. The thesis states that a mathematical method is effective if it could be set out as a list of instructions able to be followed by a human clerk with paper and pencil, for as long as necessary, and without ingenuity or insight.
Machines that computed with continuous values became known as the analog kind. They used machinery that represented continuous numeric quantities, like the angle of a shaft rotation or difference in electrical potential.
Digital machinery, in contrast to analog, were able to render a state of a numeric value and store each individual digit. Digital machinery used difference engines or relays before the invention of faster memory devices.
The phrase computing machine gradually gave away, after the late 1940s, to just computer as the onset of electronic digital machinery became common. These computers were able to perform the calculations that were performed by the previous human clerks.
Since the values stored by digital machines were not bound to physical properties like analog devices, a logical computer, based on digital equipment, was able to do anything that could be described "purely mechanical." The theoretical Turing Machine, created by Alan Turing, is a hypothetical device theorized in order to study the properties of such hardware.