Photoshop Designer
Memaparkan catatan dengan label Notes. Papar semua catatan
Memaparkan catatan dengan label Notes. Papar semua catatan

29 September 2011

Harini Kita Belajar CSS style

Harini Kita Belajar CSS style

20 September 2011

LAB 2: The Goals of Information Technology Security

LAB 2: The Goals of Information Technology Security 

23 Mac 2011

Peer-To-Peer Networking

Review Questions

1. Find 2 P2P file sharing applications that use centralized directory other than

I. Audiogalaxy

II. Direct Connect

III. Advanced Direct Connect

IV. Soulseek

V. Opennap

VI. Soribada

2. Find 2 P2P file sharing applications that use decentralized directory other than

I. Applejuice

II. Ares

III. BitTorrent

IV. eDonkey

V. FastTrack

VI. Freenet

3. Find 2 P2P file sharing applications that use query flooding other than Gnutella.

I. WinMX

II. Limewire

III. eMule

IV. Bearshare

4. List 3 open source-based P2P file sharing applications.

I. QuteCom : Free Voice, Video and IM client application

II. Icecast : open source streaming media server

III. YaCy : P2P-based search engine

IV. TVmad : p2p free online streaming

V. Radiolicious: Internet radio

5. List 3 proprietary-based P2P file sharing applications.

I. MetaMachine (eDonkey2000 )

II. Loophole (WinMX protocol)

III. KCeasy is client based on giFT peer to peer file sharing protocol

6. Make a search on P2P file sharing applications. Among all P2P services (other than
Ares), which one caught your interest the most? Explain why (interface, features,
add-ons, performance, license type, ratings etc.)

I choose WinMX because WinMX one of pretty old peer to peer file sharing program has suffered due to lowsuite and its official website and server is now offline form 2005 although WinMX program is still operating successfully.WinMX network has limited number of Viruses and also it has restriction of maximum file size can be shared is 2 GB only.WinMX is majorly used for audio and video file sharing but you can use it for sharing any types of files. Also Supported Operating system: Win XP/NT 4.x/2003/2000/Vista.

License type is freeware.

Rating review is 5 star.

4 Mac 2011

Introduction To Computer Graphics

What is Computer Graphic?
 the term "computer graphic" was coined in 1960 by William Fetter
• to describe new methods he was pursuing at Boeing
• mean the creation, storage and manipulation of model and images; all generated by computer
• computer graphic are picture or images generated by computer.

Modelling And Rendering
 modelling: develop a mathematical representation of any 3D surface of object.
• method: implicit func. ; polygon mesh; splines; metaballs
• representing a scene or object in a format that can be stored in computer memory
• rendering: give final appearance to the model; 2D to 3D; technique=raytracing

4 Main Task:
  1. Imaging: representing 2D Images
  2. Modelling: creating and representing the geometry of object in the 3D world
  3. Rendering: constructing 2D images from 3D model
  4. Animation: describing how objects change in time
Computer Graphic Tool
 Hardware Tool: video monitor; graphic cards; data gloves; graphic tablet
 Software Tools: OpenGL; write program to create images
 Software For CGI Animation: 3Dstudio Max/ Maya/ Blender

Where CGI (computer graphic interface) are used?
 computer games; movie production; animation and special effect; slide, book, megazine design
 monitoring a process: air traffic control system
 simulations: flight simulator
 computer aided design(CAD)

Element of Computer Graphic System
• processor; memory; frame buffer(memory store of pixel)
• input device; output devices(CRT)

Transformation: encoded as 4x4 matrix
Clipping: limited field of view so cut geometry against the clippilng rectangle
Projection: flatten object from 3D to 2D
Rasterization: (scan conversion): covert geometry primitives(lines, polygon) to pixel

Geometric Objects And Transformation (Part 2)

• one example of a transformation is the windows to view port transformation
 to allow us to move objects to more complex locations
• OpenGL pipeline makes transformations easy
• transformation consists of (occur in 2d and 3d)
     • a rotation
     • a scaling
     • a translation
     • a shearing

• transformation allow for:
  1. scene composition
  2. easily create symmetrical object
  3. viewing object at different angles
  4. computer animation where several objects need to more relative to one another
 Transformation points ( simply takes a point and maps it to another location)
transformation point

Affine Transformations : there are 4 types of transformations that can be combined to produce an affine transformation

  1. Translation: moving point/object around in the x,y, and z direction
This means that values are being added or subtracted to the existing coordinates

      2. Scaling : This means that x, y and z coordinates are being multiplied by a scalar
Scale point; P = (6,2) to Q = (3,4)

     3. Rotation : This means that x,y,z rotated araound a point
rotation matrix
     4. Shearing : That a point is dragged in a particular direction, coordinated affected but other are not

     5. Combining Transformation : rotate scaling, translation and shearing can be combined into matrix

Input And Interaction

Input Device
• physical device
• logical device : define the type of input; not adopted in openGL

input device
Classes of Logical Device
  1. String Device : returns strings of characters; physical device keyboard
  2. Locator: returns; physical device mouse
  3. Pick: returns the ID of the graphical object; physical device mouse button gun
  4. Choice: mouse returns one of a discrete number of option;ex menu
  5. Stroke: return array of location; similar to locator; ex push button, releasing the button mouse
Input Process
  1. Measure process: input device returns a set of logical measures
  2. Trigger process: input device returns the trigger signal
Input Modes
Request mode:

Sample mode:

Event mode:
Display Lists
  • is a compiled list of intructions stored in adisplay memory(client) or on a graphics server


  • Draw geometric objects.
  •  Manipulate pixels.
  • Control attributes, such as color, line type,
  • and fill patterns.
  • Include menus.
  • Allow for moving and resizing the window

3 Mac 2011

Overview Of The Internet

Autonomous System
• the infrastructure of the internet each independently managed
• each may consist of multiple network
• each have number called AS number

Internet Access Method
• Dial-up : use a modem and standard telephone line (max speeed not exceed=56kbps)
• ISDN : use existing telephone lines  (allows 64Kbps on a single channel). Two channel = 128Kbps.
• DSL : use existing telephone lines, using DSL hub; always connected ; (640Kbps>speed>256Kbps)
• Cable Modem: use existing TV coaxial cable;
  provide by cable TV provider; via network card and ethernet cable; speed<1.5Mbps

• very specialized telecommunication circuit that does not work over normal telephone line
• divide in 24 channels in many different purpose; speed<1.54Mbps

Internet Service Providers (ISPs)
• a bussiness that provides connectivity to the internet
• can be a small bussiness hat provides connectivity in only one city, or large company with access points in
many cities and country
• Popular ISPs
  1. TMNet
  2. Jaring
  3. School And College Network
Primary Purpose of an ISP
To Connect To The Internet:
  1. a physical connection
  2. software to communicate
  3. an address
To Connect To An ISP
• must be using an operating system that support communication protocol such TCP/IP

Local Area Network (LAN)
• a group of computer and other devices network together that is confined in a small area

How An Internet Service Provider Works
• after connect to ISP by cable, DSL or telephone line the ISP connect you to the internet
• a router device that connect two or more network can make decision about the best way to route data over these networks
• Region network=Wide Area Network (WAN); a network covers a large geographical area.
• Channel Service Unit(CSU) acts as a safe electrical buffer between the LAN and public network
• Digital Service Unit or Data Service Unit; data formatted correctly before allowed on the T1 line

Point Of Presence
• is a connection point to the internet; either a telephone number, Dial-up
Uniform Resource Locator
• is an address for a web page file or other resource on the internet

• consist of a large number of computer connected or network to each other
• server tend to have greater capacity and more expensive
• a network that uses the TCP/IP protocol to provide private services within an organization.
• medium or larger business enterprise
• refer to internet resource that are beyond the reach of the public and require login name and password to access
• certain large or privileged customers; suppliers and subcontractor

Geometric Objects And Transformation (Part 1)

Three Basic Types
• scalars
• points
• vectors

Define this in three different ways:
• geometric view
        • point-a location in space
       • scalar-unit of measurement, real numbers
       • vector-quantity with direction and magnitude
• mathematical view
       • linear vector space - combine 2 distinct scalar and vectors
       • affine space - adds the point, operation=vector point addition; point-to-point subtraction.
       • euclidean space - add concept of distance
• computer science view
       Abstract Data Type (ADTs) = set of operation on data.
       • fundamental to modem computer science


1 Mac 2011

Presentation Layer

Presentation Layer
•  is the sixth level of OSI model
•  sender and receiver seeing same data = presentation format.
  presentation layer may be represent(encode) the data in various way; ex: data compression,or encryption
•  convert into its original meaning

Specific Reponsibilities Of Presentation Layer

Data Representation

  • different computer=different representation for character
  • converting the complex data structures used by application into a byte stream trasmit across the network.
  • Popular network data reprentations include:
  •    • ASN.l - an ISO standard
  •    • XDR - used with SunRPC
Abstract Syntax Notation (ASN.l) that address the issue of representing, encoding , transmitting and decoding data structure
• Two part:
      1. Abstract Syntax: that describe data structure in an unambiguous way. use int; string;
      2. Transfer Syntax: that describes the bit stream encoding of ASN.l data object

The main reason for success of ASN.l is that it is associated with several standardized encoding rules such:
• Basic Encoding Rules(BER) - X.209
• Canonical Encoding Rules(CER)
• Distinguised Encoding Rules(DER)

• Sun Microsystem's External Data Representatin(XDR) is much simpler than ASN.l but less powerful.
     1. XDR uses implicit typing
     2. all data transfered in units of 4 bytes

 Data Compression

  • Lossless Compression: data is compressed and can be uncompressed
  • Lossy Compression: aim to obtain the best possible fidelity for given bit-rate. most suite to video and audio compression techniques
• Why Compression:
  • need to compress the data at the sender and decompress it at the receiver
  • storage can be efffectively increased
  • communication link can be effectively increased
step of data compression

Image Compression
 to represent image with less data in order to save storage or transmission time
 possible to reduce file size to 10% from original without noticeable loss in quantity
Lossless -image quality is not reduce: ex; drawing, graphic, logo 
              method: Run-Length Encoding(RLE), Huffman Coding
Lossy-    reduce image quality.cannot get the original image back and lose some information 
              ex: natural image such a photo landscape. method: Dicrete Cosine Transform(DCT)

Audio Compression
 a form of data compression design to reduce the size of audio files
• audio compression can be lossless or lossy compression
• audio compression algoritm are typically refered to as audio codecs
Lossless - allows one to preserve an exact copy of one's audio files
                codec: Apple Lossless, Free Lossless Audio Codec(FLAC)
                Lossless Predective Audio Compression(LPAC), (LTAC)
Lossy -     irreversible changes, achive for greater compresion
               codec: MP3, MP2, WMA

Video Compression
• storing and transmitting uncompressed raw video is not an efficient technique
  because it needs large amount of storage and bandwidth
• DVD, DSS use digital data: take a lot of space to store and large bandwidth to transmit
• less storage space=less bandwidth to transmit data
• inter frame=using its predecessor
• intra frame=coded independently

Video Compression Techniques
1. flow control and buffering
2. temporal compression
3. spatial compression
4. discrete cosine transform (DCT)

• sender transform original information(plaintext) to another form(ciphertext)
• to carry sensitive information, a system must be abe to assure privacy
• to protect information
• done in presentation layer besides transport and physical layer

• reverse the original process to transform the message(ciphertext back to original(plaintext)

26 Februari 2011

OpenGL Programming Part 2

The Sierpinski Gasket
• generated using randomly selected vertices
• is fractal, an object that can recursively and randomly;

• an attributes is any property that determines how a geometric primitives is to be rendered
• color
• styles
  -bold, italic, line
  -string, height, weight

• color model is an orderly system for creating a whole range of color from a small set of primary colors
• solid color
• two types of color models:

  •    RGB Color Model
  •    Use light to display color
  •    red+green+blue = white


  •    CMY Color Model
  •    substractive model using printing ink
  •    color result from reflected light
  •    cyan+magneta+yellow = black.

Color Model

Color Range
4 channels:Red, Green, Blue and Alpha (opacity/transparency).
• Each channel has intensity from 0.0 ~ 1.0
• Alpha is used in blending and transparency
• Ex: glColor4f(0.0, 1.0, 0.0, 1.0); //green
        glColor4f(1.0, 1.0, 1.0, 1.0); //white

Hidden Surface Removal
• How to apply HSR in OpenGL
   - glutInitDisplayMode(GLUT_DEPTH);
   - glEnable(GL_DEPTH_TEST);

• In display function
  - glEnable(GL_DEPTH_BUFFER_BIT);

Also called z-buffer

OpenGL Programming Part 1

What is OpenGL®
• graphic rendering Application Programming Interface
• high quality color images composed of geometric and image primitives
• window and operating system independent
• a library for 3D graphic and modelling
• portable and fast

The OpenGL Pipeline

The OpenGL® Standard
• an API not a language
• some graphic package include
  • Renderman
  • Renderware
  • DirectX

What can OpenGL® do?
• display primitives
• coordinate transform
• anti-aliasing
• pixel update operation
• display list

OpenGL® Primitives
• All geometric object in OpenGL are created from a set of basic primitives
• certain primitives are provided to allow optimization of geometry for improved rendering speed.
Line Based Primitives
Polygon Primitives

OpenGL Supports:
• phong illumination model
    -diffuse reflection
     -phong specular highlight
     -ambient illumination
• shading models
    -flat shading
    -gourand shading
    -phong shading

Relevent Library
• the GL library : core function of OpenGL; modelling, viewing, clipping, lighting
• The GL Utility (GLU) : create common object; sphere quadrics : special of standard views; perspective, orthographic
• The GL Utility Toolkit (GLUT) : provides the interface with the windowing system.
• window management, menus, mouse interaction

OpenGL Command Format

25 Februari 2011


• is a standard TCP/IP protocol for virtual terminal service
• this client-server application program enables the estabalisment of a connection to a remote system whereby the local terminal appears  to be a terminal at the remote system
• Windows versions also include Telnet Client and Telnet Server Component

Initiating And Using Telnet Session
Telnet Enable user:
• create remote command console session on a host
• run command line programs, shell commands, and script in aremote command console session

How Telnet Works
• To use Telnet you need to know IP adress of the host where the resource you want use
• When you contact the host; the distant computer and your computer negotiate how to communicate with each other
• When client and server communicate they use Telnet protocol
• You start manually / configure automatic every time you want to connect to a host
TELNET Software
Telnet In Windows XP
• Use Run dialog box
type: telnet
• Use Web browser
Enter: telnet://

Example of Telnet Client/Server
• Tlntsvr.exe(Telnet server) - preinstalled in windows os
• Telner.exeITelnet server) - preinstalled in windows ps

Telnet Limitation
• not design to transmit cursor movement or GUI information
• can only run command line programs, shell, commands, script, and batch files
• does not encrypt any data sent over the connection

Using Secure Shell Protocol (SSH)
• enable two computer to negogiate and estabalish secure connection that use encryption
• may stop cracker who try to sniff password and data
• provide secure communication for doing email and access web.

File Transfer And Remote File Access

File Transfer Protocol (FTP)
• standard mechanism provided by TCP/IP for copying file from one host to another.
• FTP Site is a computer running an FTP server Application
• On FTP Server, a program called daemon allows to download and upload files
• FTP can transfer binary files over internet without encoding and decoding overhead
• FTP can upload files from your computer to another computer
• Large organization use mirror site; contain same set of files
• Mirror site serve as a backup for the main server if main server fails

How FTP Works
• FTP server identifies user based on user IDs
• FTP client / server create a session after you are logged on
FTP client has access to the file system on the server
FTP cliend / server software can access their individual file system in either direction

• FTP uses two well known port:
  • Port 20 for data connection
  • Port 21 for control connection

Requirement For Using FTP
  • An FTP client installed on the computer.
  • Login details of the FTP server to which you want to connect: 
  • The FTP server address. This looks a lot like the address you type in Internet Explorer to browse websites. One such example is “”. 
  • The user name and password required for the FTP connection. Some FTP servers let you connect to them anonymously. For anonymous connections, you do not need a user name and password.
FTP From A Command Prompt
•  Another similar FTP is TFTP (Trivial FTP)
•  TFTP has fewer command than FTP
•  TFTP used only to send and receive files.
•  It can be used for multicasting which a file is sent to more than one client at the same time using UDP

TFTP Usage And Design  Transfer files between process.
  Minimal overhead(no security)
  Easy to implement
  Small-possible to include firmware
  Used to bootstrap workstations and network devices.

TFTP Protocol

  •   Read request
  •   Write request
  •   Data
  •   ACK(acknowledgement)
  • •  Error

23 Februari 2011

Internet Infrastructure (Part 1)

Using Telephone Line To Connect To The Internet
You  Need:

  1. Modem: to transmit data over telephone line and software that allows the OS interact with the  modem
  2. Operating System: utility that allows you to configure the modem to connect to a specific ISP
  3. ISP User Information: tel. no, user ID, password, and other information need.
• responsible for managing communication between device and can be
reffered as Data Communication  Equipment (DCE) device
Data Terminal Equipment(DTE) using DCE to communicate with another device.

• Install and configure modem
if external modem: insert modem to a serial port
if internal modem: insert expansion slot (PCI slot) inside a computer.
• creating dialup connection: install dialup adapter
Dial-Up Networking: process enable a computer to use a modem and a telephone line to connect a network

• configure TCP/IP to connect to the cable modem
  (Windows 7, Windows XP, Windows 2000; TCP/IP is automatically installed; Windows98 must be isntall TCP/IP)

Connection Using Cable Modems
• the cable modem connect to a regular TV coaxial cord; which then connect to TV cable wall outlet.
• cable modem has an electrical connection to provide power to the box.

Connecting a PC on a LAN to the Internet
• the connection of the LAN always uses a network card
• but the connection to the ISP could be a
     network card
     •or ISDN card

Physically And Logically Dividing a Large Network
you can physically divide a network using hardware devices (segmentting the network)
you can logically divide the network using software setting (subnetting)
Bridges And Switch
more intelligent than hubs
•make decisssion involving whether to allow trafic to pass or route that traffic
use MAC address to subdivide a network into physical segments
Routing Table
is a database stored within a router that is used to find the best network path
Subnet Mask/Network Mask
used to defined which portion of an IP address identifies the network and which portion identifies the host

How Data Travels Across Interconnected Networks
responsible for helping data travel across interconnected network
• function as both a bridge and a router
•like switch route use table to determine the best route
unconcerned about the data, but concerned about the destination of data
•several protocol: RIP, BGP

Default Gateway
A default gateway is the router to which your computer addresses packet information for data destined for a computer on another network.