You are on page 1of 9

“CRITICAL JURNAL REVIEW”

“INTRODUCTION OF ALGORITHM AND PROGRAMMING”

Dosen Pengampu: Hermawan Syaputra, S.Si.,M.Si

CREATED BY :

CHELSEA MAYTHREE [4163312003]

RANA ZAHRA [4163312023]

BILINGUAL MATHEMATICS EDUCATION 2016

MATHEMATICS DEPARTEMENT
FACULTY OF MATHEMATICS AND SCIENCES
STATE UNIVERSITY OF MEDAN
2018
CHAPTER I

PRELIMINARY

C ++ (pronounced "cee plus plus") is a static, free-form typing, multi-paradigm,


compiled, general-purpose programming language. It is considered a medium-level language,
as it consists of a combination of both high-level and low-level language features. It was
developed by Bjarne Stroustrup starting in 1979 at Bell Labs as an improvement on the C
language. C was originally named with Class, the language was renamed C ++ in 1983, as a
word game involving operator hikes.

C ++ is one of the most popular programming languages with application domains


including system software, application software, device drivers, embedded software, high-
performance servers and client applications, and entertainment software such as video games.
some groups provide both free and proprietary C ++ software compilers, including GNU
Project, Microsoft, Intel and Embarcadero Technologies. C ++ has greatly influenced many
other popular programming languages, especially C # and Java.

C ++ is also used for hardware design, where the design was initially depicted in C
++, then analyzed, architecture constrained, and scheduled to create a hardware level transfer
register of high-level language descriptions via synthesis.

Languages start as additions to C, first add classes, then virtual functions, operator
overloading, multiple inheritance, templates, and exception handling among other features.
After years of development, C ++ standard programming languages were ratified in 1998 as
ISO / IEC 14882: 1998. This standard is amended with a technical error corrected in 2003,
ISO / IEC 14882: 2003. The standard when extending C ++ with new features is authorized
and published by ISO in September 2011 as ISO / IEC 14882: 2011 (informally known as C
+ +11).
CHAPTER II

SUMMARY

A. Model TCP / IP Layer


The TCP / IP model is the most widely used protocol in network architecture. TCP /
IP is the result of research developed and developed by DARPA (Defense Advanced
Research Project Agency) used on packet networks. TCP / IP layer is divided into 4 layers,
namely:
1. Host-to-Network Layer
This layer works so that a host can connect to a network using a protocol so that it can send
IP packets through the protocol.
2. Internet Layer
This layer works to allow hosts to send packets to any network and packets run independently
to different destinations or networks.
3. Transport Layer
This layer is responsible for coordinating all data
received and data sent. This layer
works the same as the transport layer in the OSI Layer.
4. Application Layer
This layer is the highest layer used by many applications for network communication. This
layer also contains any applications owned by users.

B. Definition of Smart Card


Smart card is a card made of plastic (PVC) combined with an Integrated Circuit (IC)
that is the size of a credit card and is tamper resistant, that is illegal business of taking data
from within the card that is not possible. Smart cards are designed to store personal data with
high security and easy to carry cards anywhere. Storage and processing of information in
smart cards is done through electronic circuits incorporated in silicon on plastic materials
(PVC) of cards. Integrated circuit (chip) is very small and printed circuit in the form of a thin
gold plate. These printed circuits provide electrical contact with the external environment and
also protect the chip from mechanical damage and power failures. For secure data processing
and storage use public-key or shared-key algorithm. Some smart cards have cryptographic
coprocessors
separate and support algorithms such as RSA (Rivest-Shamir-Adleman's algorithm), AES
(Advanced Encryption Standard) and Triple DES (Triple Data Encryption Standard). The
way of communication used smart card technology is half duplex, ie two-way
communication, but not done simultaneously. This function works by sending and receiving
process must be done interchangeably. The data sent and received from the smart card is
stored in the buffer contained in the RAM smart card.

C. International Standard Smart Card


The ISO / IEC standard is an international standard for standardizing smart cards. The
extension of ISO is the International Organization for Standarization, while the extension of
the IEC is the International Electrotechnical Commission. ISO / IEC 7816 and ISO / IEC
7810 is a standard for smart cards to determine the following:
1. The physical form of the card.
2. Characteristics of electronic circuits.
3. Posisi dan ukuran kartu dari konektor elektrikal kartu.
4. Communication protocol.

5. Card resilience.

6. Functionality of the card.

The size of the smart card card with ID-1 format based on ISO / IEC 7810 is 85.60mm x
54mm and has 0.76mm ± 0.08mm card thickness and 3.18mm angle radius.

Figure 1 Standard Size of Smart Card Format ID-1


D. Smart Card Type
In general there are two types of smart card is a memory card and microprocessor
card. Memory cards only store and protect data locally, but do not contain a processor to pass
computer calculations on the data. While the microprocessor card is a card that has a memory
and microprocessor that can perform calculations on data and store data in the card safely. A
memory card can store 4K of data and the advantage of memory card lies in its simple
technology. While the microprocessor card, offering securities and multifunctional
capabilities. The data stored in the microprocessor card can not be accessed directly through
applications outside the card. The microprocessor controls data and memory that governs
accessing data according to given conditions such as passwords, encryption and more. The
advantage of a microprocessor card is that it can be integrated into more than one application.
Physically smart cards can be divided into two types:
1. Contact Smart Card
Contact Smart Card works by physically communicating between card reader and smart card
pin contact in the form of rectangle measuring ± 1 cm (See picture
2). Contact smart card
Does not require battery and will be active when connected with card reader. When
connected with the card reader, the chip will wait for the request command from the client of
the application to read the information from the chip or write the information to the chip.

Gambar 2 Smart Card’s Pin Contact


Here are the functions of each contact according to ISO / IEC 7816, namely:
a. VCC (Supply Voltage)
Serves as a provider of electrical voltage, available voltage of 3 or 5 volts with a maximum
tolerance of ± 10%.
b. RST (Reset Input)
It functions to transmit signals to reset the microprocessor.
c. Clk (Clock Input)
It functions as a timing or clocking signal that regulates the time and speed of the
microprocessor.
d. GND (Ground)
It is a reference voltage opposite to VCC where its potential energy is measured and its value
is considered 0 volts.
e. VPP (Programming Voltage)
Serves to provide different power voltages from VCC. Used for other applications such as
USB connectivity.
f. I / O (Input / Output)
Serves to monitor all incoming and outgoing communications to the card.
g. C4 and C8
Contact C4 and C8 are additional contacts used when at any time required for operation on
the card or the use of interfaces in the future
come.
2. Contactless Smart Card Contactless smart card
Communicate with the terminal through a radio frequency signal. Contactless smart card does
not have a battery so this card has an inductor that can capture radio frequency signal as an
electronic power for the card. Contactless card requires a certain distance to exchange data
with card reader. The contactless smart card communication standard is ISO / IEC 14443.
Here is the standardization table ISO / IEC 14443.

Tabel 1 Standarisasi ISO/IEC Contactless Smart Card

E. Smart Card Memory System


Smart card consists of 3 kinds of memory, namely:
1. ROM (Read-Only Memory)
Is a memory type that can only be read (read) and can not be written (write), and does not
require electric power to store and maintain the integrity of data. ROM can not be rewritten
after the card is created, and contains an operating system. ROM of the smart card contains
data and user applications that are permanent.
2. EEPROM (Electrical Erasable Programmable Read Only Memory)
EEPROM is almost similar to ROM that can provide data when the power from memory is
turned off. The difference between the two is the contents of the memory that can be
modified during normal card usage. EEPROM can receive at least 100,000 times of writing,
and can store data for 10 years. Reading from EEPROM is as fast as reading from RAM, but
writing on EEPROM is longer than writing from RAM.
3. RAM (Random Access Memory)
RAM is a memory used to hold data stored during a process. The amount of access to a RAM
is unlimited and requires power to operate. RAM is a nonpersistent memory that is
information stored on RAM will be lost when the power from RAM is lost.
F. Client and Server Side Scripting
PHP is an open source scripting language and is designed for website development. Initially
PHP started from personal home page equipment developed by Rasmus Lerdorf. Another
name of PHP is Hypertext Preprocessor which has the ability to process web pages before
they are displayed.
The advantages of PHP include:
1. Fast
On a website, because it uses HTML code, the processing time to display a web page
becomes shorter.
2. Easy to use
PHP has a simple syntax and is easy to understand and used even for a programmer. For use
in websites, PHP code is designed to be easily inserted in HTML code.
3. Runs on many operating systems
PHP can run on many operating systems such as Windows, Linux, Mac OS and other Unix
types.
4. Can be customized
As per the open source rules that allow the
programmer to change the PHP software,
add or modify features if needed for
matching the existing environment.
5. Free
PHP is free but still reliable.

G. Understanding Socket
Socket is an abstraction in which an application sends and receives data such as by
opening a file through an application to read and write data. A socket allows an application to
'plug in' to a network and communicate with other applications residing on the same network.
Information written to a socket by an application within a machine can be read by other
applications in different machines and so on. Sockets come in different forms depending on
the protocol used and the different stack on a protocol. The main forms of sockets in TCP / IP
are stream sockets and datagram sockets. Stream sockets inside TCP (under IP) are used as
end-to-end protocols and provide reliability in byte delivery. Datagram sockets use UDP
(under IP) and provide the ability to send individual data up to 65,500
bytes. Streams and datagram sockets are also supported by other protocols.
A socket that uses the TCP / IP protocol can be uniquely identified by an internet address,
end-to-end protocol (TCP or UDP) and port number. When the first socket is created, the
socket already has the associated protocol but not the internet address or port number. Before
a socket is bound by a port number, the socket can not receive messages from applications
outside the network.

H. TCP Client
The task of the TCP Client is to start a communication with a server that passively waits to be
contacted.
Basically TCP Client has 4 basic stages:
1. Create a TCP socket using a socket. 2. Establish a connection to the server using connect.
3. Communicate using send () and recv ().
4. End the connection with close ().
A TCP socket must be connected to another socket before various data can be sent. The client
starts a connection when a server passively waits for a connected client.

I. TCP Server
The task of TCP Server is to set up the final communication and passively wait for a
connection from the client.
Basically TCP Server has 4 basic phases:
1. Create a TCP Socket using a socket.
2. Assign port number to socket with bind.
3. Notify the system to allow any connections made to the port using listen.
4. Repeatedly:
a. Call accept to get new socket
for each client connection.
b. Communicate with clients through the new socket
using send and recv.
c. Close client connections using close.
A server must do a bind to a
address on a socket and then using a socket
as a channel to receive sockets
others connected to the client.

J. QT Framework
Qt framework was first published in May 1995. Developed by Haavard Nord
(Trolltech's CEO) and Eirik Chambe-Eng (Trolltech's Chief Troll). Haavard and Eirik met at
the Norwegian Institute of Technology in Trondheim and they both graduated with a master's
degree in computer science. Haavard had an interest in the development of C ++ UI in 1988
when he was hired by a Swedish company to develop a framework for C ++ GUI. In 1990,
Haavard and Eirik worked together on a C ++ database application for ultrasound images.
The system should be able to run with GUI on Unix, Macintosh, and Windows. In 1991,
Haavard began writing a class that eventually became Qt. In 1993, Haavard and Eirik built
the first kernel graph for Qt and could be implemented with their widgets. The Q letter is
flattened as the class prefix because the letter looks good on
Haavard's Emacs font. The "t" is added from the word toolkit. In 2005, Qt version 4 was
released with 500 classes and more than 9,000 functions. Qt 4 is the first Qt edition available
as open source on all platforms that support it.
CHAPTER III
CLOSING

1. CONCLUSION
C ++ is one programming language that is easy to learn and object-oriented. The C ++
language has an easy-to-understand language structure. In running the program from C ++
language required a compiler that is useful to compile the code that we write into the form of
machine language so that the program can run.

2. SUGESTION
We recommend that in making the program code note the upper and lowercase letters,
because C + + is case sensitive. In addition, we also must pay attention to the compiler used
to run the program so that the program runs according to our wishes without any errors.
Weaknesses and Advantages of journals:

Advantages:
1. This journal uses an easy-to-understand language.

2. This journal is good for students who understand about programming.

3. This journal has a very detailed discussion.

Weakness:
1. For beginners this journal has a program that is difficult to understand.

2. This journal has no conclusions and suggestions.

You might also like