Computer Strucure

Sunday 19 June 2011

A computer system consists of five basic structural units, namely:• The unit input (Input Unit)• The control unit (Control Unit)• arithmetic and logic unit (Arithmetic & Logical Unit / ALU)• Unit memory / storage (Memory / Storage Unit)• The unit outputs (Output Unit)Control Unit and ALU form a separate unit which disebutCentral Processing Unit (CPU). The relationship between each of the units that make up a computer system can be seen in the figure below:
 
Data received via the Input Device and sent to the Memory. In the Memory data is stored and subsequently processed in the ALU. The results are stored back to memory the process prior to release via the Output Device. Control and coordination of the system is performed by the Control Unit. In summary the working principle of the computer is Input - Process - Output, known by the acronym IPO.Main functions of each unit will be explained below:• Input Unit (Input Unit)Serves to receive input (input) and then read and forwarded to the Memory / storage. In this connection, the technical term input device (input device) that is the receiver and reader input and the input media is the intermediary.• Control Unit (Control Unit)Serves to carry out supervision and control of the entire computer system. He serves as regulator of the household computer, decide the order of operations for the entire system, generating and controlling signals to control operations and adjust the flow of data from the address bus (address bus) and data bus (data bus), and to control and interpret the signals -control signals on control bus (control bus) of a computer system. Understanding of the bus can be seen at the bottom of this page.• Logic & Arithmetic Unit (Arithmetical & Logical Unit)Serves to carry out the work or arithmetic & logic calculations such as add, subtract, multiply, divide and constituent. It is also carrying out work such as data transfer, pooling of data, election data, compare data, etc., so that the ALU is a core part of a computer system. On some computer systems and help to lighten the task of the ALU of the CPU is given an additional device called a coprocessor so that in particular the process of calculation and execution of work in general to be faster. Coprocessor understanding can be seen at the bottom of this page.• Unit Memory / Storage (Memory / Storage unit)Serves to accommodate the data / programs received from units of input before processing by the CPU and also receive data when processed by the CPU which then forwarded to the output unit. In a computer system there are two kinds of memory, that naming depends on whether the device can only read or can read and write to him. Part of memory that can only be read without being able to write to her so-called ROM (Read Only Memory), while the memory can perform read and write is called RAM (Random Access Memory).• Unit Output (Output Unit)Serves to receive the results of data processing from the CPU through the memory. As with the input unit to output unit is also known term output devices (output device) and output media (output media).
 


Understanding BUS 

The bus is a group of signal path used to move bits of information from one place to another, grouped according to Standard functions of a computer system bus is the address bus (address bus), data bus (data bus) and the control bus (control bus) . Computer using a bus or a bus line as buses carrying passengers from one place to another, then the bus transporting computer data. Computer bus connects the CPU to the RAM and peripherals. All computers use the bus line for the same purpose.Understanding coprocessorCoprocessor is a microprocessor additional (auxiliary processor) to assist the task of the main processor (CPU). Actually the background of the coprocessor is intended to cover up weaknesses in math calculation and arithmetic on the Intel 8088. Its main tasks to perform mathematical calculations and arithmetic so as not to burden the Intel 8088.

Sources:1. Achmad Bachrum, PC: Know Before Purchasing, PT. Elex Press, 19912. Drs. Suyanto, MM., -, -, 199 -Computer System StructureThere is no specific provisions on how to structure a computer system. Every expert and designer of computer architecture has a view of each. However, to facilitate us to understand the details of the operating system in subsequent chapters, we need to have general knowledge about the structure of a computer system.Computer Operating SystemsIn general, the computer system comprises CPU and a device controller connected via a bus that provides access to memory. Generally, each device controller is responsible for a hardware spesisfik. Each device and the CPU can operate concurrently to gain access to memory. The existence of some hardware can cause synchronization problems. Therefore, to prevent a memory controller is added to synchronize the memory access.

General Computer Architecture
 At a more advanced computer system, its architecture is more complex. To improve performance, use multiple buses. Each bus is a data path between several different devices. In this way the RAM, processor, GPU (AGP VGA) connected by high-speed primary bus is better known as the FSB (Front Side Bus). While other slower devices connected by a lower-speed bus that connects with another bus which is faster up to the main bus. For communication between the bus is used a bridge. The responsibility of the synchronization bus that indirectly also affect the memory synchronization is done by a bus controller, otherwise known as a bus master. The bus master will control the flow of data up to at one time, the bus contains only data from one device. In practice the bridge and the bus master is incorporated in a chipset.

  Modern PC architecture

 NB: GPU = Graphics Processing Unit; AGP = Accelerated Graphics Port; HDD = Hard Disk Drive: FDD = Floppy Disk Drive; FSB = Front Side Bus: USB = Universal Serial Bus; PCI = Peripheral Component Interconnect; RTC = Real Time Clock; PATA = Parallel Advanced Technology Attachment; SATA = Serial Advanced Technology Attachment; ISA = Industry Standard Architecture; IDE = Intelligent Drive Electronics / Integrated Drive Electronics; MCA = Micro Channel Architecture; PS / 2 = A port was built to connect the mouse to the IBM PC ;If the computer is turned on, which is known as booting, the computer will run the bootstrap program is a simple program that is stored in ROM as a chip CMOS (Complementary Metal Oxide Semiconductor). Modern CMOS chips are usually of type EEPROM (electrically erasable programmable read only memory), which is non-volatile memory (not erased when power is turned off) which can be written and erased with electronic pulses. Then bootsrap program is better known as BIOS (Basic Input Output System).Bootstrap main program, which is usually located on the motherboard will examine the major hardware and hardware-initialization of the program in hardware known as firmware.Bootstrap main program will then locate and load the operating system kernel into memory and then proceed with the program here operasi.Dari system initialization the operating system will wait for certain events. This incident will determine what will be done next operating system (event-driven).This event on modern computers are usually characterized by the emergence of software or hardware interrupt, so the Operating System is called the Interrupt-driven. Interrupt of hardware is usually delivered via a particular signal, while the software sends an interrupt by invoking the system call or also known as monitor call. System / Monitor this call will cause the trap is special interrupt generated by the software due to problems or requests to the operating system services. Trap is also often referred to as the exception.Each interrupt occurs, a set of code known as the ISR (Interrupt Service Routine) will determine the action to be taken. To determine what actions to take, it can be done in two ways: a poll that makes a computer to check one by one device is there to investigate the source of the interrupt and by using the addresses stored in the array ISR known as the interrupt vector in which the system will check Interrupt Vector each time an interrupt occurs.Interrupt architecture must be able to store the address of the interrupt instruction. On older computers, this address is stored in certain places that remain, while new padakomputer, the address stored in the stack together with state information at the time.The structure of I / OThere are two kinds of action if any I / O operations. Both kinds of actions are:After the I / O starts, control returns to user program when the I / O completion (Synchronous). Wait instruction causes the CPU is idle until the next interrupt. Wait loop will occur (to wait for the next access). At most one process I / O running at one time.After the I / O starts, control returns to user program without waiting for the I / O completion (Asynchronous). System call request to the operating system to allow the user to wait until the I / O selesai.Device-status table contains the data entered for each I / O device that describes the type, address, and the circumstances. Check the operating system I / O devices to know the state of the device and turn the tables to include interrupt. If the I / O device to send / retrieve data to / from memory this is known by the name (Direct Memory Access) DMA.

The structure of I / O
 Direct Memory Access

 Used for I / O device that can move data at high speeds (close to the memory bus frequency). Device controller moves data in blocks of buffer storage directly to main memory or vice versa without the intervention of the processor. Interrupt occurs only every block instead of each word or byte data. The whole process is controlled by a DMA controller named DMA Controller (DMAC). DMA controller sends or receives signals from the memory and I / O device. The processor sends only the beginning of the address data, data destination, length data to the DMA Controller. . Interrupt the processor only occur during the transfer process is complete. The right to use the necessary memory bus DMA controller obtained with the help of a bus arbiter that the PC is now a Northbridge chipset.BusA data transfer path that connects each device on the computer. There is only one device can transmit data through a bus, but may be more than one device that reads the data bus. Consisting of two models: Synchronous bus where used but with the help of high-speed clock, but only for high-speed devices as well; Asynchronous bus used by the system but the low-speed handshake, can be used for a variety of devices.Storage StructureThe important thing to remember is that the program is part of the data.RegisterPlace some of the fruit volatile data storage that will be processed directly in the processor speed is very high. Registers are located inside the processor with a very limited number because of its function as a place of calculation / computation data



 


Cache Memory

 Temporary storage (volatile) small amounts of data to increase the speed of retrieval or storage of data in memory by a high-speed processor. Formerly stored outside the processor cache and can be added. For example the usual pipeline burst cache on the computer early 90's. However, with decreasing the die or wafer production costs and to improve performance, embedded in the processor cache. This memory is usually made based on static memory design.Random Access Memory (RAM) - Main MemoryPlace while a number of volatile data storage that can be accessed directly by the processor. Direct sense here means the processor can find the address data in memory directly. Now, the RAM can be obtained with a fairly low view of performance that can even skip the cache on an older computer.Memory ExtensionAdditional memory to be used to assist the processes in the computer, usually a buffer. Additional role of memory is often overlooked but very important for efficiency. Usually this extra memory gives a rough idea of ​​the ability of such devices, for example such as the amount of VGA memory, sound card memory.Secondary StorageStorage medium is non-volatile data that can be either Flash Drive, Optical Discs, Magnetic Disk, Magnetic Tape. This media is usually quite large carrying capacity with a relatively cheap price. Portability is also relatively higher. 
 
Figure 1-15. Disk Structure




 Structure Optical Drive
 
Storage Hierarchy


 Basic arrangement of storage systems are speed, cost, nature of volatility. Caching copying information into faster storage media; Main memory can be viewed as a last cache for secondary storage. Using high-speed memory to hold data that is accessed last. Required cache management policy. The cache also introduces another level in the storage hierarchy. This requires data to be stored together in more than one level in order to remain consistent.
 
hierarchy storage

Comparison of Android 2.2, Windows 7 Phone, Symbian 3, 4 and BlackBerry IOS 6

Monday 6 June 2011

Adapted From : CHIP.co.id



Comparison of Android 2.2, Windows 7 Phone, Symbian 3, 4 and BlackBerry 6 IOS interesting because the current record, the smartphone is not just used for talking, but also used as a communications device for e-mail, Facebook, Twitter and chat while in your home can connecting to a PC.

Before deciding to buy a smartphone sure which system provides all these functions with ease.

Android 2.2: Multipurpose
Number of Applications: 95,154
App Store: Android Market
Smartphone: HTC Desire

* Pros: Android relatively flexible system. Users can combine Apps, Folders, and Widgets to one another and to download other interfaces on the Android market. Info bar was useful for users, for example, to know the application (app) enabled. Browser has been rapid, including when opening a website with flash. Interestingly again, the user can cancel the purchase paid applications and get back the money. Condition, cancellations made within 15 minutes after the transaction. App can communicate with each other and using contacts and schedules. Sense the presence of interfaces and tools sync from HTC more to give a positive impression.
* Weaknesses: compared with the IOS, Android still less intuitive.
Users still need time to find some system options and third-party file manager. In addition to the search function is less accurate, many also found the application "garbage" that is less useful. Finally without a credit card there is only free applications. Prospective buyers also need to be careful because there are still some Android1.6 smartphones on the market and offers no official update from the manufacturer.

Symbian 3: Peremajan system
Number of Applications: 19,625
Store: Store OVI
Smartphone: Nokia N8

* Pros: compared to the previous version, symbian 3 is now more finger friendly and responsive while on-the input data. Some innovative new facility on the system presented nokia symbian 3, such as Web TV, Real multitasking, multiple Home screen, and USB OTG (USB On The Go). USB OTG provides facilities-based BGI symbian smartphone users 3, for example the Nokia N8 to directly access files stored on the USB external hard disks, USB Flash Drive (UFD), or any other smartphone (if assigned as a media storage).
* Weaknesses: Like previous versions of Symbian, a user who daily use this smartphone would have complained about the navigation menus are a little less practical and sometimes difficult to understand (the menu name that is too short). In addition, the guidance when navigating the interface was minimal. Indeed, this problem only occurs on the user's veteran (old) symbian. Performance browser and a standard touch screen keyboard is also one other disadvantage.

Windows 7 Phone: Newcomer
Total Applications: 292
Store: Marketplace
Smartphone: LG-E900 Optimus 7

* Pros: Windows 7 Phone has a different interface than other smartphone interface. Microsoft deliberately pursued product differentiation for their smartphones are "outside" competitors. Interface consists of two parts, namely a box called a hub and a second part to the Tools and Options. Through the account of Windows Live available mail service, contact, calendar. Users can also access its online store service (Marketplace) and free safety facilities. Through the browser and the GPS, users can find the location, block and reset the smartphone.
* Weaknesses: Microsoft make a radical change in this new system. For example, third-party applications (third party) may not be triggered on the back, no folders, access multimedia files to go through the Zune, and Office data should be stored in an online service Sky Drive. It is because they are new, this one likes the potential of mobile platforms is not optimal.



IOS 4.1: Easy to use
Total Applications: 252 769
App Store: App Store
Smartphones: iPhone 4

* Pros: iPhone superior because it is easy to use system and its third-party applications that are always consistent with Apple. What is also positive is a grouping of applications in one folder for ease of management. Apple made a big improvement is to create a system that supports multi-tasking though still limited. Through iTunes, the iPhone is now more easily managed, for example to perform data synchronization, backup and search applications on the App Store which is still the largest and most complete.
* Weaknesses: Although known as a smatphone a user-friendly thanks to its superior interface, the iPhone is less flexible in making certain adjustments to the user. Users will experience obstacles in changing the default applications and manages the data on smartphones. Users can not even casually package data in a folder. Interconnection between iTunes users are also troublesome. Apple designed the iPhone does not seem to make the exchange of songs or video clips with fellow users with ease. The same also applies when copying multiple files iPhone to PC

Blackberry 6: Smartphone business
Number of Applications: 13,869
App Store: BB App World
Smartphone: Blackberry

* Pros: Home screen presented in three parts. Two top mobile phone settings and presents news updates on the display screen. On the down side there are screen menus that can be opened. This menu contains all the applications that are divided into five categories. Each icon can be quickly used and grouped in folders. Blackberry system also supports the transfer of multimedia data easily via WLAN and PC to the smartphone. RIM smartphone business aspect is seen in a series of security facilities in the system. Facility data encryption and smartcard for needs such as e-mail also does not miss.
* Weaknesses: The user application is less intuitive. As a result there are some configurations that have to go through a touch screen and the other is done through the menu button. The presence of the trackpad on the Blackberry 9800 Torch increasingly easier for users in the "maneuver" in every part of the interface on the screen. Nevertheless, some menus are elaborate and impressive it becomes redundant. RIM must continue to refine the input mechanism between the input on the display and slider QWERTY keyboard to be more in tune.



Comparison Table







MSI GTX 580 Lightning Extreme Edition- Review














As of Q1 2011, the NVIDIA GeForce GTX 580 still has the highest series from the ranks of DX 11 graphics card with a single GPU in it. This graphics card has a memory capacity of 1.5 GB DDR5 manifold.

The surprise comes from MSI, as one of the major players mainboard and graphics card in the world. particularly in Indonesia. At the 2011 Computex event, MSI introduced their new hero for the graphics card product that comes from the NVIDIA camp. MSI currently has a GeForce GTX 580 Extreme Edition Lightning. From the name would have to imagine the performance he had.

Yes, not half-hearted MSI graphics card to increase memory capacity becomes 2x more than the reference specification, which is 3 GB. So what other advantages?

MSI GTX 580 Extreme Edition Lightning do not miss the cooling system comes with the latest from MSI, TwinFrozr III which has a more effective performance than TwinFrozr II. Slightly different from TwinFrozr III variants exist in any other graphics card, the MSI GTX 580 Extreme Edition Lightning blue fan will be spinning the opposite direction for a few seconds every time the PC boots. This is useful for removing impurities such as dust automatically attached to the fan.

Not only that, the blue fan on the MSI GTX 580 Extreme Edition Lightning was able to change color to white if the resulting temperature exceeds 45 ° C. In addition, this graphics card also comes with features Triple Temp Monitor that can monitor the temperature of the GPU, memory, and also through the application of MSI Afterburner mosfet.

Chrome OS, Windows Compete with Google Custom System

Sunday 5 June 2011

Google has confirmed on Tuesday night (07 / 7) to develop a lightweight operating system based on Linux and web standards for personal computers (PCs). Google's move is motivated to help users get everything on the web, enjoy the exciting experience on the web, more than that generated from search engine Google. To that end, Google created Chrome the OS that has been developed starting early this year.

System operation is claimed Google's Chrome will work better than Windows, Mac OS X, Linux and even variations in the Android operating system. According to Google, the world has changed dri PC's built-in models for individual works offline, into a business file sharing between online work anywhere and anytime. The move automatically reduces the importance of process power and complexity of the operating system. Another reason is to ease the user when the update status up, editing photos or videos that require speed and long battery life.

Google's idea has a purpose, to make the operating system is fast, secure, and lightweight to run on portable devices. Google Chrome the OS is working with a new method of 'windowing' or switching between multiple applications. With the new user interface can handle data storage, files and applications. In addition, Google Chrome OS will also use standard web such as HTML 5, which is the development of browser-based software operating system, which is easily understood in the era of Web 2.0 developers today.

However, the idea of ​​Chrome the operating system OS is not the first, because Palm has previously released as a WebOS in Palm Pre-friendly web development on Linux-based browser engine. Google Chrome OS has a wider scope than the WebOS from Palm, which has all the applications and web services that can be done via computer, including email sending, send documents, edit photos, and web browsing.

"The main difference this OS Android and Chrome, if Android was designed from the variety of devices from mobile phones to netbooks. While Chrome is made for people who spend a lot of time for browsing the web, and is designed for computer power netbooks range of small to full-size desktop systems. "Says Google. Google plans to release Chrome OZ at the end of this year, and device-based system, Chrome the OS will be available in mid-2010

Data Types in Oracle 11g

Saturday 4 June 2011

by : Yuafanda Kholfi Hartono

Data type is a classification or type of information or specific data.
Each value manipulated by Oracle has a data type of each. Data type of a value associated with property values ​​that set fixed. This property causes the values ​​of one data type to be treated different from other values ​​by Oracle.

For example, you can add the value of NUMBER data type, but can not do the same thing on RAW data type. When you create a table or cluster, you must specify the data type for each column. When you create a procedure or function which then will be saved, you must specify the data type for each argument. This data type will determine the domain value in each column that contains the arguments each of which can have the procedure or function. For example, DATE columns can not accept the value February 29 (except for leap year) or the values ​​2 or 'shoes'. Each value will be placed in a column by assuming the data type of column. For example, if
You enter the '01-JAN-98 'into a DATE column, then Oracle treats the character string '01-JAN-98' as a DATE value after verifying the character string has been translated into a valid date format.

Oracle Database provides a number of built-in data types as well as several categories for user-defined types, which can be used as a data type. Explanation of the Oracle data type of each type of data will be described in the following sections:

Character Data Type
Character data type consists of data types CHAR, NCHAR, NVARCHAR2, VARCHAR2, VARCHAR, LONG, RAW and LONG RAW. Explanation of each data type is described as follows:

CHAR
CHAR data type is specified in a character string that has a fixed length. Oracle ensures that all values ​​stored in a CHAR column has a length which is determined by the size (size). If you enter a value shorter than the column length, Oracle will fill in the blank value for the length of column values ​​that are not filled. If you try to enter a value that is too long for the column, Oracle will display an error message.

NCHAR
NCHAR data type is Unicode-only data type. When you create a table with NCHAR columns, you will be asked to specify the column width in characters. You define the national character when you make (create) your database.

NVARCHAR2
The data type NVARCHAR2 are Unicode-only data type. When you create a table with NVARCHAR2 column, you will be asked to include the maximum number of characters that can be loaded into it. Oracle then store each value in the column exactly as you specify it, provided the value does not exceed the maximum length of the column.

VARCHAR2
VARCHAR2 data type to set the variable-length character string. When you create a VARCHAR2 column, you will be asked to include the maximum number of bytes or characters of data that can be loaded into it. Oracle then store each value in the column exactly as you specify it, provided the value does not exceed the maximum length of a column about columns. If you try to enter a value that exceeds the specified length, then Oracle will display an error message.

VARCHAR
Do not use the VARCHAR data type. Use the VARCHAR2 instead. Although VARCHAR data type is currently synonymous with VARCHAR2, VARCHAR data type is scheduled to be redefined as a separate data type used for variable-length character strings compared with different comparison semantics.

LONG
Do not create tables with LONG columns. Use LOB columns (CLOB, NCLOB, BLOB) instead. LONG columns are supported only for compatibility. LONG columns store character strings that contain variable-length up to 2
gigabyte -1 or 231-1 bytes. LONG columns have many characteristics of VARCHAR2 columns. You can use LONG columns to store long text strings. The length of LONG values ​​may be limited by the available memory on your computer.

RAW and LONG RAW
Data types RAW and LONG RAW data stores that do not explicitly converted by
Oracle Database when transferring data between different systems. This data type
intended for binary data or byte strings. For example, you can use
LONG RAW to store graphics, sound, documents, or arrays of binary data, which
interpretation depends on the use of each.

MSI Releases Tablet PC for Business Men

TAIPEI, KOMPAS.com - Competition tablet computer got hotter. At the exhibition site information eknologi Computex 2011 in Taipei, Taiwan, May 31-June 4, 2011, dozens of new tablet even present to take part in the thriving business center intu.

Not to forget the MSI, Taiwanese computer companies. In the event, MSI introduced the four choices tablets at a time, not only for the needs of individual consumers, but also the needs of professionals.

Senior Director of Sales Division, MSI Notebook Chern Sambora, on the sidelines of the exhibition Computex 2011, say, for the tablet PC, MSI targeting business customers who are used to using the Windows operating system. Currently, MSI is preparing two units of tablet PCs based on Windows 7, namely MSI WindPad 110W and 120W WindPad.

"MSI play in the commercial market, eg for warehouse management, restaurant, police, and so on where they are generally familiar with the application in Windows. These applications are not easily found in the tablet PC with another operating system," said Sambora told Compass. com.

In addition to Windows 7-based tablet PC, MSI also manufactures tablet PCs based on Android. Tablet PC Android is WindPad Enjoy Enjoy 7 and 10 who use the Cortex A8 processor and WindPad 100A 1.2 GHz processor with Nvidia Tegra 2 Dual Core ARM Cortex A9.

To date, MSI is producing WindPad 110W and is expected to begin to be marketed beginning in June 2011. The WindPad Enjoy Enjoy 7 and 10 will be available starting July 2011, while WindPad 120W began marketing authorization in September 2011.

Specifications:

WindPad 110W: Dual Core AMD Brazos Z01 + HD 6250 Windows 7 Home Preium / Professional Screen 10-inch multitouch screen 2GB DDR3 memory (max. 4GB) Media store 32GB/64GB respectively Dual camera 1.3 megapixel Wi-Fi, Bluetooth 3.0, and 3G (optional) mini-HDMI plugs, USB, SD Card reader Sensor: ALS (ambient light sensor), G-Sensor (accelerometer), motor (vibration), GPS (optional) Weight 850 grams Battery life up to 6 hours

WindPad 120W: Intel Trail 10-inch multitouch display platform Windows Home 7 an Intel wireless display Widi 2.0 support, support FFS (Fast Flash standby), SRS surround sound has been supported GPS

Android Secure, Kaspersky Playing Swift


Along with the development of information technology, the cyber crime rate was also increased.

Based on reports about the evolution of IT threats Kaspersky in the first quarter of 2011, identified a significant trend regarding the threat cyberthreat. Growth Android platform craze to be one cause.

Russian antivirus researchers are also predicting the number of malicious programs that are very excessive planted and distributed through an online application store. Unfortunately, this amount would still increase in future.

That is why, the PC and smartphone users 'must' have a reliable security solution to protect their devices. Responding to this, the antivirus vendor Kaspersky said on Wednesday (06/01/2011) and in Jakarta, announced the expansion of its network. Through this strategy also Kaspersky hope will be able to reach out to retail consumers deeper.

It was marked by the role of PT. Main Nusantara Technology to work on the consumer segment in Indonesia. Jimmy Fong (Channel Sales Director of Kaspersky Lab, Southeast Asia) who attended the press conference said that this partnership will allow customers at least in the consumer segment.

In addition, through the expansion of distribution channels PT. Main Nusantara Technology, will open the door even wider for Kaspersky in providing maximum service. This opportunity will undoubtedly bring Kaspersky easier to achieve business targets by the end of 2011.

IP Version 6

In computer networks known the existence of a protocol that governs how
a node communicates with other nodes in the network, the protocol
serves as a language for one computer can communicate with each other.
protocol which is the de facto standard in the Internet network is TCP / IP,
so that with the TCP / IP computers with various types of hardware and various
types of operating systems (Linux, Windows X, X BSD, etc.) could communicate.

Internet Protocol (IP) is the core of TCP / IP protocols, all data derived from
layers above it must be processed by this protocol for up to a current IP ketujuan.versi
This has been used widely on the Internet is Internet Protocol version 4 (IPv4).


very rapid development of the internet these days causes the allocation of addresses (IP address)
Diminishing IPv4, this causes the price of very expensive legal IP address
(Except maok! HEU HEU ... ...). To overcome the shortage of IP address allocation, the IETF
designing a new IP called Internet Protocol version 6 (IPv6).

on IPv6, the length of the address consists of 128 bits, while IPv4 only 32 bits. so that IPv6
able to provide as many as 2 ^ 128 addresses [2 to the power 128] or 3x10 ^ 38 addresses, while IPv4
only able to provide as many as 2 ^ 32 addresses, or 4.5 X10 ^ 10 addresses.

okay, was just the intro ONLY! we now proceed to a deeper again.
Kemon baybeh !!!!!

now I will explain other differences between IPv4 with IPv6.

A. Structure of addressing

# IPv4

IPv4 uses 32-bit addressing which each bit separated by a dot notation.
IPv4 addressing notation is as follows:

XXXXXXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX

where each symbol X is replaced with a combination of bits 0 and 1.misalnya:

10000010.11001000.01000000.00000001 (in binary)

Another way of writing for easy diinget is to form four decimal places separated
by dots. eg to address with binary combinations as above can be written
as follows:

130.200.127.254

authors have considered all my friends can easy way to convert from numbers
binary to decimal:). cos' if need dijelasakan again later added intricate article nih: p
okay now proceed to IPv6 addressing structure!


# IPv6

Unlike in IPv4 uses a 32 bit address notation, IPv6 uses
128 bits. dah tau khan why a 128-bit? yup let the allocation could be more.
okay now we see the IPv6 address notation is as follows:

X: X: X: X: X: X: X: X

kalo in binary form is written as follows:

1111111001111000:0010001101000100:1011111001000001:1011110011011010:
0100000101000101:0000000000000000:0000000000000000:0011101000000000

(Two blocks above actually disconnected but so as not to take place then written down)
notation that if the IPv6 address in binary form deliberately I write this not to make
dizziness who read but to show how long IPv6 addresses.
please compare with the length of IPv4.

nah! for easier diinget each symbol X is replaced with a combination of 4 numbers
hexadecimal symbols separated by a colon [:]. for the example above can be written as follows:

FE78: 2344: BE43: BCDA: 4145:0:0:3 A

diliatnya better right? nah IPv6 addressing system can be simplified if there
in a row a few numbers "0". example for the notation as above can be written:

FE78: 2344: BE43: BCDA: 4145:0:0:3 A -------> FE78: 2344: BE43: BCDA: 4145:: 3A

example again:

--------> 8088:0:0:0:0:0:4508:4545 8088:: 4508:4545


B. System addressing

# IPv4

IPv4 addressing system is divided into 5 classes, based on the number of hosts that can be allocated
namely:

Class A: range 1-126
Class B: range 128-191
class C: range 192-223
class D: range 224-247
class E: range 248-255

but just using that common class A, B and C, while class D is used for the purposes of address
multicasting and class E using that for experimental purposes.

other than that on IPv4 subnet mask that is the technical term is 32-bit binary number that is used for
distinguish the network ID and host ID, indicating the location of a host is in one network
or other rich jaringan.contohnya gini:

IP address: 164.10.2.1 and 164.10.4.1 is a different network if you use the netmask
255.255.254.0, but will if netmasknya changed to 255.255.240.0 then the second
IP address above is different from the network. have not understood? kalo gini have not understood how:


164.10.2.1 -------> 10100100.00001010.00000010.00000001
255.255.254.0 ----> 11111111.11111111.11111110.00000000
____________________________________ XOR
10100100.00001010.00000010.00000000 -> 164.10.2.0
and
164.10.4.1 -------> 10100100.00001010.00001000.00000001
255.255.254.0 ----> 11111111.11111111.11111110.00000000
____________________________________ XOR
10100100.00001010.00001000.00000000 -> 164.10.4.0


XOR operations such as increment of time elementary way, just more easily, easily gini kalo
the number "1" an even result is "1" if the number "1" bizarre result "0" (1 +1 = 1, 1 +0 = 0)
(Heu. .. HEU ...).

visible result of XOR operation of two IP addresses with the same netmask means that different results
The second IP address is different from the network. for the next sample using
netmask 255.255.240.0 please try it yourself.

# IPv6

on IPv6 is not known pengkelasan term, IPv6 only provide 3 types of addressing
namely: Unicast, anycast and multicast. unicast address is the address that points to an
address or host interface, is used to communicate one on one. the unicast address
again divided into 3 types namely: local link address, site address local and global addresses.
link local address is the address used within one link of a local network
connected to each other in one level. Site address while the local equivalent of private addresses,
used is limited in one site so that limited its use only in one
site so it can not be used to send out the address of this site.
global address is the address used for example to an Internet Service Provider.

anycast address is the address that shows some of the interface (usually a different node).
packets sent to this address will be delivered to one of the main address of the interface that most
close to the router. anycast addresses do not have a specific allocation, cos' if some
node / interface is given the same prefix, then the address is an anycast address.

multicast address is the address that shows multiple interfaces (usually for nodes
different). Packets sent to this address will be delivered to all interfaces
indicated by this address. multicast address is designed to replace the broadcast address
on IPv4 who consume lots of bandwidth.

IPv6 address allocation table
__________________________________________________________________
| Allocation | binary prefix | instance (16 bit first |
|_______________|__________________________|_______________________|
| Global unicast | 001 | ato 2XXX 3XXX |
| Local links | 1111 1110 10 | FE8X - FEBx |
| Site local | 1111 1110 11 | FECx - FEFx |
| Multicast | 1111 1111 | FFxx |
|_______________|__________________________|_______________________|

in addition to the above address mentioned there are also other types of addressing are:

# IPv4-compatible IPv6 addresses are typically used to address the transition mechanism Tunelling
kaya gini address format:

80 bits | 16 | 32 bits |
+-------------------+------+---------------------+
| 0000 ........... 0000 | 0000 | IPv4 address |
+-------------------+------+---------------------+

example:
= 0:0:0:0:0:0:192.168.30.1
=:: 192.168.30.1
=:: C0A8: 1E01
so 0:0:0:0:0:0:192.168.30.1 =:: c0AB: 1E01 how come to the mane? gini's how:
first create a binary address 0:0:0:0:0:0:192.168.30.1
:: 11000000.10101000.00011110.00000001 later regrouped into 16 bits each
:: [1100.0000.1010.1000]: [0001.1110.0000.0001] converted to hexa decimal --->:: C0A8: 1E01
sign "." (Dots) in brackets for easy conversion from binary to hexadecimal.
already pahamkan? still not too please try again slowly: p

# IPv4-mapped IPv6 addresses are typically used for ISATAP transition mechanism.

80 bits | 16 | 32 bits |
+-------------------+------+---------------------+
| 0000 ........... 0000 | FFFF | IPv4 address |
+-------------------+------+---------------------+

for example: =:: FFFF: 192.168.1.2

# IPv6 over Ethernet is used for stateless autoconfiguration (provision of IPv6 addresses
automatically without requiring a server that provides IP address allocation, DHCP similar
cuman without a server).
For example:
00:90:27:17: FC: 0F
/ \
/ \
FF FE
then the address to be 00:90:27: FF: FE: 17: FC: 0F then blocked the first seven bits diinvers
00:90:27:17: FC: 0F
|
|
\ | /
000 000 [0] 0 bits that dikurungi diinvers from 0 ---> 1
it is now a 02:90:27: FF: FE: 17: FC: 0F addresses are IPv6 addresses over ethernet.

Web 3.0 Period


If the world's 3G mobile known term, then on the Internet there is such thing as Web 3.0. Wow, what is this? What's the difference with Web 2.0 is now emerging? Make no mistake, it turns out people of Indonesia are also already exist that develop them.

Today we enter the second generation of the website or called web 2.0. In the previous generation of Web 1.0 has the general characteristics of striking the consult, surf and search. So on the Web 1.0 era we are mostly just looking for or browse to find the specific information.

Social

Then comes Web 2.0 to Web 1.0 which replaces the social interaction in cyberspace has become a necessity so that the era of Web 2.0 has some striking feature of the share, collaborate and exploit. In the era of Web 2.0 now, use the web for sharing, friendship, collaboration becomes something important. Web 2.0 is present as the rise of user blogs, Friendster, Myspace, Youtube and Fickr. So here the social life in cyberspace is really felt.

The era of Web 2.0 does not require a genius who just struggling alone in a closed room or laboratory to create new, patented technology to make himself become famous. But this era is more need for people to share knowledge, experience or other, forming a large online community, which abolished individual traits.

But gradually the habits and needs of people in the virtual world is always changing and growing. It is also in line with the increasingly fast broadband Internet access and computer technology is increasingly sophisticated. If the telecommunication is beginning to sound issues 4G era, so too is happening in the world of websites that also raises the issue will soon be the presence of a new era of Web 3.0. This third-generation Web technologies are more advanced development of Web 2.0 where the web here as if life was like in the real world. Web 3.0 has the general characteristics such as suggest, and Provide Happen.

So, here the web as if it was like our personal assistant. Web begin to understand our needs by being able to give us suggestions or advice, providing what we need. Using 3D animation technology, we can create avatars that match the profile with the character, then do activities in the virtual world just like in the real world. We can take a walk, go to the mall, chatting with another friend. Yes, Web 3.0 is our virtual world.

Made in Indonesia

In this Web 3.0, have occurred very close convergence between the IT world with the world of telecommunications. World wide web and telco growing rapidly in line with user needs. The use of IT and telecommunications devices such as the later is the same no difference. Currently, only a sign like that already we can feel although still not perfect. We can watch television on mobile phones or computers, can access the Internet on mobile phones, SMS and can make calls from computers. Yes because the convergence of various devices such as the laws of nature that can not be circumvented. All experienced the evolution toward a more advanced world.

Is there a website now as a harbinger of the era would be the inclusion of Web 3.0? Yes, Web 3.0 model could be felt one of them is on the secondlife.com website. And also quite proud that we are, Indonesia has been able to enter the world of Web 3.0 is the presence of lilofriends.com. The site was near the Web 3.0 model of the original works of children of the nation which was developed by developed by Li'l Online Games with engines from Altermyth Studio. Hmm ... great-great Indonesian children right? Many more examples of other children's works of high quality people who deserve to be proud and not inferior to products made in other nations. Time to let work continue to promote Indonesia!

Categories

 

Contact