Simulasi Investasi Di Neobux Tanpa Modal

Selasa, 15 Februari 2011 0 komentar

Mungkin sudah banyak sekali orang yang tahu tentang neobux. Kalau di lihat pada statistik pada forum yang katanya komunitas nomor 1 di Indonesia record tentang neobux ini sudah terlihat mulai tahun 2008. Saya sendiri baru bergabung dengan neobux pada bulan Desember 2010. Melihat dari pengalaman yang lalu kebanyakan jenis PTC site seperti neobux ini tidak berumur panjang, Namun setelah melihat record perjalanan neobux yang terlah berjalan hampir 3 tahun lebih ini membuktikan bahwa neobux adalah salah satu PTC yang sukses dan digarap dengan serius oleh pemiliknya sehingga membuat saya yakin pantas untuk menulis tentang neobux.

Yang akan kita diskusikan disini adalah simulasi investasi. Seperti kita ketahui kebanyakan orang yang belum paham sangat sulit kita ajak untuk bergabung sebelum mereka merasakan buah manis alias hasil yang bisa mereka anggap cukup. Untuk itulah simulasi investasi ini saya buat untuk mengajak teman-teman yang mungkin tertarik dan memenuhi syarat, tentunya TANPA MODAL agar lebih menarik karena kebanyakan orang tidak mau mengambil risiko.

Untuk memulai pastikan terlebih dahulu kita memenuhi syarat dibawah ini:

  1. Punya waktu luang minimal 5-10 menit setiap hari.
  2. Punya koneksi internet.
  3. Punya alamat email.
  4. Punya akun paypal/alertpay yang telah berstatus verified.

Kalau anda sudah memenuhi syarat diatas silahkan baca artikel ini hingga selesai. Silahkan ikuti petunjuk dibawah ini:

Mendaftar pada situs neobux, jika tidak keberatan anda boleh mendaftar melalui link ini untuk menjadi referral saya. Apa keuntungan menjadi referral saya dibanding anda mendaftar langsung pada situs neobux? Jika anda mendaftar melalui link referral saya maka anda menjadi direct referral saya (tentu akan ada bonus dari saya pribadi sebagai solusi win-win), Jika anda mendaftar langsung tanpa melalui link referral saya maka anda akan dijual oleh neobux untuk keuntungan neobux. Silahkan anda tentukan berdasarkan pemikiran anda sendiri, saya tidak memaksa dan tidak akan rugi atas keputusan anda.
  1. Setelah mendaftar pada situs neobux buka email anda lalu klik link verifikasi pada email anda.
  2. Setelah anda sukses terdaftar pada situs neobux segera login lalu update informasi personal anda dengan data yang benar (termasuk email paypal/alertpay).
  3. Setelah update informasi personal silahkan anda klik pada tulisan “View Advertisements” Iklan yang diberikan pada anda adalah 4 setiap harinya, jika anda sering online maka akan diberikan bonus tambahan, tiap klik iklan bernilai $0.01 atau setara dengan Rp 91 , Mungkin bagi anda ini kelihatan sangat kecil, tapi jangan bersedih silahkan baca terus simulasi investasi ini agar mencapai hasil yang di inginkan.
  4. Pastikan anda melakukan klik iklan setiap harinya, Saran saya setiap harinya anda klik pada range jam 12:00 Siang sampai dengan jam 21:00 Malam. Jika anda punya waktu luang yang banyak saran saya klik 1 iklan setiap rentang 1 jam karena ada bonus $0.50 setiap jam di neobux.
  5. Lakukan rutinitas diatas hingga earning anda mencapai $1 jika anda melakukan klik rutin setiap harinya maka anda dapat mencapai $1 dalam waktu 25 hari (tidak lebih dari 1 bulan)
  6. Pada tahap ini lakukan re-investasi atau investasi ulang dari penghasilan anda untuk mencapai tingkat berikutnya. Sewalah 3 referral seharga $0.75. Maka pada bulan berikutnya uang anda akan berjumlah 1,8+0.25+1.2 = $3.25 *Jika 100% aktif.
  7. Pada langkah berikutnya lakukan lagi invertasi ulang, jika sewa 1 referral harganya adalah $0.25 maka sekarang anda mampu menyewa 13 referrals, karena paket sewa referral tidak ada angka 13 maka anda harus menyewa 10 dan sisanya anda simpan untuk berjaga-jaga jika perlu melakukan recycle (pergantian).
  8. Langkah seterusnya adalah mengikuti langkah ke-8 sampai pada saat anda mulai memiliki pondasi yang kuat.
  9. Setelah anda merasa memiliki pondasi yang kuat saatnya anda mulai berpikir untuk melipat gandakan keuntungan anda dengan menjadi member yang berbayar. tentu saja tidak ada paksaan, jika anda merasa cocok sebagai member standard silahkan. Jika anda merasa masih belum mencapai target maka upgrade lah akun anda. Anda akan semakin berkembang dan naik ke level diatas sebelumnya.
  10. Setelah mencapai batasan maksimal/target yang anda incar anda bisa menikmati keuntungan anda. Jika belum, lakukan manajemen pintar agar anda bisa naik terus pada tingkat berikutnya.
  11. Pelajari dan pahami bagaimana agar anda bisa mencapai target yang di incar, cari tahu tentang yang legal dan ilegal, dan yang terakhir pelajari juga teknik dari member lain mungkin ada beberapa yang akan memberikan nilai lebih.

Simulasi ini sangat mudah dipahami oleh banyak orang namun jarang sekali orang bertindak. Salah satu kunci untuk mendapatkan penghasilan yang lebih dari cukup adalah dengan memiliki banyak sumber. Sama hal-nya dengan prinsip umum jika seorang pegawai negeri memiliki bisnis sampingan maka dia akan semakin untung karena memiliki lebih dari 1 sumber penghasilan. Ini juga berlaku pada semua orang karena sangatlah rugi jika anda hanya menggantungkan sumber penghasilan anda hanya dari 1 sumber saja.

Lalu bagaimana dengan neobux? kunci diatas dapat anda gunakan, semakin banyak referrals yang anda sewa atau direct referral yang anda cari maka akan semakin tinggi penghasilan anda. Jangan melihat dari besar kecilnya penghasilan pokok tapi lihatlah pada hasil akhir dan bagaimana pintarnya anda melakukan manajemen. Bayangkan ada seorang tukang bakso berjualan, sehari keuntungan tukang bakso kita anggap saja 20 ribu Rupiah. Bisakah tukang bakso menjadi orang kaya? tentu BISA kenapa tidak?! semua orang memiliki kemungkinan menjadi kaya jika dia melakukan manajemen yang pintar dan terorganisir. Jika tukang bakso menjadi bandar bakso, jika dia punya 10 gerobak, maka penghasilan sehari buat si tukang bakso adalah 200 ribu Rupiah bukan lagi 20 ribu Rupiah.

Anda tidak yakin jika neobux bisa memberikan penghasilan yang lebih dari cukup atau mungkin bahkan lebih dari gaji anda sendiri? Silahkan baca dan pelajari diforum neobux ada seorang member yang mendapatkan keuntungan bersih setiap bulannya dari neobux sebesar $2.500. Kalau kita rupiahkan dengan rate saat ini $2.500 = Rp 22.750.000 setiap bulannya. Fantastis kan angka ini? bahkan mungkin angka ini lebih besar dari gaji seorang pegawai negeri (maaf bukan maksud melecehkan pegawai negeri hehe) semua ini dilakukan hanya dengan meluangkan waktu 5-10 menit setiap harinya, tentunya juga manajemen yang pintar dan modal yang cukup sehingga sang member yang wah itu bisa mencapai target itu. Kalau dia bisa kenapa anda tidak bisa?!

Yang perlu anda ketahui bahwa neobux ini bukanlah solusi untuk anda yang ingin menjadi kaya mendadak, neobux mungkin merupakan salah satu cara agar anda bisa berkembang atau mungkin bisa menjadi salah satu income dari sekian banyak income yang anda miliki. Seperti filsafat diatas, anda akan rugi jika hanya menggantungkan sumber penghasilan anda pada satu sumber.

{Tulisan diatas sudah mendapatkan persetujuan dari Penulis aslinya.]

Sekian, Salam GoBlog!

Sumber : http://id.istanto.net/

Finding Your MAC Address On Wired And Wireless Network Cards

Minggu, 06 Februari 2011 0 komentar
The Answer To The Media Access Control Question
----------------------------
Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason I've received so many questions about Ethernet cards and MAC addresses is people trying to secure their home wireless networks and their desire to use MAC address filtering. This type of filtering in wireless networks can be configured to allow or deny specific computers to use or attach to the wireless network, based on the MAC address.

My first thought was to write an article just about MAC addresses and wireless Ethernet. After thinking about it I decided to expand on this and go over some specific information about Ethernet cards and communication.

Different Ways Of Finding Your MAC Address And More
--------------------------------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer's have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP "ipconfig" utility since this is available in the majority of Windows Operating Systems.

First, go to "start" -> "run" and type "cmd" without the quotes. Then hit the enter key. At the command line type "ipconfig /all", again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the "ipconfig /all" command is below with each item commented in green lettering:

Fault Tolerant And Highly Availability Computer Systems
----------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer's have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP "ipconfig" utility since this is available in the majority of Windows Operating Systems.

First, go to "start" -> "run" and type "cmd" without the quotes. Then hit the enter key. At the command line type "ipconfig /all", again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the "ipconfig /all" command is below:

OutPut Of The "Ipconfig /All" Command
----------------------------------------------------------
Windows IP Configuration


Host Name . . . . . . . . . . . . : Home Computer
This is the name of your computer, typically defined during the windows installation. However, it can be changed after installation.

Primary Dns Suffix . . . . . . . : domain.com
If your computer participates in a network such as a Microsoft Windows domain this item may contain the name of the domain.

Node Type . . . . . . . . . . . . : Unknown
The Node Type may say Unknown, or peer-to-peer, or in some cases "hybrid". It is a setting that has to do with the Windows Internet Naming Services used in certain types of Windows domain networks.

IP Routing Enabled. . . . . . . . : No
This setting determines if Windows XP or 2000 will function as an IP router. If you have two or more network cards you can setup your system to act as a router, forwarding communications requests from one network to another. Windows 2000 can be configured to do this in a pretty straight forward fashion; Windows XP will need a registry modification.

WINS Proxy Enabled. . . . . . . . : No
WINS Proxy is another setting that is related to the "Node Type" we discussed earlier. It is normally not a required setting in a home or small office network, or newer types of Microsoft Windows domains.

Ethernet adapter Wireless Network Connection 2:
If you have multiple Ethernet (network) cards in your systems, as I do in this laptop, you will have multiple listings. This one happens to be the second Ethernet card, an internal wireless Ethernet card.

Description . . . . . . . . . . . : Broadcom 802.11b/g WLAN
This is the description of the Ethernet card, usually the Name / Manufacturer and type of Ethernet card. In this case, it is a Broadcom wireless Ethernet card built into my laptop.

Physical Address. . . . . . . . . : 00-90-4B-F1-6E-4A
And here we have the MAC address. The MAC address is a 48 bit hexadecimal code and is suppose to be a totally unique address. It is 48 bits because each number or letter in hexadecimal represents 8 bits. Hexadecimal numbers range from 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, F. There are 6 alpha-numeric codes hence 6*8=48(bits). The first 3 codes identify the manufacturer of the card and the remaining codes are used to create a unique number. Theoretically there should never be a card with same MAC address on a local network. However, there are a few exceptions. There are software tools that allow you to change this code. In fact, this is a step some hackers take to attack other systems on a local network. I say local network because MAC addresses are not routable between network segments. By spoofing this address, you can impersonate another machine on the local network. Traffic that was bound for the intended target can be redirected to the hacker's machine. This is the address you would also use to populate a MAC address, or physical address table when setting up your wireless access point to support MAC address filtering.

DHCP Enabled. . . . . . . . . . . : Yes
DHCP, or the Dynamic Host Control Protocol, if enabled means your computers IP address is being provided by a DHCP server on you network. The DHCP server could be your wireless access point, cable/dsl router, cable modem, or a server on your network. Also, if a DHCP server is not enabled on your network, your computers Operating System will auto generate a random IP address within a certain predefined range. This means you could network a group of systems together without having to manually assign the IP settings.

IP Address. . . . . . . . . . . . : 192.168.0.117
This parameter provides you with your current IP address. The address listed above is what is called a "private" address. There are certain classes of IP addresses that have been set aside for private use. This means for your internal, local, or private network at home or office. These addresses are not, or should not, be routable on the Internet. The Internet routes what are called "valid" IP addresses. Your cable/dsl router or cable modem has a valid IP address assigned to its "external" network interface. The external interface may be your phone line or cable TV cable.
Subnet Mask . . . . . . . . . . . : 255.255.255.0
The Subnet Mask is a special number, or in some sense, filter, that breaks down your IP address, in this case private IP address, into certain groups. IP addresses and Subnet Masks can be a complicated matter and would take an entire article to go over.

Default Gateway . . . . . . . . . : 192.168.0.254
The default gateway, the IP addresses listed above, is the IP address of the device that will route your request, such as when you try to browse a website, to the Internet. It is a bit more complicated than that though as gateways or routers can route traffic to various different networks, even other private networks. At your home or small office, this gateway most likely is your cable/dsl modem or router.

DHCP Server . . . . . . . . . . . : 192.168.0.49
The DHCP server, remember we talked a little about this above, is the device that assigns your computer an IP address and other information. DHCP servers can assign all kinds of information such as; Default Gateway, Domain Name Servers (DNS), IP address, Subnet Mask, Time Server, and much more.

DNS Servers . . . . . . . . . . . : 192.168.0.49, 64.105.197.58
DNS Servers are internal or external servers that resolve Fully Qualified Domain Names (FQDN), such as www.defendingthenet.com , to IP addresses. This is done because computers don't actually transmit your requests using the domain name, they use the IP address assigned to the FQDN. For most home or small office users, the primary DNS server is the IP address of your cable/dsl router. Your cable/dsl router than queries an external DNS server on the Internet to perform the actual resolution of the FQDN to IP address. The address 192.168.0.49 is an internal private device on my network whereas the 64.105.197.58 is an external public Internet DNS server and is present just in case my router has trouble performing the DNS resolution tasks.

Lease Obtained. . . . . . . . . . : Sunday, March 19, 2006 6:38:16 PM
This information tells you when your computer received its IP address and other information from a DHCP server. You will notice it says "Lease Obtained", that is because most DHCP servers only lease the IP address to you from a pool of available address. For instance, your pool may be 192.168.1.1 through 192.168.1.50. So your DHCP server has 50 IP addresses to choose from when assigning your computer its IP address.

Lease Expires . . . . . . . . . . : Wednesday, March 29, 2006 9:38:16 PM
When the IP address, assigned by the DHCP server, lease expires it will attempt to lease you the same or another IP address. This function can typically be changed on the DHCP server. For instance, on some fully functional DHCP servers, you can configure the Lease to never expire, or to expire within 1 day and so on.

Why Are MAC Addresses So Important And How Do They Work
------------------------------------------------------
To jump back to MAC address for just a bit. You may think that IP addresses are the most important thing when it comes to network communication. The reality is, MAC addresses are very important because without them computers would not be able to communicate over Ethernet networks. When a computer wants to speak with another computer on a local network, it will make a broadcast request, or ask a question, of who owns a particular IP address. For instance, your computer may say "Who is 192.168.0.254". Using the information above, my default gateway is 192.168.0.254 and will answer "I am "00-90-4B-F1-6E-4A" 192.168.0.254". It sends back its MAC address. That MAC address then goes into what is called a Address Resolution Protocol (ARP) table on your computer. You can see this information by going to the command prompt like you did above and typing "arp –a". You will get information like the following:


Internet Address Physical Address Type
192.168.0.49 00-12-17-5c-a2-27 dynamic
192.168.0.109 00-12-17-5c-a2-27 dynamic
192.168.0.112 00-0c-76-93-94-b2 dynamic
192.168.0.254 00-0e-2e-2e-15-61 dynamic

How A Hacker Can Use MAC Addresses In An Attack
----------------------------------------------
You will notice the IP addresses and to the right of them the MAC addresses. Without this information, without the MAC address, you would not be reading this article right now. MAC addresses are not routable like IP addresses. They work on your local or private network. However, devices on the Internet perform the same tasks. Routers and switches maintain a list of their peer devices MAC address just like your computers and devices on your home or office network. I mentioned above that MAC addresses can be changed in order to redirect requests. For instance, if I were on your office network and you had an internal web server that took personal information as input, I could tell your computer to go to my laptop for the web site by broadcasting my MAC address tied to the real web servers IP address. I would do this when you computer asked "Who is the "Real Web Server"". I could setup a fake web server that looks just like the real thing, and start collecting information the real web server would normally collect. You can see how dangerous this can be.

Conclusion
-----------
There are several other easy ways you can find your MAC address but they can be a little confusing if you have more than one internal network card. Most external USB, or PCMCIA wired and wireless Ethernet cards have their MAC address printed on them. In cases where the wired or wireless network card are inside your computer, such as in laptops, the MAC address is sometimes printed on the bottom of the laptop. Even Desktop systems cards that are inserted in PCI slots have the MAC address printed on the Ethernet card.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/NewsLetters/FindingYourMACAddressOnWiredAndWirelessNetworkCards.htm

About The Author
----------------
Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@defendingthenet.com. If you would like to know more about computer security please visit us at http://www.defendingthenet.com.


in Networks

How To Find Your IP Address . DNS Address . IPv4 . IPv6

Selasa, 01 Februari 2011 0 komentar

IP address
(Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)-in simpler terms, a computer address. Any participating network device-including routers, computers, time-servers, printers, Internet fax machines, and some telephones-can have their own unique address.
An IP address can also be thought of as the equivalent of a street address or a phone number ( compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. An IP address differs from other contact information, however, because the linkage of a user's IP address to his/her name is not publicly available information.
IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a network address translator (NAT) or proxy server acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP addresses, in the private address space defined by RFC 1918, an address block that cannot be routed on the public Internet. Only the "outside" interface(s) of the NAT need to have Internet-routable addresses.
Most commonly, the NAT device maps TCP or UDP port numbers on the outside to individual private addresses on the inside. Just as there may be site-specific extensions on a telephone number, the port numbers are site-specific extensions to an IP address.
IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.

DNS Address:

On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use.

Uses :

The most basic use of DNS is to translate hostnames to IP addresses. It is in very simple terms like a phone book. For example, if you want to know the internet address of en.wikipedia.org, the Domain Name System can be used to tell you it is 66.230.200.100. DNS also has other important uses.
Pre-eminently, DNS makes it possible to assign Internet destinations to the human organization or concern they represent, independently of the physical routing hierarchy represented by the numerical IP address. Because of this, hyperlinks and Internet contact information can remain the same, whatever the current IP routing arrangements may be, and can take a human-readable form (such as "wikipedia.org") which is rather easier to remember than an IP address (such as 66.230.200.100). People take advantage of this when they recite meaningful URLs and e-mail addresses without caring how the machine will actually locate them.
The Domain Name System distributes the responsibility for assigning domain names and mapping them to IP networks by allowing an authoritative server for each domain to keep track of its own changes, avoiding the need for a central registrar to be continually consulted and

History :

The practice of using a name as a more human-legible abstraction of a machine's numerical address on the network predates even TCP/IP, and goes all the way to the ARPAnet era. Back then however, a different system was used, as DNS was only invented in 1983, shortly after TCP/IP was deployed. With the older system, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI (now SRI International). The HOSTS.TXT file mapped numerical addresses to names. A hosts file still exists on most modern operating systems, either by default or through configuration, and allows users to specify an IP address (eg. 192.0.34.166) to use for a hostname (eg. www.example.net) without checking DNS. As of 2006, the hosts file serves primarily for troubleshooting DNS errors or for mapping local addresses to more organic names. Systems based on a hosts file have inherent limitations, because of the obvious requirement that every time a given computer's address changed, every computer that seeks to communicate with it would need an update to its hosts file.
The growth of networking called for a more scalable system: one that recorded a change in a host's address in one place only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts' names and their associated IP Addresses.
At the request of Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications appear in RFC 882 and 883. In 1987, the publication of RFC 1034 and RFC 1035 updated the DNS specification and made RFC 882 and RFC 883 obsolete. Several more-recent RFCs have proposed various extensions to the core DNS protocols.
In 1984, four Berkeley students - Douglas Terry, Mark Painter, David Riggle and Songnian Zhou - wrote the first UNIX implementation, which was maintained by Ralph Campbell thereafter. In 1985, Kevin Dunlap of DEC significantly re-wrote the DNS implementation and renamed it BIND (Berkeley Internet Name Domain, previously: Berkeley Internet Name Daemon). Mike Karels, Phil Almquist and Paul Vixie have maintained BIND since then. BIND was ported to the Windows NT platform in the early 1990s.
Due to BIND's long history of security issues and exploits, several alternative nameserver/resolver programs have been written and distributed in recent years.
How DNS Work In The Theory :
The domain name space consists of a tree of domain names. Each node or branch in the tree has one or more resource records, which hold information associated with the domain name. The tree sub-divides into zones. A zone consists of a collection of connected nodes authoritatively served by an authoritative DNS nameserver. (Note that a single nameserver can host several zones.)
When a system administrator wants to let another administrator control a part of the domain name space within his or her zone of authority, he or she can delegate control to the other administrator. This splits a part of the old zone off into a new zone, which comes under the authority of the second administrator's nameservers. The old zone becomes no longer authoritative for what goes under the authority of the new zone.
A resolver looks up the information associated with nodes. A resolver knows how to communicate with name servers by sending DNS requests, and heeding DNS responses. Resolving usually entails iterating through several name servers to find the needed information.
Some resolvers function simplistically and can only communicate with a single name server. These simple resolvers rely on a recursing name server to perform the work of finding information for them.

IPv4:

Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 is the dominant network layer protocol on the Internet and apart from IPv6 it is the only protocol used on the Internet.
It is described in IETF RFC 791 (September 1981) which made obsolete RFC 760 (January 1980). The United States Department of Defense also standardized it as MIL-STD-1777.
IPv4 is a data-oriented protocol to be used on a packet switched internetwork (e.g., Ethernet). It is a best effort protocol in that it does not guarantee delivery. It does not make any guarantees on the correctness of the data; It may result in duplicated packets and/or packets out-of-order. These aspects are addressed by an upper layer protocol (e.g., TCP, and partly by UDP).
The entire purpose of IP is to provide unique global computer addressing to ensure that two computers communicating over the Internet can uniquely identify one another.

Addressing :

IPv4 uses 32-bit (4-byte) addresses, which limits the address space to 4,294,967,296 possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~1 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses. As the number of addresses available are consumed, an IPv4 address shortage appears to be inevitable, however Network Address Translation (NAT) has significantly delayed this inevitability.
This limitation has helped stimulate the push towards IPv6, which is currently in the early stages of deployment and is currently the only contender to replace IPv4.

Allocation :

Originally, the IP address was divided into two parts:

* Network id : first octet
* Host id : last three octets

This created an upper limit of 256 networks. As the networks began to be allocated, this was soon seen to be inadequate.
To overcome this limit, different classes of network were defined, in a system which later became known as classful networking. Five classes were created (A, B, C, D, & E), three of which (A, B, & C) had different lengths for the network field. The rest of the address field in these three classes was used to identify a host on that network, which meant that each network class had a different maximum number of hosts. Thus there were a few networks with lots of host addresses and numerous networks with only a few addresses. Class D was for multicast addresses and class E was reserved.
Around 1993, these classes were replaced with a Classless Inter-Domain Routing (CIDR) scheme, and the previous scheme was dubbed "classful", by contrast. CIDR's primary advantage is to allow re-division of Class A, B & C networks so that smaller (or larger) blocks of addresses may be allocated to entities (such as Internet service providers, or their customers) or Local Area Networks.
The actual assignment of an address is not arbitrary. The fundamental principle of routing is that address encodes information about a device's location within a network. This implies that an address assigned to one part of a network will not function in another part of the network. A hierarchical structure, created by CIDR and overseen by the Internet Assigned Numbers Authority (IANA) and its Regional Internet Registries (RIRs), manages the assignment of Internet address worldwide. Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments; information from these databases plays a central role in numerous tools that attempt to locate IP addresses geographically.

IPv6:

Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is designated as the successor of IPv4, the current version of the Internet Protocol, for general use on the Internet.
The main improvement brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. While IPv6 could support 2128 (about 3.4׳1038) addresses, or approximately 5׳1028 addresses for each of the roughly 6.5 billion people[1] alive today. It was not the intention of IPv6 designers, however, to give permanent unique addresses to every individual and every computer. Rather, the extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

Introduction :

By the early 1990s, it was clear that the change to a classless network introduced a decade earlier was not enough to prevent IPv4 address exhaustion and that further changes to IPv4 were needed.[2] By the winter of 1992, several proposed systems were being circulated and by the fall of 1993, the IETF announced a call for white papers (RFC 1550) and the creation of the "IP, the Next Generation" (IPng Area) of working groups.[2][3]
IPng was adopted by the Internet Engineering Task Force on July 25, 1994 with the formation of several "IP Next Generation" (IPng) working groups.[2] By 1996, a series of RFCs were released defining IPv6, starting with RFC 2460. (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.)
It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. IPv4-only nodes (clients or servers) will not be able to communicate directly with IPv6 nodes, and will need to go through an intermediary

Features of IPv6 :

[edit] To a great extent, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to work over IPv6; exceptions are applications protocols that embed network-layer addresses (such as FTP or NTPv3).
Applications, however, usually need small changes and a recompile in order to run over IPv6.

Larger address space :

The main feature of IPv6 that is driving adoption today is the larger address space: addresses in IPv6 are 128 bits long versus 32 bits in IPv4.
The larger address space avoids the potential exhaustion of the IPv4 address space without the need for network address translation (NAT) and other devices that break the end-to-end nature of Internet traffic. NAT may still be necessary in rare cases, but Internet engineers recognize that it will be difficult in IPv6 and are trying to avoid it whenever possible. It also makes administration of medium and large networks simpler, by avoiding the need for complex subnetting schemes. Subnetting will, ideally, revert to its purpose of logical segmentation of an IP network for optimal routing and access.
The drawback of the large address size is that IPv6 carries some bandwidth overhead over IPv4, which may hurt regions where bandwidth is limited (header compression can sometimes be used to alleviate this problem). IPv6 addresses are harder to memorize than IPv4 addresses, although even IPv4 addresses are much harder to memorize than Domain Name System (DNS) names. DNS protocols have been modified to support IPv6 as well as IPv4.

Stateless auto configuration of hosts :

IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually. Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means

IPv6 scope :

IPv6 defines 3 unicast address scopes: global, site, and link.
Site-local addresses are non-link-local addresses that are valid within the scope of an administratively-defined site and cannot be exported beyond it.
Companion IPv6 specifications further define that only link-local addresses can be used when generating ICMP Redirect Messages [ND] and as next-hop addresses in most routing protocols.
These restrictions do imply that an IPv6 router must have a link-local next-hop address for all directly connected routes (routes for which the given router and the next-hop router share a common subnet prefix).

Links:

Find IP Info: link http://www.ip-adress.com
Find DNS, IPv4, IPv6 : link: http://www.iplobster.com
Find IP Address: link http://www.myip.dk

in Networks

Jenis Sistem Operasi

0 komentar
Pada masa sekarang sebagian besar orang memanfaatkan teknologi komputerisasi, misal saja komputer dan handphone. Karena itulah, untuk berinteraksi dengan alat-alat tersebut manusia membutuhkan suatu antarmuka, yaitu berupa perangkat lunak (software). Perangkat lunak ini bermanfaat untuk membuat komputer dapat berinteraksi atau melakukan apa yang manusia inginkan dan perintahkan. Perangkat lunak yang digunakan untuk mengatur suatu penggunaan Perangkat keras (hardware) komputer selain BIOS disebut sistem operasi (operating system).
Sekarang ini banyak sekali tipe/jenis sistem operasi untuk untuk mengkoordinir suatu komputer ataupun handphone. Nah, untuk lebih jelasnya lagi mari kita kenali bersama masing-masing sistem operasi tersebut.


Sistem Operasi untuk komputer:
  • UNIX
    Termasuk sistem operasi yang paling awal ada untuk komputer. Merupakan induk dari sistem operasi linux.
  • DOS
    Sistem operasi yang merupakan cikal bakal dari micro**oft Windows. Ciri khasnya yaitu berupa teks putih dengan latar belakang hitam. Kalau mau mencobanya bisa lewat Start Windows – Run, lalu ketik cmd.
  • Novell Operating Sistem
    Dibuat oleh Novell Corporation. Sistem operasi yang dulu pernaha digunakan oleh Fakultas MIPA UGM untuk Entry Key-In KRS mahasiswa.
  • microsoft Windows
    Merupakan sistem operasi yang paling populer. Hampir semua orang pernah memakainya. Beberapa versi micro**oft Windows yang terkenal: micro**oft Windows 98, 2000, Me, XP, Vista, dan yang paling terbaru Windows 7.
  • Apple Machintos
    System operasi yang unggul dalam hal grafik. Memerlukan hardware khusus sehingga tidak dapat di-install di computer biasa. Versinya antara lain Mac OS X (Tiger), Leopard.
  • Linux
    Pertama kali dikembangkan oleh Linus Torvald. Merupakan sistem operasi open source artinya bisa dikembangkan oleh semua orang dengan bebas. Turunan linux atau yang dikenal dengan distro linux banyak sekali macamnya. Mungkin linux merupakan sistem operasi yang paling banyak. Beberapa di antaranya yaitu: Debian, Suse, Red Hat (Fedora), Slackware, Ubuntu, Backtrack, dan lain-lain
  • Solaris
    Dikembangkan oleh Sun Microsystem. Lebih banyak digunakan untuk perusahaan.
  • Free BSD
    Dibuat oleh Universitas Berkeley. Hampir sama seperti linux.
Sistem Operasi untuk handphone:
  • Symbian
    Sistem operasi yang populer di kalangan para pengguna handphone. Kebanyakan handphone nokia menggunakan symbian sebagai sistem operasi. Versinya antara lain S40, S60, S9
  • microsoft Windows Mobile
    Sistem operasi yang dikeluarkan oleh micro**oft untuk smartphone dan PDA. Tampilannya hampir sama dengan Windows pada komputer.
  • Palm OS
    Sistem operasi yang digunakan pada PDA keluaran PALM.
  • Android
    Sistem operasi untuk handphone yang akan diluncurkan Google. Android berbasis Linux sehingga termasuk open source.
Nah, Apabila ada yang kurang dan ada yang salah dalam penjelasannya, saya berharap temen-temen semua berminat untuk meluangkan sebaris dua baris penjelasan yang benar, dengan cara meninggalkan komentar dibawah. Thanks semoga bermanfaat

Sumber