Skip to main content

Inside The Internet

Internet is a global computer network providing a variety of information and communication, very real and part of our everyday lives. Internet is networks of networks. It means all of activity which using internet are real. Internet never breaks and never stop. Inside the internet is nothing controls, everyone can open everything. Internet can be links academic, emails, social media posts, google searches, and others. 

1.Internet Protocol/Transmission Control Protocol (IP/TCP)is a set of rules for routing and addressing packets of data to smaller pieces, it’s called packets. In every packets of IP,  data arrives where it is needed. Its like a language of the internet. 
2. Internetworkingis a process of connecting different networks by using devices. These are physical hardware devices which have the ability to connect different networks and ensure error free data communication. 
IP address is a unique identifier assigned to a device that connects to the internet, example ‘192.168.1.1’. They had two version IPv4 vs IPv6, IPv4 was introduced in1983. IPv6 addresses have many characters and more permutations but not yet completely adopted. There’s an IP packet, are created by adding an IP header to each packet of data before it’s sent on its way. Packets can take different routes to the same place if necessary.



2Technopedia, (n.d).”What is internetworking?”. https://www.techopedia.com/definition/7788/internetworking. 22 June 2019 

Name : Nadira Yunia Mahardhani
NIM : 106218025

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...
SHAVIRA KHAIRUNISSA DEVIE 106218005, IR A [ Assignment for Pengantar Teknologi Informasi ] Today I wanna talk about Supercomputer. What is make supercomputer become highly super system? The secret behind supercomputer? Okay, we've known a long way ago that MITS developed the first personal computer in 1974, which was sold and help as a tool that the customer use for their daily activities also assemble the machine themselves. I will try to be as up-to-date and compactly report as possible. Also on these grounds I think there is a place that the supercomputer market is a very dynamic, the number of vendors that sell has boomed accordingly. At anytime we know one of the most powerful and fastest computers to solve the scientific and engineering problems or significant amount of data very quickly is Supercomputer.  A well-adopted metric is the number of floating-point operations per seconds (FLOPS) such a system can carry out for the operation itself. ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...