<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7536198095607186990</atom:id><lastBuildDate>Thu, 12 Sep 2024 14:26:22 +0000</lastBuildDate><title>All About Problem</title><description></description><link>http://allaboutproblem.blogspot.com/</link><managingEditor>noreply@blogger.com (Asep Rojali)</managingEditor><generator>Blogger</generator><openSearch:totalResults>13</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-6897499412266295588</guid><pubDate>Thu, 10 Mar 2011 16:44:00 +0000</pubDate><atom:updated>2011-03-10T00:45:45.069+07:00</atom:updated><title>Virus</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNo3uxX9rNCsGbpIfkf2yHNV6DSetFaG2kOVJ7qcmTskLpm3QwkmkPPmb1ymFORlWXvN-FYBJA_nWlWKBQG-89Y4oWb3ocIWpUaw6vbIkz9c0YggYlRI_TXU9DpBRarqtGlq8Bp-uvhF8E/s1600/8.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNo3uxX9rNCsGbpIfkf2yHNV6DSetFaG2kOVJ7qcmTskLpm3QwkmkPPmb1ymFORlWXvN-FYBJA_nWlWKBQG-89Y4oWb3ocIWpUaw6vbIkz9c0YggYlRI_TXU9DpBRarqtGlq8Bp-uvhF8E/s400/8.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;VIRUS adalah suatu aplikasi yang dapat mereplikasi diri dalam suatu jaringan komputer, bersifat merusak dan memiliki kemampuan untuk menginfeksi file lain menjadi memiliki sifat-sifat yang sama seperti dirinya.&quot;&gt;VIRUS  is an application that can replicate itself in a computer network, is  destructive and has the ability to infect other files to have the same  qualities as himself. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus akan mengubah ukuran program yang terinfeksi tanpa mengubah tanggal modifikasi suatu aplikasi.&quot;&gt;The virus will change the size of the infected program without changing the modification date of the application. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sejarah virus :&quot;&gt;History virus: &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada tahun 1949, John von Newman, yang menciptakan Electronic Discrete Variable Automatic Computer (EDVAC), memaparkan suatu makalahnya yang berjudul “Theory and Organization of Complicated Automata”.&quot;&gt;In  1949, John von Newman, who created the Electronic Discrete Variable  Automatic Computer (EDVAC), presented a paper entitled &quot;Theory and  Organization of Complicated Automata.&quot; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dalam makalahnya dibahas kemungkinan program yang dapat menyebar dengan sendirinya.&quot;&gt;In his paper discussed the possibility of a program that can spread by itself. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1960, para ahli di lab BELL (AT&amp;amp;T) -sebuah labolatorium terbesar di dunia yang telah menghasilkan banyak hal dalam dunia komputer- mencoba mengimplementasikan teori yang diungkapkan oleh john v neuman.&quot;&gt;In  1960, experts at the lab BELL (AT &amp;amp; T)-the largest laboratories in  the world that has produced a lot of things in the world of  computer-trying to implement the theory expressed by john v neuman. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Mereka bermain-main dengan teori tersebut untuk suatu jenis game.&quot;&gt;They toyed with the theory to a type of game. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di sela-sela waktu Istirahat mereka, para peneliti membuat permainan dengan suatu program yang dapat memusnahkan program buatan lawan, kemampuan membenahi dirinya sendiri lalu balik menyerang kedudukan lawan.&quot;&gt;On  the sidelines of their break time, the researchers made the game with a  program that can destroy your opponent artificial program, the ability  to fix themselves and then standing behind the opponent&#39;s attack. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Program permainan ini juga dapat memperbanyak dirinya secara otomatis.&quot;&gt;This game program also can reproduce itself automatically. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perang program ini disebut Core War, pemenangnya adalah pemilik program sisa terbanyak dalam selang waktu tertentu.&quot;&gt;War  of the program is called Core War, the winner is the owner of the  largest remaining programs within a certain time interval. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena sadar akan bahaya program tersebut bila bocor keluar laboratorium (terutama sekali karena C dan C++ adalah salah satu pemrograman bahasa tingkat tinggi - mudah dipelajari), maka setiap selesai permainan, program tersebut selalu dimusnahkan.&quot;&gt;Because  the program is aware of the dangers when leaked exit lab (especially  because C and C + + is one of the high-level programming language - easy  to learn), then each finished the game, the program is always  destroyed. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1970, perusahaan Xerox memperkenalkan suatu program yang digunakan untuk membantu kelancaran kerja.&quot;&gt;In 1970, the company Xerox introduced a program used to assist the smooth working. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;1980, Program yang tadinya dipergunakan sebagai permainan &#39;berbahaya&#39; tersebut akhirnya keluar dari lab, menyebar diluar lingkungan laboratorium, dan mulai beredar di dunia cyber.&quot;&gt;1980,  the program which was used as a game &#39;dangerous&#39; is finally out of the  lab, spread beyond the lab environment, and began circulating in the  cyber world. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;1981, Sebuah Virus yang bernama sama dengan pembuatnya, Elk Cloner, lahir di di TEXAS A&amp;amp;M.&quot;&gt;1981, A Virus of the same name by author, Elk Cloner, was born in the TEXAS A &amp;amp; M. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Menyebar melalui disket Apple II yang memiliki operating system.&quot;&gt;Spread through Apple II floppy disk that has the operating system. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sang perusak ini mendisplay pesan di layar : &amp;quot;It will get on all your disks-It will infiltrate your chips–yes it is Cloner!-It will stick to you like glue-It will modify RAM too-send in the Cloner!&amp;quot;&quot;&gt;The  destroyer is displaying a message on the screen: &quot;It will of get on all  your disks It will of infiltrate your-chips-yes it is the Cloner!-It  will of stick to you like glue It will of-modify RAM too-send in the  Cloner!&quot; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;3 November 1983, Len Adleman meresmikan nama ”VIRUS” dalam sebuah seminar yang membahas cara membuat virus and memproteksi diri dari virus.&quot;&gt;3  November 1983, Len Adleman inaugurated the name &quot;virus&quot; in a seminar  that discusses how to create viruses and protect yourself from viruses. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;1986, Virus Brain (dikenal juga dengan nama virus Pakistan) menyebarluas di Indonesia, merupakan Virus paling menggemparkan dikala itu.&quot;&gt;1986, Brain Virus (also known as viral Pakistan), widespread in Indonesia, is the most appalling Virus dikala it. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena penyebarannya yang luar-biasa itulah tahun ini justru disebut-sebut oleh sebagian orang Indonesia sebagai awal munculnya Virus komputer.&quot;&gt;Because  of its spread enormously this year that it was mentioned by some people  of Indonesia as the early emergence of computer viruses. &lt;/span&gt;&lt;span title=&quot;Kelahiran virus ini juga bersamaan dengan [PC-Write Trojan] dan [Vindent].&quot;&gt;The birth of this virus is also in conjunction with [PC-Write Trojan] and [Vindent]. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1988, muncul serangan besar-besaran terhadap Machintosh oleh virus [MacMag] &amp;amp; [scores].&quot;&gt;In 1988, emerging large-scale attack against Machintosh by the virus [MacMag] &amp;amp; [scores]. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di tahun ini pula jaringan Internet dihajar habis-habisan oleh worm buatan Robert Morris, Jr, seorang mahasiswa Ilmu Komputer Cornell.&quot;&gt;In  this year also an Internet network of all-out got beat by an artificial  worm Robert Morris, Jr., a student of Computer Science Cornell. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1989 ada orang iseng yang menyebarkan file &amp;quot;AIDS information program&amp;quot; dan celakanya, begitu file ini dibuka, yang didapat bukannya info tentang AIDS, tapi virus yang mengenkripsi harddisk dan meminta bayaran untuk kode pembukanya.&quot;&gt;In  1989 there prankster who spread the file &quot;AIDS information program&quot; and  unfortunately, so this file is opened, which is obtained instead of  info about AIDS, but the virus that encrypts the hard drive and require  payment for the opening code. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1990 Bulgarian virus exchange factory (VX) BBS didirikan.&quot;&gt;In 1990 Bulgarian virus factory exchange (VX) BBS was established. &lt;/span&gt;&lt;span title=&quot;Tips-trik pembuatan virus computer disebarkan melalui BBS ini.&quot;&gt;Tips-tricks-making computer virus transmitted through this BBS. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Mark Ludwig menulis sebuah buku yang berjudul “The Little Black Book of Computer Viruses”.&quot;&gt;Mark Ludwig wrote a book called &quot;The Little Black Book of Computer Viruses&quot;. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dalam buku tersebut dibahas langkah-langkah pembuatan virus komputer.&quot;&gt;In the book discussed the steps to create a computer virus. &lt;/span&gt;&lt;span title=&quot;Tahun 1991, virus polymorphic pertama lahir.&quot;&gt;In 1991, the first polymorphic virus is born. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus yang diberi nama Tequila ini datang dari Switzerland.&quot;&gt;The virus, named Tequila comes from Switzerland. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1992, muncul virus mematikan yang sempat membuat panik para pengguna komputer.&quot;&gt;In 1992, there was a deadly virus caused panic in the user&#39;s computer. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus tersebut diberi nama Michelangelo.&quot;&gt;The virus was named Michelangelo. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Namun penyebaran virus ini kurang begitu meluas (hanya memakan sedikit korban).&quot;&gt;But the spread of the virus is not so widespread (only eat a little victim.) &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 1995 muncul serangan besar-besaran.&quot;&gt;In 1995 came a massive attack. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perusahaan-perusahaan besar dilumpuhkan, diantaranya Griffith Air Force Base, Korean Atomic Research Institute, NASA, IBM dan masih banyak PERUSAHAAN RAKSASA lain yang dianiaya oleh virus &amp;quot;THE INETRNET LIBERATION FRONT&amp;quot; di hari ~Thanksgiving~.&quot;&gt;Large  companies paralyzed, including Griffith Air Force Base, Korean Atomic  Research Institute, NASA, IBM and many other GIANT COMPANY persecuted by  the virus &quot;THE INETRNET Liberation Front&quot; on Thanksgiving day ~ ~. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena keberanian dan kedahsyatan serangan itu, tahun 1995 dijuluki sebagai tahunnya para Hacker dan Cracker.&quot;&gt;Because of the courage and the magnitude of the attack, dubbed as the year 1995, the Hacker and Cracker. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di tahun ini juga lahir Concept, virus macro pertama yang menyerang dokumen Microsoft Word.&quot;&gt;In this year also born Concept, the first macro virus that attacks Microsoft Word document. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;1996, Boza, virus pertama yang ditujukan khusus untuk Windows 95 terlahir.&quot;&gt;1996, Boza, the first virus that are specific to Windows 95 was born. &lt;/span&gt;&lt;span title=&quot;Muncul juga Laroux, virus pertama yang menginfeksi MS Excel.&quot;&gt;Appears also Laroux, the first virus that infects MS Excel. &lt;/span&gt;&lt;span title=&quot;Tahun ini juga merupakan Staog, Virus pertama yang menginfeksi Linux.&quot;&gt;This year is also the Staog, the first virus that infects Linux. &lt;/span&gt;&lt;span title=&quot;1998, Lahir Strange Brew, merupakan Virus Java pertama.&quot;&gt;1998, Born Strange Brew, is the first Java virus. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Lahir juga Back Orifice, Trojan pertama yang menyebarluas, memungkinkan user tidak sah untuk mengendalikan komputer lain melalui internet.&quot;&gt;Born also Back Orifice, the first Trojan to spread, allowing unauthorized users to control other computers via the internet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;1999, Kombinasi virus&amp;amp;worm dengan nama yang sangat manis terlahir: Melissa.&quot;&gt;1999, the combination of viruses &amp;amp; worms with a very sweet name was born: Melissa. &lt;/span&gt;&lt;span title=&quot;Melissa merupakan perpaduan virus macro dan worm yang menyebarluas melalui email dengan memanfaatkan kelemahan Outlook.&quot;&gt;Melissa is a mix of macro viruses and worms to spread via email using Outlook weakness. &lt;/span&gt;&lt;span title=&quot;Muncul juga Corner, virus pertama yang menginfeksi MS Project files.&quot;&gt;Appears also Corner, the first virus that infects MS Project files. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 2000, Muncul Serangan Denial of Service (DoS) yang melumpuhkan Yahoo, Amazon dan situs-situs raksasa lainnya yang diakibatkan oleh worm.&quot;&gt;Of 2000, Appears Denial of Service (DoS) attacks that crippled Yahoo, Amazon and other giants sites caused by the worm. &lt;/span&gt;&lt;span title=&quot;Worm bernama Love Letter melumpuhkan e-mail systems di penjuru dunia.&quot;&gt;Love Letter worm called paralyzed e-mail systems around the world. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Worm Timofonica mengacaukan jaringan telepon Spanyol.&quot;&gt;Worm Timofonica disrupt Spanish telephone network. &lt;/span&gt;&lt;span title=&quot;Liberty, worm pertama yang menyerang PDA terlahir.&quot;&gt;Liberty, the first worm that attacks the PDA was born. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pirus, dari keluarga virus concept menginfeksi file-file HTML and PHP.&quot;&gt;Turquoise, from the family of concept virus infects the files HTML and PHP. &lt;/span&gt;&lt;span title=&quot;Tahun 2001, kembali dunia harus menghadapi sederetan serangan worm.&quot;&gt;In 2001, returned the world must face a series of worm attacks. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Gnuman (Mandragore) terlahir.&quot;&gt;Gnuman (Mandragore) was born. &lt;/span&gt;&lt;span title=&quot;Worm ini menyamar sebagai file MP3.&quot;&gt;This worm disguised as MP3 files. &lt;/span&gt;&lt;span title=&quot;Winux, worm yang menyerang mesin Windows dan LINUX, hadir dari Czech Republic.&quot;&gt;Winux, worms that attack Windows and Linux machines, comes from the Czechs Republic. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 2002, LFM-926, lahir virus pertama yang menginfeksi file Shockwave Flash (.SWF).&quot;&gt;In 2002, the LFM-926, was born the first virus that infects Shockwave Flash file (. SWF). &lt;/span&gt;&lt;span title=&quot;Menampilkan pesan saat file tersebut jalankan: &amp;quot;Loading.Flash.Movie..”&quot;&gt;Displays a message when the file is run: &quot;Loading.Flash.Movie ..&quot; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 2003, Worm Blaster mengexploitasi kelemahan RPC DCOM pada windows.&quot;&gt;In 2003, the Blaster worm exploit weaknesses in the Windows RPC DCOM. &lt;/span&gt;&lt;span title=&quot;Kembali dunia menghadapi serangan besar-besaran.&quot;&gt;Return the world faces a massive attack. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sobig-F dicatat sebagai virus yang paling sukses menyebar.&quot;&gt;Sobig-F was recorded as the most successful virus spread. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Mei 2004, jaringan internet dunia dikacaukan oleh worm SASSER.&quot;&gt;May 2004, the world&#39;s Internet networks disrupted by the Sasser worm. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 2005-2007 varian-varian baru Bagle menyebarluas, namun kemudian meredup karena pembuatnya tertangkap.&quot;&gt;In 2005-2007 of new Bagle variants widespread, but then faded as the author caught. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Penyebaran NETSKY juga mengalami peningkatan sesaat dan hanya lahir sedikit varian-varian baru.&quot;&gt;The spread of Netsky also increased slightly for a moment and just birth of new variants. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di tahun-tahun ini tidak begitu banyak Virus &amp;amp; Worm baru yang cukup menggemparkan di kalangan dunia seperti para pendahulunya kecuali serangan-serangan virus lokal.&quot;&gt;In  the years is not so much new Virus &amp;amp; Worm quite appalling in the  world like their predecessors except local virus attacks. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tahun 2005 ini tampaknya para Underground Programmer dunia memfokuskan diri pada SPYWARE.&quot;&gt;In 2005 it seems the Underground Programmer world focusing on SPYWARE. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jenis-Jenis Virus Komputer : Berdasarkan tehnik pembuatannya, virus dikelompokkan menjadi 3 :1.&quot;&gt;Types of Computer Viruses: Based on the techniques of manufacture, viruses are grouped into 3: 1. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus yang ditulis dengan CompilerJenis virus inilah yang pertamakali muncul dan hingga kini terus berkembang.&quot;&gt;Viruses are written by CompilerJenis this virus first appears and until now continues to grow. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus ini merupakan virus executable yang dapat langsung dijalankan karena mengalami proses kompilasi.2.&quot;&gt;This virus is the virus executable that can be directly implemented because the experience kompilasi.2 process. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus Makrovirus Macro adalah virus yang memanfaatkan fasilitas pemrograman modular pada suatu program aplikasi tertentu.&quot;&gt;Makrovirus Macro Virus is a virus that utilizes modular programming facilities in a particular application program. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tujuan dari fasilitas pemrograman modular ini adalah untuk memberikan suatu kemudahan serta membuat jalan pintas bagi aplikasi tersebut.&quot;&gt;The goal of modular programming facilities is to provide convenience and create a shortcut for the application. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Misalnya saja yang terdapat pada Microsoft Word, Excel, Power Point dan lain sebagainya.3.&quot;&gt;For example, included in Microsoft Word, Excel, Power Point and other sebagainya.3. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus ScriptAwalnya lebih dikenal dengan virus batch karena dulu terdapat pada file batch yang ada pada DOS.&quot;&gt;Virus ScriptAwalnya better known because the first batch viruses contained in the existing batch files in DOS. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Namun sekarang hal ini telah berganti menjadi script karena bahasa yang dipergunakan mulai beragam.&quot;&gt;But now this has changed the script because the language used began to vary. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus jenis ini biasanya menumpang pada file-file HTML dan dibuat dengan menggunakan fasilitas script seperti Javascript dan Vbscript.&quot;&gt;This type of virus usually stay in the HTML files and scripts created by using facilities such as JavaScript and VBScript. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ada juga yang dikode dengan menggunakan PHP.Sedangkan berdasarkan perilakunya, secara umum virus dikelompokkan kembali menjadi:1.&quot;&gt;There also are encoded by using PHP.Sedangkan based on its behavior, in general viruses were regrouped into: 1. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Virus Boot SectorVirus jenis ini akan memindahkan atau menggantikan boot sector asli dengan program booting virus sehingga saat terjadi booting maka virus akan di load kememori dan selanjutnya virus akan mempunyai kemampuan mengendalikan hardware standar seperti monitor, prontaer dan lain sebagainya.&quot;&gt;Boot  Virus SectorVirus this kind would move or replace the original boot  sector with boot virus program so that when there is booting the virus  will be loaded kememori and then the virus will have the ability to  control the standard hardware such as monitors, prontaer and so forth. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dari memori ini pula virus akan menyebar keseluruh drive yang ada dan terhubung kekomputer (ex: floopy, drive lain selain c:).2.&quot;&gt;From  this memory is also the virus will spread throughout the existing drive  and connect kekomputer (ex: floppy, drive other than c:) .2. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Stealth VirusVirus ini akan menguasai tabel tabel interupt pada DOS yang sering kita kenal dengan &amp;quot;Interrupt interceptor&amp;quot;.3.Polymorphic VirusVirus ini Dirancang buat mengecoh program antivirus,artinya virus ini selalu berusaha agar tidak dikenali oleh antivirus dengan cara selalu merubah rubah strukturnya setiap kali selesai&quot;&gt;Stealth  VirusVirus will be master table in DOS interrupt table that often we  are familiar with &quot;Interrupt interceptor&quot; .3. Polymorphic this  VirusVirus Designed for misleading antivirus program, meaning the virus  is always trying to avoid being recognized by antivirus in a way always  changing after every change its structure &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;menginfeksi file/program lain.4.Virus FileVirus ini menginfeksi file file yang dapat dieksekusi langsung dari sistem operasi, baik itu file application (*.EXE),maupun *.COM biasanya juga hasil infeksi dari virus ini dapat diketahui dengan berubahnya ukuran file yang&quot;&gt;infected  files / programs lain.4.Virus FileVirus infects an executable file  directly from the operating system, whether the application  configuration file (*. EXE), or *. COM usually also result from  infection with this virus can be identified by changing the file size &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;diserangnya.5.Multi Partition Virus (Virus Hybrid)Virus ini merupakan gabungan dari Virus Boot sector dan Virus file: artinya pekerjaan yang dilakukan berakibat dua, yaitu dia dapat menginfeksi file file *.EXE dan juga menginfeksi Boot Sector.Syarat-syarat Kemampuan Yang&quot;&gt;Partition  diserangnya.5.Multi Virus (Hybrid Virus) This virus is a combination of  boot sector viruses and file viruses: it means the work performed  resulted in two, that he can infect files *. EXE file and also infects  the boot Sector.Syarat Ability Yang-requisites &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Harus Dimiliki Virus Komputer :Suatu aplikasi dikatakan sebagai Virus Komputer apabila telah memiliki 5 kemampuan dasar berikut:1.&quot;&gt;Must be Held Computer Virus: A virus is said to be a computer application when it has 5 basic capabilities: 1. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemampuan mendapatkan informasi2.&quot;&gt;The ability to get informasi2. &lt;/span&gt;&lt;span title=&quot;Kemampuan memeriksa suatu program3.&quot;&gt;The ability to check a program3. &lt;/span&gt;&lt;span title=&quot;Kemampuan menggandakan diri dan menulari file lain4.&quot;&gt;The ability to reproduce and infect files lain4. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemampuan melakukan manipulasi5.&quot;&gt;The ability to do manipulasi5. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemampuan untuk menyembunyikan diriAdapun kemampuan tambahan yang biasa dimiliki oleh virus dan worm ialah:6.&quot;&gt;The ability to hide the usual diriAdapun additional capabilities possessed by viruses and worms are: 6. &lt;/span&gt;&lt;span title=&quot;Kemampuan untuk mengexploitasi suatu kelemahan pada system7.&quot;&gt;The ability to exploit a weakness in system7. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemampuan untuk mempertahankan diri dari aplikasi-aplikasi pembasmi virus &amp;amp; worm.&quot;&gt;The ability to defend itself from the applications exterminator viruses &amp;amp; worms. &lt;/span&gt;&lt;span title=&quot;Sasaran serangan virus :&quot;&gt;Target virus attack: &lt;/span&gt;&lt;span title=&quot;Registry&quot;&gt;Registry &lt;/span&gt;&lt;span title=&quot;System configuration utility&quot;&gt;System configuration utility &lt;/span&gt;&lt;span title=&quot;Autoexec.bat dan win.ini&quot;&gt;Autoexec.bat and win.ini &lt;/span&gt;&lt;span title=&quot;Task manager&quot;&gt;Task manager &lt;/span&gt;&lt;span title=&quot;Special directory&quot;&gt;Special directory &lt;/span&gt;&lt;span title=&quot;Kloning dan icon&quot;&gt;Cloning and icon &lt;/span&gt;&lt;span title=&quot;Media penyebaran&quot;&gt;Media distribution &lt;/span&gt;&lt;span title=&quot;System restore&quot;&gt;System restore &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;AntivirusRegistry5 kunci utama pada registryHKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERHKEY_CURRENT_CONFIGSystem Configuration UtilityDari MSCONFIG user biasa memeriksa file/aplikasi apa saja yang dijalankan otomatis ketika windows startup.Dari MSCONFIG user bisa menghapus daftar aplikasi yang tidak diinginkan.Dari sini pula user bisa dengan leluasa mengedit isi file win.ini, autoexec.&quot;&gt;AntivirusRegistry5  key on  registryHKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERHKEY_CURRENT_CONFIGSystem  Configuration MSCONFIG UtilityDari regular user checks the files /  applications are run automatically when windows startup.Dari MSCONFIG  users can delete the list of applications that are not here well  diinginkan.Dari users can freely edit the contents of win.ini files,  autoexec. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;bat, system.ini dan config.sys.File Autoexec.bat dan win.inidengan sedikit memanipulasi isi kedua file tersebut, Virus bisa otomatis berjalan ketika windows booting.&quot;&gt;bat,  system.ini and autoexec.bat and win.inidengan config.sys.File slightly  manipulate the contents of two files, viruses can be automatically run  when Windows boots. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kedua file diatas akan di proses ketika startup.File Win.ini terletak di directory Windowsberisi beberapa konfigurasi yang mengatur OS, bisa menjalankan file tertentu secara otomatis dengan memodifikasi isi file win.ini.Task ManagerTask Manager akan menampilkan aplikasi apa saja yang sedang berjalan baik yang&quot;&gt;The  two files above will be processed when startup.File Win.ini is located  in the directory Windowsberisi several configurations that set the OS,  can run certain files automatically by modifying the contents of the  file win.ini.Task ManagerTask Manager displays any application that is  running either &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;secara background atau tidak.Melalui Task Manager kita bisa menghentikan &amp;quot;secara paksa&amp;quot; program yang tidak kita inginkan.Metodanya sendiri bermacam-macam.&quot;&gt;tidak.Melalui  the background or we can stop the Task Manager &quot;by force&quot; program that  is not our own inginkan.Metodanya manifold. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ada yang otomatis mematikan fungsi mouse ketika Task Manager tebuka, ada pula yang langsung melakukan shutdown atau restart.Special DirectoryAda 2 directory special yang sudah menjadi &amp;quot;langganan&amp;quot; worm dan Virus yaitu directory windows dan directory system.Kedua directory ini memiliki keunikan tersendiri karena kemudahan pengesetan&quot;&gt;There  is an automatic turn off the mouse when the Task Manager function  tebuka, there is also a direct shutdown or restart.Special DirectoryAda  two special directory that has become a &quot;subscription&quot; worms and viruses  are the windows directory and the directory system.Kedua this directory  is unique because of ease of setting &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;variabel ketika kita menulis kode program.Kloning dan IconSebelum Anda membuka dokumen apapun, pastikan dengan benar bahwa icon yang digunakan SESUAI sengan ekstensi file yang seharusnya.&quot;&gt;variables  when we write code and IconSebelum program.Kloning you open any  document, be sure to correct that with a bunch of icons used COMPATIBLE  file extension should be. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Banyak user yang lalai akan hal ini.Biasakan untuk melihat properties file terlebih dahulu sebelum membukanya.Media Penyebaran Virus :&quot;&gt;Many users are lax about ini.Biasakan to view the properties file first before membukanya.Media Spread of Virus: &lt;/span&gt;&lt;span title=&quot;Disket dan Flashdisk&quot;&gt;Floppy and flash &lt;/span&gt;&lt;span title=&quot;Email&quot;&gt;Email &lt;/span&gt;&lt;span title=&quot;Irc&quot;&gt;Irc &lt;/span&gt;&lt;span title=&quot;WebsiteAntivirus :Virus biasanya terprogram untuk bisa mendeteksi Application Title dari program yang sedang berjalan.&quot;&gt;WebsiteAntivirus: Viruses are usually programmed to be able to detect the Application Title of the program is running. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Biasanya ketika menemukan Application title yang tidak diinginkan seperti mengandung kata ”Kill”, &amp;quot;Antivirus&amp;quot; , &amp;quot;Removal&amp;quot; , &amp;quot;Anti&amp;quot; , &amp;quot;Regsitry Editor&amp;quot; , &amp;quot;Untility&amp;quot; , &amp;quot;Basmi&amp;quot;, &amp;quot;Prompt&amp;quot; maka virus akan menghentikan proses program tersebut&quot;&gt;Usually  when you find the Application such unwanted title contains the word  &quot;Kill&quot;, &quot;Antivirus,&quot; &quot;Removal,&quot; &quot;Anti&quot;, &quot;Regsitry Editor&quot;, &quot;Untility&quot;,  &quot;Exterminate&quot;, &quot;Prompt&quot; then the virus will stop the program &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;.TOP 10 Besar Virus ( Maret 2008 ) :10.&quot;&gt;. Top 10 Big Virus (March 2008): 10. &lt;/span&gt;&lt;span title=&quot;starGate9.&quot;&gt;starGate9. &lt;/span&gt;&lt;span title=&quot;Tati8.&quot;&gt;Tati8. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;SlowButSure7.&quot;&gt;SlowButSure7. &lt;/span&gt;&lt;span title=&quot;TQ.vbs6.&quot;&gt;TQ.vbs6. &lt;/span&gt;&lt;span title=&quot;SangPerawan5.&quot;&gt;SangPerawan5. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Discusx.vbs4.&quot;&gt;Discusx.vbs4. &lt;/span&gt;&lt;span title=&quot;Pray3.&quot;&gt;Pray3. &lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/virus.html</link><author>noreply@blogger.com (Asep Rojali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNo3uxX9rNCsGbpIfkf2yHNV6DSetFaG2kOVJ7qcmTskLpm3QwkmkPPmb1ymFORlWXvN-FYBJA_nWlWKBQG-89Y4oWb3ocIWpUaw6vbIkz9c0YggYlRI_TXU9DpBRarqtGlq8Bp-uvhF8E/s72-c/8.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-8609786810421934321</guid><pubDate>Thu, 10 Mar 2011 13:06:00 +0000</pubDate><atom:updated>2011-03-10T00:48:09.908+07:00</atom:updated><title>20 Most Important Chips (Article from 1995)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7kypq2WfWXWjlEb7deYRchhAHePGR7r1CJlysgbuEUEyZhoS08I5nq-XqxfHqc_Gvmx3n7D4ljSWuAFGQtMJJpXEJU5U6BkQSPkMXbNTmvc4BzMioW5vr0pHgCe3EMoLolmMNKl10zFg/s1600/9.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7kypq2WfWXWjlEb7deYRchhAHePGR7r1CJlysgbuEUEyZhoS08I5nq-XqxfHqc_Gvmx3n7D4ljSWuAFGQtMJJpXEJU5U6BkQSPkMXbNTmvc4BzMioW5vr0pHgCe3EMoLolmMNKl10zFg/s400/9.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;m:smallfrac m:val=&quot;off&quot;&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin m:val=&quot;0&quot;&gt;    &lt;m:rmargin m:val=&quot;0&quot;&gt;    &lt;m:defjc m:val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent m:val=&quot;1440&quot;&gt;    &lt;m:intlim m:val=&quot;subSup&quot;&gt;    &lt;m:narylim m:val=&quot;undOvr&quot;&gt;   &lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;br /&gt;
&lt;h2 style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: black; font-size: large;&quot;&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;All the&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;chips&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;list&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Some&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Obscure&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;as&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;acres&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Had&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;significant&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;influence&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;evolution&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;of&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;personal&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;computing&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;All the&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;chips&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;list&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;it is unclear&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;as&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;there&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;are&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;have a significant influence&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;the evolution of&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;personal computing&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;So&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;what&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;does&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;it&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;take&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;make&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;computer&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;today&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;?&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;So,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;what is&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;needed to&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;make&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;the computer&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;today&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;?&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Mostly&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;it&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Seems&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;acronyms&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;CPU&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Some&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;of RAM&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;handful&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;of&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;EPROMs&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;DSP&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;PCI&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;bus&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;Most&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;apparently&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;an acronym&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;the CPU&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;some&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;RAM&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a handful of&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;EPROMs&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;DSP&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;PCI&lt;/span&gt; &lt;span class=&quot;hps&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;bus&lt;/span&gt;&lt;span class=&quot;&quot; title=&quot;Klik untuk terjemahan alternatif&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 13.5pt;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Then it bought back the rights for $60,000.&quot;&gt;&lt;b&gt;Intel 1103 Intel 1103 &lt;/b&gt;&lt;br /&gt;
In 1970, Intel created the 1103 - the first-Generally available DRAM chips. In 1970, Intel created the 1103 - the first generally available DRAM chip. By 1972, it was the best-selling semiconductor memory chip in the world. In 1972, it was the best-selling semiconductor memory chip in the world. Today, Would you need More Than 65.000 of Them to put 8 MB of memory into a PC. Today, you will need more than 65,000 of them to put the 8 MB of memory to a PC. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Then it bought back the rights for $60,000.&quot;&gt;&lt;b&gt;Intel 1702 Intel 1702 &lt;/b&gt;&lt;br /&gt;
In another brilliant stroke of naming, Intel created this, the first EPROM, in 1971. In another brilliant stroke of naming, Intel created this, the first EPROM, in 1971. When you say &quot;firmware,&quot; smile and think of the 1702. When you say &quot;firmware,&quot; smiling and thinking about 1702. &lt;br /&gt;
Intel 4004 Intel 4004 &lt;br /&gt;
In 1971, Busicom, a Japanese company, wanted a chip for a new calculator. With incredible o verkill, Intel built the world&#39;s first general-purpose microprocessor. In 1971, Busicom, a Japanese company, wanted a new calculator chip. With verkill o extraordinary, Intel built the world&#39;s first general-purpose microprocessors. Then it back Bought the rights for $ 60,000. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Maka hak membeli kembali sebesar $ 60.000.&quot;&gt;So the right to buy back for $ 60,000. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The 4-bit 4.004 berlari pada 108 kHz dan berisi 2300 transistor.&quot;&gt;The 4-bit 4004 ran at 108 kHz and contained 2300 transistors. The 4-bit 4004 ran at 108 kHz and contained 2300 transistors. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Lajunya diperkirakan mencapai 0,06 MIPS.&quot;&gt;Its speed is estimated at 0:06 MIPS. Its speed is estimated at 0.06 MIPS. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Sebagai perbandingan, mikroprosesor Intel terbaru, yang P6, berjalan pada 133 MHz, mengandung 5,5 juta transistor, dan menjalankan 300 MIPS.&quot;&gt;By comparison, Intel&#39;s latest microprocessor, the P6, runs at 133 MHz, contains 5.5 million transistors, and executes 300 MIPS. In comparison, Intel&#39;s latest microprocessor, the P6, running at 133 MHz, contains 5.5 million transistors, and run 300 MIPS. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Intel 8080 Intel 8080&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Intel 8080 Intel 8080&quot;&gt;&lt;b&gt;Intel 8080 Intel 8080 &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;If you drive, your life probably depends on this chip.&quot;&gt;If you drive, your life probably Depends on this chip. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;It found its way a year later into the world&#39;s first personal computer: the MITS Altair.&quot;&gt;If you drive, your life may depend on these chips. Introduced in April 1974, the 8080 was first widely Used as a traffic-light controller. It found its way a year later into the world&#39;s first personal computer: the MITS Altair. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Diperkenalkan pada bulan April 1974, 8080 pertama kali digunakan secara luas sebagai pengontrol lampu lalu lintas.&quot;&gt;Introduced in April 1974, 8080 first used extensively as a controller of traffic lights. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;MOS Technology 6502 MOS Technology 6.502&quot;&gt;It found its way a year later to the world&#39;s first personal computer: the MITS Altair. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;MOS Technology 6502 MOS Technology 6.502&quot;&gt;&lt;b&gt;MOS Technology 6502 MOS Technology 6502 &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;What do a Nintendo set and a BMW have in common?&quot;&gt;What do a Nintendo set and a BMW have in common? &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The 6.502.&quot;&gt;What do the Nintendo set and a BMW have in common? The 6502. The 6502. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Pada $ 25 (dibandingkan dengan US $ 375 untuk yang sebanding Motorola bagian), yang 6.502 itu seperti mencuri uang yang berbakat tapi miskin bocah genius dari Silicon Valley, Steve Wozniak, memilihnya untuk komputer pribadi baru, Apple I.&quot;&gt;At  $ 25 (compared with $ 375 for a comparable Motorola part), the 6502 was  Such a steal That a talented but cash-poor whiz kid from Silicon  Valley, Steve Wozniak, chose it for his new personal computer, the Apple  I. At  $ 25 (compared with U.S. $ 375 for a comparable Motorola section), the  6502 is like stealing money that talented but poor boy genius from  Silicon Valley, Steve Wozniak, select it for a new personal computer,  the Apple I. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Zilog Z80 Zilog Z80&quot;&gt;Zilog Z80 Zilog Z80 &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Remember Tandy&#39;s TRS-80 Model I?&quot;&gt;Remember Tandy&#39;s TRS-80 Model I? &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Pada bulan Juni 1978, debut 8.086.&quot;&gt;Remember Tandy&#39;s TRS-80 Model I? Remember CP / M? Remember CP / M? They were the resource persons both built on the Z80. They are both built on the Z80. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Pada bulan Juni 1978, debut 8.086.&quot;&gt;&lt;b&gt;Intel 8088 Intel 8086 and 8086 and 8088&lt;/b&gt; &lt;br /&gt;
Enter the King. Enter King. In June 1978, the 8086 debuted. In June 1978, debut 8086. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Today it stands for the world&#39;s most popular microprocessor standard: the x86 architecture.&quot;&gt;Today it stands for the world&#39;s most popular microprocessor standard: the x86 architecture. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;A year later, Intel introduced a slight variation, the 8088, that could use 8-bit components, enabling the manufacture of inexpensive systems.&quot;&gt;A  year later, Intel introduced a slight variation, the 8088, That Could  use 8-bit components, enabling the manufacture of Inexpensive systems. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;For that reason, IBM chose the 8088 over the 8086 for the original IBM PC, even though the 8088 was slower.&quot;&gt;For that reason, IBM chose the 8088 over the 8086 for the original IBM PC, even though the 8088 was slower. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Hari ini berarti di dunia mikroprosesor paling populer standar: arsitektur x86.&quot;&gt;Today is the world&#39;s most popular microprocessor standard: x86 architecture. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Setahun kemudian, Intel memperkenalkan sedikit variasi, pada 8088, yang bisa menggunakan 8-bit komponen, memungkinkan pembuatan sistem murah.&quot;&gt;A  year later, Intel introduced a slight variation, in 8088, which can use  8-bit components, enabling the manufacture of low-cost system. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The 386 heralded the beginning of a new age--the age of multitasking.&quot;&gt;Therefore, IBM chose 8088 over 8086 for the original IBM PC, despite a slower 8088. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The 386 heralded the beginning of a new age--the age of multitasking.&quot;&gt;&lt;b&gt;Intel 386DX Intel 386DX&lt;/b&gt; &lt;br /&gt;
The 386 heralded the beginning of a new age - the age of multitasking. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Introduced in October 1985, the 386 was the first &amp;quot;modern&amp;quot; x86 processor that was capable of running today&#39;s multitasking OSes, GUIs, and 32-bit software.&quot;&gt;Introduced  in October 1985, the 386th was the first &quot;modern&quot; That was the x86  processor capable of running today&#39;s multitasking OSes, GUIs, and 32-bit  software. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;386 menandakan awal sebuah era baru - usia multitasking.&quot;&gt;386 marks the beginning of a new era - the age of multitasking. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Diperkenalkan pada bulan Oktober 1985, 386 adalah orang pertama yang &amp;quot;modern&amp;quot; prosesor x86 yang mampu menjalankan OS multitasking saat ini, GUI, dan 32-bit software.&quot;&gt;Introduced  in October 1985, the 386th was the first &quot;modern&quot; x86 processor capable  of running current OS multitasking, GUI, and 32-bit software. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;The 386 introduced an enhanced microarchitecture while maintaining full backward compatibility with x86 processors Earlier. 386 introduced an enhanced microarchitecture while maintaining full compatibility with earlier x86 processors. This  was accomplished with two memory-addressing modes: real mode, the which  mi rrored the way memory is addressed by the older x86s, and a new  protected mode That shop full advantage of the 386&#39;s 32-bit  enhancements. This  is done with two memory-addressing modes: real mode, which mi rrored  way memory is addressed by older x86s, and the new protected mode that  take full advantage of 386&#39;s 32-bit extra. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Intel Pentium Intel Pentium&lt;/b&gt; &lt;br /&gt;
The Pentium swept through the PC industry faster Than any of Intel&#39;s previous chips. Pentium PC industry sweep faster than previous Intel chips. Although  Intel&#39;s 486DX (April 1989) an integrated FPU and was much faster Than  the 386, it was the Pentium That introduced the next leap forward in the  x86 microarchitecture: superscalar pipelines. Skeptics said a CISC architecture couldn&#39;t do it. Although  Intel 486DX (April 1989) that integrates an FPU and a lot faster than  the 386, it is a Pentium that introduces the next leap in x86  micro-architectures: superscalar pipeline. Skeptics &quot;said a CISC architecture can not do it. The Pentium proved Otherwise. Pentium prove otherwise. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;AMD AMD 386DX 386DX&lt;/b&gt; &lt;br /&gt;
Let the price wars begin. Let the price wars begin. When  Intel&#39;s original 16-MHz 386 was introduced in 1985, it cost $ 299; More  Than Five years later, it was still Commanding the Relatively high  price of $ 171, and the 33-MHz version Fetched $ 214. AMD&#39;s 386DX/40 appeared in March 1991 at $ 281, but Within a year its price plunged 50 percent to $ 140. When  the original Intel 386 MHz 16-introduced in 1985, cost $ 299, more than  five years later, still relatively high commander of the price of $  171, and 33-MHz versions fetch $ 214. AMD 386DX/40 appeared in March 1991 at $ 281, but within one year price fell 50 percent to $ 140. Street prices of PCs, the which follow-chip prices, fell by as much as $ 1000. Street price of a PC, who follow the price of chips, fell as much as $ 1000. The market for Windows-capable PCs expand ed by 33 percent. The market for Windows-capable PC ed expand by 33 percent. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Motorola 68000 Motorola 68000&lt;/b&gt; &lt;br /&gt;
More than any other, this is the microprocessor That helped establish the GUI. More than the others, this is the microprocessor that helps build the GUI. In  1983, four years after its introduction, it appeared in Apple&#39;s Lisa, a  unique computer but a commercial flop Nevertheless That paved the way  for the Macintosh in 1984. In  1983, four years after the introduction, it appears in the Apple Lisa, a  unique computer but a commercial failure remains open the way for the  Macintosh in 1984. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Mips mips R2000 R2000 &lt;/b&gt;The R2000, introduced in 1986, was a 32-bit CPU with 110 000 transistors. It powered the first generation of RISC workstations and servers. The R2000, introduced in 1986, is a 32-bit CPU with 110 000 transistors. It powered the first generation of RISC workstations and servers. The original version, clocked at 8 MHz, Executed about 5 MIPS and Had a separate FPU. The original version, clocked at 8 MHz, was executed about 5 MIPS and has a separate FPU. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Sun Microsystems Sun Microsystems SPARC SPARC &lt;/b&gt;In July 1987, Sun Announced an open-RISC architecture. In July 1987, Sun announced an open-RISC architecture. The  idea was to encourage multiple sourcing and Lively Competition That  Would spur performance, the SPARC standard and spread far and wide. The  idea is to encourage a variety of sources and live performance that  will spur competition and the standard SPARC spread far and wide. Eight years later, SPARC workstations and servers dominate Their markets. Eight years later, SPARC workstations and servers dominate their markets. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;IBM / Motorola PowerPC 601 IBM / Motorola PowerPC 601 &lt;/b&gt;Although  Few doubted the power of the Po werPC architecture, many thought the  politics of the IBM / Motorola / Apple relationship was going to be  unmanageable. Although  few doubt the power of architecture werPC Po, a lot of political  thought IBM / Motorola / Apple relationship will be arranged. &lt;br /&gt;
In Less than two years, it has spawned the world&#39;s most popular RISC platforms: the Power Macintosh. In less than two years, she has given birth to the world&#39;s most popular RISC platforms: Power Macintosh. &lt;br /&gt;
Chips &amp;amp; Technologies AT Chip Set Chips &amp;amp; Technologies AT Chip Set &lt;br /&gt;
IBM is not known for its approach to open systems. IBM is not known for its open systems approach. So, while it was actively Resisting the cloning of its PC architecture, C &amp;amp; T was introducing its AT Chip Set. So, while it is actively opposed the cloning of PC architecture, C &amp;amp; T introduced the AT Chip Set. With only five chips, C &amp;amp; T duplicated the core logic of about 100 chips in IBM&#39;s systems. With only five chips, C &amp;amp; T doubled from about 100 core logic chip in the IBM system. All a clone maker Had to do was add a 286, a Phoenix BIOS ROM, and Some memory to create a PC. All clone makers just need to add 286, Phoenix BIOS ROM, and some memory to create a PC. Take that, Big Blue. Take that, Big Blue. &lt;br /&gt;
Amiga Agnes / Denise / Paula Amiga Agnes / Denise / Paula &lt;br /&gt;
It&#39;s  not a rock group: This was the advanced chip set That powered the  world&#39;s first multimedia computer: The Commodore Amiga 1000. This  is not a rock group: This is an advanced chip set which powered the  world&#39;s first multimedia computer: Commodore Amiga 1000. In  1985, these three chips do tricks That Could today&#39;s PCs and Macs still  can not do - Such as display multiple screens with independent pixels  Resolutions and bit depths on a single monitor. In  1985, the three chip can perform tricks that today&#39;s PCs and Macs still  can not do - such as displaying some of the independent pixel screen  resolution and bit depth on a single monitor. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Commodore Commodore SID SID &lt;/b&gt;You can get remarkable results you Pls tell an engineer to do what he thinks is right. You can get incredible results when you tell an engineer to do what he thought was right. Take SID (Sound Interface Device), for example. Take the SID (Sound Interface Device), for example. In 1981, Bob Jannes toll was to design a low-cost sound chip for the upcoming Commodore 64. In 1981, Bob Jannes instructed to design a low-cost sound chip for the upcoming Commodore 64. Would he end up creating an analog synthesizer chip That redefined the concept of sound in personal computers. He eventually will create analog synthesizer chip that redefined the concept of sound in personal computers. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Yamaha OPL-2 Yamaha OPL-2 &lt;/b&gt;Tweet. Twitter. Beep, beep. Beep, beep. Name That Tune! Name that tune! The  original IBM PC&#39;s sound capabilities were the resource persons  Practically nonexistent - a simple beeper That Could Produce a limited  range of square-wave tones. The original IBM PC practically no sound capability - simple pager that can produce an unlimited range of square wave tones. Yamaha&#39;s  OPL-2 enabled vendors Such as Ad Lib and Creative Labs to Introduce a  plug-in sound boards with reasonable (but not great) sound. Yamaha  OPL-2 enabled vendors such as Ad Lib and Creative Labs to introduce a  plug-in sound boards with a reasonable (but not great) sound. Today, Nearly all PCs come with a sound board. Today, nearly all PCs come with sound board. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;S3 911 911 S3 &lt;/b&gt;Because  PCs Had Originally character-oriented displays, screen performance  drastically bogged down Pls running Microsoft Windows and graphical  applications. Because  the first PC-oriented display the characters, the performance  drastically screen freezes when running Microsoft Windows and graphical  applications. &lt;br /&gt;
IBM&#39;s  8514 chip and its spin-off s provided Some improvement, but the market  broke wide open in 1991 Pls S3 introduced the 911, the which integrated  GUI acceleration and VGA compatibility on a single chip. IBM  8514 chip and spin-off s provide some improvement, but the market broke  wide open in 1991 when S3 introduced the 911, an integrated GUI  compatibility and VGA acceleration on a single chip. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;PCI (Peripheral Component Interconnect) bus tambahan yang paling penting ke PC arsitektur sejak ISA bus, dan Merkurius adalah implementasi pertama.&quot;&gt;&lt;b&gt;Intel Intel Mercury Mercury &lt;/b&gt;The  PCI (Peripheral Component Interconnect) bus is the most Important  enhancements to the PC architecture since the ISA bus, and the Mercury  was the first implementation. PCI  (Peripheral Component Interconnect) bus of the most important addition  to the PC architecture since the ISA bus, and Mercury is the first  implementation. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Today even Apple has adopted PCI to replace the NuBus.&quot;&gt;Today even Apple has adopted to replace the NuBus PCI. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Top of Page Top of Page&quot;&gt;Even today, Apple has adopted to replace the NuBus PCI. &lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;b&gt;Top of Page &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Glossary of Microprocessor Architecture Terms Glossary of Microprocessor Arsitektur Persyaratan&quot;&gt;Microprocessor Architecture Glossary of Terms Glossary of Microprocessor Architecture Requirements &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Bus Unit : Bus Unit:&quot;&gt;Bus Unit: Bus Unit: &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Bus Unit adalah tempat di mana instruksi mengalir masuk dan keluar dari mikroprosesor dari memori utama komputer.&quot;&gt;The Bus Unit is the place Nowhere instructions flow in and out of the microprocessor from the computer&#39;s main memory. Bus Unit is the place where the instruction flow in and out of the microprocessor of the computer&#39;s main memory. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Instruction Cache : Instruksi Cache:&quot;&gt;&lt;b&gt;Instruction Cache: &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Akses cepat ini membuat pengolahan cepat sebagai instruksi yang &#39;mengambil&#39; ke Unit Prefetch di mana mereka ditempatkan dalam urutan yang tepat untuk diproses.&quot;&gt;The  Instruction Cache is a warehouse of instructions right on the chip, so  That the microprocessor does not have to stop and look in the computer&#39;s  main memory for instructions. Instruction  Cache is a repository of instructions right on the chip, the  microprocessor so it does not need to stop and look into the computer&#39;s  main memory for instructions. This  quick access makes processing fast as instructions are &#39;Fetched&#39; to the  Prefetch Unit Nowhere They are put in the proper order for processing. This  quick access makes processing faster as the instructions that &#39;take&#39; to  the Prefetch Unit where they are placed in the proper sequence for  processing. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Prefetch Unit : Prefetch Unit:&quot;&gt;&lt;b&gt;Prefetch Unit: &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Ketika petunjuk datang dalam tugas yang paling penting bagi Unit Prefetch untuk memastikan semua instruksi yang dibatasi dengan benar untuk mengirim berangkat ke Decode Unit.&quot;&gt;The  Prefetch Unit Pls decides to order the data and instructions from the  Instruction Cache or the computer&#39;s main memory based on commands or the  task at hand. A  unit for deciding when to prefetch data and instructions from the  instruction cache or main memory based computer commands or task at  hand. When  the instructions come in the most Important task for the Prefetch Unit  is to be sure all the instructions are lined up Correctly to send off to  the Decode Unit. When  the instructions come in the most important task for Prefetch Unit to  ensure all instructions are limited to the right to send off to Decode  Unit. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Decode Unit : Decode Unit:&quot;&gt;&lt;b&gt;Decode Unit: &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;This makes processing more efficient.&quot;&gt;The  Decode Unit That just does - it decodes or translates complex machine  language instructions into a simple format understood by the Arithmetic  Logic Unit (ALU) and the Registers. The  Decode Unit not only that - it decodes or translates complicated  machine language instructions into a format easily understood by the  Arithmetic Logic Unit (ALU) and Registers. This makes processing more efficient. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Control Unit : Control Unit:&quot;&gt;This makes processing more efficient.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot; style=&quot;color: black; font-family: inherit; font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Control Unit : Control Unit:&quot;&gt;&lt;b&gt;Control Unit:&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The Control Unit makes sure everything happens in the right place at the right time.&quot;&gt;The Control Unit is one of the most Important parts of the microprocessor Because it is in charge of the entire process. Based  on instructions from the Decode Unit, That it creates control signals  tell the Arithmetic Logic Unit (ALU) and the Registers how to operate,  what to operate on, and what to do with the result. Control Unit is one of the most important part of the microprocessor as responsible for the overall process. Based  on instructions from the Decode Unit, create control signals that tell  the Arithmetic Logic Unit (ALU) and Registers how to operate, what to  operate on, and what to do with the outcome. The Control Unit makes sure everything Happens in the right place at the right time. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The ALU is the last stage of processing in the chip.&quot;&gt;Control Unit to keep things going in the right place at the right time. &lt;br /&gt;
&lt;b&gt;Arithmetic Logic Unit (ALU): &lt;/b&gt;&lt;br /&gt;
The ALU is the last stage of processing in the chip. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The ALU is the smart part of the chip that performs commands like adding, subtracting, multiplying and dividing.&quot;&gt;The ALU is the smart part of the chip That performs commands like adding, subtracting, multiplying and dividing. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Yang cerdas ALU adalah bagian dari chip yang melakukan perintah seperti menambahkan, mengurangi, mengalikan dan membagi.&quot;&gt;The ALU is the final stage of processing within the chip. Intelligent ALU is part of the chip that perform commands like add, subtract, multiply and divide. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;It also knows how to read logic commands like OR, AND, or NOT.&quot;&gt;Also it knows how to read logic commands like OR, AND, or NOT. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Ini juga tahu cara membaca perintah logika seperti OR, AND, atau TIDAK.&quot;&gt;It also knows how to read logic commands like OR, AND, or NOT. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Messages from the Control Unit tell the ALU what it should do and then it takes data from its close companion, the Registers, to complete the task.&quot;&gt;Messages  from the Control Unit of the ALU tell what it Should do and then it  takes the data from its close companion, the Registers, to complete the  task. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;This is really where 2 finally gets added to 3 in our example.&quot;&gt;Messages  from the Control Unit ALU told what to do and then retrieve data from a  close friend, the Registers, to complete the task. This is really Nowhere 2 finally gets added to 3 in our example. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Ini benar-benar dimana 2 akhirnya akan ditambahkan ke 3 dalam contoh kita.&quot;&gt;This is really where the two finally will be added to the 3 in our example. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Registers : Register:&quot;&gt;Registers: Register: &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The Registers adalah mini-tempat penyimpanan data yang digunakan oleh Arithmetic Logic Unit (ALU) untuk menyelesaikan tugas-tugas Control Unit telah meminta.&quot;&gt;The  Registers are a mini-storage area for data Used by the Arithmetic Logic  Unit (ALU) to complete the tasks the Control Unit has requested. The  Registers are the mini-site data storage used by the Arithmetic Logic  Unit (ALU) to complete the tasks of the Control Unit has requested. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The data can come from the data cache, main memory or the control unit and are all stored at special locations within the Registers.&quot;&gt;The  data cans come from the data cache, main memory or the control unit and  are all stored at special locations Within the Registers. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;This makes retrieval for the ALU quick and efficient.&quot;&gt;This makes retrieval for the ALU quick and efficient. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Data Cache bekerja sangat erat dengan &amp;quot;mitra pemrosesan,&amp;quot; kata ALU &amp;amp; Registers, dan Decode Unit.&quot;&gt;Data  can be derived from the data cache, main memory or the control unit and  everything is stored in a special location in the Registers. This makes the search for fast and efficient ALU. &lt;br /&gt;
&lt;b&gt;Data Cache: &lt;/b&gt;&lt;br /&gt;
The Data Cache works very closely with the &quot;processing partners,&quot; the ALU &amp;amp; Registers, and the Decode Unit. Data Cache to work very closely with the &quot;processing partners,&quot; said ALU &amp;amp; Registers, and Decode Unit. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;This is where specially labeled data from the Decode Unit are stored for later use by the ALU and where final results are prepared for distribution to different parts of the computer.&quot;&gt;This  Is Nowhere specially labeled data from the Decode Unit are stored for  later use by the ALU and Nowhere final results are Prepared for  distribution to different parts of the computer. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;This is the big store house of data located within the main computer outside of the microprocessor.&quot;&gt;This  is a special place labeled data from the Decode Unit stored for later  use by the ALU and where the final result is ready to be distributed to  various parts of the computer. &lt;br /&gt;
&lt;b&gt;Main Memory:&amp;nbsp;&lt;/b&gt; &lt;br /&gt;
This is the big store house of data Within the main computer located outside of the microprocessor. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Ini adalah rumah toko besar data yang terletak di dalam komputer utama di luar mikroprosesor.&quot;&gt;This is a huge store house of data which lies on the main computer outside the microprocessor. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;At times the Main Memory may send in data or instructions for the Prefetch Unit, which often get stored at an address in the Instruction Cache to be used later.&quot;&gt;At  times the Main Memory May send in data or instructions for the Prefetch  Unit, Often the which get stored at an address in the Instruction Cache  to be Used later. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Pada kali Main Memory dapat mengirim data atau instruksi untuk Unit Prefetch, yang sering disimpan di sebuah alamat di Cache Instruksi untuk digunakan kemudian.&quot;&gt;At  times the Main Memory to send data or instructions to prefetch unit,  which is often stored in an address in the Cache Instructions for use  later. &lt;br /&gt;
&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Originally published in the September 1996 issue Aslinya diterbitkan dalam edisi September 1996&quot;&gt;Top of Page &lt;br /&gt;
WHAT EVER happened to ... WHAT EVER HAPPENED TO ... The TI 9900 CPU? The TI 9900 CPU? &lt;br /&gt;
&lt;br /&gt;
by Stan Veit by Stan Veit &lt;br /&gt;
Originally published in the September 1996 issue Originally published in the September 1996 edition &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Now that super chips are being produced by companies other than Intel Sekarang chip super sedang diproduksi oleh perusahaan lain selain Intel&quot;&gt;Now  That super chips are being produced by companies other super Than Intel  chips now being produced by companies other than Intel &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;and Motorola, I am reminded that the success of new processors can dan Motorola, aku mengingatkan bahwa kesuksesan prosesor baru dapat&quot;&gt;and  Motorola, I am reminded That the success of new cans and Motorola  processors, I was reminded that the success of the new processors can &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;rely on more than technological innovation.&quot;&gt;Rely on More Than technological innovation. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The silicon graveyards are Silikon kuburan adalah&quot;&gt;rely on more than technological innovation. The silicon graveyards acre cemetery is the Silicon &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;marketing or because the manufacturer misread the buying habits of the pemasaran atau karena produsen salah membaca kebiasaan membeli dari&quot;&gt;Filled  with technically superior CPUs That Because of the poor lost out filled  with technically superior CPU lost because of poor &lt;br /&gt;
Because  the manufacturer marketing or misread the buying habits of the  marketing or because manufacturers misread the buying habits of &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;huge boost because of the public&#39;s early adoption of the Altair/S-100 dorongan besar karena dari awal publik adopsi Altair/S-100&quot;&gt;public. public. &lt;br /&gt;
&lt;br /&gt;
In  the early days of the PC industry, the Intel 8080 family received a In  the early days of the PC industry, Intel receives 8080 family &lt;br /&gt;
Because  of the huge boost the public&#39;s early adoption of the Altair/S-100 huge  boost because of the public early adoption Altair/S-100 &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;series; Zilog&#39;s Z-80, which was compatible with the 8080 CPU, serial; Zilog&#39;s Z-80, yang kompatibel dengan CPU 8080,&quot;&gt;series; Zilog&#39;s Z-80, the which was compatible with the 8080 CPU, serial; Zilog&#39;s Z-80, which is compatible with the CPU 8080, &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;continued that success.&quot;&gt;That continued success. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;melanjutkan bahwa kesuksesan.&quot;&gt;continue that success. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;the widely popular South West Technical Products PC and many others.&quot;&gt;Similarly, Motorola&#39;s 6800 chips were the resource persons Used in. Similarly, the Motorola 6800 chip used in &lt;br /&gt;
The widely popular South West Technical Products PC and many others. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;A Different View A Different View&quot;&gt;a very popular South West Technical Products PC and many others. &lt;br /&gt;
&lt;br /&gt;
A Different View A Different View &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Texas Instruments (TI), the world&#39;s largest semiconductor Texas Instruments (TI), terbesar di dunia semikonduktor&quot;&gt;Texas Instruments (TI), the World&#39;s Largest semiconductor Texas Instruments (TI), the world&#39;s largest semiconductor &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;manufacturer, developed the TMS9900, a true 16-bit CPU that was quite produsen, mengembangkan TMS9900, yang benar 16-bit CPU yang cukup&quot;&gt;manufacturer,  developed the TMS9900, a true 16-bit CPU That was Quite a manufacturer,  developed the TMS9900, the true 16-bit CPU is enough &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;8-bit CPUs lacked.&quot;&gt;advanced  for its time, having capabilities That the Intel and Motorola advanced  for its time, has the ability of Intel and Motorola &lt;br /&gt;
8-bit CPUs lacked. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;8-bit CPU kekurangan.&quot;&gt;8-bit CPU shortage. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Unlike TI, chip makers Intel, Zilog, and Motorola Tidak seperti TI, pembuat chip Intel, Zilog, dan Motorola&quot;&gt;Unlike TI, the chip makers Intel, Zilog, and Motorola Unlike IT, chip maker Intel, Zilog, and Motorola &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;were not eager to become computer manufacturers.&quot;&gt;were the resource persons eager not changed from computer manufacturers. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;systems, but these were not designed or priced for public use.&quot;&gt;not eager to become a computer manufacturer. They made development They make development &lt;br /&gt;
systems, but these were the resource persons not Designed or price approach for public use. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;sistem, tetapi ini tidak dirancang atau harga untuk keperluan umum.&quot;&gt;system, but is not designed or prices for public use. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Most Sebagian besar&quot;&gt;Most Most &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;chip manufacturers did all they could to help computer makers improve produsen chip melakukan semua mereka bisa untuk membantu para pembuat komputer meningkatkan&quot;&gt;They  did all the chip manufacturers to help computer makers Could improv  chipmakers do all they can to help computer makers increase &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;luar.&quot;&gt;That  the systems utilized Their chips, but TI Gave little help to the system  that take advantage of their chips, but the IT provide little  assistance to &lt;br /&gt;
outsiders. outside. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;TMS9900 processor, but they were too expensive to attract developers TMS9900 prosesor, tapi mereka terlalu mahal untuk menarik pengembang&quot;&gt;TI  did develop the TI 990 / 4 and 990 / 5 minicomputers, the which Used  the TI did not develop the TI 990 / 4 and 990 / 5 minicomputers, which  uses &lt;br /&gt;
TMS9900  processor, but They were the resource persons too expensive to attract  developers TMS9900 processors, but they are too expensive to attract  developers &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;yang akan menulis perangkat lunak untuk prosesor.&quot;&gt;WHO Would write software for the processor. who will write software for the processor. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Although TI did little to Meskipun tidak banyak TI&quot;&gt;Although TI did little to Though not many IT &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;encourage second sources for the TMS9900, TI itself was a second mendorong sumber-sumber kedua untuk TMS9900, TI itu sendiri adalah kedua&quot;&gt;encourage second sources for the TMS9900, TI Itself was a second push both sources for the TMS9900, TI itself is the second &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;source for Intel, producing the TMS8080A, a version of the Intel 8080.&quot;&gt;source for Intel, producing the TMS8080A, a version of the Intel 8080. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;sumber Intel, memproduksi TMS8080A, sebuah versi dari Intel 8080.&quot;&gt;Intel source, producing TMS8080A, a version of the Intel 8080. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;In fact, much of TI&#39;s PC competition was powered by chips it had Bahkan, banyak dari PC TI kompetisi ini didukung oleh chip itu telah&quot;&gt;In  fact, much of TI&#39;s PC competition it was powered by chips Had In fact,  many IT competition from the PC is powered by chips that have been &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;As a corporation, TI had a different view of the PC market.&quot;&gt;manufactured. produced. &lt;br /&gt;
&lt;br /&gt;
As a corporation, TI Had a different view of the PC market. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Sebagai sebuah perusahaan, TI memiliki pandangan yang berbeda dari pasar PC.&quot;&gt;As a company, IT has a different view of the PC market. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;This machine would be filled Mesin ini akan dipenuhi&quot;&gt;It is &lt;br /&gt;
envisioned  a product That would be Used in the home, at school, and on to imagine a  product that will be used at home, at school, and on &lt;br /&gt;
the job, just as its Calculators were the resource persons. work, just as a calculator that. This machine would be filled this machine will be met &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;with TI chips, run TI software, and earn millions for the company.&quot;&gt;with TI chips, run IT software, and earn Millions for the company. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;dengan TI keripik, jalankan perangkat lunak TI, dan dapatkan jutaan bagi perusahaan.&quot;&gt;with TI chips, run the IT software, and earn millions for the company. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Since such a machine did not yet exist, TI had to design one--the Karena mesin semacam itu belum ada, TI telah merancang satu - yang&quot;&gt;Since  Such a machine did not yet exist, TI Had to design one - the kind of  machine because it does not exist, TI has designed one - which &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Texas Instruments 99 / 4.&quot;&gt;Texas Instruments 99 / 4. Texas Instruments 99 / 4. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;In the spring of 1979, I went to Boston to see the 99/4--I was hoping Pada musim semi tahun 1979, saya pergi ke Boston untuk melihat 99/4--I berharap&quot;&gt;In  the spring of 1979, I Went to Boston to see the 99/4--I was hoping In  the spring of 1979, I went to Boston to see 99/4--I hope &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;I also had thoughts Saya juga punya pikiran&quot;&gt;to sell it at my Computer Mart stores in New York. to sell it in my Computer Mart in New York. I Also Had thoughts I also have thoughts &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;of becoming a software developer for graphics-based games.&quot;&gt;of Becoming a software developer for graphics-based games. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Priced at Harga&quot;&gt;become a software developer for graphics based games. Priced at Price &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;$1,200, the 99/4 had highly polished metal parts, 16K of RAM, TI BASIC $ 1.200, yang 99 / 4 telah sangat mengilap bagian logam, 16K RAM, TI BASIC&quot;&gt;$  1.200, the 99 / 4 Had highly polished metal parts, 16K of RAM, TI BASIC  $ 1,200, a 99 / 4 has been highly polished metal parts, 16K RAM, BASIC  IT &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;dalam ROM, sebuah 13-inch monitor berwarna, dan keyboard tipis.&quot;&gt;in ROM, a 13-inch color monitor, and a thin keyboard. in ROM, a 13-inch color monitor, keyboard and thin. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;this prototype were of a style that came to be called &amp;quot;Chiclets,&amp;quot; and prototipe ini adalah satu gaya yang kemudian disebut &amp;quot;Chiclets,&amp;quot; dan&quot;&gt;The 40 keys on the keypad 40 &lt;br /&gt;
this  prototype were the resource persons of a style That Came to be called  &quot;Chiclets,&quot; and this prototype is a style that came to be called  &quot;Chiclets,&quot; and &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;The system also had a Sistem ini juga memiliki&quot;&gt;The monitor displayed 24 lines of 32 characters. monitor display 24 lines of 32 characters. The System Also Had a systems also have &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;built-in slot for plug-in, solid-state software modules, which did not built-in slot untuk plug-in, solid-state modul perangkat lunak, yang tidak&quot;&gt;built-in  slots for plug-ins, solid-state software modules, the which did not  built-in slots for plug-ins, solid-state software module, which is not &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;belum ada.&quot;&gt;yet exist. yet exist. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The plug-in program modules were to hold extra RAM to run Plug-in program modul RAM ekstra untuk terus menjalankan&quot;&gt;The  plug-in program modules were the resource persons to hold the extra RAM  to run the Plug-in module program to continue running the extra RAM &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;perangkat lunak.&quot;&gt;the software. software. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;Interestingly, the TI engineers had crippled its 16-bit CPU by running Menariknya, para insinyur TI telah melumpuhkan yang 16-bit CPU dengan menjalankan&quot;&gt;Interestingly,  the TI engineers Had crippled its 16-bit CPU by running Interestingly,  the IT engineer has paralyzed the 16-bit CPU to run &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;dalam sebuah 8-bit bus.&quot;&gt;it in a 8-bit bus. in an 8-bit bus. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;This permitted them to use fewer memory chips and Hal ini memungkinkan mereka untuk menggunakan chip memori lebih sedikit dan&quot;&gt;This Permitted Them to use fewer memory chips and This allows them to use fewer memory chips and &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;mengurangi biaya.&quot;&gt;reduce costs. reduce costs. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;the 8088 microprocessor rather than Intel&#39;s 16-bit 8086.&quot;&gt;Later, IBM followed the path Same with the IBM PC, using Then, IBM followed the same path with the IBM PC, using &lt;br /&gt;
The 8088 microprocessor rather Than Intel&#39;s 16-bit 8086. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;mikroprosesor 8088 daripada Intel 16-bit 8.086.&quot;&gt;8088 microprocessor than 16-bit Intel 8086. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;I liked the TI 99/4, but thought the price was a little steep.&quot;&gt;Back to the Drawing Board Back to the Drawing Board &lt;br /&gt;
&lt;br /&gt;
I liked the TI 99 / 4, but thought the price was a little STEEP. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Aku menyukai TI 99 / 4, tapi pikir harga agak curam.&quot;&gt;I liked the TI 99 / 4, but thought the price a bit steep. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;So did Begitu&quot;&gt;So did soon &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;seluruh dunia.&quot;&gt;The rest of the world. around the world. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;99 / 4 dan kembali ke meja gambar untuk menurunkan biaya.&quot;&gt;Shortly after it was released, recalled the IT Shortly after it was released, IT recalled &lt;br /&gt;
99 / 4 and Went back to the drawing board to bring down the costs. 99 / 4 and go back to the drawing board to reduce costs. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;it came with a real keyboard.&quot;&gt;The It &lt;br /&gt;
TI  99/4A required fewer new chips, due to large-scale integration, and new  IT 99/4A fewer chips required, because large-scale integration, and &lt;br /&gt;
it Came with a real keyboard. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;itu datang dengan keyboard yang nyata.&quot;&gt;It comes with a real keyboard. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;TI priced it without the monitor and Harga TI tanpa monitor dan&quot;&gt;IT price approach it without the monitor and the monitor and the price of IT without &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;provided plug-ins for expansion.&quot;&gt;provided plug-ins for expansion. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;By the time of the 99/4A&#39;s release, Pada saat dari 99/4A &#39;s release,&quot;&gt;provides plug-ins for expansion. By the time of the 99/4A &#39;s release, At the time of the 99/4A&#39; s release, &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;software developers to write for the new system.&quot;&gt;Some software for Had it appeared, and TI encouraged third-party software for some it has appeared, and encourage third-party IT &lt;br /&gt;
software developers to write for the new system. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;pengembang untuk menulis perangkat lunak untuk sistem yang baru.&quot;&gt;developers to write software for the new system. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;royalties TI demanded were discouraging; ultimately software TI menuntut royalti yang mengecilkan hati; akhirnya perangkat lunak&quot;&gt;However, the However, &lt;br /&gt;
IT royalties demanded discouraging were the resource persons; ultimately demand IT software royalties discouraging; end software &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;developers lost interest in the 99/4A.&quot;&gt;developers lost interest in the 99/4A. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The new machine was called the QI, Mesin baru disebut QI,&quot;&gt;developers lost interest in the 99/4A. &lt;br /&gt;
&lt;br /&gt;
In  late 1982, the IT re-engineered the motherboard to put most of the In  late 1982, the IT re-engineering the motherboard to put most &lt;br /&gt;
&quot;Glue&quot; chips into a single package. &quot;Glue&quot; chips into one package. The new machine was Called the QI, a new machine called QI, &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;for &amp;quot;Quality Improved.&amp;quot;&quot;&gt;for &quot;Improved Quality.&quot; &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;system that could compete with the Apple, Atari, and Commodore systems sistem yang dapat bersaing dengan Apple, Atari, dan Commodore sistem&quot;&gt;for &quot;Improving Quality.&quot; With a new and improved systems, IT Had a With a new and better system, TI has &lt;br /&gt;
System  That Could Compete with the Apple, Atari, and Commodore systems are  systems that can compete with Apple, Atari, and Commodore systems &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;hari.&quot;&gt;of the day. days. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;It also had a better product for a small but growing group Ini juga memiliki produk yang lebih baik bagi yang kecil tapi kelompok tumbuh&quot;&gt;It Also Had a better product for a small but growing group It also has a better product for the small but growing group &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;of devoted users.&quot;&gt;of Devoted users. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The 99/4 series users were among the most devoted The 99 / 4 para pengguna seri termasuk yang paling setia&quot;&gt;of loyal users. The 99 / 4 series were the resource users Among the most Devoted The 99 / 4 of the series users, including the most loyal &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;fans you could imagine.&quot;&gt;Could you imagine fans. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;penggemar Anda bisa bayangkan.&quot;&gt;fan you can imagine. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;But the company did little to support users, Tetapi perusahaan tidak banyak untuk mendukung pengguna,&quot;&gt;But the company did little to support users, but the company did little to support the user, &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;and except for Computer Shopper and a small magazine called 99er, the dan kecuali untuk Computer Shopper dan majalah kecil yang disebut 99er, yang&quot;&gt;and  except for Computer Shopper magazine and a small Called 99er, tea and  except for Computer Shopper and a small magazine called the 99er, which &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;computer press ignored the systems.&quot;&gt;press ignored the computer systems. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;a way to add a floppy drive to the 99/4.&quot;&gt;computer press ignored the system. &lt;br /&gt;
&lt;br /&gt;
When  all other manufacturers turned to the floppy disks to Expand Their When  all other producers turned to a floppy disk to develop &lt;br /&gt;
machines  &#39;usefulness, TI Came out with the expensive Expansion Box as machines&#39;  usefulness, TI came out with expensive Expansion Box as &lt;br /&gt;
a way to add a floppy drive to the 99 / 4. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;cara untuk menambahkan sebuah floppy drive 99 / 4.&quot;&gt;how to add a floppy drive, 99 / 4. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;of a thick aluminum plate, a heavy-duty design that was obviously dari plat aluminium tebal, berat-tugas desain yang jelas&quot;&gt;It was Designed like a piece is designed like a piece of &lt;br /&gt;
of  equipment meant to meet military specifications, the box was made  military equipment intended to meet specifications; box was made &lt;br /&gt;
of a thick aluminum plate, a heavy-duty design That was obviously from a thick aluminum plate, heavy-duty clear design &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;unnecessary for home computers.&quot;&gt;unnecessary for home computers. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;tidak perlu untuk komputer rumah.&quot;&gt;no need for a home computer. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Compare this with the Apple II, which Bandingkan dengan Apple II, yang&quot;&gt;Compare this with the Apple II, the which compare with the Apple II, which &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;understand the market and had to learn the hard way.&quot;&gt;needed only a small plug-in interface board connects to a floppy disk. only need a small plug-in interface board to connect the floppy disk. &lt;br /&gt;
Once again, IT Had to Provide a fix to the system Because it did not once again, IT must provide to fix the system because no &lt;br /&gt;
understand the market and Had to learn the hard way. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;memahami pasar dan harus belajar dengan cara yang sulit.&quot;&gt;understand the market and must learn the hard way. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;In January 1982, TI was poised to throw all its marketing efforts Pada bulan Januari 1982, TI sudah siap untuk membuang semua upaya pemasaran&quot;&gt;In January 1982, TI was poised to throw all its Marketing Efforts In January 1982, TI was ready to throw all marketing efforts &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;behind the TI 994/A.&quot;&gt;behind-the-IT 994 / A. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;meant more to the company than just another item in its huge line of lebih berarti perusahaan tidak hanya item lain dalam garis besar&quot;&gt;IT rear 994 / A. At the time, the success of TI&#39;s home computer at that time, the success of TI home computer &lt;br /&gt;
meant  more to the company Than just another item in its huge line of more  means the company is not just another item in the outline &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;It was counting on the TI 99/4A, and its Itu mengandalkan TI 99/4A, dan&quot;&gt;electronic equipment. electronic equipment. It was counting on the TI 99/4A, and its It relies on TI 99/4A, and &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;successors to be the major consumer of the company&#39;s own chips.&quot;&gt;successors to be the major consumer of the company&#39;s own chips. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;This Ini&quot;&gt;successor to be the main consumers of the company&#39;s own chips. This is &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;hadn&#39;t run into a stone wall--Jack Tramiel, the president of tidak lari ke dinding batu - Jack Tramiel, presiden&quot;&gt;was  TI&#39;s core business, and the strategy Would have succeeded if IT is IT&#39;s  core business, and strategy will be successful if the IT &lt;br /&gt;
hadn&#39;t run into a stone wall - Jack Tramiel, the president of not running into a stone wall - Jack Tramiel, president &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;Commodore.&quot;&gt;Commodore. Commodore. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;The troubles started with the introduction of the $300 Commodore Kesulitan dimulai dengan pengenalan $ 300 Commodore&quot;&gt;The troubles started with the introduction of the $ 300 Commodore The difficulty begins with the introduction of $ 300 Commodore &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;VIC-20.&quot;&gt;VIC-20. VIC-20. &lt;/span&gt;&lt;span style=&quot;background-color: white; font-weight: normal;&quot; title=&quot;99/4A, its introduction cut into the TI system&#39;s market share.&quot;&gt;Although  the VIC&#39;s capabilities were the resource persons below those of the IT  Despite the ability of VIC is below those of the IT &lt;br /&gt;
99/4A, cut its introduction into the IT system&#39;s market share. &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot; title=&quot;99/4A, para pengantar dipotong ke dalam sistem TI pangsa pasar.&quot;&gt;99/4A, the introduction of IT systems cut into market share. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;&lt;i style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt; &lt;/span&gt;&lt;/h2&gt;&lt;div id=&quot;divLookup&quot; style=&quot;-moz-border-radius: 3px 3px 3px 3px; background-color: #ffff77; color: black; left: 572px; padding: 3px; position: absolute; top: 450px; z-index: 999999999;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;data:image/gif,GIF89a%12%12%B3%FF%FF%FF%F7%F7%EF%CC%CC%CC%BD%BE%BD%99%99%99ZYZRUR%FE%01%02%21%F9%04%04%14%FF%2C%12%12%04X0%C8I%2B%1D8%EB%3D%E4%60%28%8A%85%17%0AG*%8C%40%19%7CJ%08%C4%B1%92%26z%C76%FE%02%07%C2%89v%F0%7Dz%C3b%C8u%14%82V5%23o%A7%13%19L%BCY-%25%7D%A6l%DF%D0%F5%C7%02%85%5B%D82%90%CBT%87%D8i7%88Y%A8%DB%EFx%8B%DE%12%01%3B&quot; /&gt;&lt;/div&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/20-most-important-chips-article-from.html</link><author>noreply@blogger.com (Asep Rojali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7kypq2WfWXWjlEb7deYRchhAHePGR7r1CJlysgbuEUEyZhoS08I5nq-XqxfHqc_Gvmx3n7D4ljSWuAFGQtMJJpXEJU5U6BkQSPkMXbNTmvc4BzMioW5vr0pHgCe3EMoLolmMNKl10zFg/s72-c/9.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-8673189947096479379</guid><pubDate>Thu, 10 Mar 2011 03:03:00 +0000</pubDate><atom:updated>2011-03-09T18:08:32.567+07:00</atom:updated><title>What is the algorithm?</title><description>&lt;m:smallfrac m:val=&quot;off&quot;&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin m:val=&quot;0&quot;&gt;    &lt;m:rmargin m:val=&quot;0&quot;&gt;    &lt;m:defjc m:val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent m:val=&quot;1440&quot;&gt;    &lt;m:intlim m:val=&quot;subSup&quot;&gt;    &lt;m:narylim m:val=&quot;undOvr&quot;&gt;   &lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTGx-1d19PKnIr5Zm1GWYfhFUc61ThwS7PrqpwkZA4SMnpxC9Pul0_ti2MQwqYw-2ddsW8owKbGEyh47O1C6lO4Mvrju0LwxRtILaOW8daA7awd3FQ9aFAJCfck7JMJfDDFu5662UPxDZN/s1600/images.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTGx-1d19PKnIr5Zm1GWYfhFUc61ThwS7PrqpwkZA4SMnpxC9Pul0_ti2MQwqYw-2ddsW8owKbGEyh47O1C6lO4Mvrju0LwxRtILaOW8daA7awd3FQ9aFAJCfck7JMJfDDFu5662UPxDZN/s400/images.jpeg&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3Lk-WhgWa0710D8gWObw_66Or1pev0HGEC34xG_mT2BZIxxg-bHf00P5NQTPqbku7uNZ9-vORi4D-MPDPc1XAkmtp7OujbopGqLYmIr4K7W9Cn07Po9HZB7Ixo2mAVcA-EnQc0jB370s/s1600/images.jpeg&quot;&gt;&lt;span style=&quot;color: blue; text-decoration: none;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Judging from the origin of the word he said algorithm itself has a strange history. People just find a word that means the process of calculating Algorism with arabic numbers. You say if you calculate Algorist use Arabic figures. Linguists attempt to discover the origin of this word but the results are less satisfactory. Finally, historians of mathematics found the origin of the word is derived from the Arabic name of the famous author, Abu Ja&#39;far Muhammad Ibn Musa Al-Khuwarizmi. &lt;/span&gt;Al-Khuwarizmi read people west into Algorism. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Al-Khuwarizmi write a book called The Book of Al Jabar Wal-Muqabala which means &quot;The book of restoration and reduction&quot; (The book of restoration and reduction). From the title of the book we also get the root word &quot;Algebra&quot; (Algebra). Change the word of the Algorithm Algorism Algorism arises because the word is often confused with Arithmetic, so the suffix became-sm-THM. &lt;/span&gt;Because the calculation with Arabic numerals have become commonplace. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Then gradually the word algorithm gradually used as a method of calculation (computing) in general, thus losing its original meaning of the word. In Indonesian, the word Algorithm is absorbed into algorithm. &lt;/span&gt;Algorithm Definition &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&quot;The algorithm is a sequence of logical steps solving problems systematically and logically arranged.&quot; Logical word is the key word in the algorithm. The steps in the algorithm must be logical and must be determined is false or true. The algorithm is the heart of Informatics The algorithm is the heart of computer science or informatics. Many branches of computer science terminology referenced in the algorithm. However, do not assume the algorithm is always synonymous with computer science course. In real life there are many processes haripun expressed in an algorithm. Ways to make a cake or a dish that is expressed in a recipe can also be referred to as algorithms. In every recipe there is always a sequence of step-lankah made cuisine. &lt;/span&gt;If the steps are not logical, can not produce the desired cuisine. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Mothers who try a recipe will read one by one the steps and then he did the process of making appropriate that he read. In general, the (object) who worked on the process called the processor (processor). Processing may take the form of human, computer, robot or other electronic equipment. Processors perform a process to carry out or &quot;execute&quot; an algorithm that outlines the process. Implement the algorithm means doing the steps in the algorithm. Processors working on the process in accordance with the algorithm given to him. The cook makes a cake based on a recipe given to him, the pianist played a song by musical notes board. &lt;/span&gt;Therefore, an algorithm must be expressed in a form that can be understood by the processor. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;So the processor must: &lt;/span&gt;1. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Understand each step in Algorithm &lt;/span&gt;2. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Doing operations corresponding to these steps. &lt;/span&gt;Writing Algorithms &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The algorithm can be written in several ways, namely: • In a natural language (Indonesian, English, and other human language) &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Example: Algorithm sending short messages (sms) &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;1. Take Mobile &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;2. Incoming SMS menu &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;3. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Select Sub-Menu Compose SMS &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;4. Write the contents of SMS &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;5. Press menu &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;6. Enter the destination number &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;7. Press ok &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;8. Wait for the report &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;9. When an SMS is sent, Done &lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;10. If SMS is not sent, skip to step 5 &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;• &lt;b&gt;Use flow charts &lt;/b&gt;For example: Alarm Clock Algorithm &lt;br /&gt;
&amp;nbsp; • &lt;b&gt;Using the pseudo-code &lt;/b&gt;For example: Algotima Finding Largest Numbers max ← first ilangan if (max &amp;lt;the second number) ← max number two if (max &amp;lt;third numbers) ← max number of third Important Aspects of the Algorithm 1. Finiteness &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The algorithm must be stopped (after a finite number of steps) &lt;/span&gt;2. Definiteness Each step must be precisely defined, should not confuse the (ambiguous) 3. Input &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;An algorithm has zero or more input given to the algorithm before it runs &lt;/span&gt;4. Output An algorithm has one or more outputs, which typically rely on input 5. Effectiveness &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Each algorithm is expected to have effective properties &lt;/span&gt;Programming Language &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;From the past until now, of course we know that in the computer world there is a wide range of programming languages. Because so many types of programming languages, the languages are also grouped based on certain criteria. There are breaks it down into 3 levels of language, namely: high level (like Pascal and Basic), middle level (like C), and low level (like Assembly Language). There are also breaks it down into procedural / functional programming, object oriented programming, and so forth. Programming can be classified as follows [Rechenberg]: &lt;/span&gt;1. Procedure-oriented (procedural oriented) 2. Oriented functions (functional oriented) 3. Oriented logic (logic oriented) 4. Object oriented (object oriented) Each has its own advantages. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Sometimes in building an application programming method is required combination. For example in C + + and Java (object oriented programming language), we can still find the techniques-oriented programming procedures in each method / function in the member objects. &lt;br /&gt;
A programming language originally only be used in a method. &lt;/span&gt;Pascal originally for procedural-oriented, Lisp for the functional-oriented, Smaltalk for object-oriented and others. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Along with the development of information and computer technology, tens and even hundreds of new programming language was born. &lt;/span&gt;Each has unique and specific advantages. There are specific to a particular type of computer, some are specific to a particular programming paradigm. &lt;br /&gt;
Selection of the first programming language is a complicated issue. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;For the first programming language affects the way programmers think in the future. Pascal programmers with a first language will be easier to switch to a programming language that has the same paradigm, which is oriented procedures such as C, Modula, Oberon. But the programmers are difficult to move into programming language with the other paradigms such as CLOS and Scheme, namely Lisp programming language family. In addition, after determining the paradigm, the next problem that arises is selecting the most dominant programming languages in this paradigm. For example, for function-oriented paradigm is most appropriate taught to beginners, whether or Scheme or EmacsLisp CLOS. The second problem is related to, the ease in learning, programming language dialects in the family, or even market trends. &lt;/span&gt;&lt;/div&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/what-is-algorithm.html</link><author>noreply@blogger.com (Asep Rojali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTGx-1d19PKnIr5Zm1GWYfhFUc61ThwS7PrqpwkZA4SMnpxC9Pul0_ti2MQwqYw-2ddsW8owKbGEyh47O1C6lO4Mvrju0LwxRtILaOW8daA7awd3FQ9aFAJCfck7JMJfDDFu5662UPxDZN/s72-c/images.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-1340706927100844336</guid><pubDate>Wed, 09 Mar 2011 18:56:00 +0000</pubDate><atom:updated>2011-03-10T01:56:17.513+07:00</atom:updated><title>Subnetting</title><description></description><link>http://allaboutproblem.blogspot.com/2011/03/subnetting.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-1497914127115250060</guid><pubDate>Wed, 09 Mar 2011 08:20:00 +0000</pubDate><atom:updated>2011-03-09T20:18:33.561+07:00</atom:updated><title>ALGORITHM IN THE FIELD OF COMPUTER SCIENCE</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3ii2reOC3cSUmSmwXqGqbryA25P4J5tLVwlXC3OfsVk4f8KWdru4eLWbjMYuL5fqEHYAw_-shxT9krhOlPsNqVfEH8jzStkXcz7OuYy4LgZOYRBHrqMQmH9VVHZBNsbHK3m3mQtXZifqV/s1600/7.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;137&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3ii2reOC3cSUmSmwXqGqbryA25P4J5tLVwlXC3OfsVk4f8KWdru4eLWbjMYuL5fqEHYAw_-shxT9krhOlPsNqVfEH8jzStkXcz7OuYy4LgZOYRBHrqMQmH9VVHZBNsbHK3m3mQtXZifqV/s400/7.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;m:smallfrac m:val=&quot;off&quot;&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin m:val=&quot;0&quot;&gt;    &lt;m:rmargin m:val=&quot;0&quot;&gt;    &lt;m:defjc m:val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent m:val=&quot;1440&quot;&gt;    &lt;m:intlim m:val=&quot;subSup&quot;&gt;    &lt;m:narylim m:val=&quot;undOvr&quot;&gt;   &lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;br /&gt;
INTRODUCTION &lt;br /&gt;
&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Today, computers are used in almost all areas of human life, ranging from education, business, up to the game. Speaking of the computer can not be separated from computer programming. This is because the computer is basically a machine that can not be anything. We must give a series of instructions to the computer for the machine to &#39;smart&#39; is to solve a problem. The steps that need to be done in giving instructions to the computer to solve this problem called computer programming. The computer programming steps are as follows: define the problem, determine a solution, choose the algorithm, write programs, test programs, write documentation, and care programs. Before creating the program, should we make the Flow Chart or Pseudocode, making it easier for us to understand the algorithm and enable us in making the program. The program should also be clearly written, real, and complete. &lt;/span&gt;B. Problem Formulation 1. What is an algorithm? 2. What is the function of the algorithm? 3. How criteria algorithm in the computer field? C. The purpose of Writing Papers 1. To find understanding algorithms. 2. Knowing the benefits of the algorithm. 3. Knowing the criteria in the field of computer algorithms. &lt;br /&gt;
DISCUSSION A. Understanding Algorithm &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The algorithm is a proper procedure to solve the problem using computer assistance and the use of a particular programming language such as Pascal, Visual Basic, Java, and many more languages lain.Pranata (2002:8) in everyday life, we actually &lt;/span&gt;also uses algorithms to implement something. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;For example, when we write a letter, then we need to perform several steps as follows: &lt;/span&gt;1. Prepare paper and envelopes. 2. Prepare stationery, such as a pen or pencil. 3. Start writing. 4. Insert the paper into the envelope. 5. Go to the post office to post the letter. B. Function Algorithm With the algorithm, we can solve problems from simple to complex ones. However, a user must be able to create a program using a language understood by computers. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Before serving in the form of programming language, we should make a flow chart (Flow Chart) and Pseudocode. &lt;/span&gt;This is intended to facilitate the employment or facilitate in making the program. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;In addition, the algorithm can overcome the problem of logic and math problems with sequential manner, but sometimes not always sequential algorithm, this is known as the branching process. &lt;/span&gt;C. Criteria Algorithm Program in Computer Field In essence, computers are digital machines, meaning that computers can only recognize the condition of electrical currents (usually denoted by 1) and no electric current (usually denoted by 0). &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;In other words, we must use password-0 and 1 for computer programming. &lt;/span&gt;The programming language that uses a password 0 and 1 are called machine language. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Because machine language is very difficult, the idea appears to represent a string of code 0 and 1 with the abbreviation word that is more easily understood by ordinary people called mnemonic code. &lt;/span&gt;The programming language that uses the word acronym is called assembly language. Algorithm program must complete, real, and obvious. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Although the assignment algorithm does not produce a solution, but the process must end this thing called a semi-algorithm (the procedure will go on or commonly referred to as looping). &lt;/span&gt;The point is we should not add to the problem, but we must be able to resolve the problem to get the right result. As examples of such algorithms in the area of a circle from the input of the radius of the circle. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The formula for the circle is L =? * R * R &lt;/span&gt;The following are examples of algorithms to calculate the area of a circle: 1. Enter R 2. Pi? 3,14 3. L? Pi * R * R 4. Write L Notice the sign? on the second row and third. This sign means that the value of the right given to the operand on the left. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;For example, for the second row, the value of 3.14 given in the variable Pi. &lt;/span&gt;Next, the value of Pi * R * R given to the variable L. The last line writes the wide circle. As stated above, that there are algorithms that are not sequential and commonly called by repetition. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The example is in calculating the average of a set of data entered by the user. Here is the algorithm to calculate the average data entered by the user: &lt;/span&gt;1. Enter N 2. i? 1 3. j? 0 4. As long as (i &amp;lt;= N) do row 4 to 7 5. Enter dt 6. i? i +1 7. j? j + dt 8. Average? J / N 9. Write average The first line asks the user to enter N, the amount of data. On the second line, the variable I, which is useful as a counter the number of data already entered pegguna, worth 1. On the third line, the variable j, which is used to store the sum of the data, given the value 0. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The fourth line gives the command to repeat the fourth line until the seventh row during the first less than equal to N. &lt;/span&gt;In other words, setelahi larger than N, the line kedelapanyang executed. Fifth row of data entered into the request-i. Sixth row to add the variable I by 1. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;Consider the meaning of the command i? I +1 is the value of i plus 1, then the results are stored in the variable i again. &lt;/span&gt;Seventh row j by adding variable data entered by the user. As explained above, the variable j is used to store the sum of all data, so for each input data, the value of variable j must be added to the second. Eighth row to calculate the average by dividing the sum by the number of data. The last line writes the average. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;But many experienced programmers who have never written the algorithm in the paper again .. &lt;/span&gt;It means he wrote the algorithm in daalam head. &lt;br /&gt;
CLOSING A. Knot Based on the above description, it can be concluded: 1. The algorithm is a proper procedure to solve the problem using computer assistance and the use of a programming language. 2. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The function of the algorithm is to facilitate the work or help us in making the program or commonly called as Problem Solving. &lt;/span&gt;In addition, the algorithm can overcome the problem of logic and math problems 3. Criteria for the program must complete algorithm, real, and obvious. Although the assignment algorithm does not produce a solution, but the process must end this thing called a semi-algorithm (the procedure will go on or commonly referred to as looping). The point is we should not add to the problem, but we must be able to resolve the problem to get the right result. B. Suggestion Based on the conclusions above, it is recommended to: 1. The programmer can use the algorithms to solve the problem using computer assistance. 2. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The programmer can use the algorithm as Problem Solving in a matter of logic and math problems. &lt;/span&gt;3. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;The programmer must write a program algorithm with a clear, tangible, and complete. &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/algorithm-in-field-of-computer-science.html</link><author>noreply@blogger.com (Asep Rojali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3ii2reOC3cSUmSmwXqGqbryA25P4J5tLVwlXC3OfsVk4f8KWdru4eLWbjMYuL5fqEHYAw_-shxT9krhOlPsNqVfEH8jzStkXcz7OuYy4LgZOYRBHrqMQmH9VVHZBNsbHK3m3mQtXZifqV/s72-c/7.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-9216191733269389302</guid><pubDate>Sat, 12 Feb 2011 13:04:00 +0000</pubDate><atom:updated>2011-03-10T01:47:16.891+07:00</atom:updated><title>Privacy Policy</title><description>&lt;b&gt;Privacy Policy for http://allaboutproblem.blogspot.com/&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
If you require any more information or have any questions about our  privacy policy, please feel free to contact us by email at  rojaliasep@gmail.com.  &lt;br /&gt;
&lt;br /&gt;
At http://allaboutproblem.blogspot.com/, the privacy of our visitors is  of extreme importance to us. This privacy policy document outlines the  types of personal information is received and collected by  http://allaboutproblem.blogspot.com/ and how it is used.   &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Log Files&lt;/b&gt;&lt;br /&gt;
Like many other Web sites, http://allaboutproblem.blogspot.com/ makes  use of log files. The information inside the log files includes internet  protocol ( IP ) addresses, type of browser, Internet Service Provider (  ISP ), date/time stamp, referring/exit pages, and number of clicks to  analyze trends, administer the site, track user’s movement around the  site, and gather demographic information. IP addresses, and other such  information are not linked to any information that is personally  identifiable.   &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Cookies and Web Beacons&lt;/b&gt; &lt;br /&gt;
http://allaboutproblem.blogspot.com/ does use cookies to store  information about visitors preferences, record user-specific information  on which pages the user access or visit, customize Web page content  based on visitors browser type or other information that the visitor  sends via their browser. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DoubleClick DART Cookie&lt;/b&gt; &lt;br /&gt;
.:: Google, as a third party vendor, uses cookies to serve ads on http://allaboutproblem.blogspot.com/.&lt;br /&gt;
.:: Google&#39;s use of the DART cookie enables it to serve ads to users  based on their visit to http://allaboutproblem.blogspot.com/ and other  sites on the Internet. &lt;br /&gt;
.:: Users may opt out of the use of the DART cookie by visiting the  Google ad and content network privacy policy at the following URL -  http://www.google.com/privacy_ads.html  &lt;br /&gt;
&lt;br /&gt;
Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....&lt;br /&gt;
Google Adsense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These third-party ad servers or ad networks use technology to the  advertisements and links that appear on  http://allaboutproblem.blogspot.com/ send directly to your browsers.  They automatically receive your IP address when this occurs. Other  technologies ( such as cookies, JavaScript, or Web Beacons ) may also be  used by the third-party ad networks to measure the effectiveness of  their advertisements and / or to personalize the advertising content  that you see. &lt;br /&gt;
&lt;br /&gt;
http://allaboutproblem.blogspot.com/ has no access to or control over these cookies that are used by third-party advertisers.  &lt;br /&gt;
&lt;br /&gt;
You should consult the respective privacy policies of these third-party  ad servers for more detailed information on their practices as well as  for instructions about how to opt-out of certain practices.  http://allaboutproblem.blogspot.com/&#39;s privacy policy does not apply to,  and we cannot control the activities of, such other advertisers or web  sites. &lt;br /&gt;
&lt;br /&gt;
If you wish to disable cookies, you may do so through your individual  browser options. More detailed information about cookie management with  specific web browsers can be found at the browsers&#39; respective websites.</description><link>http://allaboutproblem.blogspot.com/2011/03/privacy-policy.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-1887510893957697105</guid><pubDate>Tue, 08 Feb 2011 18:50:00 +0000</pubDate><atom:updated>2011-03-10T01:49:36.298+07:00</atom:updated><title>HOW TO UPGRADE YOUR VGA CARD ?</title><description>&lt;m:smallfrac m:val=&quot;off&quot;&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin m:val=&quot;0&quot;&gt;    &lt;m:rmargin m:val=&quot;0&quot;&gt;    &lt;m:defjc m:val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent m:val=&quot;1440&quot;&gt;    &lt;m:intlim m:val=&quot;subSup&quot;&gt;    &lt;m:narylim m:val=&quot;undOvr&quot;&gt;   &lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLZeASD7TP3S6FOsIx6K6bAbCtSOV2UJYlx2b2BVGj3nax47E-kFiqXuU-MAkSVoj2v79Ei3FiWq58iDn_vH7ZcePMSRbG4nijgr3UmKRA5kRKlCWxPXaTbFwgV1A1pOATZRQdqmwf_ZZg/s1600/vga-card1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLZeASD7TP3S6FOsIx6K6bAbCtSOV2UJYlx2b2BVGj3nax47E-kFiqXuU-MAkSVoj2v79Ei3FiWq58iDn_vH7ZcePMSRbG4nijgr3UmKRA5kRKlCWxPXaTbFwgV1A1pOATZRQdqmwf_ZZg/s320/vga-card1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Our current crop of popular PC games has shown us that the video card has now become the most important component in a gaming system. The CPU and the video card used to be of equal importance in the past, but games have become increasingly dependent on video cards as developers have been cranking up the graphics levels. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;In recent games like Call of Duty 2, F.E.A.R., and Quake 4, a strong video card improves game performance and image quality much more than a strong CPU does. Newer games also default down to uglier graphics if the game detects an older card. And some games remove support for older cards altogether. When a highly anticipated game like Battlefield 2 no longer supports GeForce 4 level or older cards, it&#39;s time to consider starting on that long-overdue upgrade. &lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Do I have PCI Express or AGP?&lt;/span&gt;&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjALJM4YlD-aNZ0UgLuyx-SB-Lv7YOJ-TaptADozF2G1pKFhEtvNMDfHLLc2A9Z2fRGTVNgBwI1iW3yK-PJV_1BgsGN2Kf1iYVM2-MVkXBSBuQ4SyOG8sUthlAhpWB6KxxuMcSXg1thNqgf/s1600/pci_express.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjALJM4YlD-aNZ0UgLuyx-SB-Lv7YOJ-TaptADozF2G1pKFhEtvNMDfHLLc2A9Z2fRGTVNgBwI1iW3yK-PJV_1BgsGN2Kf1iYVM2-MVkXBSBuQ4SyOG8sUthlAhpWB6KxxuMcSXg1thNqgf/s320/pci_express.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Before you run off to buy that graphics upgrade, you have to find out if your current system will be able to handle a new video card. Video card requirements have changed over the years, and older PC systems might not have the necessary hardware to be compatible with the latest video cards. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Take a look at your system motherboard to see if it has an AGP or PCI Express card slot (it will be the topmost expansion slot on the motherboard--your monitor should be connected to the card currently sitting there). Older systems have AGP card slots, but more recent systems (made in the past two years) have PCI Express card slots. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;If your system has a PCI Express slot, you&#39;re in luck. All the latest video cards use the PCI Express form factor. Your upgrade options will be much more limited if you find an AGP slot staring back at you. All the best cards come out in PCI Express first, followed months later by scaled-back AGP versions, if they&#39;re made at all. Consider upgrading to a PCI Express motherboard if you want to get the most powerful video card options. If your system is more than 5 years old, you might have an ancient PCI slot for graphics. In this case, the best thing to do would be to put that Pentium II out to pasture and upgrade to a completely new system. &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;background: none repeat scroll 0% 0% rgb(229, 229, 229); text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=7536198095607186990&amp;amp;postID=1887510893957697105&quot;&gt;&lt;span style=&quot;color: #113b85; text-decoration: none;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Hyperlink1&quot;&gt;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Note that newer systems might also have two PCI Express slots for dual video card configurations. However, for the purpose of this guide we&#39;re going to assume that you have an older system that doesn&#39;t have two video card slots, since anyone with an Nvidia SLI or ATI CrossFire system should be playing F.E.A.R. at 1600x1200 with all the settings maxed out instead of reading this guide. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;While you&#39;re looking at the video card slot, check to see how much space is available beneath the card slot, as some video cards have extra-large cooling units that double the height of the card. If you only have room for a normal-sized card, consider moving the card located directly beneath the video card to a lower slot if possible. However, if that isn&#39;t possible, or if you have a small form factor system that only has room for a single-slot video card, then you&#39;ll have to make sure your new video card is a single-slotter. &lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;How much power do I have?&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;After determining what kind of card slot and how much space you have for it, you&#39;ll need to find out the power rating on your system power supply. Today&#39;s performance video cards require lots of power, and some power supplies might not have the wattage to support a system loaded with extra drives, a fast processor, and a new power-hungry video card. If you&#39;re lucky, the power supply will have its maximum wattage listed on the back, visible from outside the case. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Otherwise you&#39;ll have to crack open the case and look for the rating sticker on the power supply. The bare-minimum wattage you&#39;re looking for is 350W, but you&#39;ll be able to get a more powerful card with a 400W or 450W power supply, and you&#39;ll need 500W or more for a dual-card setup. Check the power supply requirements printed on the outside of the video card box to make sure your system can support the card. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;The hardest part about upgrading your video card is actually just figuring out what kind of card your system can handle. Check out our recent Call of Duty 2 and F.E.A.R. hardware performance guides to see how the current graphics cards compare. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Assuming you did your homework and picked a card that&#39;s compatible with your system, installing the card is very easy. First, switch off the system and unplug the computer. Use a Phillips-head screwdriver to open up your case and unscrew the video card. The video card might have a retention mechanism located at the base of the slot, and you should be able to jiggle it open and slide out the card without a problem. Next, plug in your new video card and replace the screw to secure the card in place. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;If you have a power-hungry card, you&#39;ll need to plug an auxiliary power source into the board, usually one or two 4-pin hard drive power connectors or a 6-pin PCI Express power connector. Video card manufacturers will often package a power splitter or a dual 4-pin to 6-pin adapter with the card in case your system doesn&#39;t have enough free power connectors, but you can order the cables online for less than $5 in case you get a bare-bones card bundle. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt;&quot;&gt;Replace the case cover, attach the monitor, plug in the power cable, and fire the system up. &lt;/span&gt;&lt;/div&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/how-to-upgrade-your-vga-card.html</link><author>noreply@blogger.com (Asep Rojali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLZeASD7TP3S6FOsIx6K6bAbCtSOV2UJYlx2b2BVGj3nax47E-kFiqXuU-MAkSVoj2v79Ei3FiWq58iDn_vH7ZcePMSRbG4nijgr3UmKRA5kRKlCWxPXaTbFwgV1A1pOATZRQdqmwf_ZZg/s72-c/vga-card1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-9036990732772271889</guid><pubDate>Sun, 06 Feb 2011 18:50:00 +0000</pubDate><atom:updated>2011-03-10T01:51:17.450+07:00</atom:updated><title>Subnetting</title><description>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika seorang pemilik sebuah IP Address kelas B misalnya memerlukan lebih dari satu network ID maka ia harus mengajukan permohonan ke internic untuk mendapatkan IP Address baru.&quot;&gt;If  an owner of a class B IP address such as requiring more than one  network ID then it must apply with Internic to get a new IP address. &lt;/span&gt;&lt;span title=&quot;Namun persediaan IP Address sangat terbatas karena banyak menjamurnya situs-situs di internet.&quot;&gt;However, very limited supply of IP addresses because a lot of proliferation of sites on the Internet. &lt;/span&gt;&lt;span title=&quot;Untuk mengatasi ini timbulah suatu teknik memperbanyak network ID dari satu network yang sudah ada.&quot;&gt;To overcome this timbulah a technique to reproduce the network ID of an existing network. &lt;/span&gt;&lt;span title=&quot;Hal ini dinamakan subnetting, di mana sebagian host ID dikorbankan untuk dipakai dalam membuat network ID tambahan.&quot;&gt;This is called subnetting, where most of the host ID sacrificed for use in making additional network ID. &lt;/span&gt;&lt;span title=&quot;Sebagai contoh, misal di kelas B network ID 130.200.0.0 dengan subnet mask 255.255.224.0 dimana oktet ketiga diselubung dengan 224.&quot;&gt;For  instance, for example in the class B network ID 130.200.0.0 with a  subnet mask of 255.255.224.0 where the third octet diselubung with 224. &lt;/span&gt;&lt;span title=&quot;maka dapat di hitung dengan rumus 256-224=32.&quot;&gt;then can be calculated with the formula 256-224 = 32. &lt;/span&gt;&lt;span title=&quot;maka kelompok subnet yang dapat dipakai adalah kelipatan 32, 64, 128, 160, dan 192.&quot;&gt;then the group of subnets that can be used is a multiple of 32, 64, 128, 160, and 192. &lt;/span&gt;&lt;span title=&quot;Dengan demikian kelompok IP address yang dapat dipakai adalah:&quot;&gt;Thus groups of IP addresses that can be used are: &lt;/span&gt;&lt;span title=&quot;130.200.32.1 sampai 130.200.63.254&quot;&gt;130.200.32.1 through 130.200.63.254 &lt;/span&gt;&lt;span title=&quot;130.200.64.1 sampai 130.200.95.254&quot;&gt;130.200.64.1 through 130.200.95.254 &lt;/span&gt;&lt;span title=&quot;130.200.96.1 sampai 130.200.127.254&quot;&gt;130.200.96.1 up to 130 200 127 254 &lt;/span&gt;&lt;span title=&quot;130.200.128.1 sampai 130.200.159.254&quot;&gt;130.200.128.1 through 130 200 159 254 &lt;/span&gt;&lt;span title=&quot;130.200.160.1 sampai 130.200.191.254&quot;&gt;130.200.160.1 through 130 200 191 254 &lt;/span&gt;&lt;span title=&quot;130.200.192.1 sampai 130.200.223.254&quot;&gt;130.200.192.1 through 130 200 223 254 &lt;/span&gt;&lt;span title=&quot;Atau akan lebih mudah dengan suatu perumusan baik dalam menentukan subnet maupun jumlah host persubnet.Jumlah subnet = 2n-2, n = jumlah bit yang terselubung&quot;&gt;Or  would be easier with a good formula to determine subnet and host number  persubnet.Jumlah subnet = 2n-2, n = number of bits hidden &lt;/span&gt;&lt;span title=&quot;Jumlah host persubnet = 2N-2, N = jumlah bit tidak terselubung&quot;&gt;The number of hosts persubnet = 2N-2, N = number of bits is not veiled &lt;/span&gt;&lt;span title=&quot;Sebagai contoh, misalnya suatu subnet memiliki network address 193.20.32.0 dengan subnet mask 255.255.255.224.&quot;&gt;For example, such a subnet has a network address with a subnet mask of 193.20.32.0 255 255 255 224. &lt;/span&gt;&lt;span title=&quot;Maka:&quot;&gt;Then: &lt;/span&gt;&lt;span title=&quot;Jumlah subnet adalah 6, karena dari network address 193.20.32.0 dengan memperhatikan angka dari oktet pertama yaitu 193, maka dapat di ketahui berada pada kelas C.&quot;&gt;The  number of subnets is 6, because of network address 193.20.32.0 by  considering the number of the first octet is 193, then it can be in the  know are in class C. &lt;/span&gt;&lt;span title=&quot;dengan memperhatikan subnetmask 255.255.255.224 atau 11111111.11111111.11111111.&quot;&gt;with regard Subnet 255 255 255 224 or 11111111.11111111.11111111. &lt;/span&gt;&lt;span title=&quot;11100000 dapat diketahui bahwa tiga bit host ID diselubung, sehingga didapat n = 3 dan didapat:jumlah subnet = 23-2 = 6.&quot;&gt;11100000 can be seen that three-bit host ID diselubung, in order to get n = 3 and obtained: the number of subnets = 23-2 = 6. &lt;/span&gt;&lt;span title=&quot;Sedangkan untuk jumlah host persubnet adalah 30, ini didapat dari 5 bit yang tidak terselubung, maka N = 5 dan akan didapat: jumlah host per subnet = 25-2 = 30.&quot;&gt;As  for the number of hosts persubnet is 30, is obtainable from 5 bits that  are not hidden, then N = 5 and will be obtained: the number of hosts  per subnet = 25-2 = 30. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bit terselubung adalah bit yang di wakili oleh angka 1 sedangkan bit tidak terselubung adalah bit yang di wakili dengan angka 0.&quot;&gt;Bit is a bit shrouded in represented by number 1, while bits are the bits that are not shrouded in representing the number 0. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2011/02/subnetting.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-8888346471355682388</guid><pubDate>Wed, 19 Jan 2011 23:08:00 +0000</pubDate><atom:updated>2011-03-10T01:58:43.728+07:00</atom:updated><title>APIPA 169 254  and Reset Router</title><description>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Windows XP lagi!&quot;&gt;Windows XP again! &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena persoalan jaringan di satu komputer desktop dan dua notebook, saya menikmati akhir pekan kemarin bersama Windows XP.&quot;&gt;Due to network problems on a desktop and two notebook computers, I enjoy the weekend with Windows XP. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bukan soal mudah: tidak ada /etc/init.d/networking atau /etc/network/interfaces di sana.&quot;&gt;Not a question easily: no / etc / init.d / networking or / etc / network / interfaces there. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bonus yang saya peroleh: setiap selesai mengubah sebuah konfigurasi dan menyimpannya, saya punya waktu untuk mengobrol, karena komputer harus di-restart.&quot;&gt;I get a bonus: each finished changing a configuration and save it, I had time to chat, because the computer must be restarted. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di komputer desktop, modul jaringan gagal memanggil DHCP dan alamat IP diset menjadi 169.254.xy (dua ruas terakhir bisa berubah-ubah).&quot;&gt;On desktop computers, network module failed to call DHCP and IP address set to 169.254.xy (the last two sections can vary.) &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena disambungkan ke router dan si router yang menjalankan permintaan DHCP berhasil, saya menduga modul klien DHCP bermasalah.&quot;&gt;Because  it is connected to the router and the router is running DHCP request is  successful, I suspect the DHCP client module problematic. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ditambah dengan Internet Explorer yang aktif sendiri setiap pemakai login, dugaan saya mengarah kepada spyware.&quot;&gt;Coupled with an active Internet Explorer itself every user login, I suspect leads to spyware. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan membandingkan kepraktisan memperbaiki komputer desktop tersebut, saya memutuskan untuk melakukan instalasi ulang Windows XP.&quot;&gt;By comparing the practicality of repair desktop computers, I decided to do reinstall Windows XP. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Terserah penyebabnya apa, yang penting pemilik komputer dapat segera menggunakan mesinnya untuk akses Internet.&quot;&gt;It&#39;s up to what the cause, the important computer owners can immediately use the machine to access the Internet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kesempatan juga untuk segera memasangkan Mozilla Firefox dan memberi penjelasan kepada mereka agar pindah alat bantu.&quot;&gt;Opportunity also to immediately pair Mozilla Firefox and give an explanation to them for moving tools. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ternyata persoalan yang lebih merepotkan datang keesokan harinya.&quot;&gt;It turns out the more troublesome issue come the next day. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Klien DHCP di dua notebook gagal mendapatkan alamat IP, dan hanya beroleh nomor legendaris 169.254!&quot;&gt;DHCP client on the two notebooks failed to get an IP address, and only have an allotted number of legendary 169 254! &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Saya jalankan utilitas gratis Ad-Aware dan memang muncul sekian puluh berkas yang positif ditandai bermasalah oleh Ad-Aware.&quot;&gt;I run the free utility Ad-Aware and it appeared a few tens of files that are positively marked troubled by the Ad-Aware. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ini mengingatkan saya pada kesibukan serupa di bulan Oktober lalu dan saya tergelitik untuk memperbaiki benar-benar modul jaringan yang lumpuh saja.&quot;&gt;This  reminds me of a similar activity in the month of October and I was  intrigued to actually fix a crippled network module only. &lt;/span&gt;&lt;span title=&quot;Sedapat mungkin jangan melakukan instalasi ulang!&quot;&gt;As far as possible not to reinstall! &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hasil pencarian saya lewat Google tentang alamat IP 169.254 menghasilkan penjelasan bahwa nomor tersebut memang diberikan apabila komputer terhubung ke sebuah hub dan tidak terdapat koneksi Internet,&quot;&gt;My  search results through Google about 169,254 IP addresses generate an  explanation that the number is given if the computer is connected to a  hub and there is no Internet connection, &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The computers are connected to a hub, and there is no Internet connection.&quot;&gt;The computers are connected to a hub, and there is no Internet connection. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In this configuration, the computers are generally assigned IP addresses in the range of 169.254.xy, where x and y are numbers between 1 and 254.&quot;&gt;In  this configuration, the computers are assigned IP addresses Generally  in the range of 169.254.xy, WHERE x and y are numbers between 1 and 254. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;— How to troubleshoot home networking in Windows XP, Microsoft Help and Support&quot;&gt;- How to troubleshoot home networking in Windows XP, Microsoft Help and Support &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Alamat IP 169.254.xy memang disediakan oleh IANA untuk Automatic Private IP Addressing (APIPA).&quot;&gt;169.254.xy IP address is provided by the IANA for Automatic Private IP Addressing (APIPA). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan demikian menghindari kemungkinan konflik alamat IP.&quot;&gt;Thereby avoiding possible conflicts of IP addresses. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Persoalannya: koneksi Internet jelas-jelas ada dan server DHCP yang ada di router bekerja dengan baik.&quot;&gt;The problem: the Internet connection is clearly there and the existing DHCP server on the router worked fine. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Saya periksa di tabel permintaan layanan DHCP di router, malah kosong.&quot;&gt;I check the table in the router&#39;s DHCP service request, even empty. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Berarti server tidak menerima permintaan dari klien.&quot;&gt;Means the server does not accept requests from clients. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena saya yakin bahwa server DHCP bekerja dengan baik, dugaan kuat saya persoalan kegagalan mendapatkan alamat IP secara otomatis ini ada di notebook — lebih tepatnya di Windows XP yang dijalankan di sana.&quot;&gt;Because  I am sure that the DHCP server is working fine, I strongly suspected  the problem of failure to get an IP address automatically is in  notebooks - more precisely in Windows XP that run there. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan asumsi sederhana bahwa terdapat persoalan dengan modul jaringan di Windows XP, saya coba perbaiki dengan WinSockFix, apalagi dijelaskan kemungkinan koneksi Internet gagal karena entri yang salah atau terhapus di registry.&quot;&gt;With  the simple assumption that there are problems with the network module  in Windows XP, I tried to fix with WinSockFix, let alone discussed the  possibility of Internet connection failed because of wrong or deleted  entries in the registry. &lt;/span&gt;&lt;span title=&quot;Belum ada hasilnya juga.&quot;&gt;There are no results as well. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sambil mencari solusi lain, saya set kedua notebook tersebut dengan alamat IP statik, sehingga pemakainya tetap dapat bekerja dengan koneksi Internet.&quot;&gt;While  looking for another solution, I set both the notebook with a static IP  address, so the wearer can still work with an Internet connection. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Menjadi kurang fleksibel memang, karena harus diganti-ganti sesuai aturan yang digunakan di jaringan setempat.&quot;&gt;Indeed become less flexible, because it must be changed according to the rules used in the local network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sedangkan hikmah bagi saya: karena perlu alamat DNS yang mudah diingat untuk keperluan perbaikan notebook ini, akhirnya saya pasang server DNS di komputer GNU/Linux.&quot;&gt;While  the wisdom for me: because the need to address DNS that is memorable  for the purposes of this notebook repair, I finally put in the  computer&#39;s DNS server GNU / Linux. &lt;/span&gt;&lt;span title=&quot;Saya pilih djbdns dari DJ Bernstein.&quot;&gt;I select from DJ Bernstein&#39;s djbdns. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di awal-awal menggunakan GNU/Linux saya memilih qmail sebagai pengganti Sendmail sehingga tidak terlalu asing dengan “gaya” Bernstein.&quot;&gt;In the early days of using GNU / Linux I chose qmail instead of sendmail, so not too familiar with &quot;style&quot; Bernstein. &lt;/span&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Dnsmasq yang selama ini saya pakai — dan hanya meneruskan permintaan DNS ke server DNS PJI — dihapus.&quot;&gt;Dnsmasq which has been my life - and only forward DNS requests to the ISP&#39;s DNS server - removed. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Secara tidak sengaja saya menemukan artikel yang ditulis di Help with Windows, karena judul yang digunakan sama persis dengan pesan yang muncul di salah satu notebook, “Limited or no connectivity” Network Error.&quot;&gt;I  accidentally found an article written in the Help with Windows, because  the exact same title used by the message that appears in one notebook,  &quot;Limited or no connectivity&quot; Network Error. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Solusinya sederhana: lakukan reset di router!&quot;&gt;The solution is simple: you should reset the router! &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Benar-benar konyol bagi saya yang sudah yakin tidak ada masalah dengan router.&quot;&gt;It&#39;s really ridiculous to me that you are sure there is no problem with the router. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Namun kekonyolan tersebut tampaknya masih bisa dimaafkan: penulis artikel tersebut tidak dapat menjelaskan bahwa persoalan ini hanya muncul di notebook dan tidak ada gangguan apapun di komputer desktop.&quot;&gt;But  the absurdity of it seems to still be forgiven: the author of the  article is not to explain that this issue only appears in the notebook  and there&#39;s no any disturbances on the computer desktop. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Persis seperti yang saya alami: komputer desktop yang meminta layanan DHCP dari router baik-baik saja.&quot;&gt;Just like what I experienced: the computer desktop that is requesting service from the routers DHCP fine. &lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2011/01/apipa-169-254-and-reset-router.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-6010854318891457148</guid><pubDate>Sun, 09 Jan 2011 18:52:00 +0000</pubDate><atom:updated>2011-03-10T01:53:17.926+07:00</atom:updated><title>Some variants of Linux</title><description>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Red Hat&quot;&gt;Red Hat &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Merupakan distro yang sangat populer baik di Indonesia maupun di dunia.&quot;&gt;Is a distribution that is very popular both in Indonesia and the world. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Didirikan sejak 1994 distro Red Hat banyak digunakan di seluruh dunia.&quot;&gt;Established since 1994, Red Hat distributions are widely used throughout the world. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bagi pengguna bisnis, Red Hat dikenal dengan layanannya terutama RedHat Network.&quot;&gt;For business users, Red Hat is known with its services mainly RedHat Network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;RedHat sendiri saat ini secara bisnis sudah mulai menampakkan prospek keuntungan, terutama dari bisnis jasa dan bukan dari penjualan distribusinya.&quot;&gt;RedHat  itself currently in the business has started to show profit prospects,  especially from business services and not from the sale of its  distribution. &lt;/span&gt;&lt;span title=&quot;Dengan kemudahan fitur yang ada menjadikan Red Hat sanggup menggantikan windows.&quot;&gt;With the convenience features that have made Red Hat could replace the windows. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Disisi lain, banyak pengguna komputer yang enggan meninggalkan windows seratus persen.&quot;&gt;On the other hand, many computer users are reluctant to leave the windows one hundred percent. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Solusi cerdas untuk kasus ini adalah menggunakan dua sistem operasi sekaligus, windows dan linux.&quot;&gt;Smart solution for this case is to use two operating systems at once, windows and linux. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Namun bukan perkara mudah (setidaknya itu yang penulis alami beberapa waktu lalu) untuk menginstal linux disamping windows yang dengan manisnya telah menempati space di hardisk.&quot;&gt;But  not easy (at least it&#39;s a natural writer some time ago) to install  linux as well with the sweetness of windows that have been occupying  space on your hard drive. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Masalah paling umum terjadi pada pembagian partisi.&quot;&gt;The most common problem occurs in the distribution of the partition. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Walau banyak software pembagi partisi -katakanlah Partition Magic- yang populer, namun penulis merasa perlu menulis tutorial ini, sebagai panduan bagi yang ingin beralih ke linux.&quot;&gt;While  many software divider partition Partition Magic-say-that popular, but  the author felt the need to write this tutorial, as a guide for those  who want to switch to linux. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Mandrake&quot;&gt;Mandrake &lt;/span&gt;&lt;span title=&quot;Mandrake merupakan perusahaan baru yang meluncurkan distro pertamanya pada Juli 1998.&quot;&gt;Mandrake is a new company launched its first distribution in July 1998. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Paket Mandrake dikembangkan berdasarkan distro Red Hat namun dengan perbaikan yang brilian terutama dalam hal kemudahan instalasi dalam bentuk grafis.&quot;&gt;Mandrake  package was developed based on Red Hat distributions but with a  brilliant improvement especially in terms of ease of installation in  graphical form. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;SuSE&quot;&gt;SuSE &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;SuSE merupakan distro yang berasal dari German yang juga populer karena kemudahan dan kelengkapan fasilitas serta aplikasinya terutama untuk keperluan desktop.&quot;&gt;SuSE  is a distro that comes from Germany which is also popular because of  the ease and completeness of the facility and its application primarily  for the desktop. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Distro yang merupakan distro paling laku di German dan Eropa ini dikenal dengan ulitity Yast yang sangat mudah untuk mengkonfigurasi Linux.SuSE LINUX 9.2 Live adalah sebuah single CD evaluation version dari SuSE LINUX 9.2 yang menggunakan GNOME graphical user interface.&quot;&gt;Distributions  which is the best selling distros in Germany and Europe is known by  ulitity Yast is very easy to configure Linux.SuSE LINUX 9.2 Live CD is a  single evaluation version of SuSE Linux 9.2 is substituted using the  GNOME graphical user interface. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ini adalah live cd distro booting dan berkalan dari CDROM drive yang tidak membutuhkan penginstallan ke hardisk untuk menggunakan nya.&quot;&gt;This  is a live cd distro and berkalan booting from the CDROM drive that does  not require installation to the hard drive to use it. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;jika kita ingin menyimpan file hasil kerja kita kita bisa menngunakan disket atau USB untuk menyimpan file tersebut versi live cd ini sangat cocok bagi mobile users yang dapat di bawa kemana saja dan dapat digunakan untuk browsing dokumen kerja kita, dilkengkapi pula dengan aplikasi grafis, multimedia,&quot;&gt;if  we want to save the files we work we can save a floppy or USB to save  the file version of the live cd is perfect for mobile users that can be  brought anywhere and can be used for browsing our working documents,  dilkengkapi well with graphical applications, multimedia, &lt;/span&gt;&lt;span title=&quot;home network dan develop aplication.&quot;&gt;home network and develop the user application. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;yang di dalam nya terdapat : Internet Browser / File Manager Personal Information Manager (PIM) Chat program for use with MSN, AIM, IRC, ICQ, Yahoo Music and Video player, Burning tools for CD and DVD Plug-and-Play connectivity for Digital&quot;&gt;that  its inside there are: Internet Browser / File Manager Personal  Information Manager (PIM) Chat programs for use with MSN, AIM, IRC, ICQ,  Yahoo Music and Video player, Burning tools for CD and DVD  Plug-and-Play connectivity for Digital &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Cameras Photo Management and Image Processing Integrated Secure Firewall Fast and easy Internet connectivity VNC Desktop Sharing, Network Configurator (konfig IP dari X-desktop), Audacity (Sound Editor), K3b (Aplikasi burning CD/DVD), XChm 1.0 (CHM Viewer&quot;&gt;Cameras  Photo Management and Image Processing Integrated Firewall Secure Fast  and easy Internet connectivity VNC Desktop Sharing, Network Configurator  (IP config from the X-desktop), Audacity (Sound Editor), K3b (burning  Applications CD / DVD), XChm 1.0 (CHM Viewer &lt;/span&gt;&lt;span title=&quot;Debian GNU/Linux&quot;&gt;Debian GNU / Linux &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Debian GNU/Linux adalah salah satu distro yang benar-benar non-komersial dan merupakan gambaran ideal dari semangat gerakan free-software.&quot;&gt;Debian  GNU / Linux is a distro that is really non-commercial and is an ideal  illustration of the spirit of free-software movement. &lt;/span&gt;&lt;span title=&quot;Dikembangkan oleh ratusan sukarelawan dari seluruh dunia dalam bentuk proyek yang dikelola dengan baik dan menghasilkan distribusi yang dikenal sebagai Debian.&quot;&gt;Developed  by hundreds of volunteers from around the world in the form of a  well-managed projects and produce distribution known as Debian. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Salah satu kekuatan lain dari Debian adalah sistem manajemen paket software yang unik dan rapi yang didukung oleh koleksi paket yang lengkap.&quot;&gt;One  of the other strengths of the Debian package management system is  unique and neat software which is supported by the collection complete  package. &lt;/span&gt;&lt;span title=&quot;Sistem manajemen paket software yang tersedia telah memudahkan penggunanya dalam hal instalasi software.&quot;&gt;Management system software packages are available already allows users in terms of software installation. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena kekuatannya ini, telah membuat banyak pihak yang mengembangkan distro turunan Debian yang mungkin lebih dikenal dan lebih mudah digunakan seperti Knoppix, Ubuntu, Simply Mepis, dan Xandros, Debian ini adalah merupakan salah satu distro yang tetap berpegang teguh terhadap komitmen open source yang tidak mencampurkan&quot;&gt;Because  of this strength, has made many people who develop Debian derivative  distributions that may be better known and easier to use, such as  Knoppix, Ubuntu, Simply Mepis, and Xandros, Debian this is one distro  that still adhere to the commitment not to confuse open source &lt;/span&gt;&lt;span title=&quot;aspek komersial dalam penyebarannya dengan jalan menjual nya dengan harga tertentu.&quot;&gt;commercial aspects in its distribution by road to sell his for a price. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Slackware Linux&quot;&gt;Slackware Linux &lt;/span&gt;&lt;span title=&quot;Slackwhare adalah salah satu distro yang tertua di lingkungan linux yang masih eksis dan populer hingga sekarang..&quot;&gt;Slackwhare is one of the oldest distro linux environment that still exist and are popular till now .. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Slack dikenal dengan kesederhanannya dan keamanannya, paketnya hanya dilengkapi dengan fitur dan aplikasi yang diperlukan saja.&quot;&gt;Slack known kesederhanannya and security, the package only comes with the features and applications that needed it. &lt;/span&gt;&lt;span title=&quot;Jangan mengharapkan adanya antarmuka grafis disini, semuanya text sehingga tidak cocok untuk pemula.&quot;&gt;Do not expect any graphical interface here, all the text so it is not suitable for beginners. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Versi 10 di anggap lengkap antara lain Linux 2.4.26 kernel,GCC 3.3.4, Mozilla 1.7, X11R6.7.0 from X.Org, GNOME 2.6.1, and KDE 3.2.3.&quot;&gt;Version  10 is considered complete include Linux kernel 2.4.26, GCC 3.3.4,  Mozilla 1.7, X11R6.7.0 from X. Org, GNOME 2.6.1, and KDE 3.2.3. &lt;/span&gt;&lt;span title=&quot;Sejak dari awal, distro buatan Patrick J.&quot;&gt;Since the beginning, distributions made by Patrick J. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Volkerding ini terkenal dengan linux yang stabil dan aman, baik bagi veteran UNIX maupun pemula Slackware menggunakan kernel 2.4.31 kernel dengan `advanced performance features seperti ReiserFS journaling filesystem, SCSI dan ATA RAID volume support, SATA support, dan kernel support untuk X DRI (&quot;&gt;Volkerding  is famous for its users a stable and secure, both for UNIX veterans as  well as beginners Slackware uses the 2.4.31 kernel `kernel with advanced  performance features such as the ReiserFS journaling filesystem, SCSI  and ATA RAID volume support, SATA support, and kernel support for X DRI (  &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;the Direct Rendering Interface) yang memberikan high-speed hardware accelerated 3D graphics untuk Linux.&quot;&gt;the Direct Rendering Interface) that provides high-speed hardware accelerated 3D graphics to Linux. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kecuali itu disertakan additional kernels agar dapat meng-instalasi Slackware menggunakan semua jenis `journaling filesystems` yang tersedia untuk Linux, termasuk ext3, ReiserFS, IBM`s JFS, dan SGI`s XFS.&quot;&gt;Unless  it included additional kernels to be able to install Slackware using  any type of `` journaling filesystems available for Linux, including  ext3, ReiserFS, IBM `s JFS, and SGI XFS` s. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Caldera OpenLinux&quot;&gt;Caldera OpenLinux &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Caldera dikenal dengan distro OpenLinux yang pernah cukup populer, terutama untuk penggunaan desktop.&quot;&gt;Caldera OpenLinux known distro ever quite popular, especially for desktop use. &lt;/span&gt;&lt;span title=&quot;KNOPPIX&quot;&gt;KNOPPIX &lt;/span&gt;&lt;span title=&quot;Salah satu distro yang kini populer adalah KNOPPIX.&quot;&gt;One of the popular distro now is KNOPPIX. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Keistimewaan Knoppix adalah distro yang menggunakan CDROM sebagai live CD, artinya, kita tidak perlu menginstalasi software tersebut kedalam Hard Disk.&quot;&gt;Privileges  Knoppix is a distro that uses the CDROM as a live CD, that is, we do  not need to install the software into your Hard Disk. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Masukkan CD kedalam Drive PC Intel, kemudian boot dan sistem berjalan aktif dengan menampilkan KDE sebagai window manager.&quot;&gt;Insert the CD into the drive Intel PC, then boot and run an active system featuring KDE as window manager. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Knoppix dapat mendeteksi Hardware secara prima, baik USB, Graphic Device, maupun peralatan lain yang biasanya sulit terdeteksi oleh distro Linux lainnya.&quot;&gt;Knoppix  can detect the hardware is excellent, both USB, Graphic Device, or  other equipment that is usually difficult to detect by other Linux  distributions. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bila menggunakan CDROM, maka pertanyaan yang muncul adalah: &amp;quot;Bagaimana dengan sistem file? Apakah Read Only?&quot;&gt;When using the CDROM, then the question that arises is: &quot;What about file system? Is Read Only? &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Knoppix menggunakan filesystem yang disebut UnionFs, sistem file ini secara pintar dan transparan menulis file pada ramdisk.&quot;&gt;Knoppix uses a filesystem called UnionFS, this file system intelligently and transparently write files on the ramdisk. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Banyaknya request akhir-akhir ini kepada Inixindo, dalam waktu dekat akan diadakan workshop 1 hari penggunaan Knoppix, tips &amp;amp; tricks, serta hal-hal yang perlu diperhatikan dalam menggunakan Knoppix tersebut.&quot;&gt;Number  of requests lately to Inixindo, in the near future workshops will be  held 1 day use of Knoppix, tips &amp;amp; tricks, and things to consider in  using the Knoppix. &lt;/span&gt;&lt;span title=&quot;Untuk informasi lebih lanjut hubungi sales team Inixindo.&quot;&gt;For more information contact the sales team Inixindo. &lt;/span&gt;&lt;span title=&quot;Kate OS LIve CD (kate-lv)&quot;&gt;Kate OS Live CD (kate-lv) &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kate OS adalah sebuah distro yang berbentuk live cd yang ringan namun punya fitur yang dapat di gunakan untuk kebutuhan dan keseharian perkantoran, sekolah, multimedia serta tampilan desktopnya yang menarik menambah keistimewaan tesendiri.&quot;&gt;Kate  OS is a live cd distro that shaped light but have features that can be  used for daily needs and offices, schools, multimedia and desktop  display features an attractive add tesendiri. &lt;/span&gt;&lt;span title=&quot;Silahkan klik di sini untuk melihat dokumentasi lebih lanjut.&quot;&gt;Please click here to see further documentation. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Clark Connect (cl-con)&quot;&gt;Clark Connect (cl-con) &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Paket-paket inti ClarkConnect kini dibangun menggunakan kode-kode sumber (SRPMS) dari #A43AD2 Hat Enterprise Linux 4 (RHEL 4) dengan beberapa perkecualian seperti: * Inplementasi udev (simak: RHEL 4 Release Notes) merupakan fitur indah untuk desktop tapi dianggap tidak&quot;&gt;ClarkConnect  core packages are now built using the source code (SRPMS) from # A43AD2  Hat Enterprise Linux 4 (RHEL 4) with a few exceptions such as: *  Inplementasi udev (see: RHEL 4 Release Notes) is a beautiful feature for  the desktop but is not considered &lt;/span&gt;&lt;span title=&quot;penting untuk sebuah sistem server.&quot;&gt;important for a server system. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;* Paket MySQL dipecah menjadi dua kelompok RPMS yaitu: mysql dan mysql-client.&quot;&gt;* MySQL package was split into two groups of RPMS is: mysql and mysql-client. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;* Fitur distcache dari Apache web server dipadamkan (disabled).&quot;&gt;* Features of the Apache web server distcache off (disabled). &lt;/span&gt;&lt;span title=&quot;* Aneka patches untuk PPTP, firewall dan peer-to-peer ditambahkan di kernel.&quot;&gt;* Various patches for PPTP, firewall and peer-to-peer added in the kernel. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;* Ditambahkan dukungan Legacy Megaraid untuk kernel sementara sejumlah drivers lama ditiadakan.&quot;&gt;* Added support for kernel Legacy Megaraid temporarily removed some older drivers. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Xnuxer live CD (xnux-lv)&quot;&gt;Xnuxer live CD (xnux-lv) &lt;/span&gt;&lt;span title=&quot;Xnuxer adalah sebuah distribusi yang dikembangkan oleh Dani Firman Syah.&quot;&gt;Xnuxer is a distribution developed by Daniel Firman Syah. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Versi live Xnuxer Linux 1.0 dibangun berbasisikan distro knoppix.&quot;&gt;Xnuxer live version 1.0 build berbasisikan Linux distro knoppix. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Distro kompak dalam 1 CD mengemas paket aplikasi yang umum dibutuhkan untuk perkantoran maupun hiburan termasuk: - OpenOffice 1.9.113 (2.0 beta), - Firefox 1.0.6 + flash player, - Acrobat Reader 7.0.&quot;&gt;Distro  compact in 1 CD package is a general application package needed to  offices and entertainment including: - OpenOffice 1.9.113 (2.0 beta), -  Firefox 1.0.6 + flash player, - Acrobat Reader 7.0. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;- Real Player 10, - Gaim 1.3.1 (Internet Messenger), - Gimp 2.2 (Program mirip Adobe Photoshop).&quot;&gt;- Real Player 10, - Gaim 1.3.1 (Internet Messenger) - Gimp 2.2 (Programs like Adobe Photoshop). &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Ubuntu&quot;&gt;Ubuntu &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ubuntu adalah sebuah OS Linux desktop dari Canonical Ltd.&quot;&gt;Ubuntu is a Linux desktop operating system from Canonical Ltd.. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;yang cukup komplit dan tersedia secara gratis.&quot;&gt;a fairly complete and available for free. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Salah satu manifesto Ubuntu adalah software seharusnya tersedia secara gratis, dapat digunakan oleh orang banyak dengan dukungan bahasa lokalnya, juga tentunya mudah dicustomised sesuai keinginan dan kebutuhan si pemakai.&quot;&gt;One  of the Ubuntu manifesto is a software should be available free of  charge, can be used by people with local language support, as well as of  course easy dicustomised wants and needs of the user. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Nama Ubuntu diambil dari bahasa Afrika kuno (dari kelompok bahasa Nguni) yang berarti &amp;quot;Humanity for others, caring and harmony&amp;quot; (kemanusiaan untuk sesama, peduli dan harmoni. Ubuntu yang lahir dari keturunan keluarga Debian seakan-akan hadir untuk menjawab tantangan dan menghilangkan kesan&quot;&gt;Ubuntu  name is taken from an ancient African language (from the Nguni language  group) which means &quot;Humanity for others, caring and harmony&quot; (humanity  to others, caring and harmony. Ubuntu offspring born to the family as if  Debian will be present to answer the challenge and eliminate the  impression &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;bahwa Debian adalah distribusi Linux tersulit bagi pengguna baru Linux, terutama pada tahap proses instalasi dan konfigurasi awal.&quot;&gt;Debian  Linux distribution that is most difficult for new users of Linux,  especially at this stage of the installation and initial configuration. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Instalasi Linux Ubuntu masih mempertahankan instalasi text based yang bukan command line dan tidak sebagus apabila kita meng-install distribusi lain seperti SuSE, Xandros atau Fedora Core.&quot;&gt;Installing  Ubuntu Linux is still maintaining a text-based installation is not a  command line and not as good as when we install other distributions like  SuSE, Xandros or Fedora Core. &lt;/span&gt;&lt;span title=&quot;Untuk mengetahui lebih jauh mengenai proses instalasi Linux Ubuntu, kunjungi situs www.linuxbeta.com.&quot;&gt;To learn more about Ubuntu Linux installation process, visit the site www.linuxbeta.com. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ciri khas dari Debian adalah penggunaan APT (Advanced Packaging Tool) yang berguna untuk meng-update operating system, baik security maupun versi program-programnya.&quot;&gt;A  unique feature of Debian is the use of APT (Advanced Packaging Tool) is  useful to update the operating system, both security as well as  versions of its programs. &lt;/span&gt;&lt;span title=&quot;Penggunaan APT ini makin dipermudah dalam distribusi Ubuntu melalui aplikasi Synaptic-nya yang cukup mudah dimengerti.&quot;&gt;Use of APT is further facilitated in the Ubuntu distribution through its application Synaptic quite easy to understand. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Synaptic dapat dengan mudah diakses melalui menu “Computer” di bagian atas, kemudian pilih “System Configuration”.&quot;&gt;Synaptic can be easily accessed via the menu &quot;Computer&quot; at the top, then select &quot;System Configuration&quot;. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Software dan aplikasi yang tersedia secara default pada Linux Ubuntu antara lain adalah: Evolution, Firefox, GAIM, GnomeMeeting, Xchat, gFTP sebagai aplikasi-aplikasi Internet, software games, software untuk manipulasi gambar seperti Gimp, Image Viewer dan Xsane Image Scanning serta didukung oleh&quot;&gt;Software  and applications available by default on Ubuntu Linux include:  Evolution, Firefox, Gaim, GnomeMeeting, Xchat, gFTP as Internet  applications, software games, software for image manipulation such as  Gimp, Image Viewer and XSane Image Scanning and supported by &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;software multimedia seperti CD Player, Music Player, Sound Juicer CD Ripper, Sound Recorder dan Totem Movie Player, yang akan memanjakan Anda, serta OpenOffice untuk aplikasi dokumen-dokumen Anda.&quot;&gt;multimedia  software such as CD Player, Music Player, Sound Juicer CD Ripper, Sound  Recorder and Totem Movie Player, which will pamper you, and OpenOffice  for your application documents. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Khusus untuk administrasi yang membutuhkan level superuser, Ubuntu lebih memilih penggunaan sudo, seperti yang sering kita jumpai dalam Operating System OS X.&quot;&gt;Especially  for administration that requires superuser level, preferring Ubuntu use  sudo, as we often encounter in the operating system OS X. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tidak seperti distribusi Linux pada umumnya yang lebih menonjolkan KDE sebagai pilihan desktop manager-nya, Ubuntu memilih penggunaan Gnome terbaru yaitu Gnome 2.8 dengan tampilan baru pada fitur monitoring baterai yang lebih baik, monitoring system network, themes dan file manager yang lebih disempurnakan.&quot;&gt;Unlike  Linux distributions in general are more feature KDE as desktop manager  of his choice, Ubuntu chose Gnome use the latest Gnome 2.8 with a new  look at the feature better battery monitoring, network monitoring  systems, themes and file manager that is more refined. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kekurangan Ubuntu yang paling banyak diutarakan adalah pembagian dan penentuan partisi pada saat proses awal instalasi, tidak adanya kesempatan untuk memilih paket-paket program yang akan kita install pada proses instalasi awal, serta tidak tersedianya VPN wizard (panduan untuk mengkonfigurasi VPN pada desktop Gnome).&quot;&gt;Disadvantages  of the most widely expressed Ubuntu is the distribution and  determination of the partition during the install process, not an  opportunity to choose which program packages will be installed at  initial installation process, and the unavailability of a VPN wizard (a  guide to configure the VPN to the Gnome desktop). &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2011/01/some-variants-of-linux.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-7228253447959561794</guid><pubDate>Sat, 08 Jan 2011 18:45:00 +0000</pubDate><atom:updated>2011-03-10T01:48:38.236+07:00</atom:updated><title>Wi-Fi</title><description>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Wi-Fi (atau Wi-fi, WiFi, Wifi, wifi) merupakan kependekan dari &amp;quot;Wireless Fidelity&amp;quot;, memiliki pengertian yaitu sekumpulan standar yang digunakan untuk Jaringan Lokal Nirkabel (Wireless Local Area Networks - WLAN) yang didasari pada spesifikasi IEEE 802.11.&quot;&gt;Wi-Fi  (or Wi-fi, WiFi, Wifi, wifi) is short for &quot;Wireless Fidelity&quot;, a notion  which is a set standard used for Wireless Local Networks (Wireless  Local Area Networks - WLANs) based on IEEE 802.11 specification. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Standar terbaru dari spesifikasi 802.11a atau b, seperti 802.16 g, saat ini sedang dalam penyusunan, spesifikasi terbaru tersebut menawarkan banyak peningkatan mulai dari luas cakupan yang lebih jauh hingga kecepatan transfernya.&quot;&gt;The  latest standards of specifications 802.11a or b, such as 802.16 g, is  currently in preparation, the latest specification will offer many  improvements ranging from more extensive coverage to the transfer speed. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Awalnya Wi-Fi ditujukan untuk pengunaan perangkat nirkabel dan Jaringan Local (LAN), namun saat ini lebih banyak digunakan untuk mengakses internet.&quot;&gt;Wi-Fi  originally intended for the use of wireless devices and the Local  Network (LAN), but now more widely used to access the Internet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hal ini memungkinan seseorang dengan komputer dengan kartu nirkabel (wireless card) atau personal digital assistant (PDA) untuk terhubung dengan internet dengan menggunakan access point (atau dikenal dengan hotspot) terdekat.&quot;&gt;This  allows anyone with a computer with a wireless card (wireless card) or  personal digital assistant (PDA) to connect to the Internet by using an  access point (or known as hotspots) nearby. &lt;/span&gt;&lt;span title=&quot;Spesifikasi&quot;&gt;Specification &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Wi-Fi dirancang berdasarkan spesifikasi IEEE 802.11.&quot;&gt;Wi-Fi was designed based on the IEEE 802.11 specification. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sekarang ini ada empat variasi dari 802.11, yaitu: 802.11a, 802.11b, 802.11g, and 802.11n.&quot;&gt;Today there are four variations of 802.11, as follows: 802.11a, 802.11b, 802.11g, and 802.11n. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Spesifikasi b merupakan produk pertama Wi-Fi.&quot;&gt;Specifications b is the first Wi-Fi products. &lt;/span&gt;&lt;span title=&quot;Variasi g dan n merupakan salah satu produk yang memiliki penjualan terbanyak pada 2005.&quot;&gt;The variation of g and n is one product that has the most sales in 2005. &lt;/span&gt;&lt;span title=&quot;Spesifikasi Wi-Fi&quot;&gt;Specifications Wi-Fi &lt;/span&gt;&lt;span title=&quot;Spesifikasi  Kecepatan  Frekuensi&quot;&gt;Specifications Speed Frequency &lt;/span&gt;&lt;span title=&quot;Band  Cocok&quot;&gt;Band Match &lt;/span&gt;&lt;span title=&quot;dengan&quot;&gt;with &lt;/span&gt;&lt;span title=&quot;802.11b  11 Mb/s  2.4 GHz  b&quot;&gt;802.11b 11 Mb / s 2.4 GHz b &lt;/span&gt;&lt;span title=&quot;802.11a  54 Mb/s  5 GHz  a&quot;&gt;802.11a 54 Mb / s 5 GHz a &lt;/span&gt;&lt;span title=&quot;802.11g  54 Mb/s  2.4 GHz  b, g&quot;&gt;802.11g 54 Mb / s 2.4 GHz b, g &lt;/span&gt;&lt;span title=&quot;802.11n  100 Mb/s  2.4 GHz  b, g, n&quot;&gt;802.11n 100 Mb / s 2.4 GHz b, g, n &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di banyak bagian dunia, frekuensi yang digunakan oleh Wi-Fi, pengguna tidak diperlukan untuk mendapatkan ijin dari pengatur lokal (misal, Komisi Komunikasi Federal di AS).&quot;&gt;In  many parts of the world, the frequencies used by Wi-Fi, users are not  required to obtain permission from local regulators (eg, Federal  Communications Commission in the U.S.). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;802.11a menggunakan frekuensi yang lebih tinggi dan oleh sebab itu daya jangkaunya lebih sempit, lainnya sama.&quot;&gt;802.11a uses a higher frequency and therefore narrower jangkaunya power, others the same. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Versi Wi-Fi yang paling luas dalam pasaran AS sekarang ini (berdasarkan dalam IEEE 802.11b/g) beroperasi pada 2.400 MHz sampai 2.483,50 MHz.&quot;&gt;Wi-Fi version of the most extensive in the U.S. market today (based in IEEE 802.11b / g) operates at 2400 MHz to 2483.50 MHz. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan begitu mengijinkan operasi dalam 11 channel (masing-masing 5 MHz), berpusat di frekuensi berikut:&quot;&gt;With so allows operation in 11 channels (each 5 MHz), centered on the following frequencies: &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;• Channel 1 - 2,412 MHz;&quot;&gt;• Channel 1 to 2.412 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 2 - 2,417 MHz;&quot;&gt;• Channel 2 to 2.417 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 3 - 2,422 MHz;&quot;&gt;• Channel 3 to 2.422 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 4 - 2,427 MHz;&quot;&gt;• Channel 4 to 2.427 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 5 - 2,432 MHz;&quot;&gt;• Channel 5 to 2.432 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 6 - 2,437 MHz;&quot;&gt;• Channel 6 to 2.437 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 7 - 2,442 MHz;&quot;&gt;• Channel 7 to 2.442 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 8 - 2,447 MHz;&quot;&gt;• Channel 8 to 2.447 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 9 - 2,452 MHz;&quot;&gt;• Channel 9 to 2.452 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 10 - 2,457 MHz;&quot;&gt;• Channel 10 to 2.457 MHz; &lt;/span&gt;&lt;span title=&quot;• Channel 11 - 2,462 MHz&quot;&gt;• Channel 11 to 2.462 MHz &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Secara teknis operasional, Wi-Fi merupakan salah satu varian teknologi komunikasi dan informasi yang bekerja pada jaringan dan perangkat WLANs (wireless local area network).&quot;&gt;Operational  Technically, Wi-Fi is one variant of communications and information  technology that works on the network and device WLANs (wireless local  area network). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain, Wi-Fi adalah nama dagang (certification) yang diberikan pabrikan kepada perangkat telekomunikasi (Internet) yang bekerja di jaringan WLANs dan sudah memenuhi kualitas interoperability yang dipersyaratkan.&quot;&gt;In  other words, the Wi-Fi is the trade name (certification) provided to  manufacturers of telecommunications equipment (Internet) working in  WLANs and network interoperability already meet the required quality. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Teknologi Internet berbasis Wi-Fi dibuat dan dikembangkan sekelompok insinyur Amerika Serikat yang bekerja pada Institute of Electrical and Electronis Engineers (IEEE) berdasarkan standar teknis perangkat bernomor 802.11b, 802.11a dan 802.16.&quot;&gt;Technology-based  Wi-Fi Internet created and developed a group of U.S. engineers who  worked at the Institute of Electrical and Electronis Engineers (IEEE)  technical standards-based numbered devices 802.11b, 802.11a and 802.16. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perangkat Wi-Fi sebenarnya tidak hanya mampu bekerja di jaringan WLAN, tetapi juga di jaringan Wireless Metropolitan Area Network (WMAN).&quot;&gt;Wi-Fi devices are not only able to work on WLAN networks, but also on network Wireless Metropolitan Area Network (WMAN). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena perangkat dengan standar teknis 802.11b diperuntukkan bagi perangkat WLAN yang digunakan di frekuensi 2,4 GHz atau yang lazim disebut frekuensi ISM (Industrial, Scientific dan Medical).&quot;&gt;Because  the device with the technical standard 802.11b WLAN devices intended  for use in the 2.4 GHz frequency or frequencies, commonly called ISM  (Industrial, Scientific and Medical). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sedang untuk perangkat yang berstandar teknis 802.11a dan 802.16 diperuntukkan bagi perangkat WMAN atau juga disebut Wi-Max, yang bekerja di sekitar pita frekuensi 5 GHz.&quot;&gt;As  for the technical standards 802.11a and 802.16 WMAN or destined for the  device is also called Wi-Max, who works in the vicinity of 5 GHz  frequency band. &lt;/span&gt;&lt;span title=&quot;Tingginya animo masyarakat --khususnya di kalangan komunitas Internet-- menggunakan teknologi Wi-Fi dikarenakan paling tidak dua faktor.&quot;&gt;High public interest - particularly among the Internet community - using Wi-Fi technology because at least two factors. &lt;/span&gt;&lt;span title=&quot;Pertama, kemudahan akses.&quot;&gt;First, the ease of access. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Artinya, para pengguna dalam satu area dapat mengakses Internet secara bersamaan tanpa perlu direpotkan dengan kabel.&quot;&gt;This means that users in one area can access the Internet simultaneously without having to be bothered with cables. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Konsekuensinya, pengguna yang ingin melakukan surfing atau browsing berita dan informasi di Internet, cukup membawa PDA (pocket digital assistance) atau laptop berkemampuan Wi-Fi ke tempat dimana terdapat access point atau hotspot.&quot;&gt;Consequently,  users who want to do surfing or browsing news and information on the  Internet, simply bring the PDA (pocket digital assistance) or Wi-Fi  enabled laptop into a place where there is access point or hotspot. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Menjamurnya hotspot di tempat-tempat tersebut --yang dibangun oleh operator telekomunikasi, penyedia jasa Internet bahkan orang perorangan-- dipicu faktor kedua, yakni karena biaya pembangunannya yang relatif murah atau hanya berkisar 300 dollar Amerika Serikat.&quot;&gt;The  proliferation of hotspots in places such - which was built by the  telecom operators, Internet service providers and even individual people  - triggered the second factor, namely because construction costs are  relatively cheap or only around 300 dollars U.S.. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Peningkatan kuantitas pengguna Internet berbasis teknologi Wi-Fi yang semakin menggejala di berbagai belahan dunia, telah mendorong Internet service providers (ISP) membangun hotspot yang di kota-kota besar dunia.&quot;&gt;Increasing  the quantity of Internet users based Wi-Fi technology is increasingly  implicated in various parts of the world, has encouraged Internet  service providers (ISPs) to build hotspots in major cities of the world. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Beberapa pengamat bahkan telah memprediksi pada tahun 2006, akan terdapat hotspot sebanyak 800.000 di negara-negara Eropa, 530.000 di Amerika Serikat dan satu juta di negara-negara Asia.&quot;&gt;Some  observers have even predicted in 2006, there will be 800,000 hotspots  in the countries of Europe, 530,000 in the United States and one million  in countries in Asia. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Keseluruhan jumlah penghasilan yang diperoleh Amerika Serikat dan negara-negara Eropa dari bisnis Internet berbasis teknologi Wi-Fi hingga akhir tahun 2003 diperkirakan berjumlah 5.4 trilliun dollar Amerika, atau meningkat sebesar 33 milyar dollar Amerika dari tahun 2002 (www.analysys.com).&quot;&gt;The  overall amount of income derived by the United States and European  countries of technology-based Internet business Wi-Fi until the end of  2003 was estimated at 5.4 trillion U.S. dollars, an increase of 33  billion U.S. dollars from the year 2002 (www.analysys.com). &lt;/span&gt;&lt;span title=&quot;Mewabah&quot;&gt;Plague &lt;/span&gt;&lt;span title=&quot;Di Indonesia sendiri, penggunaan Internet berbasis Wi-Fi sudah mulai menggejala di beberapa kota besar.&quot;&gt;In Indonesia alone, the use of Internet-based Wi-Fi already implicated in several major cities. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Di Jakarta, misalnya, para maniak Internet yang sedang berselancar sambil menunggu pesawat take off di ruang tunggu bandara, sudah bukan merupakan hal yang asing.&quot;&gt;In  Jakarta, for example, the maniacs who are surfing the Internet while  waiting for the plane took off at the airport waiting room, was not an  alien. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Fenomena yang sama terlihat diberbagai kafe --seperti Kafe Starbuck dan La Moda Cafe di Plaza Indonesia, Coffee Club Senayan, dan Kafe Mister Bean Coffee di Cilandak Town Square-- dimana pengunjung dapat membuka Internet untuk melihat berita politik atau gosip artis terbaru sembari menyeruput cappucino&quot;&gt;The  same phenomenon seen in many cafes - like Starbuck&#39;s Café and La Moda  Cafe in Plaza Indonesia, the Coffee Club Senayan, and Mister Bean Coffee  Cafe at Cilandak Town Square - where the visitor can open the Internet  to look at political news or the latest gossip while sipping a  cappuccino artist &lt;/span&gt;&lt;span title=&quot;panas.&quot;&gt;heat. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dewasa ini, bisnis telepon berbasis VoIP (Voice over Internet Protocol) juga telah menggunakan teknologi Wi-Fi, dimana panggilan telepon diteruskan melalui jaringan WLAN.&quot;&gt;Today,  business telephone-based VoIP (Voice over Internet Protocol) has also  been using Wi-Fi technology, where calls are forwarded through the WLAN  network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Aplikasi tersebut dinamai VoWi-FI (Voice over Wi-Fi).&quot;&gt;The application is named VoWi-FI (Voice over Wi-Fi). &lt;/span&gt;&lt;span title=&quot;Beberapa waktu lalu, standar teknis hasil kreasi terbaru IEEE telah mampu mendukung pengoperasian layanan video streaming.&quot;&gt;Some  time ago, the latest technical standards created by the IEEE has been  able to support the operation of a streaming video service. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bahkan diprediksi, nantinya dapat dibuat kartu (card) berbasis teknologi Wi-Fi yang dapat disisipkan ke dalam peralatan eletronik, mulai dari kamera digital sampai consoles video game (ITU News 8/2003).&quot;&gt;Even  the predictable, the future can be made cards (card)-based Wi-Fi  technology that can be inserted into electronic equipment, ranging from  digital cameras to video game consoles (ITU News 8 / 2003). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Berdasarkan paparan di atas, dapat disimpulkan bahwa bisnis dan kuantitas pengguna teknologi Wi-Fi cenderung meningkat, dan secara ekonomis hal itu berimplikasi positif bagi perekonomian nasional suatu negara, termasuk Indonesia.&quot;&gt;Based  on the above explanation, it can be concluded that the quantity of  business and technology, Wi-Fi users tend to increase, and economically  it has a positive impact on the national economy of a country, including  Indonesia. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Meskipun demikian, pemerintah seyogyanya menyikapi fenomena tersebut secara bijak dan hati-hati.&quot;&gt;Nevertheless, the government should address the phenomenon wisely and carefully. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pasalnya, secara teknologis jalur frekuensi --baik 2,4 GHz maupun 5 GHz-- yang menjadi wadah operasional teknologi Wi-Fi tidak bebas dari keterbatasan (Kompas, 5/2/2004).&quot;&gt;The  reason is, technologically frequency bands - both 2.4 GHz and 5 GHz -  which became operational container technology, Wi-Fi is not free of  limitations (Kompas, 2/5/2004). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pasalnya, pengguna dalam suatu area baru dapat memanfaatkan sistem Internet nirkabel ini dengan optimal, bila semua perangkat yang dipakai pada area itu menggunakan daya pancar yang seragam dan terbatas.&quot;&gt;Because  the users in a new area can take advantage of wireless Internet system  is optimally, when all the devices used in the area using a uniform  transmit power and limited. &lt;/span&gt;&lt;span title=&quot;Apabila prasyarat tersebut tidak diindahkan, dapat dipastikan akan terjadi harmful interference bukan hanya antar perangkat pengguna Internet, tetapi juga dengan perangkat sistem telekomunikasi lainnya.&quot;&gt;If  the preconditions are not honored, you can bet will happen is not only  harmful interference between devices of Internet users, but also with  other telecommunications systems devices. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bila interferensi tersebut berlanjut --karena penggunanya ingin lebih unggul dari pengguna lainnya, maupun karenanya kurangnya pemahaman terhadap keterbatasan teknologinya-- pada akhirnya akan membuat jalur frekuensi 2,4 GHz dan 5 GHz tidak dapat dimanfaatkan secara optimal.&quot;&gt;If  interference continues - because users want more superior than other  users, and therefore lack of understanding of the limitations of the  technology - in the end will make the path a frequency of 2.4 GHz and 5  GHz could not be used optimally. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Keterbatasan lain dari kedua jalur frekuensi nirkabel ini (khususnya 2,4 GHz) ialah karena juga digunakan untuk keperluan ISM (industrial, science and medical).&quot;&gt;Another  limitation of this second wireless frequency bands (particularly 2.4  GHz) is due also used for ISM (industrial, science and medical). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Konsekuensinya, penggunaan komunikasi radio atau perangkat telekomunikasi lain yang bekerja pada pada pita frekuensi itu harus siap menerima gangguan dari perangkat ISM, sebagaimana tertuang dalam S5.150 dari Radio Regulation.&quot;&gt;Consequently,  the use of radio communications or other telecommunication device that  works in the frequency band it should be ready to accept interference  from ISM devices, as stated in S5.150 of the Radio Regulations. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dalam rekomendasi ITU-R SM.1056, diinformasikan juga karakteristik perangkat ISM yang pada intinya bertujuan mencegah timbulnya interferensi, baik antar perangkat ISM maupun dengan perangkat telekomunikasi lainnnya.&quot;&gt;In  the recommendation ITU-R SM.1056, also informed the device  characteristics of the ISM which basically aims to prevent occurrence of  interference, both between devices with the ISM as well as  telecommunications equipment sharing. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Rekomendasi yang sama menegaskan bahwa setiap anggota ITU bebas menetapkan persyaratan administrasi dan aturan hukum yang terkait dengan keharusan pembatasan daya.&quot;&gt;The  same recommendation affirms that every member of the ITU-free establish  administrative requirements and rules of law relating to mandatory  power restrictions. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Menyadari keterbatasan dan dampak yang mungkin timbul dari penggunaan kedua jalur frekuensi nirkabel tersebut, berbagai negara lalu menetapkan regulasi yang membatasi daya pancar perangkat yang digunakan.&quot;&gt;Recognizing  the limitations and the impact that may arise from the use of both of  the wireless frequency bands, various countries and impose regulations  that limit the transmission power of the devices used. &lt;/span&gt;&lt;span title=&quot;Lebih tahu mengenai Wi-Fi&quot;&gt;More to know about Wi-Fi &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Wi-Fi (Wireless Fidelity) adalah koneksi tanpa kabel seperti handphone dengan mempergunakan teknologi radio sehingga pemakainya dapat mentransfer data dengan cepat dan aman.&quot;&gt;Wi-Fi  (Wireless Fidelity) is a wireless connection such as mobile phones  using radio technology so that users can transfer data quickly and  securely. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Wi-Fi tidak hanya dapat digunakan untuk mengakses internet, Wi-Fi juga dapat digunakan untuk membuat jaringan tanpa kabel di perusahaan.&quot;&gt;Wi-Fi not only allows you to access the Internet, Wi-Fi can also be used to create wireless networks in the enterprise. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena itu banyak orang mengasosiasikan Wi-Fi dengan “Kebebasan” karena teknologi Wi-Fi memberikan kebebasan kepada pemakainya untuk mengakses internet atau mentransfer data dari ruang meeting, kamar hotel, kampus, dan café-café yang bertanda “Wi-Fi Hot Spot”.&quot;&gt;Because  of that many people associate with Wi-Fi &quot;Freedom&quot; because Wi-Fi  technology gives freedom to users to access the Internet or transferring  data from the meeting room, hotel rooms, campus, and cafes are marked  &quot;Wi-Fi Hot Spot.&quot; &lt;/span&gt;&lt;span title=&quot;Juga salah satu kelebihan dari Wi-Fi adalah kecepatannya yang beberapa kali lebih cepat dari modem kabel yang tercepat.&quot;&gt;Also one of the advantages of Wi-Fi is a speed several times faster than the fastest cable modem. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jadi pemakai Wi-Fi tidak lagi harus berada di dalam ruang kantor untuk bekerja.&quot;&gt;So Wi-Fi users no longer have to be in office space to work. &lt;/span&gt;&lt;span title=&quot;Tapi Wi-Fi hanya dapat di akses dengan komputer, laptop, PDA atau Cellphone yang telah dikonfigurasi dengan Wi-Fi certified Radio.&quot;&gt;But Wi-Fi can only be accessed by computer, laptop, PDA or Cellphone that has been configured with Wi-Fi certified radio. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Untuk Laptop, pemakai dapat menginstall Wi-Fi PC Cards yang berbentuk kartu di PCMCIA Slot yang telah tersedia.&quot;&gt;For laptops, the user can install a Wi-Fi PC Cards in PCMCIA card-shaped slot that has been available. &lt;/span&gt;&lt;span title=&quot;Untuk PDA, pemakai dapat menginstall Compact Flash format Wi-Fi radio di slot yang telah tersedia.&quot;&gt;For PDA, the user can install the Compact Flash format Wi-Fi radio in the slots you have available. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bagi pengguna yang komputer atau PDA - nya menggunakan Windows XP, hanya dengan memasangkan kartu ke slot yang tersedia, Windows XP akan dengan sendirinya mendeteksi area disekitar Anda dan mencari jaringan Wi-Fi yang terdekat dengan Anda.&quot;&gt;For  users who are computer or PDA - it uses Windows XP, simply by putting  the card into an available slot, Windows XP will automatically detect  the area around you and look for Wi-Fi network that is closest to you. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Amatlah mudah menemukan tanda apakah peranti tersebut memiliki fasilitas Wi-Fi, yaitu dengan mencermati logo Wi-Fi CERTIFIED pada kemasannya.&quot;&gt;It  is very easy to find signs of whether the device has a Wi-Fi facility,  that is by looking at Wi-Fi CERTIFIED logo on the packaging. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Meskipun Wi-Fi hanya dapat diakses ditempat yang bertandakan “Wi-Fi Hotspot”, jumlah tempat-tempat umum yang menawarkan “Wi Fi Hotspot” meningkat secara drastis.&quot;&gt;Although  Wi-Fi can be accessed only place marked with &quot;Wi-Fi hotspot&quot;, the  number of public places that offer &quot;Wi Fi Hotspot&quot; increased  dramatically. &lt;/span&gt;&lt;span title=&quot;Hal ini disebabkan karena dengan dijadikannya tempat mereka sebagai “Wi-Fi Hotspot” berarti pelanggan mereka dapat mengakses internet yang artinya memberikan nilai tambah bagi para pelanggan.&quot;&gt;This  is due to maketh their place as &quot;Wi-Fi Hotspot&quot; means their customers  can access the Internet, which means giving added value to our  customers. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Layanan Wi-Fi yang ditawarkan oleh masing-masing “Hots Spot” pun beragam, ada yang menawarkan akses secara gratis seperti halnya di executive lounge Bandara, ada yang mengharuskan pemakainya untuk menjadi pelanggan salah satu ISP yang menawarkan fasilitas Wi-Fi dan ada juga yang&quot;&gt;Wi-Fi  service offered by each of the &quot;Hots Spot&quot; also varied, some offering  free access as well as in airport executive lounges, some require users  to become subscribers of an ISP that offers free Wi-Fi and there is also  a &lt;/span&gt;&lt;span title=&quot;menawarkan kartu pra-bayar.&quot;&gt;offer pre-paid card. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Apapun pilihan Anda untuk cara mengakses Wi-Fi, yang terpenting adalah dengan adanya Wi-Fi, Anda dapat bekerja dimana saja dan kapan saja hingga Anda tidak perlu harus selalu terkurung di ruang kerja Anda untuk menyelesaikan setiap pekerjaan.&quot;&gt;Whatever  your choice for how to access Wi-Fi, the most important is the presence  of Wi-Fi, you can work anywhere and at anytime until you do not need to  be always locked in your workspace to complete each task. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Teknologi Wireless&quot;&gt;Wireless Technology &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Menjadi pelopor pembangunan akses internet wireless di Bogor, PT BoNet Utama menyediakan koneksi Internetnya melalui VSAT (Very Small Apateur Terminal) ke World Wide Web.&quot;&gt;Pioneered  the development of wireless Internet access in Bogor, PT Bonet Utama  provide its Internet connection via VSAT (Very Small Apateur Terminal)  to the World Wide Web. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hal ini untuk memberikan pilihan bagi para pengguna Internet untuk mengirim email dan download data yang tidak tergantung dari infrastuktur telekomunikasi dial-up.&quot;&gt;This  is to provide options for users of the Internet to send emails and  download data that does not depend on dial-up telecommunications  infrastructure. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Teknologi jaringan komputer tanpa kabel untuk mengakses Internet boleh dikatakan diawali dari kampus ITB di Bandung, yang pada saat itu dimotori oleh Dr.&quot;&gt;Wireless  computer networking technology to access the Internet may be regarded  as starting from ITB campus in Bandung, which at that time led by Dr. &lt;/span&gt;&lt;span title=&quot;Onno W.&quot;&gt;Onno W. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Purbo dengan tim CNRG-nya, dimana mereka merakit komputer PC sederhana yang dilengkapi dengan FreeBSD dengan tambahan card PCMCIA WaveLAN dan ethernet card, dibantu dengan antena outdoor sehingga dapat menjangkau jarak sambungan yang cukup jauh.&quot;&gt;Purbo  CNRG with his team, where they assemble a simple PC computer equipped  with an additional FreeBSD WaveLAN PCMCIA cards and ethernet cards,  assisted with an outdoor antenna so it can reach far enough distance  connections. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Akal-akalan yang merupakan hasil kreatifitas murni ini sampai hari ini masih dimanfaatkan oleh banyak warnet dan perusahaan-perusahaan menengah, walaupun PCMCIA card yang namanya WaveLAN itu sudah almarhum, perusahaannya dibeli oleh Lucent, untuk kemudian dirubah nama produknya menjadi Orinoco dari Avaya, anak perusahaannya&quot;&gt;Subterfuge  which is the result of pure creativity is to this day still used by  many cafes and medium enterprises, although the name WaveLAN PCMCIA card  that was already deceased, his company was bought by Lucent, for then  changed the name of its product into the Orinoco from Avaya, its  subsidiary &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Lucent.&quot;&gt;Lucent. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jadi, dihimbau untuk tidak menyebut teknologi wireless dengan sebutan WaveLAN, karena konotasinya salah dan bisa di tertawakan oleh orang-orang yang mendalami teknologi ini, cukup menyebut WLAN atau Wireless-LAN.&quot;&gt;So,  are encouraged to not mention the wireless technology known as WaveLAN,  because of its connotation is wrong and can laugh at people who study  this technology, simply called WLAN or Wireless-LAN. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Teknologi yang dipakai oleh grupnya CNRG pada waktu itu sebetulnya menggunakan satu standar dari IEEE, yaitu kumpulan para insinyur dari seluruh dunia (tepatnya dari Amerika) yang menelurkan standar 802.11 yaitu standar komunikasi jaringan dengan tanpa menggunakan kabel dan menggunakan frekwensi 2,4GHz.&quot;&gt;The  technology used by his group CNRG at that time actually using one of  the IEEE standard, which is a collection of engineers from around the  world (rather than American), which spawned the 802.11 standard that is  standard with network communication without using a cable and use the  2.4 GHz frequency. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada saat itu, percobaan yang dilakukan dengan menggunakan card WaveLAN hanya dapat memindahkan data sebesar 2Mbps, sedang saat ini, standar yang banyak dipakai adalah 802.11B yang dapat memindahkan data sampai 11Mbps, dan tahun mendatang kemungkinan akan digantikan atau bergeser ke standar 802.11G yang dapat&quot;&gt;At  that time, experiments conducted using WaveLAN cards can only move data  at 2Mbps, being present, the standard that is widely used is 802.11b  that can move data up to 11Mbps, and next year will likely be replaced  or shifted to the 802.11g standard that can be &lt;/span&gt;&lt;span title=&quot;memindahkan data sampai 50Mbps!.&quot;&gt;move data up to 50Mbps!. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Penggunaan standar 802.11 atau 802.11B yang dirancang untuk dipakai di dalam ruangan (indoor) sebetulnya sangat tidak efisien dan bisa saling mengganggu satu sama lain, karena kebanyakan sistem 802.11 selalu mencari rekan-rekan-nya yang juga &#39;on air&#39;, sehingga memperlambat kinerja akses&quot;&gt;Use  802.11 or 802.11b standard, designed for use indoors (indoor) is  actually very inefficient and can mutually interfere with each other, as  most 802.11 systems are always looking for his colleagues who are also  &#39;on water&#39;, thus slowing the performance of access &lt;/span&gt;&lt;span title=&quot;yang kita inginkan.&quot;&gt;what we want. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pemaksaan teknologi ini didasarkan pada faktor harga murah dan terjangkau, karena standar 802.11 dan 802.11B merupakan standar umum untuk komunikasi di dalam ruangan, sehingga banyak perusahaan di Taiwan yang membuatnya, menjadikan harganya terjangkau, sekitar USD 75 sampai USD 125 per unit dasarnya.&quot;&gt;Imposition  of this technology is based on cheap and affordable price factor,  because the standard 802.11 and 802.11b is the common standard for  communication in the room, so many companies in Taiwan that make it,  make it affordable, around USD 75 to USD 125 per unit basis. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Problem yang sering terjadi di lapangan, yaitu pengetahuan si pemasangnya yang terbatas, sehingga perangkat yang sebetulnya hanya dipakai di dalam ruangan, dan kalau dipaksakan hanya bisa bekerja di jarak sekitar 6 km ini, dipaksakan lagi untuk bisa berkomunikasi sampai puluhan kilometer dengan bantuan penguat.&quot;&gt;Problems  that often occur in the field, namely the pemasangnya limited  knowledge, so that the device is really only used indoors, and if  enforced could only work at a distance of about 6 km of this, forced  again to be able to communicate up to tens of kilometers with the help  of the amplifier. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hal ini menyebabkan kisruhnya pemakaian 2,4GHz yang memang di Amerika merupakan frekwensi yang bebas digunakan tanpa perlu mendaftar atau memberitahu pihak berwenang.&quot;&gt;This  causes kisruhnya use 2.4 GHz which is in the United States is a  frequency that is free to use without needing to register or notify the  authorities. &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Untuk penggunaan 2,4GHz di luar ruangan, kita harus menggunakan perangkat yang mengikuti standar 802.16, yaitu standar IEEE untuk Wireless MAN (Metropolitan Area Network), jadi bukan memaksakan 802.11 dan 802.11B.&quot;&gt;To  use 2.4 GHz in the outdoors, we must use the device that follow the  802.16 standard, namely IEEE standard for Wireless MAN (Metropolitan  Area Network), so it is not imposing 802.11 and 802.11b. &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Masalah ini sebetulnya sangat tergantung pada anggaran dan daya beli masyarakat pengguna, dimana krisis ekonomi dan stagnasi dunia bisnis, menyebabkan para pemain IT betul-betul harus mengencangkan ikat pinggan, menggunakan perangkat yang seirit-irit mungkin.&quot;&gt;This  problem is actually very dependent on the budget and the purchasing  power of the user community, where economic crisis and stagnation in the  business world, leading IT players really have to tighten the belt  plate, using a device that seirit-efficient as possible. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sayangnya, standar 802.16 sampai saat ini belum &#39;matang&#39;, sehingga belum banyak perusahaan yang mengikuti standar tersebut, dan yang paling penting, skala ekonominya masih tinggi dan harganya sudah tentu masih belum terjangkau oleh perusahaan menengah ke bawah.&quot;&gt;Unfortunately,  the 802.16 standard, has not been &#39;cooked&#39;, so not many companies that  follow these standards, and most importantly, its economic scale is  still high and the price is certainly still beyond the company&#39;s  lower-middle. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perkembangan teknologi 2,4GHz ini sangat cepat sekali, apalagi ditunjang oleh industri di Taiwan yang sudah siap membuat produk ini sebagai produk massal dengan harga jual yang setiap hari makin murah dan makin hebat.&quot;&gt;2.4  GHz technology development is very fast at all, let alone supported by  the industry in Taiwan who are ready to make this product as a mass  product with a selling price that every day more and more cheap and more  powerful. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada awal tahun 2000-an yang lalu, ada beberapa perusahaan Taiwan dan Jepang yang membuat satu terobosan, yaitu dengan membuat apa yang sering disebut sebagai Wireless in The Box, yaitu perangkat &#39;ciptaan&#39; Onno dan kawan-kawan yang dikemas dalam bentuk yang lebih kecil&quot;&gt;In  the early 2000s ago, there are several Taiwanese and Japanese companies  that make a breakthrough, namely by making what is often referred to as  Wireless in The Box, which is the &#39;creation&#39; Onno and his friends are  packed in a smaller form &lt;/span&gt;&lt;span title=&quot;, tanpa menggunakan komputer.&quot;&gt;, without using a computer. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Wireless in The Box ini (WITB) berisi card PCMCIA yang dipasang pada satu papan elektronik yang dirancang sedemikian rupa, sehingga dapat memindahkan data dari radio yang ada di PCMCIA ke saluran ethernet.&quot;&gt;Wireless  In The Box (WITB) contains a PCMCIA card installed in an electronic  board that is designed in such a way that can move data from the radio  is on a PCMCIA to ethernet channel. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jadi, ada dua koneksi yang ada di WITB, satu sambungan ke antena luar, satu sambungan RJ-45 standar ethernet, dan dua lain sambungan standar serial untuk pengaturan awal, dan sambungan power ke adaptor 9 volt.&quot;&gt;So,  there are two connections on the WITB, a connection to an external  antenna, a connection standard RJ-45 Ethernet, and two other standard  serial connection for initial setup, and power connections to the 9 volt  adapter. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;WITB disambung ke switch atau hub dalam jaringan lokal, untuk kemudian dengan menggunakan software yang disertakan pada unit tersebut, kita dapat mengatur berbagai parameter yang ada, seperti pengaturan IP address, client dan access point, dan pengaturan lainnya yang merupakan kelengkapan penggunaan WITB.&quot;&gt;WITB  connected to a switch or hub in a local network, and then by using the  software that comes on these units, we can set various parameters, such  as setting the IP address, the client and access point, and other  settings is the completeness of the use WITB. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Teknologi yang dipakai oleh grupnya CNRG pada waktu itu sebetulnya menggunakan satu standar dari IEEE, yaitu kumpulan para insinyur dari seluruh dunia (tepatnya dari Amerika) yang menelurkan standar 802.11 yaitu standar komunikasi jaringan dengan tanpa menggunakan kabel dan menggunakan frekwensi 2,4GHz.&quot;&gt;The  technology used by his group CNRG at that time actually using one of  the IEEE standard, which is a collection of engineers from around the  world (rather than American), which spawned the 802.11 standard that is  standard with network communication without using a cable and use the  2.4 GHz frequency. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada saat itu, percobaan yang dilakukan dengan menggunakan card WaveLAN hanya dapat memindahkan data sebesar 2Mbps, sedang saat ini, standar yang banyak dipakai adalah 802.11B yang dapat memindahkan data sampai 11Mbps, dan tahun mendatang kemungkinan akan digantikan atau bergeser ke standar 802.11G yang dapat&quot;&gt;At  that time, experiments conducted using WaveLAN cards can only move data  at 2Mbps, being present, the standard that is widely used is 802.11b  that can move data up to 11Mbps, and next year will likely be replaced  or shifted to the 802.11g standard that can be &lt;/span&gt;&lt;span title=&quot;memindahkan data sampai 50Mbps!.&quot;&gt;move data up to 50Mbps!. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Penggunaan standar 802.11 atau 802.11B yang dirancang untuk dipakai di dalam ruangan (indoor) sebetulnya sangat tidak efisien dan bisa saling mengganggu satu sama lain, karena kebanyakan sistem 802.11 selalu mencari rekan-rekan-nya yang juga &#39;on air&#39;, sehingga memperlambat kinerja akses&quot;&gt;Use  802.11 or 802.11b standard, designed for use indoors (indoor) is  actually very inefficient and can mutually interfere with each other, as  most 802.11 systems are always looking for his colleagues who are also  &#39;on water&#39;, thus slowing the performance of access &lt;/span&gt;&lt;span title=&quot;yang kita inginkan.&quot;&gt;what we want. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pemaksaan teknologi ini didasarkan pada faktor harga murah dan terjangkau, karena standar 802.11 dan 802.11B merupakan standar umum untuk komunikasi di dalam ruangan, sehingga banyak perusahaan di Taiwan yang membuatnya, menjadikan harganya terjangkau, sekitar USD 75 sampai USD 125 per unit dasarnya.&quot;&gt;Imposition  of this technology is based on cheap and affordable price factor,  because the standard 802.11 and 802.11b is the common standard for  communication in the room, so many companies in Taiwan that make it,  make it affordable, around USD 75 to USD 125 per unit basis. &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Problem yang sering terjadi di lapangan, yaitu pengetahuan si pemasangnya yang terbatas, sehingga perangkat yang sebetulnya hanya dipakai di dalam ruangan, dan kalau dipaksakan hanya bisa bekerja di jarak sekitar 6 km ini, dipaksakan lagi untuk bisa berkomunikasi sampai puluhan kilometer dengan bantuan penguat.&quot;&gt;Problems  that often occur in the field, namely the pemasangnya limited  knowledge, so that the device is really only used indoors, and if  enforced could only work at a distance of about 6 km of this, forced  again to be able to communicate up to tens of kilometers with the help  of the amplifier. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hal ini menyebabkan kisruhnya pemakaian 2,4GHz yang memang di Amerika merupakan frekwensi yang bebas digunakan tanpa perlu mendaftar atau memberitahu pihak berwenang.&quot;&gt;This  causes kisruhnya use 2.4 GHz which is in the United States is a  frequency that is free to use without needing to register or notify the  authorities. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Untuk penggunaan 2,4GHz di luar ruangan, kita harus menggunakan perangkat yang mengikuti standar 802.16, yaitu standar IEEE untuk Wireless MAN (Metropolitan Area Network), jadi bukan memaksakan 802.11 dan 802.11B.&quot;&gt;To  use 2.4 GHz in the outdoors, we must use the device that follow the  802.16 standard, namely IEEE standard for Wireless MAN (Metropolitan  Area Network), so it is not imposing 802.11 and 802.11b. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Masalah ini sebetulnya sangat tergantung pada anggaran dan daya beli masyarakat pengguna, dimana krisis ekonomi dan stagnasi dunia bisnis, menyebabkan para pemain IT betul-betul harus mengencangkan ikat pinggan, menggunakan perangkat yang seirit-irit mungkin.&quot;&gt;This  problem is actually very dependent on the budget and the purchasing  power of the user community, where economic crisis and stagnation in the  business world, leading IT players really have to tighten the belt  plate, using a device that seirit-efficient as possible. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sayangnya, standar 802.16 sampai saat ini belum &#39;matang&#39;, sehingga belum banyak perusahaan yang mengikuti standar tersebut, dan yang paling penting, skala ekonominya masih tinggi dan harganya sudah tentu masih belum terjangkau oleh perusahaan menengah ke bawah.&quot;&gt;Unfortunately,  the 802.16 standard, has not been &#39;cooked&#39;, so not many companies that  follow these standards, and most importantly, its economic scale is  still high and the price is certainly still beyond the company&#39;s  lower-middle. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perkembangan teknologi 2,4GHz ini sangat cepat sekali, apalagi ditunjang oleh industri di Taiwan yang sudah siap membuat produk ini sebagai produk massal dengan harga jual yang setiap hari makin murah dan makin hebat.&quot;&gt;2.4  GHz technology development is very fast at all, let alone supported by  the industry in Taiwan who are ready to make this product as a mass  product with a selling price that every day more and more cheap and more  powerful. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada awal tahun 2000-an yang lalu, ada beberapa perusahaan Taiwan dan Jepang yang membuat satu terobosan, yaitu dengan membuat apa yang sering disebut sebagai Wireless in The Box, yaitu perangkat &#39;ciptaan&#39; Onno dan kawan-kawan yang dikemas dalam bentuk yang lebih kecil&quot;&gt;In  the early 2000s ago, there are several Taiwanese and Japanese companies  that make a breakthrough, namely by making what is often referred to as  Wireless in The Box, which is the &#39;creation&#39; Onno and his friends are  packed in a smaller form &lt;/span&gt;&lt;span title=&quot;, tanpa menggunakan komputer.&quot;&gt;, without using a computer. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Wireless in The Box ini (WITB) berisi card PCMCIA yang dipasang pada satu papan elektronik yang dirancang sedemikian rupa, sehingga dapat memindahkan data dari radio yang ada di PCMCIA ke saluran ethernet.&quot;&gt;Wireless  In The Box (WITB) contains a PCMCIA card installed in an electronic  board that is designed in such a way that can move data from the radio  is on a PCMCIA to ethernet channel. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jadi, ada dua koneksi yang ada di WITB, satu sambungan ke antena luar, satu sambungan RJ-45 standar ethernet, dan dua lain sambungan standar serial untuk pengaturan awal, dan sambungan power ke adaptor 9 volt.&quot;&gt;So,  there are two connections on the WITB, a connection to an external  antenna, a connection standard RJ-45 Ethernet, and two other standard  serial connection for initial setup, and power connections to the 9 volt  adapter. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;WITB disambung ke switch atau hub dalam jaringan lokal, untuk kemudian dengan menggunakan software yang disertakan pada unit tersebut, kita dapat mengatur berbagai parameter yang ada, seperti pengaturan IP address, client dan access point, dan pengaturan lainnya yang merupakan kelengkapan penggunaan WITB.&quot;&gt;WITB  connected to a switch or hub in a local network, and then by using the  software that comes on these units, we can set various parameters, such  as setting the IP address, the client and access point, and other  settings is the completeness of the use WITB. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kalau memang dibutuhkan jarak yang jauh untuk menghubungkan dua titik, sebaiknya menggunakan perangkat yang memang khusus untuk jarak jauh dan menggunakan frekwensi bukan 2,4GHz.&quot;&gt;If  it takes a long distance to connect two points, preferably using a  device that is specifically for long distance and use the 2.4 GHz  frequency instead. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Noise dan interferensi&quot;&gt;Noise and interference &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Noise yang terjadi, disebabkan oleh perangkat lain yang bekerja di sekitar 2,4GHz, seperti micro-wave oven, perangkat blue tooth, dan lainnya, karena kita ketahui, bahwa frekwensi 2,4GHz ini awalnya digunakan untuk industri, ilmu pengetahuan, dan kedokteran (&quot;&gt;Noise  that occurs, is caused by other devices that work at around 2.4 GHz,  such as micro-wave oven, blue tooth devices, and others, because we know  that the frequency of 2.4 GHz was originally used for industrial,  scientific, and medical ( &lt;/span&gt;&lt;span title=&quot;ISM band).&quot;&gt;ISM band). &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Interferensi disebabkan oleh pengguna perangkat 2,4GHz lain, yang bekerja pada saluran yang sama.&quot;&gt;Interference caused by other 2.4GHz device users, who worked on the same line. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Peraturan yang akan berlaku&quot;&gt;Regulations that will apply &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sampai saat ini, pemerintah melalui Postel belum membuat aturan yang pasti soal frekwensi 2,4GHz yang di Amerika adalah frekwensi gratis untuk dipakai oleh berbagai kalangan.&quot;&gt;Until  now, the government through Postel has not made definite rules about  the frequency of 2.4 GHz frequency which in America is free for use by  various circles. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Penggodokan peraturan ini masih dilempar-lempar antara Postel dan komunitas pengguna wireless, yang sering disebut IndoWLI dan berkumpul semua di milis IndoWLI@yahoogroups.com&quot;&gt;The  formulation of this rule is still thrown-throwing between the post and  telecommunications and wireless user community, often called IndoWLI and  gather all the mailing lists IndoWLI@yahoogroups.com &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dalam waktu dekat akan ada peraturan yang mengharuskan pengguna perangkat wireless untuk membayar pajak atau biaya registrasi berdasarkan jumlah base station-nya.&quot;&gt;In  the near future there will be rules that require wireless device users  to pay taxes or registration fee based on the number of its base  station. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Semua kendala dan isu-isu hangat sekitar penggunaan dan pemanfaatan teknologi tanpa kabel ini masih merupakan masalah yang saling silang dan ada beberapa yang belum dapat dipecahkan dengan cepat, walaupun para pengguna atau calon pengguna, sudah berharap sangat besar pada teknologi ini.&quot;&gt;All  the constraints and issues surrounding the use and utilization of warm  This wireless technology is still a problem that cross each other and  there are some that can not be solved quickly, even if the users or  potential users, is hoping very big on this technology. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/wi-fi.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-4638571425997399681</guid><pubDate>Mon, 09 Jun 2008 23:30:00 +0000</pubDate><atom:updated>2011-03-10T02:01:39.640+07:00</atom:updated><title>IPv6: Internet Protocol Next Generation</title><description>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perkembangan Internet dan network akhir-akhir ini telah membuat Internet Protocol (IP) yang merupakan tulang punggung networking berbasis TCP/IP dengan cepat menjadi ketinggalan zaman.&quot;&gt;Internet  and network development lately has been making the Internet Protocol  (IP)-based networking is the backbone of TCP / IP is quickly becoming  obsolete. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika dua dekade yang lalu IP merupakan penyambung jutaan komputer, maka saat ini IP harus mampu menghubungkan milyaran komputer.&quot;&gt;If  two decades ago, the IP is connecting millions of computers, then the  current IP should be able to connect billions of computers. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Selama ini Internet dan network TCP/IP yang lainnya dirancang untuk mendukung penggunaan-terdistribusi sederhana seperti transfer file (ftp), surat elektronik (e-mail), akses jarak jauh (remote access) dengan menggunakan TELNET.&quot;&gt;So  far, Internet and network TCP / IP the other designed to support the  use of such simple-distributed file transfer (ftp), electronic mail  (e-mail), remote access (remote access) by using TELNET. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Akan tetapi saat ini, akibat ledakan popularitas World Wide Web beberapa tahun terakhir ini, Internet telah tumbuh menjadi multimedia.&quot;&gt;But today, due to the explosion of popularity of the World Wide Web in recent years, the Internet has grown into multimedia. &lt;/span&gt;&lt;span title=&quot;Pada saat yang sama jaringan di perusahaan telah beralih dari e-mail dan penggunaan transfer file sederhana kepada lingkungan client/server yang kompleks.&quot;&gt;At  the same time in the company&#39;s network has shifted from e-mail and use  simple file transfers to the environment client / server complex. &lt;/span&gt;&lt;span title=&quot;Perkembangan ini telah membuat terlampauinya kapasitas jaringan berbasis IP untuk mensuplai layanan dan fungsi yang diperlukan.&quot;&gt;These developments have made exceeding the capacity of IP-based network to supply the necessary services and functions. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sebuah lingkungan seperti Internet membutuhkan dukungan pada lalu-lintas data secara real-time maupun fungsi sekuriti.&quot;&gt;An environment like the Internet requires support for data traffic in real-time and security functions. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kebutuhan ini saat ini sangat sulit dipenuhi oleh IP versi 4 atau sering disebut IPv4.&quot;&gt;This need is very difficult to be fulfilled by the IP version 4, or often called IPv4. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pengembangan IPv6, IP Generasi berikut atau IPng (IP next generation) --yang direkomendasikan pada pertemuan IETF di Toronto tanggal 25 Juli 1994-- dilatarbelakangi oleh kekurangan IP address yang saat ini memiliki panjang 32 bit, akibat ledakan pertumbuhan jaringan.&quot;&gt;Development  of IPv6, IP next generation, or IPng (IP next generation) - recommended  in the IETF meeting in Toronto on July 25, 1994 - backed by a shortage  of IP addresses that currently has a length of 32 bits, due to tissue  growth explosion. &lt;/span&gt;&lt;span title=&quot;IPv6 merupakan versi baru dari IP yang merupakan pengembangan dari IPv4.&quot;&gt;IPv6 is a new version of IP which is the development of IPv4. &lt;/span&gt;&lt;span title=&quot;Kekurangan IP address&quot;&gt;IP address shortage &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IP address adalah sederetan bilangan binary sepanjang 32 bit, yang dipakai untuk mengidentifikasi host pada jaringan.&quot;&gt;IP address is a row along the 32-bit binary numbers, which are used to identify hosts on the network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IP address ini diberikan secara unik pada masing-masing komputer/host yang tersambung ke internet.&quot;&gt;IP addresses are given uniquely to each computer / host which is connected to the internet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Packet yang membawa data, dimuati IP address dari komputer pengirim data, dan IP address dari komputer yang dituju, kemudian data tersebut dikirim ke jaringan.&quot;&gt;Packet  that carries data, loaded the IP address of the sender&#39;s computer data,  and IP address of the destination computer, then the data is sent to  the network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Packet ini kemudian dikirim dari router ke router dengan berpedoman pada IP address tersebut, menuju ke komputer yang dituju.&quot;&gt;Packet is then sent from router to router based on the IP address, go to the computer. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Seluruh host/komputer yang tersambung ke Internet, dibedakan hanya berdasarkan IP address ini, jadi jelaslah bahwa tidak boleh terjadi duplikasi.&quot;&gt;All  host / computer that is connected to the Internet, differentiated only  by IP addresses, so it is clear that there can be duplication. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sehingga IP address ini dibagikan oleh beberapa organisasi yang memiliki otoritas atas pembagian IP address tersebut, seperti Inter-NIC (Network Information Center).&quot;&gt;So  IP addresses are distributed by several organizations that have  authority over the distribution of IP addresses, such as the Inter-NIC  (Network Information Center). &lt;/span&gt;&lt;span title=&quot;Pada mulanya, address dengan 32 bit ini dianggap cukup untuk dibagikan pada host.&quot;&gt;At first, with 32-bit address is deemed sufficient to be shared on the host. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Tetapi dengan perkembangan internet yang luar biasa beberapa tahun terakhir ini, muncul kekhawatiran akan habisnya IP address ini, akibat permintaan yang luar biasa.&quot;&gt;But  with the tremendous growth of the Internet in recent years, there are  fears this will end IP address, due to exceptional demand. &lt;/span&gt;&lt;span title=&quot;Selama ini inter-NIC memberi IP address dengan menggunakan konsep kelas.&quot;&gt;During this inter-NIC provides the IP address by using the concept of class. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Maksudnya, IP address sepanjang 32 bit ini dibagi menjadi 2, yaitu bagian jaringan dan bagian host, Inter-NIC hanya mengelola bagian jaringan saja.&quot;&gt;That  is, throughout the 32-bit IP address is divided into 2, namely the  network and the host, the Inter-NIC only manage the network only. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain pada saat memberi IP address pada sebuah organisasi, Inter-NIC hanya memberi bagian jaringannya saja, sedang sisanya, pemberian IP address pada masing-masing host diserahkan pada organisasi tersebut.&quot;&gt;In  other words, when given an IP address in an organization, the Inter-NIC  only give part of its network only, while the rest, giving the IP  address on each host submitted on the organization. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada IPv4 ada 3 jenis Kelas, tergantung dari besarnya bagian host, yaitu kelas A (bagian host sepanjang 24 bit , IP address dapat diberikan pada 16,7 juta host) , kelas B (bagian host sepanjang 16 bit = 65534 host) dan kelas C&quot;&gt;In  IPv4 there are 3 types of classes, depending on the size of the host,  namely class A (all 24-bit host part, the IP address can be given to  host 16.7 million), class B (all 16-bit host part host = 65 534) and  class C &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;(bagian host sepanjang 8 bit = 254 host ).&quot;&gt;(host part all 8 bits = 254 hosts). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Administrator jaringan mengajukan permohonan jenis kelas berdasarkan skala jaringan yang dikelolanya.Konsep kelas ini memiliki keuntungan yaitu : pengelolaan rute informasi tidak memerlukan seluruh 32 bit tersebut, melainkan cukup hanya bagian jaringannya saja, sehingga besar informasi rute yang disimpan di router, menjadi kecil.&quot;&gt;Network  administrator to apply for the class type scale based on a network that  dikelolanya.Konsep this class have the advantage of: the management of  information routes do not require all 32 bits, but quite simply the  network only, so large that the route information stored in the router,  becomes small. &lt;/span&gt;&lt;span title=&quot;Konsep Kelas&quot;&gt;Concept Classes &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Setelah address jaringan diperoleh, maka organisasi tersebut dapat secara bebas memberikan address bagian host pada masing-masing hostnya.&quot;&gt;Once the network address is obtained, then the organization can freely give the address of the host on each host. &lt;/span&gt;&lt;span title=&quot;Tetapi tidak pasti seluruh address yang diperoleh dapat dipakai.&quot;&gt;But surely not all addresses obtained can be used. &lt;/span&gt;&lt;span title=&quot;Pada kenyataannya banyak yang tidak terpakai.&quot;&gt;In fact many unused. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Contohnya, organisasi yang tersambung ke internet dengan jumlah host sebanyak 1000 buah, karena jumlah host tersebut lebih dari 256, maka akan memilih kelas B.&quot;&gt;For  example, organizations that are connected to the internet with a number  of hosts as many as 1,000 pieces, because the number of that host more  than 256, then selects the class B. &lt;/span&gt;&lt;span title=&quot;Akibatnya hanya sebagian kecil dari 65536 address yang diperoleh yang dipakai.&quot;&gt;Consequently only a small proportion than 65536 addresses acquired is used. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sementara itu, address yang tersisa tidak dapat digunakan oleh organisasi lain.&quot;&gt;Meanwhile, the remaining addresses can not be used by other organizations. &lt;/span&gt;&lt;span title=&quot;Akibatnya, saat ini terjadi kekurangan IP address, khususnya kelas B.&quot;&gt;As a result, the current shortage of IP addresses, particularly the class B. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Untuk mengatasi hal tersebut, diambil cara, sebagai ganti memberi 1 kelas, maka diberikan beberapa kelas yang lebih kecil.&quot;&gt;To overcome this, taken way, instead of giving a class, then given some smaller classes. &lt;/span&gt;&lt;span title=&quot;Contohnya pada kasus 1000 host di atas, sebagai ganti kelas B, diberikan kelas C sebanyak 4 buah.&quot;&gt;For example in 1000 hosted the above case, instead of class B, class C is given by 4 units. &lt;/span&gt;&lt;span title=&quot;Sehingga didapat pembagian IP secara lebih efisien.&quot;&gt;Order to get the IP in a more efficient distribution. &lt;/span&gt;&lt;span title=&quot;Tetapi sebaliknya, hal ini telah menyebabkan munculnya persoalan lain, yaitu membengkaknya informasi routing.&quot;&gt;But instead, this has led to the emergence of another problem, namely swelling of routing information. &lt;/span&gt;&lt;span title=&quot;Pembengkakan informasi Routing&quot;&gt;Routing information Swelling &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Router pada internet, berfungsi memilih rute yang tepat untuk mengirim packet, dengan berpedoman pada IP address yang terdapat pada packet.&quot;&gt;Routers  on the internet, serves to choose the appropriate route to send the  packet, by referring to the IP address contained in the packet. &lt;/span&gt;&lt;span title=&quot;Untuk itu router harus mengelola address jaringan dari host yang dituju dan hubungan dengan interface dalam sebuah tabel rute (routing table).&quot;&gt;For  routers that must manage the network address of the host and the  relationship with the interface in a routing table (routing table). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada tabel rute ini, setiap address jaringan, diberikan satu item.&quot;&gt;In this routing table, each network address, given a single item. &lt;/span&gt;&lt;span title=&quot;Jika router ada di dalam LAN maka informasi routing yang harus dikelola tidaklah terlalu banyak.&quot;&gt;If the router is on the LAN, the routing information that must be managed is not too much. &lt;/span&gt;&lt;span title=&quot;Namun pada router utama Internet informasi routing yang harus dikelola menjadi sangat banyak.&quot;&gt;But the main Internet routers routing information that must be managed to be very much. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena setiap bertambah 1 jaringan pada Internet maka jumlah data pada tabel pun bertambah pula.&quot;&gt;Since each added a network on the Internet, the amount of data in tables is greatly increased as well. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Seperti telah disinggung di atas, jika 1 organisasi memiliki beberapa address kelas C, maka sejumlah itu pula data routing yang harus dikelola.&quot;&gt;As mentioned above, if an organization has multiple address class C, then the same number of routing data to be managed. &lt;/span&gt;&lt;span title=&quot;Jika organisani tersebut kelas B, maka hanya perlu 1 data routing saja, bandingkan jika organisasi tersebut memiliki 4 kelas C , maka data routing yang harus dikelola sebanyak 4 buah.&quot;&gt;If  organisani the class B, then only need 1 routing data only, consider  that the organization has 4 class C, then the routing of data that must  be managed as many as 4 pieces. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Akibatnya data ini kemudian sangat memakan memori dari router tersebut.&quot;&gt;As a result of this data and then a very long memory of the router. &lt;/span&gt;&lt;span title=&quot;Untuk mengurangi jumlah data routing, kemudian diperkenalkan konsep CIDR (Classless Interdomain Routing).&quot;&gt;To reduce the amount of data routing, then introduced the concept of CIDR (Classless Routing InterDomain). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Teknologi ini menghilangkan konsep kelas, bertujuan agar pemberian besar ruang address pada sebuah organisasi dapat lebih fleksibel.&quot;&gt;This  technology eliminates the concept of class, aiming for the provision of  address space in an organization can be more flexible. &lt;/span&gt;&lt;span title=&quot;Contohnya, pada organisasi yang memperoleh 4 buah kelas C, diberikan 10 bit bagian bawah dari 32 bit address sebagai bagian address host.&quot;&gt;For example, the organization that received 4 fruit class C, given the lower 10 bits of 32-bit address as the host address. &lt;/span&gt;&lt;span title=&quot;Sehingga address jaringan yang harus dikelola dapat dijadikan satu yaitu bagian yang 22 bit sisanya.&quot;&gt;So the network address that must be managed to be one that is part of a 22 bit remainder. &lt;/span&gt;&lt;span title=&quot;Dengan menggunakan cara ini, informasi routing dapat sangat dikurangi.&quot;&gt;By using this method, routing information can be greatly reduced. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Akan tetapi yang dapat menggunakan CIDR ini hanyalah ruang address yang kontinu saja.&quot;&gt;However, one can use the CIDR is only a continuous address space only. &lt;/span&gt;&lt;span title=&quot;Selain itu CIDR ini hanya bisa diterapkan pada address yang baru diberikan, sedangkan jika ingin diterapkan pada address yang lama maka address tersebut harus diberikan ulang(diberi address baru).&quot;&gt;In  addition, CIDR can only be applied to the new address given, whereas if  you want to apply to the old address so the address must be given back  (given a new address.) &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan CIDR ini, persoalan pembengkakan informasi routing dapat diatasi, namun karena Internet terus tumbuh secara cepat, CIDR tidaklah memecahkan persoalan secara mendasar.&quot;&gt;With  CIDR, the swelling problem of routing information can be overcome, but  because the Internet continues to grow rapidly, CIDR does not solve the  problem fundamentally. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;(1) Dengan disatukan, address dalam tabel rute hanya menjadi 1 saja, namun perlu tambahan field baru tentang panjang bit bagian network.&quot;&gt;(1)  With a unified, addresses in the routing table only to 1 only, but need  additional new field about the length of bit parts network. &lt;/span&gt;&lt;span title=&quot;Otomatisasi berbagai setting&quot;&gt;Automation of various settings &lt;/span&gt;&lt;span title=&quot;Address pada IPv4 pada dasarnya statis terhadap host.&quot;&gt;IPv4 Address on essentially static on the host. &lt;/span&gt;&lt;span title=&quot;Biasanya diberikan secara berurut pada host.&quot;&gt;Usually given sequentially on the host. &lt;/span&gt;&lt;span title=&quot;Misalnya ketika menggunakan komputer note, jika tersambung pada satu jaringan maka IP address yang dipakai adalah IP addres pada jaringan tersebut.&quot;&gt;For example when using a computer note, if connected to a network, the IP address used is the IP address on the network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika tersambung pada jaringan yang lain lagi, maka IP addres pun harus di set ulang ke IP address di jaringan tersebut.&quot;&gt;If connected to another network, the IP address must be set back to the IP address on the network. &lt;/span&gt;&lt;span title=&quot;Pada koneksi dialup pun, karena IP address berganti-ganti maka harus diset ulang.&quot;&gt;On a dialup connection, since the IP addresses keep changing it must be set back. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Memang saat ini hal di atas bisa dilakukan secara otomatis dengan menggunakan DHCP (Dynamic Host Configuration Protocol).&quot;&gt;It is currently above this can be done automatically by using DHCP (Dynamic Host Configuration Protocol). &lt;/span&gt;&lt;span title=&quot;Tetapi, hal tersebut sesungguhnya tidak termasuk dalam spesifikasi IPv4,merupakan fungsi tambahan yang besifat optional.&quot;&gt;However, it is actually not included in the specification of IPv4, an optional additional functions besifat. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada kenyataannya DHCP hanya terbatas pada OS baru saja, sehingga DHCP harus diload secara tersendiri.&quot;&gt;In fact, DHCP is only limited to the new OS, so that DHCP must be loaded individually. &lt;/span&gt;&lt;span title=&quot;Karena itu, tetap diperlukan adanya mekanisme pemberian address yang fleksibel pada layer IP.&quot;&gt;Therefore, it remains necessary to address a flexible delivery mechanism at the IP layer. &lt;/span&gt;&lt;span title=&quot;Sama Rata&quot;&gt;Equal &lt;/span&gt;&lt;span title=&quot;salah satu ciri khas Internet adalah pemakaian bersama jaringan, khususnya backbone.&quot;&gt;one characteristic of the Internet is the use of shared networks, especially backbone. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Walaupun bandwith (lebar-pita) provider sebesar 1.5 Mbps, dan begitu pula dengan routing antaranya, namun belum tentu kita dapat senantiasa menggunakan seluruh lebar-pita tersebut.&quot;&gt;Although  the bandwidth (bandwidth) provider of 1.5 Mbps, and so did the routing  of them, but not necessarily that we can always use all the bandwidth. &lt;/span&gt;&lt;span title=&quot;Jika pada saat itu ada pengguna lain yang menggunakan line tersebut, maka lebar-pita yang dapat kita pakai pun berkurang sebanyak yang dipakai oleh pengguna tersebut.&quot;&gt;If  at that time there are other users who use that line, then the  bandwidth can we use was reduced as much as that used by the user. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain tidak ada jaminan besar lebar-pita yang dapat dipakai pada waktu tertentu.&quot;&gt;In other words there is no guarantee of bandwidth that can be used at any given time. &lt;/span&gt;&lt;span title=&quot;Walaupun sudah menggunakan line ke provider cukup besar, ketika akan mengirim atau menerima suara atau gambar, namun tidak dapat dipastikan akan berlangsung dengan lancar sebelum terlaksana.&quot;&gt;Despite  using a large enough line to the provider, when it will send or receive  voice or image, but can not be certain to take place smoothly before  accomplished. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Atau secara ekstrim, ketika kita melakukan TV conference di dalam LAN, tiba-tiba ada pengguna lain yang mengirim data yang sangat besar, maka gambar dan suara yang diterima/dikirim akan terputus-putus.&quot;&gt;Or  in the extreme, when we do a TV conference in the LAN, all of a sudden  there are other users who send huge data, then the picture and sound  received / sent will falter. &lt;/span&gt;&lt;span title=&quot;Karenanya diperlukan satu sistem baru yang dapat memenuhi pemakaian baru tersebut.&quot;&gt;Therefore needed a new system that can meet the new usage. &lt;/span&gt;&lt;span title=&quot;Keamanan&quot;&gt;Security &lt;/span&gt;&lt;span title=&quot;Agar pemakaian Internet dapat meluas ke bidang bisnis dan berbagai bidang lainnya, fungsi sekuriti adalah salah satu kuncinya.&quot;&gt;In  order to use the Internet to expand into areas of business and many  other fields, the function of security is one of the key. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Konsekuensi dari Internet sebagai jaringan publik,tidak dapat dipungkiri kemungkinan data dilihat selama dalam perjalanan.&quot;&gt;Consequences of the Internet as a public network, can not be denied the possibility of data seen during the trip. &lt;/span&gt;&lt;span title=&quot;Atau perlu dicegah akses yang dapat merusak,seperti hacker ataupun cracker.&quot;&gt;Or have prevented access that could damage, such as hackers or crackers. &lt;/span&gt;&lt;span title=&quot;Fungsi sekuriti dapat diwujudkan pada berbagai layer.&quot;&gt;Function security can be realized in various layers. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Meskipun telah ada banyak sekuriti pada layer aplikasi seperti untuk surat elektronik, maupun WWW, tetap diperlukan fungsi sekuriti pada layer jaringan.&quot;&gt;Although  there has been a lot of security at the application layer such as for  electronic mail, or WWW, still required the function of security at the  network layer. &lt;/span&gt;&lt;span title=&quot;Pada IPv4 sendiri tidak terdapat fungsi sekuriti ini.&quot;&gt;In IPv4 itself does not have these security functions. &lt;/span&gt;&lt;span title=&quot;Perubahan pada IPv6&quot;&gt;Changes to IPv6 &lt;/span&gt;&lt;span title=&quot;Kemudian apa yang berubah dengan IPv6 ini?&quot;&gt;Then what has changed with this IPv6? &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perbaikan utama adalah pada : perluasan ruang alamat (IP address), penyederhanaan header dari packet, Plug&amp;amp;Play, fungsi Sekuriti.&quot;&gt;The  main improvement is on: the expansion of address space (IP address),  simplifying the header of the packet, Plug &amp;amp; Play, Security  function. &lt;/span&gt;&lt;span title=&quot;Masing-masing perbaikan tersebut dimaksudkan agar dapat merespon pertumbuhan Internet, meningkatkan reliability, maupun kemudahan pemakaian.&quot;&gt;Each of these improvements are intended to be responding to the growth of the Internet, increasing reliability, and ease of use. &lt;/span&gt;&lt;span title=&quot;Perluasan Address&quot;&gt;Address Expansion &lt;/span&gt;&lt;span title=&quot;Seperti telah dijelaskan di atas, perkembangan Internet yang demikian pesat beberapa tahun terakhir ini telah mengakibatkan kelangkaan IP address.&quot;&gt;As explained above, such a rapid Internet growth in recent years has resulted in scarcity of IP addresses. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Perubahan terbesar pada IPv6 adalah perluasan IP address dari 32 bit pada IPv4 menjadi 128 bit.&quot;&gt;The biggest change in IPv6 is the extension of the IP address of 32 bits in IPv4 to 128 bits. &lt;/span&gt;&lt;span title=&quot;128 bit ini adalah ruang address yang kontinyu dengan menghilangkan konsep kelas.&quot;&gt;This is a 128 bit address space by eliminating the concept of the continuous class. &lt;/span&gt;&lt;span title=&quot;Selain itu juga dilakukan perubahan pada cara penulisan IP address.&quot;&gt;It also made changes in the way of writing IP addresses. &lt;/span&gt;&lt;span title=&quot;Jika pada IPv4 32 bit dibagi menjadi masing-masing 8 bit yang dipisah kan dengan &amp;quot;.&amp;quot;&quot;&gt;If the IPv4 32 bits divided into 8 bits each separated it with &quot;.&quot; &lt;/span&gt;&lt;span title=&quot;dan di tuliskan dengan angka desimal, misalnya 150.7.7.250.&quot;&gt;and write with a decimal number, for example, 150.7.7.250. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Maka pada IPv6, 128 bit tersebut dipisahkan menjadi masing-masing 16 bit yang tiap bagian dipisahkan dengan &amp;quot;:&amp;quot;dan dituliskan dengan hexadesimal.Contohnya, &amp;quot;4FE5:2F21:3512:77BB:AF23:3201:55AA:2F33&amp;quot;.&quot;&gt;So  on IPv6, 128 bits are separated into 16 bits each, where each section  is separated by &quot;:&quot; and written by hexadesimal.Contohnya, &quot;4FE5: 2F21:  3512:77 BB: AF23: 3201:55 AA: 2F33&quot;. &lt;/span&gt;&lt;span title=&quot;Disamping itu, bukan hanya sekedar memperbesar ruang address saja, tapi juga diperkenalkan struktur bertingkat, agar pengelolaan routing menjadi mudah.&quot;&gt;In addition, not only enlarge the address space, but also introduced multilevel structure, for routing management made easy. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada CIDR (Classless Interdomain Routing) tabel routing diperkecil dengan menggabungkan jadi satu informasi routing dari sebuah organisasi.&quot;&gt;In  CIDR (Classless InterDomain Routing) routing tables is reduced by  combining into one routing information from an organization. &lt;/span&gt;&lt;span title=&quot;Pada IPv4, sama sekali tidak memperhatikan hubungan antar organisasi maupun negara.&quot;&gt;In IPv4, not at all concerned with the relations between organizations and countries. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sementara itu pada IPv6, beberapa organisasi dengan provider yang sama, atau memiliki hubungan geografis, dihubungkan dan dicerminkan pada routing.&quot;&gt;Meanwhile, on IPv6, some organizations with the same provider, or have geographic ties, linked and mirrored on the routing. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain, jika beberapa organisasi berada dalam satu provider pada saat pemberian IP address diupayakan agar address tersebut bisa berada dalam satu ruang address.&quot;&gt;In  other words, if several organizations are in a one provider at the time  of the IP address attempted to address these could be in the same  address space. &lt;/span&gt;&lt;span title=&quot;Misalnya ada dua organisasi pada sebuah provider,maka kedua organisasi ini jaraknya dekat jika dilihat dari jaringan.&quot;&gt;For example there are two organizations on a provider, the two organizations close the distance when viewed from the network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sehingga pada pemberian address, diupayakan agar bagian atas dari address sedapat mungkin tidak berbeda jauh.&quot;&gt;So in giving the address, aligned to the top of the address is not much different as far as possible. &lt;/span&gt;&lt;span title=&quot;Dengan demikian di luar provider tersebut, informasi routing dari kedua organisasi ini dapat dijadikan satu.&quot;&gt;Thus, outside providers, routing information from both these organizations can put together. &lt;/span&gt;&lt;span title=&quot;Dengan cara tersebut, saat ini sudah dilakukan pembagian ruang IP address pada IPv6.&quot;&gt;In this way, it&#39;s been done division of IP address space in IPv6. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dan yang banyak menempati ruang tersebut adalah Address untuk provider dan address untuk wilayah.&quot;&gt;And that occupy much space is the address for providers and addresses for the region. &lt;/span&gt;&lt;span title=&quot;masing-masing menempati 1/8 dari ruang address yang tersedia.&quot;&gt;each occupies one eighth of the available address space. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemudian saat ini masih sekitar 70% yang belum didefinisikan, yang dibiarkan sebagai cadangan bagi cara pemberian address baru.&quot;&gt;Then when it was still about 70% that has not been defined, which is left as a reserve for granting a new address. &lt;/span&gt;&lt;span title=&quot;Selanjutnya, mari kita lihat struktur bertingkat address pada IPv6 ini dengan melihat contoh pada address untuk provider.&quot;&gt;Next, let&#39;s see-story structure in IPv6 addresses this by looking at examples in the address to the provider. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pertama-tama address sepanjang 128 bit dibagi menjadi beberapa field yang dapat berubah panjang.&quot;&gt;First of all along the 128-bit address is divided into several fields which can change the length. &lt;/span&gt;&lt;span title=&quot;Jika 3 bit pertama dari address adalah &amp;quot;010&amp;quot;, maka ini adalah ruang bagi provider.&quot;&gt;If the first 3 bits of address are &quot;010&quot;, then this is a space for providers. &lt;/span&gt;&lt;span title=&quot;Sedangkan n bit berikutnya adalah registry ID yaitu field yang menunjukkan tempat/lembaga yang memberikan IP address.&quot;&gt;Meanwhile, the next n bits are registry ID is a field that indicates the place / institution that provides the IP address. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Misalnya IP address yang diberikan oleh InterNIC maka field tersebut menjadi &amp;quot;11000&amp;quot;.&quot;&gt;For example, the IP addresses provided by the InterNIC, the field becomes &quot;11,000&quot;. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Selanjutnya m bit berikutnya adalah provider ID, sedangkan o bit berikutnya adalah Subscriber ID untuk membedakan organisasi yang terdaftar pada provider tersebut.&quot;&gt;Furthermore,  m the next bit is the provider ID, while the next bit o Subscriber ID  to distinguish the organizations listed on these providers. &lt;/span&gt;&lt;span title=&quot;Kemudian p bit berikutnya adalah Subnet ID, yang menandai kumpulan host yang tersambung secara topologi dalam jaringan dari organisasi tersebut.&quot;&gt;Then  p next bit is the Subnet ID, which marks a collection of hosts that are  connected in the network topology of the organization. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dan yang q=125-(n+m+o+p) bit terakhir adalah Interface ID, yaitu IP address yang menandai host yang terdapat dalam grup-grup yang telah ditandai oleh Subnet ID.&quot;&gt;And  the q = 125 - (n + m + o + p) is the last bit Interface ID, which is  the IP address that marks the host contained in groups which have been  marked by the Subnet ID. &lt;/span&gt;&lt;span title=&quot;Subnet ID dan Interface ID ini bebas diberikan oleh organisasi tersebut.&quot;&gt;Subnet ID and Interface ID is freely given by the organization. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Organisasi bebas menggunakan sisa p+q bit dari IP address dalam memberikan IP address di dalam organisasinya setelah mendapat 128-(p+q) bit awal dari IP address.&quot;&gt;Organizations  are free to use the remaining p + q bits of the IP address in providing  an IP address within the organization after receiving a 128 - (p + q)  initial bits of an IP address. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada saat itu, administrator dari organisasi tersebut dapat membagi menjadi bagian sub-jaringan dan host dalam panjang bit yang sesuai, jika diperlukan dapat pula dibuat lebih terstruktur lagi.&quot;&gt;At  that time, administrators of these organizations may divide into the  sub-network and host bits in the appropriate length, if necessary can  also be made more structured again. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Karena panjang bit pada provider ID dan subscriber ID bisa berubah, maka address yang diberikan pada provider dan jumlah IP address yang dapat diberikan oleh provider kepada pengguna dapat diberikan secara bebas sesuai dengan kebutuhan.&quot;&gt;Because  of the long bit on the provider ID and subscriber ID can be changed,  then the address given on the provider and the number of IP addresses  that can be given by the provider to the user can freely given according  to need. &lt;/span&gt;&lt;span title=&quot;Pada IPv6 bagian kontrol routing pada address field disebut prefix, yang dapat dianggap setara dengan jaringan address pada IPv4.&quot;&gt;In  IPv6 routing control part is called prefix in the address field, which  can be considered equivalent to a network address in IPv4. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;3 Jenis address yang disediakan&quot;&gt;3 Type the address provided &lt;/span&gt;&lt;span title=&quot;Address IPv6 dapat dibagi menjadi 3 jenis.&quot;&gt;IPv6 addresses can be divided into 3 types. &lt;/span&gt;&lt;span title=&quot;Yang pertama, disebut unicast Address, digunakan untuk komunikasi satu lawan satu, dengan menunjuk satu host.&quot;&gt;The first, called a unicast address, used to communicate one on one, by appointing a single host. &lt;/span&gt;&lt;span title=&quot;Kemudian multicast yang digunakan untuk komunikasi 1 lawan banyak.&quot;&gt;Then multicast is used to communicate an opponent a lot. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ini dengan menunjuk host dari grup.&quot;&gt;This is to designate the host of the group. &lt;/span&gt;&lt;span title=&quot;Kemudian yang terakhir adalah fungsi baru pada IPv6 yaitu anycast Address, yang menunjuk host dari grup, tetapi packet yang dikirim hanya pada satu host saja.&quot;&gt;Then  the last is a new function in the IPv6 anycast address, which refers to  the host of the group, but the packet is sent only on one host only. &lt;/span&gt;&lt;span title=&quot;Pada sebuah host tidak selalu hanya diberikan satu address dari ketiga tipe address di atas, tapi bisa saja diberikan beberapa address.&quot;&gt;On a host are not always given only one address of the third type above address, but could have given a few addresses. &lt;/span&gt;&lt;span title=&quot;Misalnya memiliki sekaligus Unicast address, link local address, dan Anycast Address.&quot;&gt;For example, having once Unicast addresses, link local address, and anycast addresses. &lt;/span&gt;&lt;span title=&quot;Unicast Address&quot;&gt;Unicast Address &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada unicast address, ditetapkan address yang bersifat glogal seperti address untuk provider, address geografis.&quot;&gt;In unicast addresses, addresses that are assigned glogal such as address to the provider, the geographical address. &lt;/span&gt;&lt;span title=&quot;Selain itu juga link local address maupun site local address.&quot;&gt;In addition, a link local address and the site local address. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Masing-masing yaitu Link-local address dan Site-local address, dimasukkan dalam ruang address IPv6 yang memakan masing-masing sekitar 1/1024 dari ruang address yang tersedia.&quot;&gt;Each  of the Link-local address and site-local address, included in the IPv6  address space that takes each about 1 / 1024 of the available address  space. &lt;/span&gt;&lt;span title=&quot;Link Local Address adalah address yang dipakai di dalam satu link saja.&quot;&gt;Link Local Address is the address used within one link only. &lt;/span&gt;&lt;span title=&quot;Yang dimaksud link di sini adalah jaringan lokal yang saling tersambung pada satu level.&quot;&gt;What is meant here is a link local network connected to each other on one level. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Address ini dibuat secara otomatis oleh host yang belum mendapat address global, terdiri dari 10+n bit prefix yang dimulai dengan &amp;quot;FE80&amp;quot; dan field sepanjang 118-n bit yang menunjukkan nomor host.&quot;&gt;Address  is automatically created by hosts who have not received the global  address, consisting of 10 + n-bit prefix that starts with &quot;fe80&quot; and  fields along the 118-n bits indicating the number of hosts. &lt;/span&gt;&lt;span title=&quot;Link Local Address digunakan pada pemberian IP address secara otomatis.&quot;&gt;Link Local Address is used in the delivery of an IP address automatically. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Sedang Site Local Address setara dengan private address, dipakai terbatas di dalam site saja.&quot;&gt;Local Site Address being equivalent to the private address, limited use in the site only. &lt;/span&gt;&lt;span title=&quot;Address ini dapat diberikan bebas, asal unik di dalam site tersebut, namun tidak bisa mengirimkan packet dengan tujuan alamat ini di luar dari site tersebut.&quot;&gt;This  address can be given freely, provided unique within that site, but  could not send the packet to the destination address is outside of the  site. &lt;/span&gt;&lt;span title=&quot;Multicast Address&quot;&gt;Multicast Address &lt;/span&gt;&lt;span title=&quot;Sedangkan Multicast Address pertama-tama menset address untuk sebuah grup host.&quot;&gt;While Multicast Address first set the address to a host group. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemudian bila ada packet yang dikirim ke address tersebut, maka packet tersebut akan dikirim ke seluruh host pada grup tersebut.&quot;&gt;Then if any packet is sent to the address, the packet will be sent to all hosts in the group. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Multicast Address ini pada IPv4 didefinisikan sebagai kelas D, sedangkan pada IPv6 ruang yang 8 bit pertamanya di mulai dengan &amp;quot;FF&amp;quot; disediakan untuk multicast Address.&quot;&gt;Multicast  Address is the IPv4 is defined as class D, while in the IPv6 space is 8  bits in his first start with &quot;FF&quot; is provided for multicast addresses. &lt;/span&gt;&lt;span title=&quot;Ruang ini kemudian dibagi-bagi lagi untuk menentukan range berlakunya.&quot;&gt;This space is then subdivided again to determine the range of validity. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemudian Blockcast address pada IPv4 yang address bagian hostnya didefinisikan sebagai &amp;quot;1&amp;quot;, pada IPv6 sudah termasuk di dalam multicast Address ini.&quot;&gt;Then Blockcast address in the host IPv4 address is defined as &quot;1&quot;, the IPv6 multicast is already included in this Address. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Blockcast address untuk komunikasi dalam segmen yang sama yang dipisahkan oleh gateway, sama halnya dengan multicast address dipilah berdasarkan range tujuan.&quot;&gt;Blockcast  address for communication in the same segment are separated by a  gateway, as well as the multicast address ranges are sorted based on  destination. &lt;/span&gt;&lt;span title=&quot;Anycast Address&quot;&gt;Anycast address &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada IPv6 ini ditambahkan satu jenis address baru yang tidak terdapat pada IPv4, yaitu Anycast Address.&quot;&gt;In IPv6 was added a new address type that does not exist in IPv4, the anycast address. &lt;/span&gt;&lt;span title=&quot;Pada address jenis ini, sebuah address diberikan pada beberapa host, untuk mendifinisikan kumpulan node.&quot;&gt;In this type of address, an address given on multiple hosts, to define a collection of nodes. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika ada packet yang dikirim ke address ini, maka router akan mengirim packet tersebut ke host terdekat yang memiliki Anycast address sama.&quot;&gt;If any packet sent to this address, the router will send the packet to the nearest host that has the same anycast address. &lt;/span&gt;&lt;span title=&quot;Dengan kata lain pemilik packet menyerahkan pada router tujuan yang paling &amp;quot;cocok&amp;quot; bagi pengiriman packet tersebut.&quot;&gt;In other words, the owner of the router packet handed goal of the most &quot;suitable&quot; for the delivery of packets. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pemakaian Anycast Address ini misalnya terhadap beberapa server yang memberikan layanan seperti DNS (Domain Name Server).&quot;&gt;The use of anycast address this example of some of servers that provide services such as DNS (Domain Name Server). &lt;/span&gt;&lt;span title=&quot;Dengan memberikan Anycast Address yang sama pada server-server tersebut, jika ada packet yang dikirim oleh client ke address ini, maka router akan memilih server yang terdekat dan mengirimkan packet tersebut ke server tersebut.&quot;&gt;By  providing the same anycast address on servers, if any packet sent by  the client to this address, the router will choose the nearest server  and send the packet to the server. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sehingga, beban terhadap server dapat terdistribusi secara merata.Bagi Anycast Address ini tidak disediakan ruang khusus.&quot;&gt;Thus, the load on servers can be distributed merata.Bagi anycast address is not provided specific rooms. &lt;/span&gt;&lt;span title=&quot;Jika terhadap beberapa host diberikan sebuah address yang sama, maka address tersebut dianggap sebagai Anycast Address.&quot;&gt;If for some hosts are given a same address, the address is regarded as an anycast address. &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Struktur Packet pada IPv6&quot;&gt;On IPv6 Packet Structure &lt;/span&gt;&lt;span title=&quot;Sejalan dengan perluasan address menjadi 128 bit, maka pada IPv6 ini struktur packet pun mengalami perbaikan pula.&quot;&gt;In line with the expansion of the address to 128 bits, then the IPv6 packet structure had been improved as well. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Selain itu, field yang jarang dipakai pada IPv 4 pun dihapus diganti dengan field yang mendukung komunikasi real time dan lain-lain.&quot;&gt;In  addition, the field is seldom used in IPV 4 was removed replaced with  fields that support real time communications and others. &lt;/span&gt;&lt;span title=&quot;Dalam pendesignan header packet ini, diupayakan agar cost pemrosesan header menjadi kecil.&quot;&gt;In this packet header pendesignan, strived for header processing cost becomes small. &lt;/span&gt;&lt;span title=&quot;Misalnya, address awal dan akhir menjadi dibutuhkan pada setiap packet.&quot;&gt;For example, start and end address to be needed in each packet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sedangkan pada header IPv4 ketika packet dipecah-pecah, ada field untuk menyimpan urutan antar packet.&quot;&gt;While the IPv4 header when the packet is fragmented, there are fields to store the sequence between the packet. &lt;/span&gt;&lt;span title=&quot;Namun field tersebut tidak terpakai ketika packet tidak dipecah-pecah.&quot;&gt;But the field is not used when the packet is not fragmented. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Header pada Ipv6 terdiri dari dua jenis, yang pertama, yaitu field yang dibutuhkan oleh setiap packet disebut header dasar, sedangkan yang kedua yaitu field yang tidak selalu diperlukan pada packet disebut header ekstensi, dan header ini didifinisikan terpisah dari header dasar.&quot;&gt;IPv6  header consists of two types, the first, namely the fields required by  each packet called a basic header, while the second is a field that is  not always necessary in a packet called extension headers, and headers  are defined separately from the basic header. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Header dasar selalu ada pada setiap packet, sedangkan header tambahan hanya jika diperlukan diselipkan antara header dasar dengan data.&quot;&gt;There  is always the basic header on every packet, while the additional  headers inserted only as needed between the basic header to the data. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Header tambahan, saat ini didefinisikan selain bagi penggunaan ketika packet dipecah, juga didefinisikan bagi fungsi sekuriti dan lain-lain.&quot;&gt;Additional  headers, is currently defined in addition to use when a packet is  broken, also defined the functions of security and others. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Header tambahan ini, diletakkan setelah header dasar, jika dibutuhkan beberapa header maka header ini akan disambungkan berantai dimulai dari header dasar dan berakhir pada data.&quot;&gt;This  additional header, placed after the basic header, if needed some header  then this header will be connected a chain starting from the basic  header and ends on the data. &lt;/span&gt;&lt;span title=&quot;Router hanya perlu memproses header yang terkecil yang diperlukan saja, sehingga waktu pemrosesan menjadi lebih cepat.&quot;&gt;Routers only need to process the smallest header that needed it, so that processing time becomes faster. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hasil dari perbaikan ini, meskipun ukuran header dasar membesar dari 20 bytes menjadi 40 bytes namun jumlah field berkurang dari 12 menjadi 8 buah saja.&quot;&gt;The  result of this improvement, although the basic header size enlarged  from 20 bytes to 40 bytes but the number of field is reduced from 12 to 8  pieces only. &lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;span title=&quot;Struktur header dasar pada IPv6&quot;&gt;Structure of the IPv6 basic header &lt;/span&gt;&lt;span title=&quot;Setting address secara otomatis&quot;&gt;Setting address automatically &lt;/span&gt;&lt;span title=&quot;Ketika pertama kali menyambungkan host ke Internet, pengguna perlu mensetting IP address, netmask, routing dan lain-lain.&quot;&gt;When I first connect the host to the Internet, users need to be setting up an IP address, netmask, routing and others. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Akan tetapi saat ini jumlah pengguna Internet terus bertambah dan bahkan sudah dapat tersambung dari rumah tangga, sehingga tidaklah praktis bila untuk mensetting-nya diperlukan pengetahuan tentang jaringan seperti gateway IP address dan lain-lain.&quot;&gt;However,  the current number of Internet users continues to grow and even be able  to connect from home, so it is not practical when it is necessary for  setting up knowledge about the network as the gateway IP address and  others. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada IPv4 pun dengan adanya DHCP, parameter yang diperlukan untuk mensetting telah dapat diotomatisasi.&quot;&gt;In IPv4 even in the presence of DHCP, the parameters needed for setting up has to be automated. &lt;/span&gt;&lt;span title=&quot;Pada koneksi dengan menggunakan PPP atau LAN yang dibangun dengan Windows-95/NT sudah umum digunakan.&quot;&gt;In connection with using a PPP or LAN built with Windows-95/NT already commonly used. &lt;/span&gt;&lt;span title=&quot;Akan tetapi DHCP adalah fungsi option/pilihan pada IPv4, sehingga tidak semua sistem maupun OS mendukungnya.&quot;&gt;But DHCP is a function of option / option in IPv4, so not all systems, and OS support it. &lt;/span&gt;&lt;span title=&quot;Pada sistem tertentu tetap saja beberapa parameter harus disetting secara manual.&quot;&gt;In certain systems still several parameters must be set manually. &lt;/span&gt;&lt;span title=&quot;Pada IPv6 fungsi untuk mensetting secara otomatis disediakan secara standar.&quot;&gt;In IPv6 functions for setting up automatically provided by default. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain pada IPv6 ini seluruh mesin tinggal menyambungkan pada kabel jaringan dan segera dapat tersambung pada Internet.&quot;&gt;In other words in this whole machine IPv6 stay connected on the cable network and immediately be connected to the Internet. &lt;/span&gt;&lt;span title=&quot;pada setting otomatis ini, disediakan 2 cara tergantung dari pemakaian address, yaitu setting otomatis stateless dan statefull.&quot;&gt;on  these automatic settings, provided 2 ways depending on the usage of  address, namely the automatic settings and statefull stateless. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kedua cara ini dipilih berdasarkan kecenderungan administrator.&quot;&gt;Both ways are selected based on the tendency of administrators. &lt;/span&gt;&lt;span title=&quot;Setting otomatis stateless adalah cara yang menjadikan proses pengelolaan paling sedikit.&quot;&gt;Stateless auto setting is a way that makes the process of managing at least. &lt;/span&gt;&lt;span title=&quot;Tidak perlu menyediakan server untuk pengelolaan dan pembagian IP address.&quot;&gt;No need to provide a server for managing and sharing an IP address. &lt;/span&gt;&lt;span title=&quot;Cukup mensetting router saja.&quot;&gt;Simply setting up the router only. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Host yang telah tersambung di jaringan dari router yang ada pada jaringan tersebut, memperoleh prefix dari address dari jaringan tersebut.&quot;&gt;Hosts that are connected in a network of routers that exist on the network, obtained from the address prefix of the network. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kemudian host menambah patern bit yang diperoleh dari informasi yang unik terhadap host, kemudian membuat IP address sepanjang 128 bit dan menjadikannya sebagai IP address dari host tersebut.&quot;&gt;Then  add the host bits pattern obtained from the unique information to the  host, then make the IP addresses along the 128-bit and make it as the IP  address of the host. &lt;/span&gt;&lt;span title=&quot;Pada informasi unik bagi host ini, digunakan antara lain address MAC dari jaringan interface.&quot;&gt;In the information unique to this host, used among other MAC addresses of network interfaces. &lt;/span&gt;&lt;span title=&quot;Pada setting otomatis stateless ini dibalik kemudahan pengelolaan, pada Ethernet atau FDDI karena perlu memberikan paling sedikit 48 bit (sebesar address MAC) terhadap satu jaringan, memiliki kelemahan yaitu efisiensi penggunaan address yang buruk.&quot;&gt;In  this stateless auto setting behind the ease of management, on an  Ethernet or FDDI because of the need to provide at least 48 bits (by MAC  address) on one network, has the disadvantage of poor efficiency in the  use of addresses. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Cara yang kedua yaitu setting otomatis statefull adalah cara pengelolaan secara ketat dalam hal range IP address yang diberikan pada host dengan menyediakan server untuk pengelolaan keadaan IP address.&quot;&gt;The  second way is automatic settings statefull&#39;s how the management of  strictly in terms of range of IP addresses provided on the host by  providing a server for managing state of the IP address. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Cara ini mirip dengan cara DHCP pada IPv4, walaupun harus memelihara server dan address, namun karena IP address dapat dipakai secara efektif, cara ini memiliki karakteristik administrator dapat mengelola secara mendetil seperti dapat menstruktur address di dalam organisasi dan lain-lain.&quot;&gt;This  method is similar to the way DHCP in IPv4, despite having to maintain  servers and address, but since IP addresses can be used effectively,  this method has the characteristics of administrators to manage in  detail as to structuring the address in the organization and others. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada saat melakukan setting secara otomatis, informasi yang dibutuhkan antara router, server dan host adalah ICMP(Internet Control Message Protocol) yang telah diperluas.&quot;&gt;When  do the settings automatically, the required information between  routers, servers and hosts are ICMP (Internet Control Message Protocol)  which has been expanded. &lt;/span&gt;&lt;span title=&quot;Pada ICMP dalam IPv6 ini, termasuk pula IGMP (Internet Group management Protocol) yang dipakai pada multicast pada IPv4.&quot;&gt;In the ICMP in IPv6, including IGMP (Internet Group Management Protocol) is used to multicast in IPv4. &lt;/span&gt;&lt;span title=&quot;Fungsi Sekuriti&quot;&gt;Security Functions &lt;/span&gt;&lt;span title=&quot;Saat ini pada masa transaksi dengan menggunakan internet telah menjadi kenyataan, sekuriti pada saat komunikasi merupakan hal yang tidak bisa ditawar lagi.&quot;&gt;Currently  in the transaction by using the internet has become a reality, security  at the time of the communication is not negotiable. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Saat ini metode dengan menggunakan S-HTTP(Secure HTTP) untuk pengiriman nomor kartu kredit, ataupun data pribadi dengan mengenkripsinya, atau mengenkripsi e-mail dengan PGP (Pretty Good Privacy) telah dipakai secara umum.&quot;&gt;Currently,  the method by using S-HTTP (Secure HTTP) for sending credit card  numbers, or personal data to encrypt, or encrypt e-mail with PGP (Pretty  Good Privacy) has been used in general. &lt;/span&gt;&lt;span title=&quot;Akan tetapi cara di atas adalah securiti yang ditawarkan oleh aplikasi.&quot;&gt;However, the above is securiti offered by the application. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain bila ingin memakai fungsi tersebut maka kita harus memakai aplikasi tersebut.&quot;&gt;In other words if you want to use these functions we must use the application. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika membutuhkan sekuriti pada komunikasi tanpa tergantung pada aplikasi tertentu maka diperlukan fungsi sekuriti pada layer TCP atau IP.&quot;&gt;If  you need security on communications without depending on specific  applications will require security functions at the TCP or IP layer. &lt;/span&gt;&lt;span title=&quot;Dan IPv6 mendukung komunikasi terenkripsi maupun Authentication pada layer IP.&quot;&gt;And IPv6 support encrypted communications and authentication at the IP layer. &lt;/span&gt;&lt;span title=&quot;Dengan memiliki fungsi sekuriti pada IP itu sendiri, maka dapat dilakukan hal seperti packet yang dikirim dari host tertentu seluruhnya dienkripsi.&quot;&gt;By  having a security function on the IP itself, then it can do things like  packet sent from a particular host entirely encrypted. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Pada IPv6 untuk Authentication dan komunikasi terenkripsi memakai header yang diperluas yang disebut AH (Authentication Header) dan payload yang dienkripsi yang disebut ESP (Encapsulating Security Payload).&quot;&gt;In  IPv6 for authentication and encrypted communication using an extended  header called AH (Authentication Header) and the encrypted payload,  called ESP (Encapsulating Security Payload). &lt;/span&gt;&lt;span title=&quot;Pada komunikasi yang memerlukan enkripsi kedua atau salah satu header tersebut ditambahkan.&quot;&gt;In the second communication requires encryption or one of the header is added. &lt;/span&gt;&lt;span title=&quot;Fungsi sekuriti yang dipakai pada layer aplikasi, misalnya pada S-HTTP dipakai SSL sebagai metode encripsi, sedangkan pada PGP memakai IDEA sebagai metode encripsinya.&quot;&gt;Security  function that is used at the application layer, such as the S-HTTP use  SSL as a method encripsi, while on PGP uses IDEA as a method  encripsinya. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sedangkan manajemen kunci memakai cara tertentu pula.&quot;&gt;While the use of key management in a certain way as well. &lt;/span&gt;&lt;span title=&quot;Sebaliknya, pada IPv6 tidak ditetapkan cara tertentu dalam metode encripsi dan manajemen kunci.&quot;&gt;Instead, the IPv6 is not defined in a certain way in encripsi and key management method. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sehingga menjadi fleksibel dapat memakai metode manapun.&quot;&gt;So be flexible to use any method. &lt;/span&gt;&lt;span title=&quot;Hal ini dikenal sebagai SA (Security Association).&quot;&gt;This is known as the SA (Security Association). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Fungsi Sekuriti pada IPv6 selain pemakaian pada komunikasi terenkripsi antar sepasang host, dapat pula melakukan komunikasi terenkripsi antar jaringan dengan cara mengenkripsi packet oleh gateway dari 2 jaringan yang melakukan komunikasi tersebut.&quot;&gt;Function  Security in addition to the use of IPv6 on encrypted communication  between a pair of hosts, can also perform encrypted communications  between networks by encrypting the packet by the gateway from 2 networks  that make such communication. &lt;/span&gt;&lt;span title=&quot;Label Alir dan Real Time Process&quot;&gt;Label Flow and Real Time Process &lt;/span&gt;&lt;span title=&quot;Header dari packet pada IPv6 memiliki field label alir (flow-label).&quot;&gt;The header of the packet in the IPv6 flow label field (flow-label). &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Label ini, digunakan untuk meminta agar pakect tersebut diberi perlakuan tertentu oleh router saat dalam pengiriman.&quot;&gt;This label, used to ask for pakect certain treatment is given by the router while in transit. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Dengan kata lain label ini dapat memberi tanda jenis dari packet tersebut.&quot;&gt;In other words, these labels can signal the type of packet. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Misalnya pada suara atau gambar bergerak (motion picture) sedapat mungkin ditransfer secepatnya walaupun kualitasnya sedikit berkurang.&quot;&gt;For  instance on sound or moving images (motion picture) as far as possible  be transferred as soon as possible even though the quality is slightly  reduced. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sedangkan e-mail ataupun WWW lebih memerlukan sampai dengan akurat dari pada sifat real time.&quot;&gt;While e-mail or the WWW is more need to accurately than on the nature of real time. &lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Tabel Label Alir pada IPv6&quot;&gt;The table on the IPv6 Flow Label &lt;/span&gt;&lt;span title=&quot;Label Categories&quot;&gt;Label Categories &lt;/span&gt;&lt;span title=&quot;0 Uncharacterized Traffic&quot;&gt;0 Uncharacterized Traffic &lt;/span&gt;&lt;span title=&quot;1 &amp;quot;Filler&amp;quot; traffic (e.g., netnews)&quot;&gt;1 &quot;Filler&quot; traffic (e.g., netnews) &lt;/span&gt;&lt;span title=&quot;2 Unattended data transfer (e.g., e-mail)&quot;&gt;2 Unattended data transfer (e.g., e-mail) &lt;/span&gt;&lt;span title=&quot;3 Reserved&quot;&gt;3 Reserved &lt;/span&gt;&lt;span title=&quot;4 Attended bulk transfer (e.g., FTP, HTTP, NFS)&quot;&gt;4 Attended bulk transfer (e.g., FTP, HTTP, NFS) &lt;/span&gt;&lt;span title=&quot;5 Reserved&quot;&gt;5 Reserved &lt;/span&gt;&lt;span title=&quot;6 Interactive traffic (e.g., Telnet, X)&quot;&gt;6 Interactive traffic (e.g., Telnet, X) &lt;/span&gt;&lt;span title=&quot;7 Internet control traffic (eg, routing protocols, SNMP)&quot;&gt;7 Internet control traffic (eg, routing protocols, SNMP) &lt;/span&gt;&lt;span title=&quot;8-15 Realtime communications traffic, non-congestion-controlled traffic&quot;&gt;8-15 Realtime communications traffic, non-congestion-controlled traffic &lt;/span&gt;&lt;span title=&quot;Router mengelola skala prioritas maupun resource seperti kapasitas komunikasi atau kemampuan memproses, dengan berdasar pada label alir ini.&quot;&gt;Routers manage priorities and resources such as communication capacity or ability to process, based on this flow label. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Jika pada IPv4 seluruh packet diperlakukan sama, maka pada IPv6 ini dengan perlakuan yang berbeda terhadap tiap packet, tergantung dari isi packet tersebut, dapat diwujudkan komunikasi yang aplikatif.&quot;&gt;If  the IPv4 packet is treated the same throughout, then at this IPv6 with  different treatment to each packet, depending on the contents of the  packet, can be realized applicative communications. &lt;/span&gt;&lt;span title=&quot;Penutup&quot;&gt;Cover &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Internet Protocol versi 4 yang merupakan pondasi dari Internet, telah hampir mendekati batas akhir dari kemampuannya, dan IPv6 yang merupakan protokol baru telah dirancang untuk dapat menggantikan fungsi IPv4.&quot;&gt;Internet  Protocol version 4 which is the foundation of the Internet, has almost  approached the final frontier of his ability, and IPv6 which is a new  protocol has been designed to replace IPv4. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Motivasi utama untuk mengganti IPv4 adalah karena keterbatasan dari panjang addressnya yang hanya 32 bit saja.&quot;&gt;The primary motivation for change was the lack of IPv4 addresses that long, only 32 bits only. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Selain itu IP adalah protokol yang sudah sangat tua yang tidak mampu mendukung kebutuhan akan komunikasi yang aman, routing yang fleksibel maupun pengaturan lalu lintas data.&quot;&gt;In  addition, IP is a protocol that is very old who are unable to support  the need for secure communications, flexible routing and traffic control  data. &lt;/span&gt;&lt;span title=&quot;Alasan-alasan inilah yang mendorong munculnya IPv6, Internet protocol generasi berikut.&quot;&gt;These reasons that encourage the emergence of IPv6, the next generation Internet protocol. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IPv6 yang memiliki kapasitas address raksasa, mendukung penyusunan address secara terstruktur, yang memungkinkan Internet terus berkembang dan menyediakan kemampuan routing baru yang tidak terdapat pada IPv4.&quot;&gt;IPv6  address that has a huge capacity, supporting the preparation of the  address in a structured, which allows the Internet continues to grow and  provide new routing capabilities not found in IPv4. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IPv6 memiliki tipe address anycast yang dapat digunakan untuk pemilihan route secara efisien.&quot;&gt;IPv6 anycast address type that can be used to efficiently route selection.&lt;span style=&quot;background-color: white;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Selain itu IPv6 juga dilengkapi oleh mekanisme penggunaan address secara local yang memungkinkan terwujudnya instalasi secara Plug&amp;amp;Play.&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;In  addition, IPv6 is also complemented by the use of addresses in a local  mechanism that allows the realization of a Plug &amp;amp; Play installation. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IPv6 juga menyediakan platform bagi cara baru pemakaian Internet, seperti dukungan terhadap aliran data secara real-time, pemilihan provider, mobilitas host, end-to-end security, ataupun konfigurasi otomatis.&quot;&gt;IPv6  also provides a platform for new ways of Internet usage, such as  support for data streams in real-time, provider selection, host  mobility, end-to-end security, or automatic configuration. &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;</description><link>http://allaboutproblem.blogspot.com/2008/06/ipv6-internet-protocol-next-generation.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7536198095607186990.post-7390484083391261978</guid><pubDate>Sat, 07 Jun 2008 18:32:00 +0000</pubDate><atom:updated>2011-03-10T01:27:18.395+07:00</atom:updated><title>Flooding</title><description>&lt;b&gt;Flooding &lt;/b&gt;is another act of flooding the network with unnecessary data or garbage data. Network who are victims will experience congestion (saturation) due to bandwidth capacity to service customers away by garbage data.&lt;br /&gt;
Flooding is a very terrible thing for the network admin. Most people think just walking in the ICMP flooding, but it is not. Flooding is very varied and can invade a variety of protocols other than ICMP.&lt;br /&gt;
1) Sniffing&lt;br /&gt;
Sniffing literally sniff out, of course, in this case that diendus is the message (either not yet or already encrypted) in a communication channel. It is common in an insecure public channel. The sniffing could recapitalize the conversation that occurred.&lt;br /&gt;
Spoofing&lt;br /&gt;
The attacker - for instance C - can impersonate A. Everyone was made to believe that C is A. The attacker tried to convince other parties that there was no wrong done with communication, but communication was done by the deceiver / attacker. For example, if people enter your PIN into the Card Acceptance Device (CAD) - which is really built like the original CAD - of course the fraudsters can get a PIN smartcard owner. Smartcard owner did not know that there has been crime. &lt;br /&gt;
&lt;div id=&quot;divLookup&quot; style=&quot;-moz-border-radius: 3px 3px 3px 3px; background-color: #ffff77; color: black; left: -9px; padding: 3px; position: absolute; top: 21px; z-index: 999999999;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;data:image/gif,GIF89a%12%12%B3%FF%FF%FF%F7%F7%EF%CC%CC%CC%BD%BE%BD%99%99%99ZYZRUR%FE%01%02%21%F9%04%04%14%FF%2C%12%12%04X0%C8I%2B%1D8%EB%3D%E4%60%28%8A%85%17%0AG*%8C%40%19%7CJ%08%C4%B1%92%26z%C76%FE%02%07%C2%89v%F0%7Dz%C3b%C8u%14%82V5%23o%A7%13%19L%BCY-%25%7D%A6l%DF%D0%F5%C7%02%85%5B%D82%90%CBT%87%D8i7%88Y%A8%DB%EFx%8B%DE%12%01%3B&quot; /&gt;&lt;/div&gt;</description><link>http://allaboutproblem.blogspot.com/2011/03/flooding.html</link><author>noreply@blogger.com (Asep Rojali)</author><thr:total>0</thr:total></item></channel></rss>