Ping Technology Essay

1188 words - 5 pages

MAKALAH"TEKNOLOGI PING"Disusun oleh:Anindita Ratna Ningratri (X-11/03)SMA NEGERI 1 LAWANG2012/2013BAB I PENDAHULUANLatar BelakangPengembangan Teknologi Informasi kini kian pesat menjadikan kebutuhan akan komputer dan perangkat teknologi lainnya yang berkaitan dengan Teknologi Informasi semakin menjadi kebutuhan tersendiri. Perangkat-perangkat teknologi yang berkembang saat ini tidak terlepas dari kebutuhan akan internet. Namun, kita juga harus bisa mengecek apakah komputer kita sudah terhubung dengan komputer lain di internet atau belum. Oleh karena itu kami akan mencoba membahas tentang "Teknologi PING".TujuanPembuatan Makalah ini bertujuan untuk mengetahui cara mengecek konektivitas suatu komputer dengan komputer lain dan internet.BAB 2PEMBAHASAN TEORIPINGPING yaitu singkatan dari Packet Internet Gopher adalah sebuah program utilitas yang dapat digunakan untuk memeriksa Induktivitas jaringan berbasis teknologi Transmission Control Protocol/Internet Protocol (TCP/IP). Dengan menggunakan utilitas ini, dapat diuji apakah sebuah komputer terhubung dengan komputer lainnya. Hal ini dilakukan dengan mengirim sebuah paket kepada alamat IP yang hendak diujicoba konektivitasnya dan menunggu respon darinya.2.1.1 Sejarah PINGMike Muuss menulis program ini pada bulan Desember 1983, sebagai sarana untuk mencari sumber masalah dalam jaringan. Menurutnya, nama "PING" berasal dari suara echo (sonar) sebuah kapal selam yang bilamana sang operator mengirimkan pulsa-pulsa suara ke arah sebuah sasaran maka suara tersebut akan memantul dan diterima kembali ketika telah mengenai sasaran dalam jangka waktu tertentu. Utilitas ping akan menunjukkan hasil yang positif jika dua buah komputer saling terhubung di dalam sebuah jaringan. Hasil berupa statistik keadaan koneksi kemudian ditampilkan di bagian akhir. Kualitas koneksi dapat dilihat dari besarnya waktu pergi-pulang (roundtrip) dan besarnya jumlah paket yang hilang (packet loss). Semakin kecil kedua angka tersebut, semakin bagus kualitas koneksinya.2.1.2 Mekanisme Penggunaan PINGCara melakukan PING sangatlah mudah, kita tinggal mengetikkan sebuah perintah di command promt di komputer/laptop. Pada sistem operasi Windows, klik "Start" dan klik "Run" ketikkan "cmd" dan OK. Akan muncul halaman hitam putih yang biasa di sebut command promt, kemudian ketikkan "PING" dan diikuti alamat yang di tuju, misal "PING facebook.com" , atau bisa memasukkan alamat IP, misalnya "PING 172.16.0.18" Perintah PING akan mengirim empat paket informasi ke situs tersebut dan, jika terhubung dengan situs atau perangkat tersebut, setiap paket akan dikembalikan dengan informasi tambahan. Setiap paket akan memberikan info waktu yang dibutuhkan untuk membuat round trip dalam milidetik. PING juga akan memberikan rincian empat paket yang dikirim dan melaporkannya jika tidak ada koneksi. PING menunjukkan waktu maksimum, minimum dan rata-rata dari empat perjalanan paket. Laporan ini juga menunjukkan alamat situs numerik dalam bentuk "xx.xx.xx.xx."...

Find Another Essay On PING Technology

Glucose Meters Essay

611 words - 2 pages Keeping blood glucose levels under control is crucial for diabetics and those who are insulin dependent will often times be required to test their levels four times per day. As of yet there is not a cure for diabetes, however, with modern technology monitoring diabetes is as simple as turning on a computer. Traditional methods for testing include using a lancet to draw blood from your finger, applying the blood to a strip for testing and

Country report

596 words - 2 pages teachers. For that black silk stockings that girls usually wear, Chinese girls regard it as a underwear? I don't know how to say, it's like they always wear that inside of your skirt or shorts, they never wear it directly like a pants.What do you think is better about your country?FOOD!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!What do you think is better about the U.S.?Your technology! I think you are best in the world from all different

A Framework for Parallel Code Execution using Java

3795 words - 15 pages -writing effort in case of any change in the underlying communication protocol or technology. III. PROPOSED FRAMEWORK We have proposed a new HPC framework to provide explicit parallelism for distributed memory multi-core systems. The distinct features of the framework include ease of use for writing parallel code, support for various communication protocols, support for hybrid architectures, asynchronous communication and loosely coupled relation

Entertainment Changes

886 words - 4 pages recreational activities such as Bowling, Pool, Ping-Pong etc. Television and film are extremely influential in the entertainment business, involving special effects, Camera Tricks, writers, Producers and the most known celebrities.Computer Technology is highly influential as television and film industry rely highly on Computer technology. One clear example of this is the incredible advancements in special effects. Audio has come a long

The Article

1342 words - 6 pages pressures of consecutive rough shots played in quick succession. The Colt hockey stick came about when its inventor Lucchesi learnt new technology that made ping pong balls capable of withstanding 200lbs of pressure. The Colt hockey stick is made of the strength and toughness that can make it easy to play high velocity shots without damaging the stick in any way. The blade and bottom of the shaft are coated with nano material to strengthen the

Building A Home For Children In Need

1455 words - 6 pages small group instruction and remediation. The Renovations The kitchen would need to be updated for safety as well as functionality. The addition would need to provide spacious bedrooms (for tutoring of different ability levels), a library/computer center (including enough ports to allow for multiple computers), and a large enough room for various recreational activities (such as ping pong and board games). The house would need to be renovated

Global Remote Incident Prevention

1249 words - 5 pages incident can be prevented from occurring. The key is joining a response incident team as an outsource support to keep auditing the PACS system. PACS Cluster Server KASH has contracted with AGFA Health Care Company (Worldwide, 2013) which provides a great project called Picture Archive Communication System (PACS). PACS is a huge system. It has a cluster server (7 servers see table 1) located in the data center of information technology

Denial of Service(DOS)

691 words - 3 pages attack) http://en.wikipedia.org/wiki/Denial_of_service5. The Attacks on GRC.COM http://grc.com/dos/grcdos.htm6. Webopedia Computer Dictionary(What is DoS attack?) http://www.webopedia.com/TERM/D/DoS_attack.html7. Cisco Systems(Strategies to Protect Againste Distributed Denial of Service...) http://www.cisco.com/warp/public/707/newsflash.html8. CNN.com - Technology - Cyber-attacks batter Web heavyweights http://archives.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/ind ex.html9. Wikepedia(Ping of Death) http://en.wikipedia.org/wiki/Ping_of_death10. Denial of Service (DoS) Attack Resources http://www.denialinfo.com/dos.html

IBM Platform

1022 words - 4 pages "ping" between systems and shared I/O devices. The key technology functions provided include: shared queues for workload distribution and message passing, Global buffer coherency controls for distributed caches, Shared queues for workload distribution and message passing, and global concurrency controls and hardware-assisted lock contention detection .The dramatically different, high-capacity computing platform S/390 has a number of key

E-Warfare

1936 words - 8 pages ) defines warfare as armed conflict between two massed enemies, armies, or the like. But as technology develops the face of war has changed, it can now be accomplished electronically, which is known as electronic warfare or ‘E-warfare’. E-warfare is the use of computers and the internet to conduct warfare in cyberspace. There are various types of attacks which can be conducted electronically, which include hacking, denial-of-service or distributed

The Internet Should Not Be Censored

1121 words - 4 pages filter? A government department, not someone who is trained in law. Finally the internet filter will slow our already snail slow internet speeds. An internet filter should not be implemented for all these crucial reasons. It is ineffective and waste of money. With all our advances with modern technology, internet filtering is still imperfect today. The internet is a dynamic environment, with new websites appearing every day, some of them

Similar Essays

Video Games: Beneficial Or Harmful Essay

963 words - 4 pages to the early 1970's when the United States was under pressure from the issues concerning the Vietnam War, and it is also the time period where people were favoring outlandish, extravagant clothing styles. In the midst of all of this chaos, a game known as Pong (this title eventually became to be known as Ping-Pong) was released by 29 year-old Nolan Bushnell and his company, Atari (Hansen). Pong was a simple arcade video game that simulated table

Theory X Essay

2035 words - 8 pages PHYSICS as a part of Mathematic Natural Science at Linköping University belongs since 1 July 1993 to the Faculty of Technology (Linköpings Institute of Technology). The students may choose to study in the Physics Programme: * 160 points to become Master of Science * 120 points to become Bachelor of Science or just studying * shorter separate courses in Electronics, Measurement Technology, Astronomy and Geophysics and Principles of

Digital Technologies In Art Stelarc, Patricia Piccinini And Zaha Hadid

2860 words - 11 pages of works involving machinery in some way, usually being attached to him in the form of appendages, such as with his Third Hand (various performances), or via a cable hook up such as in Ping Body (first performed 1996). Stelarc’s work deals mainly with the relationship of the human body and technology, or the fusion of ‘meat’ and the ‘machine’. He sees technology as having always been “an appendage of the body” in terms of its function as an

Construction Education Essay

582 words - 2 pages computer systems to facilitate different construction companies’ projects’ information (Aziz et al. 2004; El-Diraby et al. 2005; Ruikar et al. 2007; Shelbourn et al. 2006; Owolabi et al. 2006; Ping Chen et al. 2005). Furthermore integrated management and accounting system for general and engineering contractors and sub-contractors of all trades for real-time construction management system have been developed using the semantic web technologies (MB7