Simply put, the Octet is a grouping of 8 digital bits. Although the naming convention has changed in recent years as technology has become more widespread, the Octet used to have widely different meanings from the term byte, while now they are nearly synonymous. “The easiest way to understand bits is to compare them to something you know: digits. A digit is a single place that can hold numerical values between 0 and 9.” (How Stuff Works). Electrically speaking, an Octet is simply a collection of 8 digital (or electrical) switches that can have one of two positions, on or off.
This is a very important element to understand about the internet and about the digital transfer of information. Any file, no matter what type (.jpg, .bmp, .wav, etc.), or how large or small (8 bits to 20 Gigabytes) is, at its most basic level, composed of a series of bits strung together in possibly millions of Octets. “A bit is the most basic unit of information in computing and communications, and it always has a value of either zero or one. A byte is a contiguous sequence of a fixed number of bits that is used as a unit of memory, storage and instructions execution in computers.” (Linux Info).
As the number of 8 bit combinations increase in a given file or data type, so does the number possible 1 and 0 combinations. This is important because it allows for a huge amount of diversity and potential for information. Computers process information in quantities of eight units, so these numbers are very signification and have become a universally recognized mathematical property. Computers speeds begin to double at alarming rates due to the computational property of the octet allowing for huge jumps in power and speed (i.e. 8, 16, 32, 64, 128, 256).
After these digital strings are put together to form whatever file type, to transmit whatever type of information you are trying to send, they must somehow be sent across the internet (if communication is your desired end). This is accomplished by data packet transfer, or packet switching. “So the role of the IP layer is to figure out how to `route' packets to their final destination. To make this possible, every interface on the network needs an `IP address'.” (Net Filter).
“Each packet contains address information that identifies the sending computer and intended recipient.” (Comp Networking). Once the data has been reassembled on the other side by the receiving router, you have successfully sent your information. If there is some breakdown in communication, or some small piece (or packet) of data was lost along the way, the receiving router will request to have the information sent again until the entire piece has be reassembled.
So, what is the Octet? “An octet represents any eight-bit quantity. By definition, octets range in mathematical value from 0 (zero) to 255.” (About). To most of us, it’s data. Digitally, it is one’s and zero’s, little bits of electricity strung together to contain information. In this form we use it to communicate ever more rapidly and frequently as the internet grows and continues to change. The size files grow, and our appetites for more and more information grows with it, even though far too few of us actually know how that information gets from point A to point B. The Octet is the backbone of all modern data and communication. And though it seems complex from a distance, it’s nothing but ones and zeros.
Showing posts with label Midterm. Show all posts
Showing posts with label Midterm. Show all posts
Saturday, November 6, 2010
Midterm 2: IPv6
Internet Protocol Version 6 is a newer, faster, larger, and believe it or not, simpler version of the protocol currently used (IPv4) for transmitting information via packet transmission over the internet. Although not in use yet, it will eventually replace the existing protocol (IPv4) that has been in use since 1981. “IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) such as address depletion, security, autoconfiguration, and extensibility.” (Microsoft).
One of the main, and most important elements of IPv6 over its predecessor is the increase in address space, such as the sheer number of internet addresses currently available on the internet. Whereas IPv4 uses 32 bit of space, IPv6 will use 128 bits, allowing for a vast increase in the number of addresses available for use. “This addressing capability, along with new functions enabling end-to-end security, improved mobility support, simplified address configuration and management, make IPv6 a critical component in the evolution of e-business and the next generation internet.” (IBM). And that’s just it. IPv6 is the Internet Protocol to service the next generation of computer and internet usage, including mobile computing. So why isn’t is in use already?
According to some sources, IPv6 is on the verge of widespread implementation. “The technology has broad implications to innovation and productivity. It allows us to explore new business growth models, and offer more people and communities equitable access to information.” (Cisco). Considering how quickly the internet has shrunk, and by shrunk I mean how quickly much of the bandwidth and space for addresses has diminished, now would be a good time to truly expand the internet and how we use it. The internet is the future of nearly all media, and we need to utilize it the best we can.
One of the main, and most important elements of IPv6 over its predecessor is the increase in address space, such as the sheer number of internet addresses currently available on the internet. Whereas IPv4 uses 32 bit of space, IPv6 will use 128 bits, allowing for a vast increase in the number of addresses available for use. “This addressing capability, along with new functions enabling end-to-end security, improved mobility support, simplified address configuration and management, make IPv6 a critical component in the evolution of e-business and the next generation internet.” (IBM). And that’s just it. IPv6 is the Internet Protocol to service the next generation of computer and internet usage, including mobile computing. So why isn’t is in use already?
According to some sources, IPv6 is on the verge of widespread implementation. “The technology has broad implications to innovation and productivity. It allows us to explore new business growth models, and offer more people and communities equitable access to information.” (Cisco). Considering how quickly the internet has shrunk, and by shrunk I mean how quickly much of the bandwidth and space for addresses has diminished, now would be a good time to truly expand the internet and how we use it. The internet is the future of nearly all media, and we need to utilize it the best we can.
Midterm 3: Origin of Spam
As we know (and hate) it today, spam refers to the overabundance of electronic mail messaging, in the form of unsolicited advertisements. But spam doesn’t just come from your email inbox, it has roots in many other forms of media as well. “The word "Spam" as applied to Email means "Unsolicited Bulk Email".Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent.” (http://www.spamhaus.org/definition.html).
In modern terms, the name of spam came into use with the earliest iterations of the internet, although the case could be made for the earlier iterations of unwanted chain letters and the like. The origins of this come from a bug in the original USENET software which was intended to delete unwanted messages, and which mistakenly ended up sending over 200 unintended messages to existing USENET users. “It was these recipients that were first to use the term spam, which at the time simply meant abuse of USENET.” (Spam Laws).
Prior to the internet, the spam was first utilized by virtue of the telegraph where the first recorded spam message was sent simultaneously to several destinations. “The first unsolicited messages came over the wires as early as 1864, when telegraph lines were used to send dubious investment offers to wealthy Americans.” (Time Magazine). Appropriately, the definition refers to Network abuse of nearly any kind. Of course we are all familiar with the modern terms of either the processed meat product, or the gross overabundance of unwanted email.
Spam today has become a whole new monster. It has taken root in a variety of different media, smart spammers utilizing the many varied forms that the technological world gets its information. Emails, text messages, faxes, internet ads, and so on have become the new media by which spam has taken root in all our lives…and almost none of it is welcome. ”Spammers have always shown their liking for big names and brands. And very often these brands are abused to spread malware or gain access to users’ accounts.” (Symantec). Not only has spam become incredibly annoying, but it is now becoming dangerous to our personal identities and property. Obviously common decency will not stop spammers. But the line needs to be drawn somewhere.
In modern terms, the name of spam came into use with the earliest iterations of the internet, although the case could be made for the earlier iterations of unwanted chain letters and the like. The origins of this come from a bug in the original USENET software which was intended to delete unwanted messages, and which mistakenly ended up sending over 200 unintended messages to existing USENET users. “It was these recipients that were first to use the term spam, which at the time simply meant abuse of USENET.” (Spam Laws).
Prior to the internet, the spam was first utilized by virtue of the telegraph where the first recorded spam message was sent simultaneously to several destinations. “The first unsolicited messages came over the wires as early as 1864, when telegraph lines were used to send dubious investment offers to wealthy Americans.” (Time Magazine). Appropriately, the definition refers to Network abuse of nearly any kind. Of course we are all familiar with the modern terms of either the processed meat product, or the gross overabundance of unwanted email.
Spam today has become a whole new monster. It has taken root in a variety of different media, smart spammers utilizing the many varied forms that the technological world gets its information. Emails, text messages, faxes, internet ads, and so on have become the new media by which spam has taken root in all our lives…and almost none of it is welcome. ”Spammers have always shown their liking for big names and brands. And very often these brands are abused to spread malware or gain access to users’ accounts.” (Symantec). Not only has spam become incredibly annoying, but it is now becoming dangerous to our personal identities and property. Obviously common decency will not stop spammers. But the line needs to be drawn somewhere.
Subscribe to:
Posts (Atom)