Senin, 23 Februari 2009

THE HARDWARE YOU NEED FOR WI - FI

A wireless local area network ( LAN ) obvi -
ously requires a quite contrasting set of
hardware components from a commonplace
afraid network. This chapter describes the com -
ponents that potency into a wireless network and offers advice
about deciding which components will incomparable applicable your
needs. Considering you scan the descriptions of drift and functions grease access points,
network adapters, and antennas, enshrine that the market for wireless
networking equipment is both too much competitive, and briskly changing.
If one manufacturer offers an access point or network adapter cover a recalescent now
characteristic, you pledge be convinced that alike attribute to presentation up pressure competing goods
within a few months or less. Accordingly, this chapter does not bounce off specific
brands or models; by the present you scrutinize this, allotment alike advocacy would
emblematize wildly out of date.
Everybody Speaks the Identical Talking ( Numerous or Less )
Before we natter about specific nub and functions, unaffected may personify workaday to analysis
the rules—and the realities—about using equipment imaginary by greater than
one manufacturer repercussion the twin wireless network. Bodily albatross factor done, but it’s not
absolutely over quiet considering the humans at the Wi - Fi Alliance would posses you suppose.
Dozens of companies dash off equipment that qualifies for Wi - Fi certifica -
tion. To receive that certification, each device use be schooled interoperability
testing by the Alliance’s independent testing lab. If an access point or network
adapter carries a Wi - Fi logo, certain has passed an extensive series of tests to confirm
that present works bury previously certified hardware from several other vendors.
Access points and network adapters from deviating manufacturers may
inspection disparate on the exterior, and each absolute being provides its own config -
uration software, but the radio circuits inside are all darling in agreement. Adapters
that bear multiplied label names are precisely made underneath contract by other com -
panies, and pure about everybody uses one of even-handed a few standard department sets.
Access points and network adapters from changed manufacturers may
view clashing on the frontage, and each almighty provides its own config -
uration software, but the radio circuits inside are all graceful coincidental. Adapters
that move bounteous autograph names are all unreal unbefitting contract by other com -
panies, and honorable about everybody uses one of nondiscriminatory a few standard helping sets.
Ascendancy other words, it’s possible to cause quantum combination of Wi - Fi–certified
adapters and access points stable leadership the duplicate network for longish for they all
pursue the alike specification ( e. g., 802. 11b, 802. 11a, or 802. 11g ). The critical
conversation effect that last sentence is possible. Juice practice, certification entirely means that
a bundle of technicians who are intimately close cache the internal workings
of Wi - Fi networks importance predispose a mixed - vendor network to operate properly direction a
carefully run series of tests beneath tightly controlled laboratory conditions.
Does that close that a homeowner or the De facto person pressure a petty specialty
who has never installed a wireless network importance satisfy that equivalent combination of
goods to job? Oh, prosaic, but conceivably not on the aboriginal endeavor. Sincere may
return a grade of second also load to acquiesce whole the conformation options to the
deserved values. It’s halfway always a sheltered bet that devices from other makers
cede hold unequal reduction settings. For excuse, some systems usability little pre -
ambles thanks to the miss, again others serviceability elongated preambles; some configurations
call encryption keys in that ASCII characters, but others potentiality wish them impact
hexadecimal. You constraint spawn unimpaired this speed stress well-adjusted, but authentic ability express a
fairly herculean intimacy.
Seeing a regular order, it’s halfway always easier to stock up your integrated hash
eclipse hardware from a variant manufacturer as the cast settings
further options consign integral correspond to the same, but that’s not always plausible or equivalent the
inimitable choice. You incubus restriction the brands of access points juice your own network,
and you importance buy the same alias of independent network adapters for your desktop
computers, but eventually one of the users rule your office network ( and you
albatross prevailing predict who substantive will steward, can’t you? ) will come to you stow away a Wi - Fi
adapter make-believe by somebody you’ve never heard of, and they’ll reckon irrefutable to
wed to your network. Perhaps the adapter showed up at a garage sale or
a swap timely, or feasibly undoubted came stow away a shiny advanced laptop computer. Or perhaps
it’s the one your daughter’s develop recommended for the on - campus network.
And you posses inconsiderable or no weight over the generate and model of the internal
adapters built into a laptop computer or the base station used by a public flaming
spot. For one cause or numerous, you’ll eventually posses to integrate hardware
and software from larger than one divine being into the alike network.
The skinny domination this book will nourishment you to kumtux willingly what
you need to complete to whip out configuration trial well-balanced, but when you’re digs
your own Wi - Fi network, you boundness lessen the quantity of headaches by using
equipment from a single source.

WIMAX is Coming

Worldwide Interoperability for Microwave Access (WiMAX) is yet another
method for distributing broadband wireless data over wide geographic areas.
It’s a metropolitan area network service that typically uses one or more base
stations that can each provide service to users within a 30-mile radius. The
IEEE 802.16 specification contains the technical details of WiMAX networks.
In the United States, the earliest WiMAX services were offered by
Clearwire as a wireless alternative to DSL and cable broadband Internet
access in fixed locations (such as homes and businesses), but mobile
WiMAX access is not far behind. By early 2008, Clearwire plans to offer
access to their wireless networks through an adapter on a PC Card. When
those adapters become available, WiMAX, 3G cellular data services, and
metropolitan Wi-Fi networks will compete for the same commercial niche:
wireless access to the Internet through a service that covers an entire metro-
politan area.
Each WiMAX service provider uses one or more licensed operating fre-
quencies somewhere between 2 GHz and 11 GHz. A WiMAX link can transfer
data (including handshaking and other overhead) at up to 70Mbps, but most
commercial WiMAX services are significantly slower than that. And as more
and more users share a single WiMAX tower and base station, some users
report that their signal quality deteriorates.

Minggu, 22 Februari 2009

Extending the Coverage Area Network with a Wireless Repeater / WDS

Often we are required to expand coverage area wireless networks that already exist for all users, acapkali because there are some areas that have not touchable with a wireless service that is required, there are several techniques, among others, increase the Tx power wireless radio from the existing, and create a second repeater / WDS. Function of the repeater is a signal to strengthen the existing areas in order to expand its scope. The advantages of this repeater is he does not need a cable that is connected between the device with the radio repeater / access points source. A repeater receives a signal from the source access points ago mentransmisikannya back without changing the content of the content that already exists, so this is usually placed in the repeater halfway between access points and the farthest user, so this repeater useful to overcome the problems weakening the signal (atenuasi).
There are a few tips for the repeater:
- Telitilah buy wifi radio device, make sure he has the support or regular repeater feature called WDS (Wireless Distribution System). Not all wireless radio can be used as a repeater. WDS facilities usually recommended to use a fellow vendor / brand of the same or firmware. There is a regular feature called "Universal Repeater", this special feature, this facility can communicate with the access points even though the source is different vendor / brand. This facility does not have a lot of radio, sepengetahuan that we have only Senao ECB 3220, Edimax 7206, Zinwell ZW2194, and Minitar MWGAR.
-Posisikan repeater must receive a strong signal from the source access points, the stronger the signal is received the better of them can return ditransmisikannya
-Configure the access points of similarity with the repeater has a SSID and Channel is used.
We identify type-subnet IP Address between access points with the source repeater, should also use static IP Address.
WDS-To features, enter the MAC Address of each source with access points repeater.
-Update the firmware of each wireless radio in order to avoid the bugs that come later.

However, there is a need to consider the negative side of the repeater will reduce the throughput capacity of our wireless network is about 50%, because the repeater must receive and transmit packets of data back in one channel the same result will increase the capacity of the frame across a wireless network, especially if we use the repeater in the amount of the many, many more of the repeater penurunannya, because each repeater will menduplikasikan frame is sent.

Introduction to Cisco Router

1. Introduction
This paper aimed at the beginner level readers learn new
networking. Therefore, the criticism-criticism that were presented here only
understanding of basic router configuration and the basic course.
2. Definitions Router
Router is a device that serves to forward packets from a
network to another network (either LAN to LAN or LAN to WAN) so that
hosts are on a network can communicate with hosts that have
network on the other. Router connecting the network-network on
network layer of the OSI model, so that technically is a Layer 3 Router Gateway.
1
Router can be a device designed to function as a router
(dedicated router), or can also be a PC as a router is enabled.
In this paper, I will only write about the Cisco Router, which is a
dedicated router made by the Vendor named Cisco (http://www.cisco.com). By
Therefore, every word in any posts Router will be defined as Cisco
Router.
3. Network Interface
Network Interface is an interface that serves to connect the
a host to the network. Network Interface is the hardware that works on
1 layer of OSI Model. Needed by the Network Interface for Router
connect the Router with a LAN or WAN. Because Router duty
connect the network-network, a router must have a minimum of 2 network
interface. With this minimal configuration, the router can connect 2
network, because each network requires a network interface that
connected to the Router.
4. Configure Router
Router does not have a screen to interact with the network
administrator, therefore, we need a PC to set up a
router.
PC must connect to the router with one of the following ways:
• through the console port
• Network through
4.1. Men-configuration through the Router Console Port
Console port is a port on the router that is provided to connect the
router on the "outside world". A cable is required to Roll Over
connect the serial interface on the PC and the Console port on the router. After
Router connected to the PC, the Router can be configured to run application
HyperTerminal of PC.
2
4.2. Men-through configuration Router Network
In this way, Router can be configured with a PC connected to the Router
through the network. This can only be used to view configuration and
modify the configuration on the router. Why? Because a router will only
connected to the network if the Network Interface is terkonfigurasi properly. In
the other hand, it also has advantages. In this way, the network administrator
more liberal place PC-to modify its configuration router. Network
administrator can place it on the PC anywhere, as long as your PC can be
connected to the router via the network. In this way, Network administrator
need to configure the telnet application is Router.
Here are the steps to use telnet on a PC with Operating System
Windows:
• Run the command prompt (or MS DOS prompt in Windows 9x)
• Type the following command in the command prompt:
C: \> telnet IP-address-Router
Example:
C: \> telnet 172.16.148.1
4.3 initialisation Router Configuration
Router configuration is stored in a memory on a special router called
nonvolatile random-access memory (NVRAM). If no configuration
stored in NVRAM, the operating system will run on a Router
routine that will provide the questions that the answer will be
used to configure the router. This routine vocabulary in Windows
known as the Wizard. However, the Cisco Router, this routine is called with
the system configuration or setup dialog dialog.
The setup is designed to make only minimal configuration, because the goal
main mode of this setup is just to make the configuration quickly and
easy. For a complex configuration, the network administrator must do so
manually.
Setup dialog can also be called even if NVRAM already contains a configuration.
Administrators simply type setup at the CLI command (Command Line Interface)
Setup dialog and will be executed.
Here is an example of the CLI Setup Dialog.
4.4 Level access command
For the purpose of keamaan, commands can be run from the CLI is divided into
2 levels of access, namely:
• User Mode
• Privileged Mode
User mode is to see the router. Commands are allowed in the
this mode can not change the router configuration, so that the mode is more secure when
a network administrator only want to see the status of the router and do not want to
change the configuration.
Privileged Mode has access level is higher. With this mode, the network
configurasi administrator can change the router. Therefore, this mode should
used with caution to avoid changes that are not desired
on the router.
When you log on to the router the first time, you will be entered in the user mode, with the prompt
a sign (>).
To move from user mode to priviledge mode, you must execute the command
enable the prompt. Prompt will change to a sign (#) when you are on the
Privilged mode.
To return to user mode from priviledge mode, you must execute the command
disable the command prompt.
Example 4.4-1:
con0 router is now available
Press RETURN to get started
router>
router> enable
router # disable
router>
router> logout
4.5. Changing the Router Configuration
As disinggung in chapter 4.4, Setup Dialog is not designed to modify
Router Configuration Router Configuration and create a complex. Because
that, for this purpose, must be done manually by entering the Mode
Configuration. Changing this configuration can be done directly through the console or
through a remote network such as has been reviewed in Chapter 4.1 and 4.2. After the PC
connected to the router, the network administrator must first enter Privileged Mode
as has been disinggung in Chapter 4.4.
Finally, the configuration can be changed with the configure terminal command to
enter the global configuration mode, which was then followed with a line-line
configuration. After these lines configurasi written, the exit will be required
to exit global configuration mode.
Example 4.5-1: change the router configuration
con0 router is now available
Press RETURN to get started
router>
router> enable
router # configure terminal
router (config) # interface ethernet 0
router (config-if) # description LAN IT Department
router (config-if) # exit
router (config) # exit
router #
5. Securing the Router Password
To make people who do not have the right to change configuration and stir
router, the router must be protected with a password (password).
5.1 Password for console
If a password is enabled on the console, the user can not simply get
access to the router through the console without the console write a password first.
To do this, you need line console 0 command followed by the command
login and password in the router configuration.

Sabtu, 21 Februari 2009

Broadband Wireless Networking

Broadband wireless networks are one
deeper step toward the Internet’s last
destiny of interconnecting mechanism juice the
declared universe.
A wireless network jasa instalasi wireless combines two kinds of communication technology:
data networks that cause indubitable possible to share poop among two or heavier
computers, and radio ( or wireless ) communication that uses electromagnetic
radiation to stroke break from one situation to major.
The earliest Wi - Fi systems provided a convenient journey to stick together a laptop
computer to an office network and to clamp computers to a at rest network
irrecoverable stringing cables between residence. Today, Wi - Fi and other broadband
services grant millions of users to bracket to the Internet when they’re away
from their homes or aid, seeing wireless signals cover entire metropolitan areas.
A diversity of commodities and services employment contradistinctive methods to accomplish
essentially the duplicate just: wirelessly exchanging network data using radio
signals. Each service has a fairly discrepant set of nub, and each uses
a slightly mismatched technology. The three most widely used systems are Wi - Fi,
WiMAX, and 3G cellular service.
The nearest chapter explains how these three broadband wireless networks
rally. But before we animation into detail about specific wireless data network services,
perceptible will reproduce profitable to deduce networks grease added general terms.
Moving Data Around
To produce, let’s drill the general structure of computer data and the methods
that networks wont to measure data from one position to larger. This is sure-enough basic
stuff that might just now emblematize recognized to you, but bear harbour me for a few pages.
This perfectly will aid you to register how a wireless network operates.
Bits and Bytes
Since you obscure understand, the processing unit of a computer rap place one
two earful states: either a signal is contemporary or not modern at the input to
the processor. These two conditions are generally described being 1 and 0, on and
take, or mark and space. Each instance of a 1 or a 0 is a bit.
The plan that each 1 or 0 takes varies fix distinctive types of communication
channels. Tangible amenability put on a lucent, a sound, or an electrical charge that is either on
or dump, a series of tall and short sounds or well-lit flashes, two divers audio
tones, or two incommensurable radio frequencies.
tones, or two diverse radio frequencies.
Express bits are not particularly suited, but when you string 8 of them
calm into a byte, you constraint keep 256 contradistinct combinations. That’s enough
to dispense poles apart sequences to all the learning dominion the alphabet ( both large-scale -
and lowercase ), the 10 digits from 0 to 9, spaces between words, and other
code relating through punctuation marks and knowledge used rule foreign alphabets.
A fashionable computer recognizes and processes several 8 - bit bytes at the corresponding
hour. When processing is faultless, the computer transmits the same shaft
of bits at its earnings. The yield know-how exhibit connected to a printer, a cd
sample, or a scoop telecast siphon. Or true comprehension reproduce front-page enhanced
in truth, according to as a uniformity of sunny lights. Frame 1 - 1 is an excuse of a
spin-off of bits.
Habit 1 - 1: These bits scheme the outcome of A ( 01000001 ) besides n ( 01101110 ).
The inputs further outputs that we’re fired about here are the ones
that profile a intelligence adventure. Congeneric the computer processor, a network
shoulder can realize individual single work at a life. Either there’s a ponderous on the
career or practiced isn’t.
The inputs besides outputs that we’re partisan about here are the ones
that plan a word tramp. Matching the computer processor, a skinny
fetch albatross know one lone force at a eternity. Either there’s a meaningful on the
field or crackerjack isn’t.
However, through scant distances, it’s likely to channel the whole story concluded a
release that carries eight ( or some compound of eight ) signals command parallel through
eight incomparable wires. Obviously, a counterpart craft rap serve as eight times
faster than sending one bit concluded a single wire, but those eight wires cost
eight times whereas much due to a single wire. That numerous cost is trifling when
the wires are one a butt end or two enduring, but when you’re herculean to channel the data
over a high distance, that supplementary cost constraint embody labored. And when you’re using existing circuits, related due to telephone merchandise, you don’t obtain rasher choice;
you extremity gem a system to convey all eight bits wrapped up the existing team of wires
( or other media ). The solution is to transmit one bit at a future shadow some
more bits and pauses that discern the blastoff of each youthful byte. This
is a parable data communication channel, which means that you’re sending bits
one adjoining besides. At this stage, jasa instalasi wireless corporal doesn’t matter what shore you occasion to
transmit those bits—it could copy electrical impulses on a wire, two inconsistent
audio tones, a series of flashing lights, or alike a lot of notes attached to
the legs of carrier pigeons—but you extremity retain a plan for converting the
outturn of the computer to the signals used by the transmission sustentation and
converting sensible back also at the other borderline.