Monday, June 23, 2014

Selection of Path Routing

Selection of Path Routing

Routing is a mechanism of delivery of data packets transmitted from one network to another network. In a router, usually has a routing table that stores information or routing path to be used when there is data transmission through the router. In certain cases to get to a destination, the router has only one gateway, such as a router must have a network that connects many different segments. A simple example can be seen in the following topology:
Then how the router determines its route selection?. Which Gateway Router 1 will be used to get to the server? When there is more than one routing rule, the router has a routing path calculation mechanisms that will be used routers for data transmission. Routing path selection is based on several parameters: dst-address and the distance of each routing rule.

  • First, the router will choose the rule dst-address routing to the most specific.
  • Then the router will see the value in the Distance parameter in each routing rule, the smaller the Distance, then the rule will be used.
  • If there are multiple routing rule with the same dst-address-specific and the same distance, then the router will choose the Random (round robin).
From the previous topology, routing rule obtained as images.
How does the order of priority lanes that will be used Router 1?. We will try to discuss route selection mechanism based router. Keep in mind, traffic is traffic that will be transmitted from Router 1 to the server with the IP address to 192.168.30.3. Take a look at the routing rule above, for the purpose of IP 192.168.30.3 dst-address = 192.168.30.0/29 more specific than dst-address = 192.168.30.0/24, so the rule B will be used as a first priority. Then the rule which will be a priority 2 and 3?. Consider the rule A and C. Both have the same dst-address - the same / 24, but the value of the distance of the two different rule. Between A and C routing rule, the router will choose A, because the distance to the rule parameter value A is smaller than C. It could be concluded that the rule of the discussion was going to come answer as follows:
By default distance value is determined according to the type of routing is applied, for example to Static Route = 1, OSPF = 110, RIP = 120, and so on. However, the value of the distance parameter can also be changed, to make a simple failover mechanism. An example implementation of a simple failover is when there are two routing rules with different distance, note the following routing rule:
In these examples, the main route is to go to 192.168.30.0/24 gateway 11.11.11.2. If the gateway 11.11.11.2 end / die, it will automatically update the routing rule that will use the router for data transmission will shift to using the backup path, which is the gateway 10.10.10.2. Network admin not to bother - bother to change the routing table information manually.

Qamar Bani Hashim


INSTALL THE CABLE UTP STRAIGHT TYPE AND CROSS

INSTALL THE CABLE UTP STRAIGHT AND CROSS


before you practice, there is some hardware that you need to prepare, including :



  • UTP (Unshielded Twisted Pair). UTP cables are frequently used categori 5 UTP cable (UTP Cat-5). why? for Cat-5 UTP cable support data transfer up to 100 Mbps. This cable consists of 8 small that have different colors. The cable color is orange, orange and white, blue, white, green, green, white, brown, white chocolate.

  • the second is the RJ-45 jack. jack is similar to a home telephone jack. only the larger size. RJ-45 jack consists of 8 pins, according to the number of UTP cables

  • crimping tool or crimping pliers. hardware that is similar to a pair of pliers. however, unlike its function pliers in general. crimping tool is useful to clip the cable to the RJ-45 jack. 
all the above hardware can be found at most computer stores. the price is not too expensive.

 UTP cable straight type
 

I will now discuss how to install. The first is how to install UTP cable straight type. for it to do the following steps:


  • peeled end of the wire about 1 cm, so that the small wires that are inside look.


  • attach the cables and straightens. then collated and the trim on the white color is orange, orange, green, white, blue, white blue, green, white and chocolate brown. after it cut the edges so that the average of each other.


  • after a structured cabling, RJ-45 jack grab. as I said earlier this jack consists of 8 pins. pin 1 of the jack is located adalahpin the left if your facing the pin position. sequential to the right is the jack 2, 3, 4, and so on. 


  
  • then insert the wires into the RJ-45 jack in the order was as follows:


  1. Orange-white on pin 1
  2. Orange to pin 2
  3. Green-white on pin 3
  4. Blue on pin 4
  5. Blue and white on pin 5
  6. Green on pin 6
  7. White chocolate on pin 7
  8. Brown on pin 8 
         insert the cable until the tip is stuck in the jack.

  
  • insert the RJ-45 jack which is mounted with the cable before crimping pliers in your mouth corresponding to the pin RJ-45 jack in the mouth pliers. now had a jack flops tangcrimping pin sticking up all over the wiring. usually if the pin is stuck jack will give voice "click".
now you've finished installing the RJ-45 jack on the end of the first cable. to the second end of the cable, the steps are the same as the first one end of the cable installation. to repeat the earlier steps to install the RJ-45 jack on the end of the second cable.
UTP cable straight type arrangement you can see in the picture below:



Caption:
H    : green
HP : green and white
OP : orange and white
B    : blue
BP : blue and white
O    : orange
CP : white chocolate
C    : brown


UTP cable type cross
 
how to install UTP cable straight type I described earlier. Now I will discuss about how to install the type of cross UTP cable. UTP cabling to cross almost the same type by placing a straight UTP cable types. about the same as before the technical installation. the difference is the color sequence of wires at the second end of the cable. The first end of the cable, the cable structure with UTP cable straight type arrangement are:

 

  • Orange to pin 1
  • Orange-white on pin 2
  • Green on pin 3
  • Blue on pin 4
  • Blue and white on pin 5
  • Green-white on pin 6
  • White chocolate on pin 7
  • Brown on pin 8
to the second end of the cable, the color arrangement different from the first end. As for the arrangement of the colors is:

  • Green-white on pin 1
  • Green on pin 2
  • Orange-white on pin 3
  • Blue on pin 4
  • Blue and white on pin 5
  • Orange to pin 6
  • White chocolate on pin 7
  • Brown on pin 8
composition had wiring you can see in the picture below


 Caption:
H    : green
HP : green and white
OP : orange and white
B    : blue
BP : blue and white
O    : orange
CP : white chocolate
C    : brown








the end result will cross UTP cable types like this:


 Caption:
H    : green
HP : green and white
OP : orange and white
B    : blue
BP : blue and white
O    : orange
CP : white chocolate
C    : brown





the conclusion is if you plug in the UTP straight type arrangement of colors on both ends of the cable is the same. whereas UTP installation way cross type, color composition different from the first end of the cable end of the second cable.

tutorial how to install this type of straight UTP cable and cross type.

6 Keys to Building "The Winning Team"

6 Keys to Building "The Winning Team"

Powerful article

To Build a Team Winner least we should be able to meet the following terms:
1. Has Strong Leadership, they are no longer considering the hours or salary advance, but they have a value that is pursued.
2. Must Have GOAL same, this can be obtained by routinely communicating GOAL will be achieved by the Company (Mission and Vision).
3. Having Confidence Same, it is important that within the team, no one forget to remove "Hand Brake" while another is "step on the gas"
4. Has Action Plan that serves as a nice small Goal2 Breakdown of Big Corporate Plan, to ensure team effectiveness.
5. Having Monitoring System which serves to ensure all Action Plan and Team remain in the Outline Plan for the Company.
6. Having a clear and Planning Training Contains: Skill, Motivation and the Culture Company that can ensure Growing Team.
Success comes not from the action continues to Stop. Success comes from Build HABITS!
 
 http://freakscontent.blogspot.com/

Secret Tips To Be Rich

Secret Tips To Be Rich

Secret Tips To Be Rich today, What To Do By loser ..?
Described by Robert T Kiyosaki, Fear Lost People will Keep Doing It Similar in His life, here's a few things that do losers:
1. Marriage to those who still maintain that it is no longer grounded by Love.
2. They are still undergoing A job, even though they knew no good prospects.
3. They are storing old clothes and "stuff" that they never wear.
4. Those who remained in the cities that do not have a future for them to live.
5. They are still friends with the People They already know they hinder Progress.

Zakaria: The old Egypt is back

 
 
 

Zakaria: The old Egypt is back

CNN speaks with Fareed Zakaria about Monday's conviction in Egypt of three Al Jazeera English journalists accused of aiding the Muslim Brotherhood.
Fareed, what does this ruling in Egypt, going against these Al Jazeera journalists, say about what's going on in Egypt right now? A new president has just been elected.
It tells us the old Egypt is back. That is, the deep state – the state of Mubarak and Nasr, the state that ruled in an uninterrupted military dictatorship – is back because despite the claims they're moving toward democracy and trying to create genuine transition to pluralism, freedom of the press is entirely under siege and under attack from the state.
Look at the charges. These journalists, who are very fine professional journalists, are being essentially charged for criminal activity for aiding terrorists, which is entirely untrue. Two of them sentenced to seven years. One was sentenced to an additional 10 years. Do you know why? He was charged with possession of ammunition. Why? While covering these protests this man found a spent casing, in other words a used shell. He happened to put it in his pocket as a souvenir. For that act, he has been sentenced to an additional three years in jail. This is how absurd these charges are.
Is there a possibility this can be overturned and these three journalists can be freed?
They're all really fine professional journalists whose only sin was to commit journalism. That's all they were doing – covering the story. The phase Egypt is going through right now, judges have been doing mass sentencing where they sentence hundreds of people to death at a time, just shows how ludicrous the whole process is. Some of those sentence haves been overturned on appeal. That’s possible in this case.
More from CNN: Why we should be worried
It's also possible that the president, frankly, could summarily dismiss the whole thing. Egypt has turned into a dictatorship, which means if President el-Sisi decides he wants to dispense with these sentences, he will do it. So I think if there was enough international pressure brought to bear – I think Secretary Kerry has been very good, but privately should be pushing them harder. I think it wouldn't hurt if President Obama were to speak out on this.
The issue of freedom of press is at the heart of building a new democracy. If that's what Egypt wants to do and they will not allow journalists to operate freely, they will not allow the free flow of information, then the whole thing is a sham.
The White House today began with a statement saying, "The White House strongly condemns the conviction and sentencing of these Al Jazeera journalists in Cairo," adding the verdict "flouts the most basic standards of media freedom." Here's the sensitive issue. We know Egypt is an important strategic partner in that part of the world. The United States provides Egypt with a lot of military and economic foreign aid. If Egypt continues to arrest journalists for simply doing journalism, sentencing them to seven or 10 years in prison, there will be outrage in the United States, and a lot of that pressure for foreign aid for Egypt will go away.
That's true. It's a very complicated subject. Egypt gets a lot of that foreign aid because it signed the Camp David Accords, returning land to Israel. It's tied in with a broader strategic puzzle. It will be difficult to withhold the aid without unraveling that, including the peace treaty with Israel.
However, I think it's very important for the United States to send a signal that the United States does not believe Egypt is on the right track, that these are terrible, terrible mistakes. As Secretary Kerry said, they're losing faith with the people of Egypt. I think it would be perfectly reasonable to suspend a variety of programs – the U.S. has some military aid, non-military aid, other kinds of contact. Because it's not just bad for journalists. It's terrible for Egypt. When you think about it, in terms of attracting tourists, part of the lifeblood of Egypt's economy – all this is sending exactly the wrong signals.

Implementation of Firewall Filters

Implementation of Firewall Filters


In general, firewall filtering is usually done by defining the IP address, both the src-address and dst-address. Suppose you want to block client computer that has a certain ip or when doing block certain web based ip to the web. Firewalls are not only used to block the client that can not access a particular resource, but it is also used to protect the local network from external threats, such as viruses or hacker attacks. Usually the attack from the internet is done from a lot of IP so that it will be difficult for us to do only with the protection of IP based. Well, actually there are many ways in addition to filtering based on IP Addres, for example based on protocol and port. Here's an example of implementation by utilizing some of the parameters in the filter firewall features.

Protocol and Port
The use of ports and protocols is usually combined with an IP address. Suppose you want the client can not browse, but can still FTP, then you can create a firewall rule that performs block TCP port 80. When you click the drop down in the protocol, it will display any protocol option that will we filter. This parameter will we need when we want to block the application where the application uses a specific protocol and port.



Interface
Interface outline there are 2, the input interface and output interface. How to determine this is to look at the interface where the trafick entered into the router, and which interface traffick from the exit to leave the router. Suppose you connect to the internet through a router proxy, then you ping www.mikrotik.co.id from your laptop, then the input interface is the interface connected to your laptop, and the output interface is the interface connected to the Internet. An example application is when you want to maintain the security of the router, you do not want the router can be accessed from the internet. Of these cases you can do filter the incoming connection to the router with a direct in-interface option on the interface connected to the Internet.



P2P parameter
There is actually a fairly easy way and simple to perform such filtering against traffick P2P torrent or eDonkey. If you previously used a lot of rules, you can simplify the P2P parameters specify filters in the firewall rule. If you click on the drop down, it would appear that p2p program information can be filtered by the firewall.



Mangle
We usually make a mangle to mark packets / connections, then we use for bandwidth management. But we also can make a mangle to perform filtering. Firewall filters can not perform tagging in packets or connections, but we can combine firewall mangle and filter. First, we mark the first packet or connection with mangle, then we define in the firewall filters.



Connection State
If you do not want any packet - invalid packet passing on your network, you can also perform filtering by defining the parameters of the connection state. Invalid package is a package that has no connection and is not useful so it will only burden the network resources. We can do drop the package - this package by defining the parameters of the connection state.



Address List
There are times when we want to do filtering against some ip that is not sequential or random. If we make a rule one by one, it will become tiresome. With these conditions, we can apply the IP grouping makes "address list". First, make a list of ip in the address list, and then apply the filter in your rule. Options for adding the "Address List" in the firewall on the Advanced tab. There are two types of address list, "Src. Address List" and "Dst. Address List. Src Address List is a list of resources that connect to ip, ip Dst Address List is a goal to be accessible.



Layer 7 Protocol
If you are familiar with regexp, you can also apply filtering on layer7 using firewall filters. In the proxy, adding regexp can be done in the menu Layer 7 Protocol. Once you add regexp, you can perform filtering with Layer 7 Protocol defines the filter rule you created. Please note that the use RegExp, will require higher CPU recource than usual rule.




Content
When we want to do block the website, one of the steps are quite easy to do this is to perform a filter based on content. Content is the string that is displayed on the web page. That way, the website that has a string kida fill in the content will be filtered by the firewall. Suppose we want to block www.facebook.com then simply browse content with a string parameter "facebook" and drop action, the website either HTTP or HTTPS facebook inaccessible.



Mac address
When we do a filter by IP address, a user sometimes naughty by replacing ip address. To overcome this mischief, we can apply filtering by mac-address. We record the mac address used information that user, then we add the parameters Src. Mac Address in firewall rule us. With so long as the user is still using the same device, he continued to be changed ip filter though.



Time
One alternative solution other than we have to bother making a scheduler and scripts, we can utilize the time in firewall feature filters. This feature will determine when a firewall rule is executed. Not only to determine hours, this feature can also be used to determine any day of the rule runs. Suppose we want to block facebook in office hours, then we can create a firewall rule to block facebook run from 08:00 to 16:00 hours apart on Saturday and Sunday. Before you create a firewall rule with the parameter "time", make sure you've set NTP on your router so that the router time according to real time.



When you create a firewall rule, try to create a specific rule. The more specific rule that we make, the more optimal the rule also will run.

http://freaks.co.id

An austere coronation in Spain

For more Last Look, watch GPS, Sundays at 10 a.m. and 1 p.m. ET on CNN
Last week, Prince Felipe became Felipe VI, King of Spain.
Rather than the big "to do" one normally sees in European coronations, Prince Felipe opted for a more muted ceremony. It felt a little like a second marriage rather than a big first wedding ceremony.
There was a military procession and then a simple proclamation. There were no horse drawn carriages; the royals arrived by car. There were no foreign royals or heads of state in attendance. King Juan Carlos himself didn't even attend the ceremony. Instead of a seated banquet, guests were served tapas while standing. The crown was displayed next to Felipe, but he didn't wear it.
Ardent royalists criticized the austere event as a missed opportunity to project a positive image of Spain to the world. But the occasion was reflective of Spain's economic situation and mood. Still recovering from the recession the country's unemployment rate is roughly 26 percent. For youths that number is north of 50 percent.
That didn't stop other from adding pomp to the event – commemorative souvenirs reminiscent of a royal wedding are being sold all around the country. Of course that could be a nice stimulus that the Spanish economy needs.

The electability Prabowo-Hatta Streaking

The electability Prabowo-Hatta Streaking

 


The electability Prabowo-Hatta Streaking

TRIBUNNEWS.COM, JAKARTA - The 2014 presidential election only three weeks away began to enter the stage of an increasingly thrilling. Time to determine the nation's future next five years is getting near.

At the same time, approval and public support for partner-Hatta Prabowo increasing escalation. Starting with the thousands of people who came to house Polonia as Secretariat of the National Campaign Team Prabowo-Hatta declared their support for Prabowo-Hatta.

Support flows from all walks of life and parts of Indonesia. In the midst of so swift that support, current support to Prabowo-Hatta proved to boom-Hatta electability Prabowo was significantly ahead of the 2014 presidential election.

It is based on the analysis conducted by a team Nurjaman Center for Indonesian Democracy (NCID) were collected from several recent survey, Focus Survey Indonesia (FSI) Surveys and Polls Indonesia (SPIN), the Indonesian Survey Institute (LSI), Populi Center, and the Center Unified Data (GDP).

Jajat Nurjaman, Executive Director of NCID, said that one of the reasons more and Emerging electability Prabowo-Hatta caused by bored people have started imaging performed with style Jokowi-JK, and how successful teams that tend to push the pair lain.Berikut latest survey results electability pair-vice presidential candidate;

• SPIN (Prabowo-Hatta 44.9% and 40.1% Jokowi-JK), • Indonesian Survey Institute (LSI) (35% Prabowo-Hatta in Jakarta, Banten and Jokowi 33.53-30.66% in JK Jakarta, Banten 26.25%),

• Populi Center (Prabowo-Hatta 36.9% and 47.5% Jokowi-JK)
• GDP (Prabowo-Hatta 26.5% and 32.2% Jokowi-JK).
Budi Purnomo, Director of Communications and Media National Campaign Team-Hatta Prabowo, said he was gratified by the public support.

"We are particularly grateful that in the midst of so many accusations against us about the smear campaign that hit us, it turns out people are not fed up with the issues that deliberately created to bring down Prabowo-Hatta," he said.

He also grateful to the community and then being able to see our commitment and professionalism in carrying out a peaceful and clean campaign of smear campaign.

 

Glance RB800 Wireless Router

Glance RB800 Wireless Router

the emergence of new product variants echoed by Mikrotik RouterBOARD continue during 2009. Which begins with the famous RB750 with Best Value Router and Router Tiny then followed with RB750G already using Gigabit Ethernet. Both are variants RouterBOARD 700 series are almost the same as 400 Series ie use the same processor architecture Atheros but different type, which is intended for low-end router class. In the same year also released a Mikrotik Routerboard High-end class that RouterBOARD 800 series codenamed RB800.


RouterBOARD 800 series looks like a continuation of the RB600 which does have the dimensions and specifications are almost the same, but if viewed in more detail the specification RB800 RB600 almost doubled and more complete with some additional expansion slots for hardware-latest hardware that previously did not exist in RB600 .

Processor

RB800 which uses MPC8544 network processor (Freescale PowerPC-based processor) has a speed of up to 800MHz and 1GHz can dicustom (999Mhz) is currently the most powerful processor for the category Wireless Router. With heatsink and processor HeatFan the case of the overhead guard is one of the innovations that Mikrotik Router Performance can be maximized. Function "Health System" (Temperature and Voltage) is also added in the RouterOS software to allow a user to monitor the Wireless Router.



Expansion Slot

With the availability of high Resource RB800 ready to carry out all the functions available in RouterOS, flexibility becomes a crucial point in a router device then the RB800 already prepared several options for an expansion slot is a function of RouterBOARD. Like its predecessor Doughterboard Slot RouterBOARD series that always accompanies High End, on the RB800 Doughterboard slot available two versions of the standard PCI slots Doughterboard support for Doughterboard series predecessor (RB564, RB502, RB604 and RB816) and also Doughterboard PCIe type.
Slot MiniPCIe also been provided to supplement the RB800 with the latest hardware.



Performace

The high specifications on the RB800 is not only on paper brochure, but also need to be proven, we have done tests using Core2Duo machine and RB44GV. The results were very satisfactory with traffic of 250 ~ 300 Mbps full duplex, with the traffic load can remain operational oprtimal RB800 and temperature remained normal.

By doing Customisasi RB800 processor clock can be bypassed traffic predicted greater than 300Mbps.

Variations Car Computer Development

Variations Car Computer Development


Imagine, in your car there is a computer that allows it to perform a variety of jobs, enjoy the entertainment along the way, and have a digital map when you start to get lost on the way. Your friend can still say hello via chat applications like Yahoo Messenger.

The various facilities currently can be done with the help of computers installed in the car. Computer car is no longer difficult to be realized. You will be much helped, because additional features can be installed in the car computer, according to taste and needs.

To find a range of possibilities that can be done with the car computer, the tests on the 2005 Honda CRV. Been loaned this car by PT Honda Prospect Motor to the Foundation Airputih while working at the disaster site in Aceh (2005) and Yogyakarta (2006).

Hardware

The main hardware in this system is the central processing unit (CPU). To facilitate the installation of production casing Trivia use the same standard in the car audio device (measuring 1 din, 17.78 cm wide and 5.08 cm high), so no need to do a lot of modifications to the interior of the car.



The motherboard used Mini-ITX size (17 cm x 17 cm). To reduce the heat, chosen motherboard medium speed, namely the VIA EPIA M6000, using VIA Eden 600 MHz processor, reliably enough to run applications based on Windows XP.

For storage media, used 40 GB 2.5-inch hard drive, which is designed to be more shock resistant than regular 3.5-inch hard drive. CPU is also equipped with a DVD player.

At the front of the computer there are two USB ports version 2.0, to install a variety of devices that conform to the USB standard. We can use a USB keyboard for typing. Data transfer can be done from or to a USB Flash. Bluetooth connection is obtained by attaching a bluetooth interface to the USB slot.

Connection to the internet using GPRS or CDMA can be done by connecting the phone to a USB port. While the car is running, we can connect to the internet while it is within the scope of the service provider.



Monitors are used also has a 1 din size, so it can be mounted easily on the car tape holder. When not in use, the screen folds and into the box, similar to the workings of a TV that has a lot of used cars. Although the computer can be connected to a TV monitor, you should use an SVGA monitor with a resolution up to 468 x 800 pixels (wide type) 7 inches in diameter.

To make it easier to control the computer, the monitor also function as a touch screen for a replacement mouse. With the touch of a finger, can do some simple functions, for example to enable the music player application, or adjust the volume of music played.

The touch screen can be written, such as the use of graffiti feature on PDA, as a replacement keyboard for typing. Operating system Windows XP Tablet PC version an attractive choice because it is designed to optimize the use of touch-screen computers.

The electrical system

Differences car computer with a regular computer is the electrical system. Computers use a power supply unit that will transform 220 volt AC current into 12 volt DC electric current.

In the car there is a 12 Volt DC power source, but the quality of electric cars depends on engine rpm, causing unstable flow. To overcome this problem, use a power supply unit that is designed for cars. Devices M2-ATX power supplies production mini-box.com able to work with power supplies ranging from 6-24 Volts.

The power supply unit can detect when the engine dies, and set the computer to enter hybernate mode. A few minutes later, the current into the computer disconnected, to prevent problems with the car battery if you forget to turn off the computer when to turn off the car.

Enhancements

The use of the car computer as a medium of entertainment can be done easily. With a hard drive capacity is large enough, we can store thousands of songs in MP3 format. We can also play MP3, Audio CD, VCD, or DVD. With TV Tunner that plugs into a USB slot, we can enjoy television broadcasts. It should be added also a TV antenna on the roof of the car.

The computer can also be aandal navigational aids, by adding GPS receivers (with the USB port or serial port). Do not forget to install a navigation app such as Ozi Explorer, and enter the required map.

For certain areas, such as Jakarta which already has detailed maps, navigation system accuracy is quite high. For other areas, especially outside the city, province map to select a reliable intercity roads.

In this 2005 Honda CRV, enhancements installed system 2.4 GHz Wi-Fi network, using a Mikrotik Routerboard RB112 production, which is equipped with two wireless interfaces. One is connected to a WiFi antenna on the roof, and another uses an internal antenna. RB112 devices are small enough size (14 cm x 8.5 cm) can be installed in the jack storage box at the rear of the car.

In addition to the wireless device, network RB112 has many features, such as being a router, gateway or hotspot. If the car is in the WiFi service coverage, RB112 can serve as a gateway and forwards the car computer to access the Internet, and other laptops in the car.

If there is no WiFi access from the outside, the computer can access using GPRS or CDMA, RB112 can organize and distribute connectivity to other laptops and the area around the car.

Each person may have different options for the development of the computer. Many features can be installed on the car computer, along with a lot of devices use USB functions, and ultimately improve our productivity, because when driving though, there is a computer station next to us who are ready to help.

A brief review of the Micro AP (MAP-2n)

A brief review of the Micro AP (MAP-2n)

At the end of February 2014 MUM Italy ago, MikroTik introduces several new products, and we are lucky one of them was brought to Indonesia by the - by. An indoor smallest wireless router products with comprehensive features typical RouterOS. Let's welcome the new arrivals in Mikrotik, with the name of a Micro AP (MAP-2n). Comes with a small enough size and stylish design. Equipped with LED indicator.
Designed with a small form factor, but with the hardware specification is qualified as a wireless router in its class. It could also function as a mobile Router / Access Point. Here means the mobile router can be moved - moved because berfisat flexible. However, although the shape is quite small, with RouterOS Level 4 license that is drilled into the router, the MAP-2n able to meet your networking needs. Equipped with a similar processor and RAM makes the RB750-2n MAP suitable for personal / home / SOHO routers. Both software and hardware, existing features can be found on the MAP-2n. For example PoE-In, USB Port, PoE-Out, bandiwdth management, firewalls and so on. Has two ethernet ports and a built-in wireless complete with an internal antenna, so it can be used for the distribution of cable and wireless. We try to compare the size of folders - 2n with RB750.
Poe and the Poe-In-Out
MAP-2n has a function on ether1-in PoE and PoE-Out on ether2 that could provide power to other devices. Poe-In means the router can receive power through the network cable (UTP), so without the need for a power jack directly plugged into the router. This will make it easier when the router is placed in a location away from the power jack. Poe-Out on ether2 serves to provide power to other devices as well via UTP cable.
Micro USB
MAP-2n has a Micro USB port which can have a variety of functions. One function that is quite unique, not only for the MicroUSB Modem / storage alone, but on the MAP-2n can use this port provides power to the Router. We tried connecting the laptop MAP-2n, 2n-MAP and the results can be lit with the power from the USB port.
Of course this will make the MAP-2n more flexible, do not have to use a 220v power source, simply use a laptop or POWERBANK course, the router was able to walk.
In addition they can be used to receive power, micro USB can also be used should the USB port on the router proxy, such as for additional storage, and even a USB modem to dial. Here's a screenshot of our experiments using the CDMA modem. Dial using PPP features, and the internet from a modem can be shared by the MAP.
Embedded Wireless
This wireless router also qualified for the small-scale wireless networks, similar to the built-in wireless on the RB951-2n. The results of our experiment with making folders as an access point in an outdoor location without a hitch, the signal can be effective up to a distance of 20-30 meters. Built-in wireless and antenna on MAP-2n that support wireless N router makes wireless mini is getting interesting.
Unfortunately, MikroTik.com not provide certainty when this product will be distributed. So is the price range. Hopefully, mid or late 2014 release.

Features Logging In Mikrotik

Features Logging In Mikrotik

One feature that is visible on his Mikrotik simple and probably also forgotten but have a fairly important function is LOGGING feature.
RouterOS is able to perform a variety of recording information system events and status of the router.

By default RouterOS will keep records of all activities and processes that occur in the router and keeps a record (log) of the RAM. List of record (log) can be seen on the menu / log.
Logs are located in menu / logs will be lost once we restart the router because the log is stored only in RAM.

Examples of the appearance of the menus / log via Winbox.

In network troubleshooting will be more effective by analyzing the logs of the Router prior to knowing what the process is already happening. So it will be easier to map the problem and determine a solution.

Too much information that we get if we just look at the menu / log, so it may be difficult for analysis. For that we can make the topic of what will be recorded and will be stored or displayed where the log.

Besides stored in memory (RAM) routers, logs can also be stored as a file on the storage router, sent via email or syslog server is displayed on the device itself.

This setting can be done in the menu / system logging.

If you notice there are two tabs in the menu / system logging, the Rules Tab and Tab Action.

Tab Action (/ system logging action)
Used for setting the log storage methods.
There are 5 Type of Action that we can use:


1. The Disk Type
With this type of logs will be stored as text files and are saved in the system storage router itself. We can always set the current log file name is stored in the File Name parameter. Can also set how many lines of the log file that is stored in each of his, could set the parameters of Lines per file.

The log file can then be downloaded from the Files menu router and can be opened with a text editor on your PC

2. Type Echo
By using this type of router log will be displayed at the New Terminal (Winbox) or when we use the remote CLI (direct console)

3. Type email
Logs will be sent to the email that we have set. In order to function then we have to do before setting smtp server that will be used in the menu / tool e-mail

How often will the same as the email delivery Router how often the update log. Our advice, do not use public email services (like Yahoo or Gmail) because when sending emails too often public email services usually will consider it as spam.

4. The Memory Type
Logs will be stored in RAM Routers and can take a look at the log menu. Because only the logs are stored in RAM will be lost / can not read anymore after rebooting the router.

5. Type Remote
Logs will be sent to any device that runs the syslog server. We live designate the machine running the syslog server by entering the IP address.

If action has been created the next step we have to create a log rules.

Rules tab (/ system logging rules)
On the tab this rule we can make the topic or what services will we noted in the log. So that we can observe a process or service is more specific.

There are many services in our router and the new rules is that we make, we can specify one or more topic that we will record in the log.

The following example we will record all webproxy process is simple (! Debug).

Topic! Debug is optional. This means that no topic! Debug logging webproxy will also keep running. ! Debug log is used to keep the display is not too detailed. By default if we specify a logging topic, there is a process of detailed information that occurs on a machine that sometimes even confusing.

Example when logging topic WebProxy (! Debug) with remote action so that the log will be sent to the machine (PC) that runs the syslog server (172.16.1.254) with a simple syslog application of Mikrotik for Windows named MTSyslog.

The following figure shows the log display is seen at the application MTSyslog
MTSyslog application can be downloaded free of charge here .


By using this logging function we do not need to observe the processes that occur on the router continuously at all times. We simply view the results of the record (log) of existing processes to see what is going on as long as you do not observe the router directly.

http://freakscontent.blogspot.com/