Showing posts with label Mikrotik. Show all posts
Showing posts with label Mikrotik. Show all posts

Monday, June 23, 2014

TCP / IP Introduction to OSI Layer

 TCP / IP Introduction to OSI Layer

By the time we start the step into the science of computer network, the first thing we learn is usually TCP / IP. TCP / IP can be in such language analogy. When humans exchange information, people will speak in a language that can be understood by speakers and listeners. So is the case with the host computer or in a network. Communication and exchange of information in order to be well established, it takes the same language. Although different brands of the network host - different, the host can still communicate with other hosts because it uses the same communication standard, namely TCP / IP. Internet Protocol was first designed in the 1980s. But in the 1990's where the internet is increasingly popular and more and more hosts, ranging bemunculan protocol that can only be used by certain circles, or protocol made by certain manufacturers that are not necessarily compatible with other protocols from other plants as well. So in the end the body the International Standards Organization (ISO) to standardize protocols that are currently known to the protocol of the Open Systems Interconnection or OSI abbreviated. The OSI reference model is widened and the basic concepts of a theory of how the protocol. In the development of TCP / IP is used as a de facto standard.

OSI Layer
When the ISO (International Standard Organization) to standardize the protocol, it creates a standard reference model containing the workings of the protocol. Reference model which was then called the Open Systems Interconnection (OSI). Based on the document recommendation X.200, the OSI standard has 7 layers. Each layer has a different function definitions.

Layer 7: Application Layer
Is the layer where the interaction with the end user interface applications that work using the network functionality, make arrangements of how the application works using the network resources, to then memberika message when an error occurs. Some of the services and protocols that are in this layer as HTTP, FTP, SMTP, etc..

Layer 6: Presentation Layer
This layer works to translate the data format to be transmitted by the application over the network, into a format that can be transmitted by the network. In this layer the data will be encrypted or in-description.

Layer 5: Session Layer
Session layer defines how connections can be made, maintained, or destroyed. In this layer there are protocols Name Recognition, NFS and SMB.

Layer 4: Transport Layer
This layer will split data into packets of data and provide the serial number on the data packets that can be rearranged when it came to the side of the goal. In addition, at this level, will determine the protocol that will be used to transmit the data, eg TCP protocol. This protocol will transmit data packets, as well as to ensure that the packet received successfully (acknowledgment), and retransmit the packets that are lost or damaged on the way.

Layer 3: Network Layer
Network layer will make header for packets that contain IP information, both the sender's IP data and IP destination data. Under certain conditions, this layer will also perform routing through the use of internetworking routers and layer 3 switches.

Layer 2: The data-link layer
Befungsi to determine how the data bits are grouped into a format called a frame. In addition, at this level of error correction, flow control, addressing hardware (such as the Media Access Control address (MAC address)), and determine how the network devices such as hubs, bridges, repeaters, and a layer 2 switch operates. IEEE 802 specification, dividing it into two levels level children, the layer Logical Link Control (LLC) layer and the Media Access Control (MAC).

Layer 1: Physical Layer
Layer Physcal work by defining the network transmission media, signaling method, bit synchronization, network architectures (such as Ethernet or Token Ring), network topology and cabling. In addition, this level also defines how the Network Interface Card (NIC) can interact with cable or radio media.

The process of sending data can pass through each layer analogy like when we send a letter. The letter is the data that will be sent (layer 7 -> 5). Then, according to standard delivery, we put the letter into an envelope (layer - 4). So that we can sent the letter, we need to add the address where the mail is sent, as well as who the sender of the letter was (Layer - 3). Furthermore, the letter we submitted to the expedition, and the expedition we will be sending a letter earlier (layer - 2 & 1).

Packet Header
In the previous review we discuss how a process of data transmitted, now we will try to unload data. What's in sebiah data so that data can be transmitted. analogy when we send data on the Internet is like sending a POS, it can be said that the data is the contents of the letter, then the packet headers is an envelope, stamp, address, and other equipment. Packet header provides some additional information. If we surgical ditrasnmisikan a data packet using ipv4, then the contents of the data packets can be seen as shown below:



IPVer: Storing information used IP version (IPv4 or IPv6).
IHL (IP Header Leght): Information overall length of the data packet header. The minimum length of the IP header is 20 bits, and the maximum length is 24 bits.
TOS: It is a field in the IPv4 header has a length of 8 bits and is used to indicate the type of Quality of Service (QoS) that is used by the datagram in question to be submitted to the internetwork routers. Implementation of this TOS is usually when we do the limitations of HIT in the web proxy service proxy or VOIP.
Bit 16 Total Length: 16 bits The contents of this gives the overall size information packet (fragment) including header and data. Information is displayed in a format bytes
16 Bit Identification, Fragment Offset Flag / Length: At the time of ip packet goes on the internet, this pack will probably pass some routers can not handle the size of the packet, for example, the value of Maximum transmission unit (MTU) that is smaller than its IP datagram size, then The package will be broken or fragmented packets - smaller package would then be reassembled later. These parameters will be used for fragmentation and rearrangement.
TTL: There is the possibility of an IP packet wander aimlessly in the Internet network. Case example of an error routing or routing loops. In order for this package is not circling the Internet forever, the TTL value will be deducted each time a data packet passes through a router. When the TTL value of a packet of data has been exhausted or has a value of 0, then the packet is dropped or discarded.
Protocol: Contains information what protocol is used to transmit data.
16 Bit Header checksum: information is calculated based on the calculation of the value of the IP header content. Used to determine if there is an error at the time of transmission of the data.
32 Bit Source IP Address: 32 bits data packet source IP information.
Bit 32 Destination IP Address: 32 bits IP destination information of data packets.
Options (if any): This parameter includes rarely used, has a variable length, from 0 to a multiple of 32 bits. This parameter can be used to store a value for the security option, Record Route, Time Stamp, etc..
Data: Contains the data that is transmitted.

From the packet header information above, at the end of a data can be sent from one host to another.

http://freakscontent.blogspot.com/ 

Selection of Frequency Band & Implementation Wireless In

Selection of Frequency Band & Implementation Wireless In

For those who've never tried to implement wireless, will usually encounter some obstacles that sometimes confuse. However, current wireless technologies are widely applied, especially with the range of reasons. Wireless technology is quite helpful especially to reach areas far / wide. Instead of having to build a network cable to connect remote devices, it will be easier and more efficient if you use wireless. But behind these advantages, there are factors that make the application of wireless is not as easy as using a cable. When using a cable, we stayed plug from one port to another. If the remote could use a Fiber Optic. But when implementing a wireless, connect one device to another will be influenced by many factors. Among other things, LoS (Line of sight), site 1 to site that should be able to see each other and without a hitch.
Band
Selecting the band is a standard way to specify the protocol to be used by wireless interfaces. In addition to determining the standard protocol, the band also specify the data rates that can be missed, channel frequencies and channel widths. There are few bands in mikrotik router.
  • 2GHz-b, working at a frequency of 2.4 GHz. Using 802.11b protocol with a maximum data rate of 11 Mbit / s.
  • 2GHz-b / g, also works at a frequency of 2.4 GHz. Using 802.11b and 802.11g protocols. 802.11g protocol is almost the same as 802.11b but is transmitting with a base such as 802.11a OFDM 802.11g protocol that can reach 54 Mbit / s.
  • 2Ghz-b/g/n, working at a frequency of 2.4 GHz. Using 802.11b, 802.11g and 802.11n. The development of the standard 802.11 protocol, coupled with the ability of multiple-input multiple-output (MIMO). With the addition of the MIMO feature, the maximum theoretically achievable data rate is 300 Mbit / s.
  • 2GHz-only G, working at a frequency of 2.4 GHz, just use the 802.11g protocol.
  • 2GHz-only N, working at a frequency of 2.4 GHz, just use the 802.11n protocol.
  • 5GHz-a, working at a frequency of 5 GHz. Using the 802.11a protocol, the maximum data rate that can be achieved is 54 Mbit / s.
  • 5GHz-a / n, working at a frequency of 5 GHz. Using 802.11a and 802.11n protocol.
  • 5GHz-only N, working at a frequency of 5 GHz and only using 802.11n protocol.
If we look, there are several options that the band uses more than one protocol. If we set a wireless interface with a band that uses more than one protocol, then the wireless interfaces provide options to the client, where the protocols that support the client device.
Frequency
Wireless LAN uses a radio frequency propagation medium that also need to be clean and without interruption. Interference can be obstacles such as trees, buildings, walls, glass or frequency interference from other devices in the vicinity.
In order to form a good wireless link, this disorder should be avoided. The first thing to do is to do a site survey first to determine the physical condition of the field and the use of existing frequencies. For example, the presence of obstructions such as hills, buildings, trees, walls, glass, etc. should be avoided. We also need to know the frequency - a frequency that is around. its use will be avoided so that no interference / overlapping.
The allocation of frequencies is set in the regulations in each region and country. In Indonesia, for the purposes already dalokasikan wireless LANs in the ISM band at 2.4 GHz and 5.8 GHz. More details her, to 2.4 GHz is divided into several channels with each channel width - 22MHz respectively.
So also with the 5GHz. 5GHz frequency is also divided into several channels.
In the proxy, each channel is displayed with its midpoint frequency. For example in the 2.4 GHz band, channel1 = 2412, etc..
Back to the interference problem. In proxy there are several tools that can be used to perform the scanning frequency.
  • Scanner Tool, double-click the wlan interface> set mode = station band and frequency> click scan.
  • Snooper tool, double-click the wlan interface> set mode = station band and frequency> click snooper.
  • Usage Frequency Tool, double-click the wlan interface> set mode = station band and frequency> click Freq. Usage
From these survey results, we can determine the frequency of use on our devices so as not to interfere with the other. Based on the distribution channel at 2.4 GHz, with a standard width of the channel, can be seen there are several mutually overlapping channels. This is what should be avoided so as not to interfere with each other and with well established wireless links. For example, the results of the scan turns out many are using the 2412 frequency (channel 1), then we can use the 2437 frequency (channel 6). Why not use 2417 (Ch.2) alone? not 2412 (Ch.1) and 2417 (Ch.2) are different.? Take a look at the image-sharing channel earlier, between 2412 (Ch.1) and 2417 (Ch.2) was still overlapping, mutually interfere. If pictured again, so as not to interfere with each other can use 2412 (Ch.1), 2437 (Ch. 6), 2462 (Ch. 11)
Well, if for freq 2484 (Ch.14) is a channel that is not standard. Devices like gadgets, laptops usually do not support.
Proxy support for 2484 (ch.14). But we still should not use these frequencies in vain. Although technically support devices, but the use of a clear allocation of frequencies outside violate the rules. So let's use the appropriate frequency of existing regulations. In order not to interfere with each other at other frequencies.
Tips for selection on the frequency of use of the 2.4 GHz band. How to 5GHz?. Most devices such as laptops, gadgets previously was only support for 2.4 GHz only. However, some gadgets now support 5GHz. Similarly to link wireless LAN devices today many are turning to 5GHz. In contrast to the distribution channel at 2.4 GHz, the distribution channel in the 5GHz no overlapping each other. To cover a laptop or gadget, can use the frequency 5725 - 5785 MHz. Most of today's gadgets support at these frequencies. Mikrotik product also has support for both 2.4 GHz and 5GHz bands. Support also for custom and custom channel width freq. But once again, the frequency of use wisely. Do not violate the regulation.

 http://freakscontent.blogspot.com/


Selection of Type of VPN

Selection of Type of VPN

 VPN is a method to build a network of links between network nodes in a safe / encrypted by using the public network (Internet / WAN). An example implementation is when you manage a network that consists of several offices in different locations. Would require substantial costs if we then establish a wireless link or fiber optic inter-office but could be located in the city or even a different island. With a VPN, we can establish a link between the office by utilizing the existing internet network. Links are formed secured with encryption to minimize the possibility of data will be accessible by people who are not responsible. Mikrotik VPN support several methods such as PPTP, L2TP, SSTP, and OpenVPN. Given some of these options, we need to select the type of VPN is suitable for our network. In general, all of these types have the same function. The difference is the authentication and encryption in use.

PPTP (Point to Point Tunnel Protocol)
PPTP VPN is one of the simplest type in the configuration. It is also flexible. The majority of operating systems already support the PPTP Client, both the operating system on a PC or gadgets like android. Communication PPTP uses TCP port 1723, and use the IP protocol for packet encapsulation 47/GRE data. In the PPTP settings, we can determine the network security protocol used to authenticate PPTP on Mikrotik, such as pap, chap, MSCHAP and mschap2. Then after the tunnel is formed, the transmitted data will be encrypted using Microsoft Point-to-Point Encryption (MPPE). Encryption process will usually make the transmitted packet header size will increase. If we are monitoring, traffick which passes through the PPTP tunnel will have overhead ± 7%.

L2TP (Layer 2 Tunnel Protocol)
L2TP is an extension of PPTP L2F plus. Network security and encryption protocol used to authenticate the same with PPTP. However, for communication, L2TP uses UDP port 1701. Usually for keamaanan better, combined with IPSec L2TP, L2TP/IPSec be. Examples for the Windows operating system, by default Windows OS using L2TP/IPSec. However, the consequences of course configuration that must be done is not that simple PPTP. The client side must already support IPSec when applying L2TP/IPSec. In terms of encryption, the encryption on L2TP/IPSec certainly have a higher level of security than PPTP uses MPPE reply. Traffick L2TP tunnel that passes overhead will have ± 12%.

SSTP (Secure Socket Tunneling Protocol)
To establish a method SSTP VPN with SSL certificates required in each device, unless both using RouterOS. SSTP communications using TCP port 443 (SSL), its the same thing as the website is secure (https). You have to make sure the clock is in conformity with the real time when using a certificate. Manyamakan time with real-time router can with NTP Client feature. Unfortunately not all OS Support VPN with SSTP method. Traffick SSTP tunnel that passes overhead will have ± 12%.

OpenVPN
VPN is usually used when needed on high data security. By default, OpenVPN uses UDP port 1194 and required certificate on each device to be connected. For compatibility client, OpenVPN can be built almost on all Operating Systems with the help of third-party applications. OpenVPN uses the sha1 and md5 algorithm for the authentication, and using some cipher that is blowfish128, AES128, AES192 and AES256. Traffic passing through the OpenVPN tunnel will have ± 16% overhead.

Keep in mind, that the more we need a secure network, the more complex configuration needs to be applied, as well as the use of hardware resources, the higher the encryption used, resource usage, especially CPU will also rise. The conclusion that we can take, if you want a VPN client that dg better device compatibility, then PPTP could be an option. In addition, PPTP can also be an option if you do not want too much trouble to do the configuration. But if you want a VPN with better security, use L2TP/IPsec or OpenVPN. Typically for windows OS, by default using L2TP/IPSec, so stay diseusuaikan on the server side. If your device supports it and you need a high security on the path that your VPN, L2TP/IPSec could be an option. One thing to note, the use of a VPN can not increase the bandwidth (more precisely reduce your bandwidth because there are additional headers), depending on the bandwidth of your subscription.

http://freakscontent.blogspot.com/ 

ADSL Modem Network Management

ADSL Modem Network Management

Quite a lot of providers that provide services Broadband / ADSL could be an option at this time is accompanied by a wide selection of convenience and promo offered is certainly interesting. However, here we will not discuss the price, let alone promo offer, but rather on the management network using Broadband / ADSL. Typically, the provider install a modem on the client side, so that the client can receive internet service provided. Service commonly used one is PPPoE, which functioned as a modem PPPoE Client. Simple topology used is Internet -> ADSL Modem -> Hub / Switch -> Client.
Usually a network administrator then adds ADSL router between the modem and the client, for example Mikrotik router. This is done because in general the simple ADSL modem does not have a function that is complete enough to perform network management. By adding a router, then the topology that we are building to be as follows.

Actually there are two options for connecting to the internet via our network ADSL Modem. First, we could dial into a modem using the default provider, so the public ip terpsang on the modem. Or the second alternative, we can dial directly from the Router Mikrotik PPPoE. So that will be installed at the Public IP Mikrotik. The second option is to make it easier when we will do a remote router from the Internet, or other rules also apply. For example, when applying port forwarding (dst-nat) or too loadbalance.
We will try the case study using the second option, ie from Mikrotik PPPoE dial directly. We're also going to try using the topology in which the second image using two ADSL connections. First, setting the ADSL modem to bridge mode. How to set differently depending on the brand and type of modem.
After setting the modem in bridge mode, create a client in Mikrotik PPPoE interface by pressing the + button in the menu interface. the interface parameters, select the ethernet interface heading to the modem.
Furthermore, in the Dial Out tab, fill in the username and password parameters according to the information given by the provider. Username and password information for each different course providers. If you are finished, click OK, then the interface will be formed PPPOE client and the router will automatically try to dial through PPPoE interface. If the PPPoE settings are correct and properly connected, the status of the Client in Mikrotik PPPOE will change to "Connected", or flag the interface into "R" or Running.
Repeat steps according to the image to another ADSL line, so there are two interface pppoe-client, because in this case study we tried to use two ADSL line.
Then add the default gateway for the router so that the router can connect to the internet. Because we use two ADSL line, we use the method of ECMP Load Balance, one of load balance method is quite simple. How to do ECMP Load Balance is to add two gateways in the routing rule.
When finished making the routing rule, then we need to lead the Router DNS settings to the DNS provider. This information should you ask your course provider, or use open DNS.

Add src-nat rule under router so the client can access the internet.
Do not forget to attach the IP address on the interface bound to the client, for example 192.168.3.1/24 interface = ether3. You can also pair the IP address on the interface of the modem and router interfaces that are connected to monitoring.

Minimizing Configuration Error In Safe Mode

Minimizing Configuration Error In Safe Mode

Having the wrong intentionally or unintentionally may have been having, and the worst effects may not even be the remote router. Would be very inconvenient when we are setting the router in the remote router is in a remote location, so we can not reset the router to restore the router. To minimize the occurrence quite disturbing as above, we can take advantage of the Safe Mode feature on Mikrotik.
Safe Mode
One of the features that work on a proxy mode "safe" which will save the router configuration while. If at the time of setting up the router on the condition safe mode router connection is lost, either due to setting errors or other technical errors, the configuration has been done in safe-mode conditions will be lost, and the router configuration before going back to the safe-mode configuration. If the configuration is in accordance with what we expect, we simply disable safe-mode to save the configuration that has been made in safe-mode. At the time of configuration in safe-mode, it does not mean then rule made not run the router. Rule still run by routers, only stored temporarily. System history routers store a maximum of 100 commands, so if the rule made in safe-mode too much (more than 100), then the router automatically right out of the safe-modes and configurations that have been made will be saved.
Safe-mode feature can be run using the console, SSH or telnet remote eg, safe-mode can be activated by pressing [CTRL] + [X]. Then to save the configuration and exit from safe-mode, press the [CTRL] + [X]. To get out of safe-mode without saving the configuration, press [CTRL] + [D].
If, while safe-mode setting error occurs resulting in the remote router can not, then the router will ignore the configuration is done in safe-mode, and back to the safe-mode configuration before in approximately 9 minutes (TCP Connection Time Out). It is rather long, but it would be better than having to location of the router if it turns out the router is in another city. In Winbox, also provide the safe-mode, but safe-mode feature on the Winbox is still in the development stage, we also find themselves alone safe mode does not work optimally when used as the console. Undo & Redo
MikroTik also features Undo & Redo, have almost the same function with Undo & Redo we often use the Word application instance. Undo function is used to cancel / delete configurations just done, if it does not work as we would like, or there is an error rule. While Redo function to restore a deleted configuration / Undo lost due process. To use the Undo & Redo konsidi not have to be in safe-mode, the usual condition of these features can also be run. Undo & Redo button position on the Winbox located under the tittle bar with turn arrows icon.
If we want to Undo or Redo while we're remotely via console, ssh for example, Undo and Redo can still run with the command console. Simply type the command:
Then to find out what configuration can Undo or Redo. Can be seen through the console with the command: / system history print
And configuration information will appear on the right flag. Flag U (undoable) meaning that the configuration can be canceled. Flag R (Redoable) meaning that the configuration can be restored after deleted by the Undo process. 

http://freakscontent.blogspot.com/ 

USB Tethering Android in Mikrotik

USB Tethering Android in Mikrotik

RouterOS 6.7 update, in addition to improvements to the previous feature, there is an interesting additional feature. In this v.6.7 RouterOS, MikroTik support for USB tethering Android interface. Changelog can be seen in the RouterOS version 6 here: http://www.mikrotik.com/download/CHANGELOG_6


Tethering is a way to share the internet connection from one device to another device, such as Internet connection sharing from smartphones to other devices such as laptops. Sharing media connection can use bluetooth, wireless, or USB cable. In the context of this article, we are going to do internet sharing from Android smartphones to Mikrotik router using a USB cable media.

First, we must prepare RouterBoard USB port having. In this experiment we mengguankan RB751U-2HnD. Do not forget to upgrade to first-2HnD RB751U using ROS version 6.7. After the upgrade process is complete, prepare your Android gadget. In this experiment we tried several brands of hardware with Android versions 2.3.x and 4.1.x.

As we know in advance, the RouterBoard USB port can be used for external storage or connected with modems. This time, we connect Android gadgets via USB cable to the RouterBoard. Then enable USB Tethering on Android gadgets. Here's a way to disable tethering feature in Android 4.1 version.

If you are using android with a different version, perhaps also a little different setting. The next step, we are going to do some settings in the RouterBoard. Tethering android in Mikrotik is a little different than when we use the 3G modem. If 3G modem using PPP service, while Android tethering, in Mikrotik will be read as LTE interfaces.
The LTE interfaces will automatically appear when the USB tether is activated in the Android gadgets. Here we do not need to enter a username and password to connect to the internet. Actually, when tethering is enabled, Android provides a DHCP server, including DNS information, and so on. The next step in the RouterBOARD enable DHCP Client interface with parameters leading to the Android (LTE interfaces).
If it is, wait until the status of the router DHCP client turned into a bound, meaning that the router got managed to get the IP address information of Android gadgets.
Step - a step above almost equal to the Basic Mikrotik Configuration steps using a public interface that is both dynamic (DHCP Client). If the state had successfully "bound", then check the router DNS, DNS information if it can or not. If so, check the "allow remote request".
Also check the Default Gateway Router, if it gets information gateway from the DHCP or not. If it is, checks can be done by performing ping from router to the Internet.
Up to this point, been able to internet router. We live setting for distribution in the direction of the client. Put the IP address on the interface that leads to the local network. Do not forget to also make the NAT so that the Client PCs can access the internet.
If all the above steps have been performed. Further checks on the client side by trying to ping the internet. The advantages of using this Android tethering, no special settings for the type and brand of gadgets. The main requirement, using RouterOS Mikrotik Router v.6.7 and above.

 

Basic Network

Basic Network

Computer Networks
The computer network is a connection between two or more devices, which are connected physically and logically so they can exchange information. Computer networks can be said to be connected if the device is in the network can exchange data / information and share the resources owned.
Benefits of Computer Network
There are several reasons why we need to build a computer network. This consideration also the benefits of a computer network.
Resource Sharing
With the computer network, resource sharing can be performed without distance constraints. Resource sharing include:
  • Data Sharing, with our computer network can easily share data such as documents, images, videos, etc. with colleagues in remote locations and even in different countries.
  • Sharing hardware, if the printer was once a computer, computer network, the printer can be used by multiple computers at once. Not just a printer, we can share a lot of storage and other hardware.
  • Internet Access Sharing, a small computer network allows multiple computers to share one Internet connection. Special device such as a router, has the ability to allocate bandiwdth easily computer users need.
Connectivity and Communication
Individuals in a building or a workgroup can be connected in a LAN network. Some LAN to remote locations connected into the WAN network. When the network is formed and connected, then the communication between the user could happen, for example, by using e-mail technology.
Data Security and Management
In the business world, the network makes it easy for administrators to perform essential data management company better. Instead of this important data is on each computer device data management employees can be done at random, will be safer and easier when the data is stored centrally by using Shared Server. In this way, employees of the company easier to find the data. Administrators can also ensure that data is backed up on a regular basis, and makes it possible to implement security in a way to determine who is allowed to read or write data that is important.
Performance Enhancement and Balancing
Under certain conditions a network can be used to improve the performance of some applications by means of distributing computing tasks on multiple computers on the network.
Entertainment
Computer networks, especially the Internet, usually provide many types of entertainment and games. Such as multi-player games that can be played by several users at the same time, or just watching the video.

Disadvantages of Computer Networks
Cost of Network Hardware, Software and Setup
computer networks are not formed just like that, make sure the computer network requires hardware and software investments, planning, network design, and network implementation.
Cost Management Hardware / Software and Administration
Computer networks require care and regular maintenance by IT professionals.
Unwanted Sharing
Besides the ease of sharing information, there is a risk that the virus infected files be shared computers, so that it can be easily spread.
Illegal behavior or Unwanted
Similar to the previous point, the computer network makes it easy to communicate, but carries other risks, such as taking or producing illegal content, piracy, etc..
Data Security Concerns
on a computer network that is implemented properly, data security can be maintained. Conversely, if the implementation is impressed abroad - random, then the existing data in the network are also in danger. Possible hacker attacks, sabotae, or risky enough is an attempt to steal important company documents.

Types of Computer Networks
Bersadarkan Transmission Type
In studying the types of computer networks, there are some VERY important classification transmission technology and distance. In theory, computer networks and transmission divided by the distance. There are two types of network based transmission technology, which is the network broadcast and point-to-point.
  • Broadcast networks have a single communication channel that is shared by all devices connected to the network. Small messages, called packets, which are transmitted by a machine will be accepted by the other machines. The address field of a packet containing information about to whom the package is addressed. When receiving a packet, the machine checks the address field. When the charter package addressed to him, then the engine will process the packet, if the packet is intended for other machines, the machine will ignore the charter.
  • Network Point-to-Point connection consists of several pairs of individuals, from one device to the other device. To send a packet from a source to a destination, a packet on the network of this kind may have to go through one or more intermediaries machines. Often have to go through a lot of different possible route distance. Because the algorithm route plays an important role in the network of point-to-point.
In general, smaller networks and geographically localized cendurung wear broadcasting, whereas larger network using point-to-point.

Based Geographic

Another alternative within the classification of a network is based on the geographical scope of a network. LAN, MAN, WAN, and the Internet can be regarded as a true network, meaning that computers bekomunikasi by way of exchange of data / messages over a longer cable.
  • Local Area Network (LAN)
  • Local Area Network (LAN) can be defined as a collection of computers that are linked together in a particular area that is not as extensive, as in an office or building. LAN can also be defined based on the use of the computer's IP address on the network. A host computer or LAN can be said when one has an IP address that is in a network address, so that it does not require a router to communicate. LAN network can also be divided into two types, namely peer-to-peer and client-server networks. In peer-to-peer network, each computer connected to act as either a workstation or a server, while the client-server network, only one computer acting as a server and the other computer as a workstation.
  • Metropolitan Area Network (MAN)
  • Metropolitan Area Network (MAN) is basically a LAN version is larger and usually wear the same technology as the LAN. MAN can include corporate offices are adjacent and can be used for private purposes (private) or public. The main reason to separate the MAN as a special category is already-determined standard for MAN, and these standards are now being implemented. The standard is called DQDB (Distributed Queue Dual Bus) or according to the standard IEEE 802.6, DQDB consists of two unidirectional wires where all the computers are connected. Each bus has a head-end device to start transmitting activity.
  • Wide Area Network (WAN)
  • Wide Area Network (WAN) is a computer network covering a wide geographical area, often include a country or continent.
  • Internet
  • Internet (short for interconnection-networking) is a whole network of computers connected together using a standard global system Transmission Control Protocol / Internet Protocol Suite (TCP / IP) as the packet exchange protocol (packet switching communication protocol) to serve billions of users around the world, even between planets.
Wireless Network
Also called the wireless network, is almost the same as does the cable network, only connections between hosts no longer use the cable medium. Usually wireless networks to connect one computer system to another system by using some kind of wireless transmission medium, such as radio waves, microwaves, or infrared light.
  • Infrared is used for short distance communication, with a speed of 4 Mbps. In use for remote control, for example, the remote control at the television and other electronic devices.
  • Data transmission using radio waves we are familiar with WiFi or WLAN.
Network Topology
Topology is a way to connect one computer to other computers to form a network. There are several topologies commonly used today, the bus topology, token-ring, star, tree, and mesh.
Bus Topology
In bus topology used a single cable or cable in the center where the entire workstations and servers connected.   The advantages of a bus topology is the development of a network or adding new workstations can be done easily without disturbing other workstations. The drawback of this topology is that if there is interference in the cable along the center of the whole network will be impaired.
Ring Topology
In ring topology, all workstations and servers are connected to form a loop or ring pattern. Each workstation or server will receive and pass information from one computer to another, if the addresses match then the information is received and when the information is not to be missed. Weakness   of this topology is each node in the network will always follow and manage the information that is passed in the network, so that when there is a disturbance in a node then the entire network will be disrupted. The advantages of ring topology is not the collision or the collision of data transmission such as in a bus topology, since only one node can transmit data at a time.
Star Topology
In a star topology, each workstation is connected directly to the server or hub. Excellence   of the star topology is the existence of a separate cable for each workstation to the server, then the width of the bandwidth or communication lines in the cable will be more wide that will improve the overall network performance. When there is a disruption in the cable path interference will only occur in the communication between the workstation is concerned with the server, the network as a whole is not impaired. Drawback of the star topology is a need for larger cable than other topologies.
Topology Tree
Tree topology can be a combination of a star topology with a bus topology.
Mesh Topology
Mesh topology is used in conditions where there is no absolute cut off communication link between computer nodes. This topology reflects the design of the Internet that has multiple paths to various locations.


Network Devices
Network devices are all the computers, peripherals, interface cards, and additional devices connected to a network computer system to perform data communication. Umun devices contained in computer networks consists of:
Server
The server is the control center of the computer network. Servers serves to store information and to manage a computer network. The server will serve the entire client or workstation connected to the network. The operating system used on the server is a special operating system that can provide services for workstations.
Workstation
Workstation is a computer connected to a LAN. All computers connected to the network can be regarded as a workstation. The computers that access to the server to get the services that have been provided by the server.
Network Interface Card
Network Interface Card (NIC) is an expansion board which institutions are used so that the computer can be connected to the network. Most NICs are designed for networks, protocols, and certain media. Commonly referred to as LAN NIC card. An example of a LAN card as shown in Figure

When viewed from the speed, Ethernet is divided into four types, namely as follows:
  1. 10 Mbit / sec, which is often referred to as Ethernet, the standard used: 10Base2, 10Base5, 10BaseT, 10Base-F.
  2. 100 Mbit / sec, which is often referred to as Fast Ethernet. Standards used: 100BaseFX, 100BaseT, 100BaseT4, 100BaseTX.
  3. 1000 Mbit / s or 1 Gbit / sec, which is often referred to as Gigabit Ethernet, standards used: 1000BaseCX, 1000BaseLX, 1000BaseSX, 1000BaseT.
  4. 10000 Mbit / s or 10 Gbit / sec, commonly called TenGig.
Cable Networks
Cable is the connecting channel between two or more workstations. The types of cables used in networks among others, coaxial cable, fiber optic, and TWISED Pair
Coaxial cable has only one central conductor cable. This cable has a plastic coating that serves to limiting woven conductor with the existing wiring in the next layer. Coaxial cable has a transfer speed up to 10 Mbps. Coaxial cable is often used for cable TV, ARCnet, Ethernet thick and thin ethernet. Thick coaxial / 10Base5 / RG-8 is often used for the backbone network for inter-building installations. This cable is physically heavy and inflexible, but he was able to reach a distance of 500m or more. Thin coaxial / 10Base2 / RG-58 / cheapernet often used to network between workstations. This cable is physically easier to handle than RG-8 because it is more flexible and lighter. Thick coax has an average diameter of 12mm, while the thin coaxial having an average diameter of around 5mm. Every device connected to the BNC Tconnector. Fiber optic cable has a glass core that is protected by multiple protective apisan. Data transmission on the cable using light. Fiber optic cable has a greater distance than twisted pair and coaxial. This cable also has a data transfer rate is better in the delivery of data, reaching 155Mbps. Type of coaxial cable is now rarely used.
Fiber Optic Cables has two types, namely single mode and multi mode. Type of single mode cable has a diameter cores 9micron, while the multi-mode cable has a core diameter of 62.5 microns. Fiber optic cable is more often used because of the ability to transfer larger data, as well as cable reach far enough.
Twisted pair cables, wires commonly used for local networks, it is generally divided into two types, Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). Pair cable in-twist (helical), the number of partners may consist of two, four or more. Twist function aims to reduce electromagnetic interference to other cable or to an external source. Data transfer speeds that can be served up to 10Mbps. Connectors are commonly used RJ-11 or RJ-45. Of the second type, the type of UTP is the type that is often used in a LAN network. UTP cable has four twisted pairs (8 wires fruit) and only 4 pieces of cable used in a network. Device with respect to the use of this type of cable is an RJ45 connector and Hub / Switch.
Hubs and Switches
Switch is a device that also serves to connect multiple computers. Switch is physically the same as the hub but same logikalnya ranks brigde. Increased intelligence than a hub, which has a storage capability of the MAC address (Medium Access Control) or at the link layer of the OSI model so that only transmit data at the destination port (unicast). This is in contrast to a hub that sends the data to all ports (broadcast). The process works is that when the data packets arrive, the header is checked to determine in which segment the data packet destination. Then the data will be sent back (forwaded) to the destination segment.
  • Unmanaged Switch, is the cheapest option and the type typically used in the office or small business and home. This computer network switches perform the basic functions of managing data traffic between printers or peripherals with one or more computers. This type of switch can not we manage manageable switch like that have extra features to apply, such as VLAN function.
  • Managed Switches offer more advantages to having User Interface or offer software that allows users to configure the switch. The advantages offered ole switch types are able to segment the network with VLAN useful concept to provide more security to a network, Enables users to perform network traffic monitoring and maintenance.
Bridge
Bridge is a device that forwards traffic between network segments based on data link layer information. This segment has the same network layer address. Bridge work to identify the MAC address of origin which transmit data to the network and automatically builds an internal table. This table is used to specify the segment to which the packet will be routed and provides filtering capabilities. Bridge divide a single large network into several smaller networks. Bridge can also be used to connect them in a network that uses a different cable types or different topologies.
Router
A router is a device that serves to connect a LAN to an internetworking / WAN and manage the distribution of traffic data in it. The router will determine the best path for data communication. Routers work at the network layer of the OSI model to move packets between networks using logical addresses. Router's routing table exists at which register of all known network address and that may be passed along the path latency. The router works only if the network is configured protocol is routable protocols such as TCP / IP or IPX / SPX. This differs from the bridge that is protocol independent.
Repeater
Repeaters work at the level of the physical layer in the OSI network model. Repeaters regenerate or amplify charge signals are entered. On the ethernet data transmission quality can only survive in a range of time and a limited range, which further degraded. Repeater will try to maintain signal integrity and prevent degradation until the data packets to the destination. Weakness repeaters that can not filter network traffic. Data (bits) that goes into one port is sent out through all ports. The data will be scattered to the LAN segments regardless of whether the data is required or not.
Modem
The modem is a device that is used as a connector from a PC or network to the Internet Service Provider (Internet Service Provider / ISP). One modem is used to connect to the internet is an ADSL modem. These modems are usually used by ISPs.
Bandwidth
Bandwidth is the amount of data or the volume of data in units of bits per second that can be transmitted via a network transmission medium in unit time. In general, the bandwidth can be analogous to a water pipe, and the data is that the water will pass through the pipeline. The greater the water pipe (bandwidth), the greater the volume of water (data) that can be passed. Adal some reason that makes bandwidth is one important factor in a computer network:
  1. Bandwidth plays an important role in determining the quality of a network due to the size of the data channel / bandwidth effect on the speed of data transmission.
  2. Bandwidth limitations due to physical laws and limitations of the technology. Each medium used to transmit the data separately certainly have limited maximum bandwidth that can be achieved.
  3. Bandwidth is not available for free. Bids bandwidth is most often encountered when we want to subscribe to the internet.
  4. Bandwidth requirements will always go up. With the new technology and refurbished network infrastructure, application and data requirements will also likely experience an increase in bandwidth usage.

 

Media Storage RouterBoard

Media Storage RouterBoard

We already know that Mikrotik RouterBoard have a reliable device to perform the functions of routing, firewall, bandwidth management, and so forth. Where the main functions of this router does not require large storage. But it is possible also RouterBoard we use as a server for the service-specific service, such as a radius server (UserManager), Dude server (network monitoring applications) and even webproxy server. Where these functions requires a storage server that is not exactly little.
With limited internal storage available, then there are some RouterBoard device expansion port that we can use to add storage for media storage server needs above.
Expansion ports are available today:
  • USB: Omnitik, RB411U/UAHR, RB433GL/UAH/UAHL, RB435G, RB493G, RB711UA-2HND/5HND, RB750UP, RB751U-2HND,-2HND RB751G, RB951G-2HND
  • MicroSD: RB433UAH/AH, RB493G, RB1100AH/AHX2, RB435G, RB450G
  • Compact Flash: RB800
  • MicroUSB: RB2011UAS-RM/UAS-2HND,-12G CCR1016, CCR1036-12G
For settings, we stayed an extra pair of storage to an available port in the RouterBoard us, and we turn on the extra storage in the menu "system - store"

Menu / system stores
In Store list, we need to check first the status of our additional storage in the tab "Disks".
Tab "Disks" will contain all the information that we attach storage in our router.
For storage that is still a new pair, its status will be "invalid" and can not be used. We can first select the interface that will be used (example: usb1) and then press "Format Drive"

Perform formatting storage
By pressing a button to format the drive, then storage will be reformatted by the system (be careful of all the data in storage is removed), and the status will change to "ready".
This process will format the drive long enough that we attach if storage capacity is large enough, so please wait until the status is ready first before making further configuration.

Storage status ready all
The next step if the storage media is already ready, then we need to define what services the data that we will keep in storage media earlier in the tab "Stores". When this type of data can be stored in external storage us only for the UserManager, Webproxy and Dude Server
The following example will create a new rule, to the type of data will be stored in webproxy our external storage

Moving the location of data storage webproxy
Make sure you also check the parameter "Activate" to be transferred to the storage location of data storage that we pillih within the parameters of "Disk"
Look for the already set webproxy so storage is done on the external storage

Status webproxy cache drive to usb1

Store this function we can use to backup data from an existing storage to external storage media to another.
For example, for the data we UserManager which already contains a lot of user data and passwords of our client, we can copy it to another usb flash, usb flash and then we will attach another Mikrotik dirouter also enable UserManager.


Copy the existing data to another storage

Note:
  • We recommend to reboot the router every change "activate" before starting to use external storage.
  • Webproxy service should be disabled if the first storage location is moved.