Monday, June 23, 2014

Basic Network

Basic Network

Computer Networks
The computer network is a connection between two or more devices, which are connected physically and logically so they can exchange information. Computer networks can be said to be connected if the device is in the network can exchange data / information and share the resources owned.
Benefits of Computer Network
There are several reasons why we need to build a computer network. This consideration also the benefits of a computer network.
Resource Sharing
With the computer network, resource sharing can be performed without distance constraints. Resource sharing include:
  • Data Sharing, with our computer network can easily share data such as documents, images, videos, etc. with colleagues in remote locations and even in different countries.
  • Sharing hardware, if the printer was once a computer, computer network, the printer can be used by multiple computers at once. Not just a printer, we can share a lot of storage and other hardware.
  • Internet Access Sharing, a small computer network allows multiple computers to share one Internet connection. Special device such as a router, has the ability to allocate bandiwdth easily computer users need.
Connectivity and Communication
Individuals in a building or a workgroup can be connected in a LAN network. Some LAN to remote locations connected into the WAN network. When the network is formed and connected, then the communication between the user could happen, for example, by using e-mail technology.
Data Security and Management
In the business world, the network makes it easy for administrators to perform essential data management company better. Instead of this important data is on each computer device data management employees can be done at random, will be safer and easier when the data is stored centrally by using Shared Server. In this way, employees of the company easier to find the data. Administrators can also ensure that data is backed up on a regular basis, and makes it possible to implement security in a way to determine who is allowed to read or write data that is important.
Performance Enhancement and Balancing
Under certain conditions a network can be used to improve the performance of some applications by means of distributing computing tasks on multiple computers on the network.
Entertainment
Computer networks, especially the Internet, usually provide many types of entertainment and games. Such as multi-player games that can be played by several users at the same time, or just watching the video.

Disadvantages of Computer Networks
Cost of Network Hardware, Software and Setup
computer networks are not formed just like that, make sure the computer network requires hardware and software investments, planning, network design, and network implementation.
Cost Management Hardware / Software and Administration
Computer networks require care and regular maintenance by IT professionals.
Unwanted Sharing
Besides the ease of sharing information, there is a risk that the virus infected files be shared computers, so that it can be easily spread.
Illegal behavior or Unwanted
Similar to the previous point, the computer network makes it easy to communicate, but carries other risks, such as taking or producing illegal content, piracy, etc..
Data Security Concerns
on a computer network that is implemented properly, data security can be maintained. Conversely, if the implementation is impressed abroad - random, then the existing data in the network are also in danger. Possible hacker attacks, sabotae, or risky enough is an attempt to steal important company documents.

Types of Computer Networks
Bersadarkan Transmission Type
In studying the types of computer networks, there are some VERY important classification transmission technology and distance. In theory, computer networks and transmission divided by the distance. There are two types of network based transmission technology, which is the network broadcast and point-to-point.
  • Broadcast networks have a single communication channel that is shared by all devices connected to the network. Small messages, called packets, which are transmitted by a machine will be accepted by the other machines. The address field of a packet containing information about to whom the package is addressed. When receiving a packet, the machine checks the address field. When the charter package addressed to him, then the engine will process the packet, if the packet is intended for other machines, the machine will ignore the charter.
  • Network Point-to-Point connection consists of several pairs of individuals, from one device to the other device. To send a packet from a source to a destination, a packet on the network of this kind may have to go through one or more intermediaries machines. Often have to go through a lot of different possible route distance. Because the algorithm route plays an important role in the network of point-to-point.
In general, smaller networks and geographically localized cendurung wear broadcasting, whereas larger network using point-to-point.

Based Geographic

Another alternative within the classification of a network is based on the geographical scope of a network. LAN, MAN, WAN, and the Internet can be regarded as a true network, meaning that computers bekomunikasi by way of exchange of data / messages over a longer cable.
  • Local Area Network (LAN)
  • Local Area Network (LAN) can be defined as a collection of computers that are linked together in a particular area that is not as extensive, as in an office or building. LAN can also be defined based on the use of the computer's IP address on the network. A host computer or LAN can be said when one has an IP address that is in a network address, so that it does not require a router to communicate. LAN network can also be divided into two types, namely peer-to-peer and client-server networks. In peer-to-peer network, each computer connected to act as either a workstation or a server, while the client-server network, only one computer acting as a server and the other computer as a workstation.
  • Metropolitan Area Network (MAN)
  • Metropolitan Area Network (MAN) is basically a LAN version is larger and usually wear the same technology as the LAN. MAN can include corporate offices are adjacent and can be used for private purposes (private) or public. The main reason to separate the MAN as a special category is already-determined standard for MAN, and these standards are now being implemented. The standard is called DQDB (Distributed Queue Dual Bus) or according to the standard IEEE 802.6, DQDB consists of two unidirectional wires where all the computers are connected. Each bus has a head-end device to start transmitting activity.
  • Wide Area Network (WAN)
  • Wide Area Network (WAN) is a computer network covering a wide geographical area, often include a country or continent.
  • Internet
  • Internet (short for interconnection-networking) is a whole network of computers connected together using a standard global system Transmission Control Protocol / Internet Protocol Suite (TCP / IP) as the packet exchange protocol (packet switching communication protocol) to serve billions of users around the world, even between planets.
Wireless Network
Also called the wireless network, is almost the same as does the cable network, only connections between hosts no longer use the cable medium. Usually wireless networks to connect one computer system to another system by using some kind of wireless transmission medium, such as radio waves, microwaves, or infrared light.
  • Infrared is used for short distance communication, with a speed of 4 Mbps. In use for remote control, for example, the remote control at the television and other electronic devices.
  • Data transmission using radio waves we are familiar with WiFi or WLAN.
Network Topology
Topology is a way to connect one computer to other computers to form a network. There are several topologies commonly used today, the bus topology, token-ring, star, tree, and mesh.
Bus Topology
In bus topology used a single cable or cable in the center where the entire workstations and servers connected.   The advantages of a bus topology is the development of a network or adding new workstations can be done easily without disturbing other workstations. The drawback of this topology is that if there is interference in the cable along the center of the whole network will be impaired.
Ring Topology
In ring topology, all workstations and servers are connected to form a loop or ring pattern. Each workstation or server will receive and pass information from one computer to another, if the addresses match then the information is received and when the information is not to be missed. Weakness   of this topology is each node in the network will always follow and manage the information that is passed in the network, so that when there is a disturbance in a node then the entire network will be disrupted. The advantages of ring topology is not the collision or the collision of data transmission such as in a bus topology, since only one node can transmit data at a time.
Star Topology
In a star topology, each workstation is connected directly to the server or hub. Excellence   of the star topology is the existence of a separate cable for each workstation to the server, then the width of the bandwidth or communication lines in the cable will be more wide that will improve the overall network performance. When there is a disruption in the cable path interference will only occur in the communication between the workstation is concerned with the server, the network as a whole is not impaired. Drawback of the star topology is a need for larger cable than other topologies.
Topology Tree
Tree topology can be a combination of a star topology with a bus topology.
Mesh Topology
Mesh topology is used in conditions where there is no absolute cut off communication link between computer nodes. This topology reflects the design of the Internet that has multiple paths to various locations.


Network Devices
Network devices are all the computers, peripherals, interface cards, and additional devices connected to a network computer system to perform data communication. Umun devices contained in computer networks consists of:
Server
The server is the control center of the computer network. Servers serves to store information and to manage a computer network. The server will serve the entire client or workstation connected to the network. The operating system used on the server is a special operating system that can provide services for workstations.
Workstation
Workstation is a computer connected to a LAN. All computers connected to the network can be regarded as a workstation. The computers that access to the server to get the services that have been provided by the server.
Network Interface Card
Network Interface Card (NIC) is an expansion board which institutions are used so that the computer can be connected to the network. Most NICs are designed for networks, protocols, and certain media. Commonly referred to as LAN NIC card. An example of a LAN card as shown in Figure

When viewed from the speed, Ethernet is divided into four types, namely as follows:
  1. 10 Mbit / sec, which is often referred to as Ethernet, the standard used: 10Base2, 10Base5, 10BaseT, 10Base-F.
  2. 100 Mbit / sec, which is often referred to as Fast Ethernet. Standards used: 100BaseFX, 100BaseT, 100BaseT4, 100BaseTX.
  3. 1000 Mbit / s or 1 Gbit / sec, which is often referred to as Gigabit Ethernet, standards used: 1000BaseCX, 1000BaseLX, 1000BaseSX, 1000BaseT.
  4. 10000 Mbit / s or 10 Gbit / sec, commonly called TenGig.
Cable Networks
Cable is the connecting channel between two or more workstations. The types of cables used in networks among others, coaxial cable, fiber optic, and TWISED Pair
Coaxial cable has only one central conductor cable. This cable has a plastic coating that serves to limiting woven conductor with the existing wiring in the next layer. Coaxial cable has a transfer speed up to 10 Mbps. Coaxial cable is often used for cable TV, ARCnet, Ethernet thick and thin ethernet. Thick coaxial / 10Base5 / RG-8 is often used for the backbone network for inter-building installations. This cable is physically heavy and inflexible, but he was able to reach a distance of 500m or more. Thin coaxial / 10Base2 / RG-58 / cheapernet often used to network between workstations. This cable is physically easier to handle than RG-8 because it is more flexible and lighter. Thick coax has an average diameter of 12mm, while the thin coaxial having an average diameter of around 5mm. Every device connected to the BNC Tconnector. Fiber optic cable has a glass core that is protected by multiple protective apisan. Data transmission on the cable using light. Fiber optic cable has a greater distance than twisted pair and coaxial. This cable also has a data transfer rate is better in the delivery of data, reaching 155Mbps. Type of coaxial cable is now rarely used.
Fiber Optic Cables has two types, namely single mode and multi mode. Type of single mode cable has a diameter cores 9micron, while the multi-mode cable has a core diameter of 62.5 microns. Fiber optic cable is more often used because of the ability to transfer larger data, as well as cable reach far enough.
Twisted pair cables, wires commonly used for local networks, it is generally divided into two types, Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). Pair cable in-twist (helical), the number of partners may consist of two, four or more. Twist function aims to reduce electromagnetic interference to other cable or to an external source. Data transfer speeds that can be served up to 10Mbps. Connectors are commonly used RJ-11 or RJ-45. Of the second type, the type of UTP is the type that is often used in a LAN network. UTP cable has four twisted pairs (8 wires fruit) and only 4 pieces of cable used in a network. Device with respect to the use of this type of cable is an RJ45 connector and Hub / Switch.
Hubs and Switches
Switch is a device that also serves to connect multiple computers. Switch is physically the same as the hub but same logikalnya ranks brigde. Increased intelligence than a hub, which has a storage capability of the MAC address (Medium Access Control) or at the link layer of the OSI model so that only transmit data at the destination port (unicast). This is in contrast to a hub that sends the data to all ports (broadcast). The process works is that when the data packets arrive, the header is checked to determine in which segment the data packet destination. Then the data will be sent back (forwaded) to the destination segment.
  • Unmanaged Switch, is the cheapest option and the type typically used in the office or small business and home. This computer network switches perform the basic functions of managing data traffic between printers or peripherals with one or more computers. This type of switch can not we manage manageable switch like that have extra features to apply, such as VLAN function.
  • Managed Switches offer more advantages to having User Interface or offer software that allows users to configure the switch. The advantages offered ole switch types are able to segment the network with VLAN useful concept to provide more security to a network, Enables users to perform network traffic monitoring and maintenance.
Bridge
Bridge is a device that forwards traffic between network segments based on data link layer information. This segment has the same network layer address. Bridge work to identify the MAC address of origin which transmit data to the network and automatically builds an internal table. This table is used to specify the segment to which the packet will be routed and provides filtering capabilities. Bridge divide a single large network into several smaller networks. Bridge can also be used to connect them in a network that uses a different cable types or different topologies.
Router
A router is a device that serves to connect a LAN to an internetworking / WAN and manage the distribution of traffic data in it. The router will determine the best path for data communication. Routers work at the network layer of the OSI model to move packets between networks using logical addresses. Router's routing table exists at which register of all known network address and that may be passed along the path latency. The router works only if the network is configured protocol is routable protocols such as TCP / IP or IPX / SPX. This differs from the bridge that is protocol independent.
Repeater
Repeaters work at the level of the physical layer in the OSI network model. Repeaters regenerate or amplify charge signals are entered. On the ethernet data transmission quality can only survive in a range of time and a limited range, which further degraded. Repeater will try to maintain signal integrity and prevent degradation until the data packets to the destination. Weakness repeaters that can not filter network traffic. Data (bits) that goes into one port is sent out through all ports. The data will be scattered to the LAN segments regardless of whether the data is required or not.
Modem
The modem is a device that is used as a connector from a PC or network to the Internet Service Provider (Internet Service Provider / ISP). One modem is used to connect to the internet is an ADSL modem. These modems are usually used by ISPs.
Bandwidth
Bandwidth is the amount of data or the volume of data in units of bits per second that can be transmitted via a network transmission medium in unit time. In general, the bandwidth can be analogous to a water pipe, and the data is that the water will pass through the pipeline. The greater the water pipe (bandwidth), the greater the volume of water (data) that can be passed. Adal some reason that makes bandwidth is one important factor in a computer network:
  1. Bandwidth plays an important role in determining the quality of a network due to the size of the data channel / bandwidth effect on the speed of data transmission.
  2. Bandwidth limitations due to physical laws and limitations of the technology. Each medium used to transmit the data separately certainly have limited maximum bandwidth that can be achieved.
  3. Bandwidth is not available for free. Bids bandwidth is most often encountered when we want to subscribe to the internet.
  4. Bandwidth requirements will always go up. With the new technology and refurbished network infrastructure, application and data requirements will also likely experience an increase in bandwidth usage.

 

Media Storage RouterBoard

Media Storage RouterBoard

We already know that Mikrotik RouterBoard have a reliable device to perform the functions of routing, firewall, bandwidth management, and so forth. Where the main functions of this router does not require large storage. But it is possible also RouterBoard we use as a server for the service-specific service, such as a radius server (UserManager), Dude server (network monitoring applications) and even webproxy server. Where these functions requires a storage server that is not exactly little.
With limited internal storage available, then there are some RouterBoard device expansion port that we can use to add storage for media storage server needs above.
Expansion ports are available today:
  • USB: Omnitik, RB411U/UAHR, RB433GL/UAH/UAHL, RB435G, RB493G, RB711UA-2HND/5HND, RB750UP, RB751U-2HND,-2HND RB751G, RB951G-2HND
  • MicroSD: RB433UAH/AH, RB493G, RB1100AH/AHX2, RB435G, RB450G
  • Compact Flash: RB800
  • MicroUSB: RB2011UAS-RM/UAS-2HND,-12G CCR1016, CCR1036-12G
For settings, we stayed an extra pair of storage to an available port in the RouterBoard us, and we turn on the extra storage in the menu "system - store"

Menu / system stores
In Store list, we need to check first the status of our additional storage in the tab "Disks".
Tab "Disks" will contain all the information that we attach storage in our router.
For storage that is still a new pair, its status will be "invalid" and can not be used. We can first select the interface that will be used (example: usb1) and then press "Format Drive"

Perform formatting storage
By pressing a button to format the drive, then storage will be reformatted by the system (be careful of all the data in storage is removed), and the status will change to "ready".
This process will format the drive long enough that we attach if storage capacity is large enough, so please wait until the status is ready first before making further configuration.

Storage status ready all
The next step if the storage media is already ready, then we need to define what services the data that we will keep in storage media earlier in the tab "Stores". When this type of data can be stored in external storage us only for the UserManager, Webproxy and Dude Server
The following example will create a new rule, to the type of data will be stored in webproxy our external storage

Moving the location of data storage webproxy
Make sure you also check the parameter "Activate" to be transferred to the storage location of data storage that we pillih within the parameters of "Disk"
Look for the already set webproxy so storage is done on the external storage

Status webproxy cache drive to usb1

Store this function we can use to backup data from an existing storage to external storage media to another.
For example, for the data we UserManager which already contains a lot of user data and passwords of our client, we can copy it to another usb flash, usb flash and then we will attach another Mikrotik dirouter also enable UserManager.


Copy the existing data to another storage

Note:
  • We recommend to reboot the router every change "activate" before starting to use external storage.
  • Webproxy service should be disabled if the first storage location is moved.

 

Difference Mode Wireless

Difference Mode Wireless

One of the media or the interfaces contained in the proxy and is used to connect one network device to another of them is wireless, there are several wireless modes are used in accordance with its function, whether it wishes functioned as an access point (transmitter) or functioned as a station (receiver), we need to know also that not all modes can be used in the wireless bridge network because not all wireless mode support with L2 bridging primarily as a mode wireless station (receiver)

1. Alignment Mode Only
Alignment mode only, commonly used to help when the indicator pointing to the beeper / buzzer on RouterBoard, for example, we could add a script where when getting a good signal then the beeper will sound.

2. Modes AP-Bridge
AP-bridge mode used as an access point or transmitter that can serve multiple clients or also called PTMP (Point To Multi Point), we can use this mode for network routing or bridging nature. To use the AP-Bridge mode RouterBOARD devices must have a minimum level 4 license.

3. Modes Bridge
Bridge mode is used as an access point or transmitter but could only serve one client or also called PTP (Point To Point), this mode also we can use to network routing or bridging nature. To use this mode RouterBOARD device has at least a level 3 license, for example for the type of product types SXT-Embedded 5.xGHz 5HnD that only licensed level 3, we can make a point to point connection using 2 pieces of the device.

4. Nstreme dual mode slave
Basically working mechanisms on the wireless interface is half duplex, but by using this mode we can enable full duplex mechanism of action, this mode is a proprietary wireless in the proxy, of course, we also need a second wireless card and 2 antennas at each wireless router mikrotik

5. Modes Station
Wireless Mode This station is used as a wireless client / receiver topology PTP (Point To Point) or PTMP (Point To Multi Point), the wireless station mode can only be used to shape the nature of network routing, so this mode is one of the effective mode and fuel-efficient if the wireless client side / station is not required bridging

6. Modes Station-Bridge
Station-Bridge mode is a mode on the wireless interface that serves as a receiver / client and support for the bridge network, needs to know that for this mode can only be used if it Mikrotik AP device as well.

7. Modes Station-Psudobridge
Fashion Station-pseudobridge Modes Station is a development of the standard, the same make as the wireless receiver / client, the difference is in Fashion Station-pseudobridge support to create a network that nature Bridge Network, In the use of this mode where there are consequences for not bridging the L2 can be done in full, in terms mac-address of a device that is under the wireless device (PC end user) is not legible on the side of the Access Point.

8. Modes Station-Pesudobridge-Clone
Fashion Station-pseudobridge-Clone Mode is similar to Station-pseudobridge difference is in this mode can clone the mac-address, usually on a wireless link, which is read on the access point is the mac-address of the wireless client interface, but if using Fashion Station-readable Pesudobridge-Clone is the mac-address of the device connected to the station (end user), readable by default which is the mac-address in the header of the first frame in the forward, or can be specified on the "station-bridge-clone- mac "

9. Fashion Station-WDS
Station-WDS mode serves as a receiver / client of a protocol to enable Access Point WDS, WDS protocol deficiency is a decrease wireless throughput of up to 50%, please note that between one vendor with another vendor WDS function is not necessarily compatible, as well as with WDS the proxy.

10. WDS-Slave Mode
WDS-Slave mode serves as a transmitter (Access Point) as well as the receiver (Station) or also called repeaters, this mode is one solution if you want to build a repeater but owned devices only use 1 card wireless card.

Auxiliary Wireless Application

Auxiliary Wireless Application

In this article we will discuss how to use the applications provided by Mikrotik.com to calculate the signal from the wireless capabilities that we use is based on its specification. In addition, we discuss the application to take into account the altitude of the tower that we need if going to build a wireless link.
The first application, the posibility Link Calculator, you can open the following page http://www.mikrotik.co.id/test_link.php
Before we start using these, of course, we already know or at least have a hope of how the distance between wireless devices that we are building, and how much data traffic will we spend in our wireless link. But have you ever read the datasheet of a wireless device? If not, it's time you get used to reading the datasheet, why this is important, because of the datasheet we can find out in detail the specifications / capabilities of the wireless card will be used.
For Mikrotik wireless device, you can download the pdf datasheetnya on page www.routerboard.com
Let us try to count for example the case:
Will set up a wireless link to the District / County-Net as far as 3km, with a throughput of 54Mbps halfduplex semaximal possible that using the miniPCI R52 and Omni 15db antenna side of the AP. For client side we suppose to use the R52 miniPCI also with 15db grid antenna. Used jumper cables connecting using a wireless card with antenna cable LMR400 1M round. The wireless link will we wake up to a frequency of 2.4 GHz or 802.11b / g.
From R52 datasheet we can see that for the datarate of 54Mbps, the tx-power the card uses R52 at 15dBm with minimal signal should we get (rx-sensitivity) of-73dBm.
datasheet R52
Staying we enter these values ​​in the application, and calculated:
It turns out that we get -66 signal. In such applications Unreliable said. This means that although it may be connected but are approaching the lower limit value of rx-sensitivity. We need to anticipate if an interruption occurs that causes the signal decreased slightly, the connection can be disconnected. Safe side we should be able to get 10 - rx-sensitivity above 20db.
In the above case, the solution is usually to replace the miniPCI device with tx-greater power, because with the larger reference tx-power, the more distant wireless signal coverage. Let us recondition the case above, we replace the AP to use the card R2SHPN.
datasheet R2SHPN
From the datasheet we can know, for 54mbps throughput, will use the tx-power 29dBm (2x greater than R52) and rx-sensitivitynya -77
We re-count,
calc2
But the result is still "Unreliable". You see the difference signal is received on both sides.
Is one of the larger theory tx-power on the farther reach of our wireless signal? The theory is correct, but you have to remember that wireless communication was done in 2 directions. By replacing tx-power that the greater the AP side, just fix the signal from the AP to the station. But the signal from the station to the AP remains weak.
Why do not we return to the first case, the AP side still using R52, but we change from the use of the antenna. We use antenna fox
flat panel at 20db.
If the recalculated results become:
Reliable .. You notice the signal changes on both sides of what?
Antenna is an amplifier of your wireless signal either at the time of your wireless cards emit a signal or receiving signals from the opponent.
So in fact, from the above calculation, the wisest move if you have a small signal constraints are replacing one one side of the first antenna rather than wasting your time and the cost to replace the wireless card that has a great power.
We proceed to the second application, the application for Antenna Height Calculation, to help this application you can open the following page http://www.mikrotik.co.id/test_tower.php
To calculate the height of the antenna malakukan trial, we can use the previous case, namely for the frequency in use is 2412, the distance between the wireless device to be connected is 3 km, and the average barrier height is 10m.
Hitung Tower
Seen from the results in the calculation to get the recommended minimum antenna height is 17.9 meters.
If the height of the tower is used less, automatic fresnel zone area (area of ​​signal propagation) is blocked, can be implemented later experienced problems but good signal passing data (throughput) can not be maximal.
Of the two applications could be your first step before starting to build wireless infrastructure in your network. But keep in mind is the second application only theoretical calculations under normal conditions. There are many external factors that can lead to not maximalnya our wireless performance that can not be included in the calculation, such as interference, weather, electromagnetic fields and so on.

Note:
1. Use of any series routerboard (RB4xx, RB8xx, RB7xx etc.) does not affect the wireless range, but from the wireless card and antenna gain to be used.
2. Familiarize read the datasheet for the device you will use, because of the datasheet you can find out the details of the features of the device capabilities.