<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3876360839559957614</id><updated>2024-08-28T13:01:53.580-07:00</updated><category term="networking"/><category term="tutorial"/><category term="wireless"/><category term="information"/><category term="internet"/><category term="review"/><category term="wifi"/><category term="wlan"/><category term="3G"/><category term="Basic"/><category term="antenna"/><category term="command"/><category term="networking tips"/><category term="new feature"/><category term="security"/><category term="technology"/><category term="windows"/><category term="4G"/><category term="AP"/><category term="HSDPA"/><category term="Introduction"/><category term="Linux"/><category term="TCP/IP Configuration Commands for UNIX/Linux"/><category term="bandwidth"/><category term="cantenna"/><category term="cmd"/><category term="comand promt ipconfig"/><category term="hack"/><category term="hacking wireless"/><category term="ip configuration"/><category term="ipconfig"/><category term="ipconfig command"/><category term="maximize wifi range"/><category term="maximize wifi signal"/><category term="network command"/><category term="omni"/><category term="router"/><category term="usb wifi"/><category term="wajanbolic"/><category term="wi-fi"/><category term="wok anntena"/><category term="yagi"/><category term="Atheros"/><category term="EDGE"/><category term="GPRS"/><category term="GSM"/><category term="MacOS X"/><category term="Media Hub"/><category term="WEP"/><category term="XP network"/><category term="access point"/><category term="adsense"/><category term="backtrack2"/><category term="backtrack3"/><category term="best accesspoint"/><category term="command promt ipconfig"/><category term="fiber optic"/><category term="google ads"/><category term="hack AP"/><category term="hack access point"/><category term="hacking"/><category term="hacking AP"/><category term="hacking WEP"/><category term="high gain access point"/><category term="ilegal doing"/><category term="isp"/><category term="learn"/><category term="long range"/><category term="make money"/><category term="make network by vista and XP"/><category term="modem"/><category term="money"/><category term="next generation"/><category term="quality"/><category term="review access point"/><category term="setting google adsense"/><category term="topology"/><category term="vista xp network"/><category term="wifi tutorial"/><category term="windows 7"/><title type='text'>CYBERCOMP.CO.CC</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default?start-index=26&amp;max-results=25'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>26</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-2852426430991784210</id><published>2009-02-09T02:09:00.000-08:00</published><updated>2009-02-09T02:20:32.545-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Media Hub"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="new feature"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Linksys Media Hub NMH305</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI6woQklz3vMhz9Xf3wYs0zk_Sxa2r5fdM6pPUpTx1sn5esY_0LZGEFYgzomB0lge99D1WxoPc0szUgR88VXnEWrwwKDCoJoyDkQISEyr5S5P58Vv4w6oSlx_jucF8OYHjXWUhVXCANw/s1600-h/300.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 127px; height: 170px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI6woQklz3vMhz9Xf3wYs0zk_Sxa2r5fdM6pPUpTx1sn5esY_0LZGEFYgzomB0lge99D1WxoPc0szUgR88VXnEWrwwKDCoJoyDkQISEyr5S5P58Vv4w6oSlx_jucF8OYHjXWUhVXCANw/s320/300.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5300739690655739666&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Storage is a crucial part of the digital lifestyle: We all need a place to put our stuff, and we need a way to access those files easily. Linksys has tried a few storage products in the past, but the Media Hub is its most ambitious effort. While it&#39;s not exactly a small business server that lets you set up user accounts – like the HP MediaSmart EX487 – and can&#39;t compete with the robust RAID and back-up options on Netgear ReadyNAS devices or those by Buffalo Technology, it has one glowing attribute: it&#39;s easy to use. Like most Apple products including the still viable Time Capsule, the Media Hub assumes you are not a certified Microsoft engineer or someone who carries USB key drives in your pocket 24x7. It&#39;s a smart product that eases you into the deeper features, with only a few caveats.&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Setting up the Media Hub takes all of about three minutes. Connect one Ethernet cord to your router, turn it on, and you&#39;re done. Because the drive supports UPnP and works well with Windows, Apple iTunes, the Mac (thanks to Bonjour), and even Linux, you can expect to see the drive on your network without installing a driver or fussing with an IP address. Only when you do want to dive into the advanced features will you need the included setup CD or to access the drive&#39;s IP.&lt;br /&gt;&lt;br /&gt;This NAS matches the styling of the new Linksys Multi-Room Home Audio gear – which is to say, it&#39;s gray and black and nothing too special compared to more elegantly designed network-attached storage devices. The difference between a media player you&#39;d stick next to an HDTV, and this product, is that it will likely sit in a back closet somewhere. The Media Hub has two USB ports, one on the front and one on the back. There are very few buttons and lights. The NMH305 base model ships with one 500GB SATA drive and has one open bay. There&#39;s a power light and drive activity light – Linksys plans to release two additional models with higher capacities and an LCD screen that reports on drive status.&lt;br /&gt;&lt;br /&gt;Performance on the Linksys Media Hub is just ho-hum – it&#39;s not going to set any speed records. About 6GB of MPEG-4 movie files took six minutes to transfer to the Media Hub, whereas the same transfer took 3 minutes to send to a home-built Windows Home Server and only 1 min 40 seconds to copy to the HP MediaSmart EX487 server. A 700MB collection of photos and documents took 50 seconds to write to the drive and 50 seconds to read, about 15 seconds longer than it took on the HP MediaSmart. The drive really showed some pokey behavior when we performed a full back-up of a desktop, which took about ten hours for about 200GB of data. The Media Hub has a gigabit Ethernet port, so it should be no slouch, but a real server adds some extra features to speed up disk copies.&lt;br /&gt;&lt;br /&gt;source : &lt;a href=&quot;http://reviews.digitaltrends.com/review/6011-3/linksys-media-hub-nmh305-review-full-review&quot;&gt;reviews.digitaltrends.com&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/2852426430991784210/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/02/linksys-media-hub-nmh305.html#comment-form' title='2 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2852426430991784210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2852426430991784210'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/02/linksys-media-hub-nmh305.html' title='Linksys Media Hub NMH305'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI6woQklz3vMhz9Xf3wYs0zk_Sxa2r5fdM6pPUpTx1sn5esY_0LZGEFYgzomB0lge99D1WxoPc0szUgR88VXnEWrwwKDCoJoyDkQISEyr5S5P58Vv4w6oSlx_jucF8OYHjXWUhVXCANw/s72-c/300.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-1894709499894419292</id><published>2009-01-29T08:54:00.000-08:00</published><updated>2009-02-09T02:40:54.052-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="topology"/><category scheme="http://www.blogger.com/atom/ns#" term="tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Networking Topology</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Think of a topology as a network&#39;s virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there.&lt;br /&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Network topologies are categorized into the following basic types:&lt;/p&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;bus&lt;/li&gt;&lt;li&gt;ring&lt;/li&gt;&lt;li&gt;star&lt;/li&gt;&lt;li&gt;tree &lt;/li&gt;&lt;li&gt;mesh &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;More complex networks can be built as hybrids of two or more of the above basic topologies.&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;br /&gt;Bus Topology&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_oxPHm1UIftXCTEmoLOjUm8pWeNYaTIpvAqTvUGInOiA5cSwLOkzKvpipDd2WxoJoPauE96ZZBYS3t7WoOeCPPKVTNKhhev6I7UlTzfS_nDBtSGP7iZDwSxRIkSWvUZkC6mXDwOTfug/s1600-h/bus1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 173px; height: 129px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_oxPHm1UIftXCTEmoLOjUm8pWeNYaTIpvAqTvUGInOiA5cSwLOkzKvpipDd2WxoJoPauE96ZZBYS3t7WoOeCPPKVTNKhhev6I7UlTzfS_nDBtSGP7iZDwSxRIkSWvUZkC6mXDwOTfug/s320/bus1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296966676572142482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Ethernet bus topologies are relatively easy to install and don&#39;t require much cabling compared to the alternatives. 10Base-2 (&quot;ThinNet&quot;) and 10Base-5 (&quot;ThickNet&quot;) both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.&lt;/p&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;Ring Topology&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-pgia2bpzdjAQ6tjlaZzL8J1UjGn9tLsUDnDmGm7Evls5V6CJW_K89lzovvbCnTgsOvZRwVirZFVgmWhUFrfLRxJ68QutdjSbdtlQx9NPH-xqwqS6iyG6uy-DYkbgxQqZoouygyR9iA/s1600-h/ring1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 152px; height: 142px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-pgia2bpzdjAQ6tjlaZzL8J1UjGn9tLsUDnDmGm7Evls5V6CJW_K89lzovvbCnTgsOvZRwVirZFVgmWhUFrfLRxJ68QutdjSbdtlQx9NPH-xqwqS6iyG6uy-DYkbgxQqZoouygyR9iA/s320/ring1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296966684534752130&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either &quot;clockwise&quot; or &quot;counterclockwise&quot;). A failure in any cable or device breaks the loop and can take down the entire network.&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;To implement a ring network, one typically uses FDDI,SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.&lt;/p&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;Star Topology&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVkIqL8Q0n5k3piBiujjsp4M92X4KbCGDThlsbuPuFMScGdeKUf0BvTx2H94CfFEUENF3jXNhQ7BVpmPjpU7VZz1goD-i8gA78O3AE9GSNGhlpPSVpuInXUPw8gtb1gG_ppCzhGkS7BQ/s1600-h/star1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 149px; height: 120px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVkIqL8Q0n5k3piBiujjsp4M92X4KbCGDThlsbuPuFMScGdeKUf0BvTx2H94CfFEUENF3jXNhQ7BVpmPjpU7VZz1goD-i8gA78O3AE9GSNGhlpPSVpuInXUPw8gtb1gG_ppCzhGkS7BQ/s320/star1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296966698712732034&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Many home networks use the star topology. A star network features a central connection point called a &quot;hub&quot; that may be a hub, switch, and router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer&#39;s network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)&lt;/p&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;Tree Topology&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHLhNl9B3Hk9xWZRbzRZou41H6I4v6PwKQ2SqrJb5R6jiJWS438pv6fvFp3Y9C_jczUJMHcjzOyaEPoX10zEfX3_hX6Li3H-Erf6xnSv9zbeXPZWbnKSjKHfVsiSHgT1CO1-tJvIP8Tw/s1600-h/tree1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 117px; height: 140px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHLhNl9B3Hk9xWZRbzRZou41H6I4v6PwKQ2SqrJb5R6jiJWS438pv6fvFp3Y9C_jczUJMHcjzOyaEPoX10zEfX3_hX6Li3H-Erf6xnSv9zbeXPZWbnKSjKHfVsiSHgT1CO1-tJvIP8Tw/s320/tree1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296971051019185378&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the &quot;root&quot; of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.&lt;/div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;Mesh Topology&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiBg-Z1sxjA71x7cGRPere9BYzn-SdcEGuJ-Tc7r28QkQET1Y45WEQCLDxYn5TnxuXIPnIOYBKFjmIpmM2n3Cx1I58f2YtKTn58_CmLL0ZYid2IMwpeqGf5J_lpmeg5tnwG8uJWpUAyw/s1600-h/mesh1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 130px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiBg-Z1sxjA71x7cGRPere9BYzn-SdcEGuJ-Tc7r28QkQET1Y45WEQCLDxYn5TnxuXIPnIOYBKFjmIpmM2n3Cx1I58f2YtKTn58_CmLL0ZYid2IMwpeqGf5J_lpmeg5tnwG8uJWpUAyw/s320/mesh1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296971054309198914&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.&lt;/p&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: justify; font-weight: bold;&quot;&gt;Summary&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;source : &lt;a href=&quot;http://compnetworking.about.com/od/networkdesign/a/topologies.htm%20target=&quot; _blank=&quot;&quot;&gt;compnetworking.about.com&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/1894709499894419292/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/networking-topology.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1894709499894419292'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1894709499894419292'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/networking-topology.html' title='Networking Topology'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_oxPHm1UIftXCTEmoLOjUm8pWeNYaTIpvAqTvUGInOiA5cSwLOkzKvpipDd2WxoJoPauE96ZZBYS3t7WoOeCPPKVTNKhhev6I7UlTzfS_nDBtSGP7iZDwSxRIkSWvUZkC6mXDwOTfug/s72-c/bus1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-3357912295708306574</id><published>2009-01-28T12:25:00.000-08:00</published><updated>2009-01-28T13:52:57.461-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic"/><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="tutorial"/><title type='text'>Simple Steps To Basic Wireless Hacking</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;The intent of this article is to show you information on basic wireless hacking along with just how important it is to secure your wireless Network. Please use this information wisely. I am not responsible for what you and your friends do with this information.&lt;br /&gt;&lt;br /&gt;Today it is very easy to set up a wireless network. Basically plug in the router a few clicks on your computer and away you go. The average person can go to his or her local electronic store and pick up a wireless router for as cheap as 40 bucks. The Problem comes in when securing the network. A large amount of people don&#39;t take the time to learn how to, or care to set up security.. How much damage can some one do if they connect to a wireless network?&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Well in this article I will show you just how easy it is to connect to one of these unsecured networks and what kind trouble can be caused. I am going to use just some built in tools of Windows.&lt;p style=&quot;text-align: justify; color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;How Simple is it to find a Unsecured Network?&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;In this example I am just using the windows wireless management tool. This will work fine if you are not on the move. If you are scanning for networks in a car or on your bike I would strongly recommend &lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://mixeduperic.com/Windows/Software/what-is-netstumbler.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;NetStumbler . &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrfODnDmPKmEoC6cVByjucMk8V06ft_qOtvitoTKLd3UV3EZjMACTTWjareYygbtWmA0tmRCy-ip2_NK14gV44xBRaOD-LuOoi3wAQHImccN8yQQ8VUliGuTcle7jaCHwm9_RHyLELA/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 64px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrfODnDmPKmEoC6cVByjucMk8V06ft_qOtvitoTKLd3UV3EZjMACTTWjareYygbtWmA0tmRCy-ip2_NK14gV44xBRaOD-LuOoi3wAQHImccN8yQQ8VUliGuTcle7jaCHwm9_RHyLELA/s320/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296445157098473250&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;As you can see here just by looking at what networks are available close to my home, There is at least one unsecured network. I would be willing to bet you could go around your block and find at least one open network. I am going to use this Linksys network in my example.&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;So just how simple is it to connect to an Unsecurred network?&lt;/span&gt;&lt;br /&gt;I just double clicked on the open linksys network.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP_6MfYeYIvS26jG-y0M8UpRI92EvF-ilgF7iQQGruqpoGHQqpcKE5PEVvXrfhaJ-H-EbrIGsTRLVsoxS2FM_Ck31qlPE3hzfZIkfdIDsdS6JgUGnJESCfWAXWWdXb6hlcBFIFD7PyBw/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 242px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP_6MfYeYIvS26jG-y0M8UpRI92EvF-ilgF7iQQGruqpoGHQqpcKE5PEVvXrfhaJ-H-EbrIGsTRLVsoxS2FM_Ck31qlPE3hzfZIkfdIDsdS6JgUGnJESCfWAXWWdXb6hlcBFIFD7PyBw/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296445164132743842&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;It will warn you that you are connecting to a unsecure network. &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Click Connect Anyways&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXMTUJ_6WC76IenpoG7Slp01cPyStbNiv-AY_DwXgkDKReNGfaeoh1ufTqNaikP4Rg_NO2pNlr0J1CO6-5U_SaMMihF_NbUOrQMx2RprCQElbVTsWYcuKp6GRUi_KiCpM-YU4hbooZbg/s1600-h/2_connect_anyways.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 112px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXMTUJ_6WC76IenpoG7Slp01cPyStbNiv-AY_DwXgkDKReNGfaeoh1ufTqNaikP4Rg_NO2pNlr0J1CO6-5U_SaMMihF_NbUOrQMx2RprCQElbVTsWYcuKp6GRUi_KiCpM-YU4hbooZbg/s320/2_connect_anyways.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296445167146611714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Now I can start Browsing the Internet&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What can some one do if they connect to unsecured network?&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In this example this wireless network is still set at the default settings including the Administrator password. A simple search on &lt;a href=&quot;http://www.routerpasswords.com/&quot; target=&quot;_blank&quot;&gt;&lt;u&gt;http://www.routerpasswords.com&lt;/u&gt;&lt;/a&gt; you can find just about any wireless router Default password. SInce this is a linksys router the default password would be admin. Since most wireless routers are the default gateway, I will do a quick command in dos to find out what the default gateway is. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Click on start &gt; Run&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Type CMD and click ok&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In the Dos window type &lt;strong&gt;&lt;em&gt;ipconfig&lt;/em&gt;&lt;/strong&gt; then hit enter&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkKTOHU05pgDrD_ZPihfBDKvklAtToToRZQBZLLIA1vx-ghG4ordAZNH6CGF0KsNQoQuwwI-mZ_Rh6hqTCWrmws6Qty-FyXunpO8_q11GzjnNwX-Zx7wMxvFstVIFfLxr_7-s3scR_0g/s1600-h/3_default_gateway.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 211px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkKTOHU05pgDrD_ZPihfBDKvklAtToToRZQBZLLIA1vx-ghG4ordAZNH6CGF0KsNQoQuwwI-mZ_Rh6hqTCWrmws6Qty-FyXunpO8_q11GzjnNwX-Zx7wMxvFstVIFfLxr_7-s3scR_0g/s320/3_default_gateway.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296445181240498050&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;I look for the information under my wireless network card. The default gateway is 192.168.1.1 Type this in your Browser to connect to the router.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFZLna-7JWy9J-DIOtjLSHBHBVsGB8MdVqgTGAHZpW17cHBbRAfOykqdYN3I9L-NeoCQFgw0gT5LSzb1Gi-CZ2q7tdwm-KJ5jibNo124mjS0VXhonIu6PoV8z6jVhwBvoK62xciyvdsw/s1600-h/4_ip_address_browser.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 57px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFZLna-7JWy9J-DIOtjLSHBHBVsGB8MdVqgTGAHZpW17cHBbRAfOykqdYN3I9L-NeoCQFgw0gT5LSzb1Gi-CZ2q7tdwm-KJ5jibNo124mjS0VXhonIu6PoV8z6jVhwBvoK62xciyvdsw/s320/4_ip_address_browser.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296459294379398562&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You will be prompted for a username and password.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Leave the username blank or type root&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Since this is a linksys router I will use the password admin&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;To find out the default password for just about any router check out&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;u&gt;&lt;a href=&quot;http://www.routerpasswords.com/&quot; target=&quot;_blank&quot;&gt;http://www.routerpasswords.com/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If they did not change there router password you should be able to get in to the configuration pages of the router.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHS7NAnFNsZdIT3DJLLQGpV8zJTV5tERBJmVqScI2MOcqZsojpkriAtNaFbCEpk1S-ZV5B-cCPFR5muJRINllYss2rrBPfhjXzpd5YTIqJb9oz_6OTA2Tn3qrgYcakog91a-Bcohjmtg/s1600-h/5_basic_setup.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 278px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHS7NAnFNsZdIT3DJLLQGpV8zJTV5tERBJmVqScI2MOcqZsojpkriAtNaFbCEpk1S-ZV5B-cCPFR5muJRINllYss2rrBPfhjXzpd5YTIqJb9oz_6OTA2Tn3qrgYcakog91a-Bcohjmtg/s320/5_basic_setup.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296459298346184738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;I am now connected to the router. This gives me complete access to see who is on the network. I can also do things such as set up security, open ports, and so much more. &lt;/p&gt;&lt;p style=&quot;text-align: justify; font-weight: bold;&quot;&gt;How do you see who is connected to the network?&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;- Click on Status&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;- Click on Local Network&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu5yjhuQLzFc-d4z1R7iO_5XXkDe_Vin98Bexv_LkFNWi-bLwSQE52waRN4OOHHqnA8iB52CgRWOAoXbtD3ApA8_3nXebgzEA5Jxk9wg561Q0jcSpu-Fmsv3fzyi0SPfoIt0XEvipYcQ/s1600-h/6_status.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 290px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu5yjhuQLzFc-d4z1R7iO_5XXkDe_Vin98Bexv_LkFNWi-bLwSQE52waRN4OOHHqnA8iB52CgRWOAoXbtD3ApA8_3nXebgzEA5Jxk9wg561Q0jcSpu-Fmsv3fzyi0SPfoIt0XEvipYcQ/s320/6_status.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296459305755735890&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;- Click on DHCP Client Table button&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsCgLa4qAXftJH9qPBxWrnde-AWoq5nHhAHsuGRCXRyWJml8QlOaiiIvwJWmih0brmNyjeUl4edqQfT7AIWjU9uojTaBpU6_B3hE6M5zYlcPw5qpM6vHGE5ysOd6Z6oX7NUQnxd8lHzA/s1600-h/7_local.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 206px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsCgLa4qAXftJH9qPBxWrnde-AWoq5nHhAHsuGRCXRyWJml8QlOaiiIvwJWmih0brmNyjeUl4edqQfT7AIWjU9uojTaBpU6_B3hE6M5zYlcPw5qpM6vHGE5ysOd6Z6oX7NUQnxd8lHzA/s320/7_local.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296459305204291218&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You should now see all computers that have been assigned an IP address by the router. Not all the computers on the network may not be connected at that time but a simple ping will let you know. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You could run a port scanner on each of these computer&#39;s IP address to find open ports such as ssh, telnet, termainal service and so on.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9jDc8ldLEUvp-EzFMHutYAX8Lj793OQHN2dUW6PCc6e3MbGYrEMEpyBk07yFIBUVzthl2euQKrGtjiXKA6ancP8qCnxCi5PVsYG029juqJFD7aqBtV6gVkHkP5CV2dsS72FrqpBgd5A/s1600-h/9_local_pcs.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 134px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9jDc8ldLEUvp-EzFMHutYAX8Lj793OQHN2dUW6PCc6e3MbGYrEMEpyBk07yFIBUVzthl2euQKrGtjiXKA6ancP8qCnxCi5PVsYG029juqJFD7aqBtV6gVkHkP5CV2dsS72FrqpBgd5A/s320/9_local_pcs.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5296459345906634866&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsCgLa4qAXftJH9qPBxWrnde-AWoq5nHhAHsuGRCXRyWJml8QlOaiiIvwJWmih0brmNyjeUl4edqQfT7AIWjU9uojTaBpU6_B3hE6M5zYlcPw5qpM6vHGE5ysOd6Z6oX7NUQnxd8lHzA/s1600-h/7_local.jpg&quot;&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;SInce we are able to configure the router we could open up ports and let any one on the internet have access to this network. We could also have a little fun by setting up wireless security on the network and locking out the owner of his or her&#39;s own network.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Lets say you could not get in to configure the router there still is a lot of trouble that can be caused just by being connected on the network. You could set up a Network packet capturing program such as &lt;a href=&quot;http://www.ethereal.com/&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;Ethereal. Then use it to Scan for information such as username and passwords from websites they may login to.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You could also go out and cause some trouble on the web and it would trace back to there IP address. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;At the Least you could enjoy the free internet. You get lost some where, get connected real quick and take advantage of google maps. Could come in handy in a pinch. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;I hope this article got you thinking a little bit and if your wireless network is not secure, I hope this has convinced you to take the time to set it up.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;source : &lt;a href=&quot;http://mixeduperic.com/Windows/Hacks/simple-steps-to-basic-wireless-hacking.html&quot; target=&quot;_blank&quot;&gt;www.mixeduperic.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/3357912295708306574/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/simple-steps-to-basic-wireless-hacking.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3357912295708306574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3357912295708306574'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/simple-steps-to-basic-wireless-hacking.html' title='Simple Steps To Basic Wireless Hacking'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrfODnDmPKmEoC6cVByjucMk8V06ft_qOtvitoTKLd3UV3EZjMACTTWjareYygbtWmA0tmRCy-ip2_NK14gV44xBRaOD-LuOoi3wAQHImccN8yQQ8VUliGuTcle7jaCHwm9_RHyLELA/s72-c/2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-3709900124657269276</id><published>2009-01-27T11:47:00.000-08:00</published><updated>2009-01-27T20:24:04.043-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AP"/><category scheme="http://www.blogger.com/atom/ns#" term="comand promt ipconfig"/><category scheme="http://www.blogger.com/atom/ns#" term="command"/><category scheme="http://www.blogger.com/atom/ns#" term="ip configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="learn"/><category scheme="http://www.blogger.com/atom/ns#" term="router"/><category scheme="http://www.blogger.com/atom/ns#" term="tutorial"/><title type='text'>Router Commands</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage. You will find here some basic terminology of a router.&lt;/p&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                           &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;First of all you should remember the keyboard shortcuts of a  router.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                           &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Keyboard Shortcuts&lt;br /&gt;                                        CTRL-N - show next command&lt;br /&gt;                                        CTRL-P - show previous command&lt;br /&gt;                                        SHIFT-CTRL-6 – Break&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                           &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Configuring the Router &lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                           &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You will be able to learn the basic commands for configuring  a router.&lt;br /&gt;                                        sh running-config - details the running configuration file  (RAM)&lt;br /&gt;                                        sh startup-config - displays the configuration stored in  NVRAM&lt;br /&gt;setup - Will start the the automatic setup; the same as when you first boot the router&lt;br /&gt;                                        config t - use to execute configuration commands from the  terminal&lt;br /&gt;config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;config net - used to retrieve configuration info from a TFTP  server&lt;br /&gt;copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or &quot;write memory&quot; for IOS under ver.11&lt;br /&gt;copy startup-config running-config - copies from  non-volatile (NVRAM) to current running config (RAM)&lt;br /&gt;boot system flash &lt;put&gt; - tells  router which IOS file in flash to boot from&lt;br /&gt;boot system tftp - tells router which IOS file on the tftp  server to boot from&lt;br /&gt;boot system rom - tell router to boot from ROM at next boot&lt;br /&gt;copy flash tftp - Copies flash to tftp server&lt;br /&gt;copy tftp flash - Restores flash from tftp server&lt;br /&gt;copy run tftp - Copies the current running-config to tftp  server&lt;br /&gt;copy tftp run - Restores the running-config from tftp server &lt;/put&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;General Commands&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a list of the general commands. These are the basic  level commands and most commonly used&lt;br /&gt;                                          no shutdown - (enables the interface)&lt;br /&gt;                                          reload - restarts the router&lt;br /&gt;sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register&lt;br /&gt;                                          sh clock - shows date and time on router&lt;br /&gt;                                          sh history - shows the history of your commands&lt;br /&gt;                                          sh debug - shows all debugging that is currently enabled&lt;br /&gt;                                          no debug all - turns off all debugging&lt;br /&gt;                                          sh users - shows users connected to router&lt;br /&gt;                                          sh protocols - shows which protocols are configured&lt;br /&gt;                                          banner motd # Your customized message here # - Set/change  banner&lt;br /&gt;                                          hostname &lt;give&gt; - use to configure the  hostname of the router&lt;br /&gt;                                          clear counters - clear interface counters &lt;/give&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Privileged Mode commands of a router&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Learn how to work in the privileged mode of a router.&lt;br /&gt;                                          enable - get to privileged mode&lt;br /&gt;                                          disable - get to user mode&lt;br /&gt;                                          enable password &lt;give&gt; - sets privileged  mode password&lt;br /&gt;enable secret &lt;give&gt; - sets encrypted privileged mode password&lt;br /&gt;                                          Setting Passwords on router&lt;br /&gt;                                          Here you will be able to learn how to set the password on a  router.&lt;br /&gt;enable secret &lt;give&gt; - set encrypted password for privileged access&lt;br /&gt;enable password &lt;give&gt; - set password for privileged access (used when there is no enable secret and when using older software)&lt;br /&gt;                                          Setting the password for console access:&lt;br /&gt;                                          (config)#line console 0&lt;br /&gt;                                          (config-line)#login&lt;br /&gt;                                          (config-line)#password &lt;put&gt;&lt;br /&gt;Set password for virtual terminal (telnet) access (password must be set to access router through telnet):&lt;br /&gt;                                          (config)#line vty 0 4&lt;br /&gt;                                          (config-line)#login&lt;br /&gt;                                          (config-line)#password &lt;put&gt;&lt;br /&gt;                                          Set password for auxiliary (modem) access:&lt;br /&gt;                                          (config)#line aux 0&lt;br /&gt;                                          (config-line)#login&lt;br /&gt;                                          (config-line)#password &lt;put&gt; &lt;/put&gt;&lt;/put&gt;&lt;/put&gt;&lt;/give&gt;&lt;/give&gt;&lt;/give&gt;&lt;/give&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Router Processes &amp;amp; Statistics&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;By these command you can see the statistics and different  processes of the router.&lt;br /&gt;                                          sh processes - shows active processes running on router&lt;br /&gt;                                          sh process cpu - shows cpu statistics&lt;br /&gt;                                          sh mem - shows memory statistics&lt;br /&gt;sh flash - describes the flash memory and displays the size of files and the amount of free flash memory&lt;br /&gt;sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers&lt;br /&gt;sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IP Commands&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a list of the IP Commands&lt;br /&gt;                                          Configure IP on an interface:&lt;br /&gt;                                          int serial 0&lt;br /&gt;                                          ip address 157.89.1.3 255.255.0.0&lt;br /&gt;                                          int eth 0&lt;br /&gt;                                          ip address 2008.1.1.4 255.255.255.0 &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Other IP Commands:&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;sh ip route - view ip routing table&lt;br /&gt;ip route &lt;remote_network&gt; &lt;mask&gt; &lt;default_gateway&gt; [administrative_distance] - configure a static IP route&lt;br /&gt;ip route 0.0.0.0 0.0.0.0 &lt;put&gt; - sets default gateway&lt;br /&gt;ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route&lt;br /&gt;                                          sh arp - view arp cache; shows MAC address of connected  routers&lt;br /&gt;ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface&lt;br /&gt;                                          sh ip protocol &lt;/put&gt;&lt;/default_gateway&gt;&lt;/mask&gt;&lt;/remote_network&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;CDP Commands (Cisco Discovery Protocol uses layer 2  multicast over a SNAP-capable link to send data):&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;sh cdp neighbor - shows directly connected neighbors&lt;br /&gt;                                          sh cdp int - shows which interfaces are running CDP&lt;br /&gt;                                          sh cdp int eth 0/0 - show CDP info for specific interface&lt;br /&gt;                                          sh cdp entry &lt;cdp&gt; - shows CDP neighbor  detail&lt;br /&gt;                                          cdp timer 120 - change how often CDP info is sent (default  cdp timer is 60)&lt;br /&gt;cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)&lt;br /&gt;                                          sh cdp run - shows if CDP turned on&lt;br /&gt;                                          no cdp run - turns off CDP for entire router (global config)&lt;br /&gt;                                          no cdp enable - turns off CDP on specific interface&lt;/cdp&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IPX Commands&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Enable IPX on router:&lt;br /&gt;                                          ipx routing&lt;br /&gt;                                          Configure IPX + IPX-RIP on an int:&lt;br /&gt;                                          int ser 0&lt;br /&gt;                                          ipx network 4A&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Other Commands:&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;sh ipx route - shows IPX routing table&lt;br /&gt;                                          sh ipx int e0 - shows ipx address on int&lt;br /&gt;                                          sh ipx servers - shows SAP table&lt;br /&gt;                                          sh ipx traffic - view traffic statistics&lt;br /&gt;                                          debug ipx routing activity - debugs IPS RIP packets&lt;br /&gt;                                          debug ipx sap - debugs SAP packets &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing Protocols&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;RIP, IGPR and OSPF are the routing protocols and here is a  list of the commands for the working on the routing protocols.&lt;br /&gt;                                          Configure RIP:&lt;br /&gt;                                          router rip&lt;br /&gt;                                          network 157.89.0.0&lt;br /&gt;                                          network 208.1.1.0&lt;br /&gt;                                          Other RIP Commands:&lt;br /&gt;                                          debug ip rip - view RIP debugging info&lt;br /&gt;                                          Configure IGRP:&lt;br /&gt;                                          router IGRP 200&lt;br /&gt;                                          network 157.89.0.0&lt;br /&gt;                                          network 208.1.1.0&lt;br /&gt;                                          Other IGRP Commands:&lt;br /&gt;                                          debug ip igrp events - view IGRP debugging info&lt;br /&gt;                                          debug ip igrp transactions - view IGRP debugging info&lt;br /&gt;                                          Access Lists&lt;br /&gt;                                          Here is a list of the Access list command of a router.&lt;br /&gt;                                          sh ip int ser 0 - use to view which IP access lists are  applies to which int&lt;br /&gt;                                          sh ipx int ser 0 - use to view which IPX access lists are  applies to which int&lt;br /&gt;sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int&lt;br /&gt;                                          View access lists:&lt;br /&gt;                                          sh access-lists&lt;br /&gt;                                          sh ip access-lists&lt;br /&gt;                                          sh ipx access-lists&lt;br /&gt;                                          sh appletalk access-lists&lt;br /&gt;                                          Apply standard IP access list to int eth 0:&lt;br /&gt;                                          access-list 1 deny 200.1.1.0 0.0.0.255&lt;br /&gt;                                          access-list 1 permit any&lt;br /&gt;                                          int eth 0&lt;br /&gt;                                          ip access-group 1 in&lt;br /&gt;                                          Apply Extended IP access list to int eth 0:&lt;br /&gt;                                          access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23&lt;br /&gt;                                          access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80&lt;br /&gt;                                          int eth 0&lt;br /&gt;                                          ip access-group 100 out&lt;br /&gt;                                          Apply Standard IPX access list to int eth 0:&lt;br /&gt;                                          access-list 800 deny 7a 8000&lt;br /&gt;                                          access-list 800 permit -1&lt;br /&gt;                                          int eth 0&lt;br /&gt;                                          ipx access-group 800 out&lt;br /&gt;                                          Apply Standard IPX access list to int eth 0:&lt;br /&gt;                                          access-list 900 deny sap any 3378 -1&lt;br /&gt;                                          access-list 900 permit sap any all -1&lt;br /&gt;                                          int eth 0&lt;br /&gt;                                          ipx access-group 900 out &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;WAN Configurations Commands&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;PPP Configuration&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Point to point protocol is a method for the WAN connectivity  and you will find here some commands of PPP.&lt;br /&gt;                                          encapsulation pppppp authentication &lt;chap&gt;&lt;br /&gt;                                          ppp chap hostname &lt;put&gt;&lt;br /&gt;                                          ppp pap sent-username &lt;put&gt;&lt;br /&gt;                                          sh int ser 0 - use to view encapsulation on the interface&lt;/put&gt;&lt;/put&gt;&lt;/chap&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Frame-Relay Configuration&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.&lt;br /&gt;encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router&lt;br /&gt;frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up&lt;br /&gt;frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won&#39;t work, map Other IP to Your DLCI # (local)&lt;br /&gt;                                          keep alive 10 - use to set keep alive&lt;br /&gt;                                          sh int ser 0 - use to show DLCI, LMI, and encapsulation info&lt;br /&gt;                                          sh frame-relay pvc - shows the configured DLCI&#39;s; shows PVC  traffic stats&lt;br /&gt;                                          sh frame-relay map - shows route mapssh frame-relay lmi -  shows LMI info &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Miscellaneous Commands&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;                                             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In the last but not least here is a list of the some  miscellaneous and useful commands&lt;br /&gt;                                          sh controller t1 - shows status of T1 lines&lt;br /&gt;                                          sh controller serial 1 - use to determine if DCE or DTE  device&lt;br /&gt;                                          (config-if)#clock rate 6400 - set clock on DCE (bits per  second)&lt;br /&gt;                                          (config-if)#bandwidth 64 - set bandwidth (kilobits)&lt;/p&gt;&lt;br /&gt;source : &lt;a href=&quot;http://www.networktutorials.info/router_commands.html&quot; target=&quot;_blank&quot;&gt;www.networktutorials.info&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/3709900124657269276/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/router-commands-configure.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3709900124657269276'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3709900124657269276'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/router-commands-configure.html' title='Router Commands'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-4164159433093989107</id><published>2009-01-26T07:14:00.000-08:00</published><updated>2009-01-26T08:15:42.451-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="new feature"/><category scheme="http://www.blogger.com/atom/ns#" term="quality"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><title type='text'>Windows 7 Security</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlBM3XvxJu7cCqUYV__izlBdHmf_xlrFM6p6gcTrz1DZBOY1ewMYD0tsxEy6tptfFG9Jy9svxgfe5LY7iUgtxSAf05B6lHWNelYmT2NXxvW3Cfr7JxjN3x_ZZL4Xy1G_z1E_jf4GAwGA/s1600-h/images.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 137px; height: 103px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlBM3XvxJu7cCqUYV__izlBdHmf_xlrFM6p6gcTrz1DZBOY1ewMYD0tsxEy6tptfFG9Jy9svxgfe5LY7iUgtxSAf05B6lHWNelYmT2NXxvW3Cfr7JxjN3x_ZZL4Xy1G_z1E_jf4GAwGA/s320/images.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5295628039812818978&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;By : Sonny Discini&lt;br /&gt;Right now, Windows 7 looks very much like Windows Vista because enhancements to the appearance and feel aspects of the operating system typically come late in the development process. Lucky for us, much of the awaited security functionality has already made its way into the beta build and we&#39;re going to look at some of the new changes for Windows 7.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; class=&quot;dpw_allow&quot;&gt; &lt;span class=&quot;fullpost&quot;&gt; &lt;h3&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Old friends, new twists&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;Returning from Windows Vista are Kernel Patch Protection, Service Hardening, Data Execution Prevention, Address Space Layout Randomization, and Mandatory Integrity Levels&lt;/p&gt;  &lt;p&gt;Windows XP SP2 gave us the Security Center. Windows 7 discards this and in its place is an Action Center that incorporates alerts from 10 existing Windows features: Security Center; Problem, Reports, and Solutions, Windows Defender; Windows Update; Diagnostics; Network Access Protection; Backup and Restore; Recovery; and User Account Control.&lt;/p&gt;  &lt;p&gt;In Windows 7, users can adjust consent prompt behavior using a slider control, if they have administrative privileges. Microsoft says they&#39;ll still be protected against malicious software, even if they never see another alert. While this may or may not be true, users have been conditioned to see alerts whenever something is happening. Without them, perhaps a false sense of security will develop on the part of the end user.&lt;/p&gt;  &lt;h3&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Windows Filtering Platform&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;Windows 7 introduces something called the Windows Filtering Platform (WFP). The idea is that third parties can take advantage of aspects of the Microsoft Windows Firewall in their own products. Microsoft says &quot;third-party products also can selectively turn parts of the Windows Firewall on or off, enabling you to choose which software firewall you want to use and have it coexist with Windows Firewall.&quot;&lt;/p&gt;  &lt;p&gt;While this sounds nice on paper, I can&#39;t see a vendor teaming their product with the Windows firewall. Smart money says they&#39;ll just use their own and ignore the Microsoft solution.&lt;/p&gt;  &lt;p&gt;One nice thing to note about Windows 7 is that it makes it easier to configure that all-important home network. When users hit network problems, they curse the firewall and they&#39;re often right to. Windows 7 addresses the problem by taking over home network setup and making sure the firewall doesn&#39;t interfere.&lt;/p&gt;  &lt;p&gt;We also see that scrollbars were removed in the configuration settings screen, as has the Software Explorer feature, and real-time protection in Windows 7 has been improved to reduce the impact on overall system performance. A welcome change from the bloat of Vista.&lt;/p&gt;  &lt;h3&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;An inclusive BitLocker&lt;/span&gt;&lt;/h3&gt;  &lt;p&gt;Vista sailed in along with a fleet of new security features, among them BitLocker, a whole-disk encryption tool designed to protect your data even after an attacker makes off with your laptop. BitLocker utilizes a chip called a Trusted Protection Module (TPM). The Vista TPM transparently decrypts the drive once you&#39;ve authenticated yourself with a password or smart card. A laptop thief can&#39;t break into the locked drive, even after booting to a different OS or moving the drive to another computer.&lt;/p&gt;  &lt;p&gt;BitLocker drive encryption also supports removable storage devices, such as flash memory drives and portable hard drives has been added in Windows 7. This means that users can keep sensitive data on all of their USB storage devices as well as the physical drives on the host mentioned above.&lt;/p&gt;  &lt;p&gt;As a side note to Bitlocker, using groups, you can ban writing to any removable drive that isn&#39;t BitLocker-protected. It&#39;s a very useful tool against the very real problem known as podslurping. With this policy in place, employees can still bring in the virus-of-the-month on an unprotected drive, but they can&#39;t take away an unprotected copy of the personnel database. It&#39;s also helpful to know that BitLocker to Go also allows users to securely share data with other users who have not yet deployed Windows 7.&lt;/p&gt;  &lt;p&gt;That said, the testing I performed proved otherwise. I could not get this to work so I went to Microsoft and they confirmed that this is an issue in the beta build but will be fixed before final GA release.&lt;/p&gt;  &lt;h3&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Biometrics, System Restore and AppLocker&lt;/span&gt;&lt;/h3&gt;   &lt;p&gt;Biometrics enhancements include easier reader configurations, allowing users to manage the fingerprint data stored on the computer and control how they log on to Windows 7. And System Restore includes a list of programs that will be removed or added, providing users with more useful information before they choose which restore point to use. Restore points are also available in backups, providing a larger list to choose from, over a longer period of time.&lt;/p&gt;   &lt;p&gt;I&#39;ve seen more problems caused by System Restore than solved by it; I&#39;m not a big fan. Still, users often resort to it when trying to clean up a real or imagined malware problem. In Windows 7, you&#39;ll at least have a clear idea of what collateral damage may result, as it lists all programs and drivers that would be removed or brought back by invoking a particular System Restore point. It&#39;s way better than guessing at the right restore point and hoping for the best, which is what you have to do now.&lt;/p&gt;  &lt;p&gt;Another enhancement is AppLocker, accessed through Local Security Policy. It&#39;s a way to control which programs users can and can&#39;t use, and it&#39;s a lot more flexible than Vista&#39;s Software Restriction Policies. Still, it&#39;s not for the average user. Most IT shops should be pleased with this enhancement. I can see it being tailored to just about any corporate need.&lt;/p&gt;  &lt;p&gt;Virtually all the changes in the security area are simply tweaking and improving on existing Vista features. But then, that&#39;s what Windows 7 is all about, right? While the enhancements seen thus far in the beta are nice, they aren&#39;t stunning.&lt;/p&gt;  &lt;p&gt;I hope to see even more improvements before Windows 7 hits the streets.&lt;/p&gt;&lt;p&gt;source : &lt;a href=&quot;http://www.enterpriseitplanet.com/networking/features/article.php/3798201&quot; target=&quot;_blank&quot;&gt;www.enterpriseitplanet.com&lt;/a&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/4164159433093989107/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/windows-7-security.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/4164159433093989107'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/4164159433093989107'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/windows-7-security.html' title='Windows 7 Security'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlBM3XvxJu7cCqUYV__izlBdHmf_xlrFM6p6gcTrz1DZBOY1ewMYD0tsxEy6tptfFG9Jy9svxgfe5LY7iUgtxSAf05B6lHWNelYmT2NXxvW3Cfr7JxjN3x_ZZL4Xy1G_z1E_jf4GAwGA/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-6076191839548547574</id><published>2009-01-21T12:06:00.000-08:00</published><updated>2009-01-21T12:12:55.927-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="networking tips"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Save your computers from Spyware</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-top: 0pt; margin-bottom: 0pt; text-align: justify;&quot;&gt;The best defense against spyware and other unwanted technologies is to prevent them from getting on your computer in the first place. Awareness is the best approach to protect yourself online, so staying up-to-date on current threats and safe surfing practices is essential.  Here are some steps you can take to stay safe while still getting the most from the Internet and software programs.&lt;/p&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;p style=&quot;margin-top: 0pt; margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h2 style=&quot;margin-top: 0pt; margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;strong&gt;Keep security on your computer up to date.&lt;/strong&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;margin-top: 0pt; margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;li&gt;&lt;strong style=&quot;margin-top: 0pt; margin-bottom: 0pt;&quot;&gt;Update security patches:&lt;/strong&gt;  &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;blockquote style=&quot;margin-top: 0pt; margin-bottom: 0pt;&quot;&gt;   &lt;p style=&quot;margin-top: 0pt; margin-bottom: 0pt;&quot;&gt;Many malicious spyware developers exploit known security holes in essential software, such as operating systems and browsers.  Update essential software frequently. Automate the process if your vendor offers the option.&lt;/p&gt; &lt;/blockquote&gt; &lt;/div&gt;&lt;ul style=&quot;margin-top: 0pt; margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;li&gt;&lt;strong style=&quot;margin-top: 0pt; margin-bottom: 0pt;&quot;&gt;Security and privacy settings in Internet browsers:&lt;/strong&gt;  &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;blockquote style=&quot;margin-top: 0pt;&quot;&gt;   &lt;p style=&quot;margin-top: 0pt;&quot;&gt;Many Internet browsers have security and privacy settings that you can adjust to determine how much—or how little—information you are willing to accept from a Web site.  Check the documentation or help file on your Internet browser to determine how to adjust these settings to appropriate levels. See &lt;a href=&quot;http://privacy.getnetwise.org/browsing&quot;&gt;GetNetWise.org&lt;/a&gt; for detailed  instructions.&lt;/p&gt;&lt;p style=&quot;margin-top: 0pt;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0pt;&quot;&gt;&lt;/p&gt;&lt;/blockquote&gt; &lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Download programs only from Web sites you trust.  &lt;/strong&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;If you are not sure whether to trust a program you are considering downloading, ask a knowledgeable friend or enter the name of the program into your favorite search engine to see if anyone else has reported that it contains spyware or other potentially unwanted technologies.&lt;/li&gt;&lt;li&gt;Look carefully at the address of the site you are visiting to make sure it is not an obvious spoof.&lt;/li&gt;&lt;li&gt;Be particularly suspicious of programs you see advertised on unrelated Web sites. If a maker of a screensaver, “smiley” inserter, or other program heavily promotes its purportedly-free product, the product may include extra software you do not want.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Beware the fine print: Read all security warnings, license agreements, privacy statements, and “opt-in” notices with any software you download.&lt;/strong&gt;  &lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Whenever you install something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes important information such as aggressive installs or the inclusion of unwanted software in a given software installation is documented, but it may be found only in the EULA. The fine print may be the only place consumers can find notice of potentially unwanted technologies.  Unfortunately, careful consumers must read &lt;em&gt;all&lt;/em&gt; the fine print.&lt;/li&gt;&lt;li&gt;When given the choice of opting into something, make sure you understand fully to what you are agreeing. &lt;/li&gt;&lt;li&gt;If you have doubts about the legitimacy of the software, do not install it, or go to a trusted source to find more information about the software.  To be safe, you should never install software if you are uncertain about it.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,” or “Cancel” to close a window. &lt;/strong&gt;&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;If you want to close a window or dialog box, consider the options provided by your operating system or Web browser, such as closing the window with the ‘x’ mark in the upper corner or typing Alt+F4 in Microsoft Windows.&lt;/li&gt;&lt;li&gt;Pay attention when closing windows; some dialog boxes may have a prominent statement that says, “Click here to close window,” then in less prominent text adds, “and install software.”&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-bottom: 0pt; text-align: justify;&quot;&gt; &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h2 style=&quot;margin-top: 0pt; text-align: justify;&quot;&gt;&lt;strong&gt;Be especially careful with certain types of “free” programs. &lt;/strong&gt; &lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Many file sharing applications are bundled with other, potentially unwanted software.&lt;/li&gt;&lt;li&gt;Similarly, screen savers, cursor enhancements, wallpaper bundles, “smiley” inserters and any other software promoted aggressively often include extra software you did not request and aren’t expecting. Be sure you clearly understand all of the software packaged with those programs. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Use available tools to detect and delete spyware.&lt;/strong&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;li&gt;There are a number of security tools available from a variety of vendors that can help you identify spyware, stop the installation of it on your PC, and/or remove it.  &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Anti-spyware and Anti-virus software:&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;blockquote style=&quot;margin-top: 0pt;&quot;&gt;   &lt;p style=&quot;margin-top: 0pt;&quot;&gt;There are a number of programs (available both free and for a fee) from reputable vendors that can help detect spyware, prevent spyware from being installed on your PC, and/or remove spyware if it is installed. (Some programs can be removed through “Add/Remove programs” or other standard operating system features.) Note that some software that claims to be an anti-spyware tool is actually adware or other potentially unwanted software in disguise. For this reason, you should read reviews to be sure any anti-spyware software you download is from a reputable publisher. &lt;/p&gt; &lt;/blockquote&gt; &lt;/div&gt;&lt;ul style=&quot;margin-bottom: 0pt; text-align: justify;&quot;&gt;&lt;li&gt;&lt;strong&gt;Personal firewall:&lt;/strong&gt;  &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;blockquote style=&quot;margin-top: 0pt;&quot;&gt;   &lt;p style=&quot;margin-top: 0pt;&quot;&gt;Installing and using a firewall provides a helpful defense against remote installation of spyware by hackers. &lt;/p&gt; &lt;/blockquote&gt; We encourage you to learn more about how to protect yourself from spyware by visiting the US federal government OnGuard OnLine Web site at &lt;a href=&quot;http://www.onguardonline.gov/&quot;&gt;http://www.onguardonline.gov&lt;/a&gt;.&lt;br /&gt;source :&lt;a href=&quot;http://www.antispywarecoalition.org/documents/safetytips.htm&quot; target=&quot;_blank&quot;&gt;www.antispywarecoalition.org&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/6076191839548547574/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/save-your-computers-from-spyware.html#comment-form' title='2 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6076191839548547574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6076191839548547574'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/save-your-computers-from-spyware.html' title='Save your computers from Spyware'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-7163055801147095308</id><published>2009-01-17T23:17:00.000-08:00</published><updated>2009-01-18T00:07:12.493-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antenna"/><category scheme="http://www.blogger.com/atom/ns#" term="maximize wifi range"/><category scheme="http://www.blogger.com/atom/ns#" term="maximize wifi signal"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wi-fi"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi"/><title type='text'>MAKE OMNI  ANTENNA</title><content type='html'>Introduction&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS7nVAsaNJMbpRKqZaXWWx8kx4zA0VBDd5-tB6HSC7CjlCWtxPyXfSHCN0AKR1uRp4KClRdvFU2dFNKSsmoBpONIKs6g_7rbI3dRGGgH3yd2xThtD3zIeTqYiEuFYB9mNcFPDJK4jF4g/s1600-h/omni2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 150px; height: 37px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS7nVAsaNJMbpRKqZaXWWx8kx4zA0VBDd5-tB6HSC7CjlCWtxPyXfSHCN0AKR1uRp4KClRdvFU2dFNKSsmoBpONIKs6g_7rbI3dRGGgH3yd2xThtD3zIeTqYiEuFYB9mNcFPDJK4jF4g/s320/omni2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292541143959882146&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Most of the designs on the web for 2.4 GHz omni antenna seem to involve brass tubing and lmr-400 cable, none of which are readily available to me. I then found a coax only design for 444Mhz that was based on the same idea. The only reasonable cable I could get my hands on was RG-213 from Maplin. By scaling the 444Mhz design up to 2.4 Ghz and using RG-213 I thought I&#39;d have a go. In order to get about 6db gain from the antenna, it would need 8 sectors, with a 1/4 wave section at the top and a fly-lead with N-connector at the bottom. It should take about 2-3 hours to build an antenna using this design, but don&#39;t worry if it takes longer, you will get quicker, especially as you only need to make the jig once.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKuFLy4PGIT3YKE6GsRxW31-CbKufEWswwETmAQI-p-ndMKcRx809BfCvkrGPuhVdR6-Jtuphf-SSfr9D_FgJu0SOWgAgyWeC0dlokTRbxNfQU-15jXTpEPScPdN8BV0gal3Lf8DRVoQ/s1600-h/omni1.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 43px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKuFLy4PGIT3YKE6GsRxW31-CbKufEWswwETmAQI-p-ndMKcRx809BfCvkrGPuhVdR6-Jtuphf-SSfr9D_FgJu0SOWgAgyWeC0dlokTRbxNfQU-15jXTpEPScPdN8BV0gal3Lf8DRVoQ/s320/omni1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292533507684480226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Most of the designs either had toroid magnets or a decoupler on the fly-lead of the antenna. However the location of the decoupler seems different in each design, and some designs quoted a decoupler length of 1/4 wavelength, others were !/4 wavelength times the velocity factor of the decoupler tube (brass tube quoted at 0.95). I&#39;ve tried most locations and can report that without proper testing kit I can see no difference in the Signal to Noise ratio between having a decoupler and not. I decided to not bother as it simplified the design. If anyone knows a good reason why you must have a decoupler then I would love to know (especially if you know where it should be exactly). If you want to add a decoupler, please do, I found using 15mm or 22mm copper tube and a 15mm or 22mm end stop made a good design, just needing to be soldered together to get the right length, and a hole drilled in the end of the end stop to fit the cable.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMn0u3FZd6Yu6lMBJYrr_Jfe2LGUGSXN68YxCYHTbDhOBhljqmQsS5A_72Eu3jBw_6Zrhn6Bm9aA7bTbuhBaQXZLcJ1eQ42TCIqODQJcDQ-nINmhx5WUA2nYsc_hyphenhyphenZeed4soJaB3XkaA/s1600-h/omni3.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 67px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMn0u3FZd6Yu6lMBJYrr_Jfe2LGUGSXN68YxCYHTbDhOBhljqmQsS5A_72Eu3jBw_6Zrhn6Bm9aA7bTbuhBaQXZLcJ1eQ42TCIqODQJcDQ-nINmhx5WUA2nYsc_hyphenhyphenZeed4soJaB3XkaA/s320/omni3.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292533513876861538&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Each sector of the antenna needs to be a 1/2 wavelength long multiplied by the velocity factor of the cable. The velocity factor of RG-213 is 0.66 . If you decide to use different cable (such as LMR-400) then you need to get the velocity factor of that cable (which will be different), and recalculate all the dimensions.&lt;br /&gt;&lt;br /&gt;         V * C    0.66 * 299792458&lt;br /&gt;1/2 wavelength = ------ = ---------------- = 0.0405m = 40.5mm&lt;br /&gt;         2 * F     2 * 2441000000&lt;br /&gt;   &lt;br /&gt;V = Velocity Factor   of  RG213  = 0.66&lt;br /&gt;C = speed of light = 299792458&lt;br /&gt;F = Frequency of Signal = 2441000000 (middle of 2.4ghz range)&lt;br /&gt;&lt;br /&gt;The 1/4 wave element is not adjusted by the Velocity factor, as it is in the open, so works out at just 31mm long giving a total antenna length of 355mm + fly-lead. (Thanks to Oscar for correcting me of this.)&lt;br /&gt;Getting the parts&lt;br /&gt;&lt;br /&gt;All of the parts are available cheaply from either Maplin and any diy shop.&lt;br /&gt;&lt;br /&gt;* 1m RG-213U cable (available by the meter from Maplin). This is enough for 2 antenna. Buy more for whatever flylead length you want.&lt;br /&gt;* N connectors, Depending on what you want to connect to , use either male or female connectors, and inline or bulkhead. Remember inline connectors need to fit 10mm diameter RG-213 cable&lt;br /&gt;* 20mm pvc conduit (available from any diy store) Has a 20mm inside diameter, and 22mm outside.&lt;br /&gt;* 22mm pipe clips (depending on how you want to mount the antenna), pipe clips make it easy to mount and unmount, or use the proper conduit brackets (but they seem a little expensive).&lt;br /&gt;&lt;br /&gt;You don&#39;t need any special tools&lt;br /&gt;&lt;br /&gt;* mm rule for measuring !&lt;br /&gt;* junior hacksaw&lt;br /&gt;* stanley knife&lt;br /&gt;* pliers&lt;br /&gt;* standard soldering iron (don&#39;t need a heavy duty one) and solder&lt;br /&gt;* off cuts of wood to make a jig to aid soldering&lt;br /&gt;* bench or vice to hold cable while you cut it&lt;br /&gt;&lt;br /&gt;Cut the pieces&lt;br /&gt;&lt;br /&gt;After much trial and error, I found that the neatest way to cut the cable is actually with a junior hacksaw. It gives a much cleaner finish than wirecutters. Each sector consists of a short length of RG-213 cable, with the central core sticking out each end.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX_7BhCJVEQeaufkPUGbGY5Kw4Jhe_8Xwx2KEPDnfeaLgiYiGFytAUQ9PxyERFP9vJqdztFj8kYepmhMeXSUUHVmciKwmNhkcMn0lkAaydZ1RWLthE0NgaELoO9z_mjD9enqQJUeSm9Q/s1600-h/omni4.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 245px; height: 99px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX_7BhCJVEQeaufkPUGbGY5Kw4Jhe_8Xwx2KEPDnfeaLgiYiGFytAUQ9PxyERFP9vJqdztFj8kYepmhMeXSUUHVmciKwmNhkcMn0lkAaydZ1RWLthE0NgaELoO9z_mjD9enqQJUeSm9Q/s320/omni4.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292533515028621218&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMJJqmDupyespYO4lBZM-2-LQ7t0NzyfowDCvrg_b_pQD8RUjYAEkKuqYLkyoPYSQeGsnhdNFEMKbBF4YwTTA0Ka7BWO262aquSmBIjbggN87Q4KAvHDErXMMHkxb7DAnAkGQ3u5ilOg/s1600-h/omni5.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 215px; height: 122px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMJJqmDupyespYO4lBZM-2-LQ7t0NzyfowDCvrg_b_pQD8RUjYAEkKuqYLkyoPYSQeGsnhdNFEMKbBF4YwTTA0Ka7BWO262aquSmBIjbggN87Q4KAvHDErXMMHkxb7DAnAkGQ3u5ilOg/s320/omni5.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292533516829955074&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;When building the antenna, the exact length of each piece of RG-213 is not that important, it is the overall length of each sector that counts. I found that cutting the cable to 37mm with 6mm of core sticking out each end, gets enough overlap to easily solder the segments together. If you allow 1mm for the width of the hacksaw when cutting the sectors apart, it means you need 37 +6 +6 +1 = 50mm of cable for each sector making 8sectors + 1/4wave section come to 420 mm of cable for the antenna + cable for the fly lead.&lt;br /&gt;&lt;br /&gt;The best way to cut each sector is to make the cuts where each end of the sheathed section of the sector will be, before making the cut between each sector. The picture below shows the top 3 sections of the antenna, and the 1/4 wave section, showing the order that the cuts should be made.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W2wKeHe55uZVqGaYTm3BF9fq1Fpa91VK5wcm4inYSTwIqId9j5Q4RbYLgH-K0KbGOhmObxReLFIiy5PFWDlUYjKSFb31XojMvWOSvfe0D7urg1LhHVbVYop2uiaLtTHTsTkRNKRDyQ/s1600-h/omni6.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 184px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W2wKeHe55uZVqGaYTm3BF9fq1Fpa91VK5wcm4inYSTwIqId9j5Q4RbYLgH-K0KbGOhmObxReLFIiy5PFWDlUYjKSFb31XojMvWOSvfe0D7urg1LhHVbVYop2uiaLtTHTsTkRNKRDyQ/s320/omni6.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534033733023042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The best way to make the cuts is to mark them out on the cable first. When sawing the cable it has a tendancy to deform and bend, so lightly sawing round the outside sheath first, but not cutting through, helps give a guide to the cutting for real. I use the junior hacksaw to gently saw round the cable sheath to make the mark for each section.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMjvQYCkrRI6xBVPpcWYnDsyGUR4-G5Wfpz_ggAQabS2yLDHJbHAeZMt3w7_NWVbnj7KjcCeJKO8IMGcW2YWZOvULCQ3m5FNuFoX12GMfKAVN7Tzjb6tMVOzUiro1dsD037lhXHd43KA/s1600-h/omni7.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 184px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMjvQYCkrRI6xBVPpcWYnDsyGUR4-G5Wfpz_ggAQabS2yLDHJbHAeZMt3w7_NWVbnj7KjcCeJKO8IMGcW2YWZOvULCQ3m5FNuFoX12GMfKAVN7Tzjb6tMVOzUiro1dsD037lhXHd43KA/s320/omni7.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534038990073618&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The first mark will be at 31mm from the end, which is for the 1/4 wave section at the top. Once you have made the mark, it is time to cut round the cable. You want to cut through the sheath, shielding, and just into the central insulation, but not into the central copper wires. You may need to practice a bit first, but you should be able to feel as you cut through the shielding into the central insulation. By leaving plenty of sheathed section either side of the cuts, the shielding stays in place when being cut.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgujQM7pkm_L41qHM5q-7AAgbityGL-43Q26sC-iUIZ2t4HvqET056cut4n7t2zytGNW53yW4a5E-ncL9KisUq3I5VQWiQ8HIf0bqYCZSzfPkteay3jKzlye3rgsZKatThhrr2QkaTImA/s1600-h/omni8.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 91px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgujQM7pkm_L41qHM5q-7AAgbityGL-43Q26sC-iUIZ2t4HvqET056cut4n7t2zytGNW53yW4a5E-ncL9KisUq3I5VQWiQ8HIf0bqYCZSzfPkteay3jKzlye3rgsZKatThhrr2QkaTImA/s320/omni8.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534039248264482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Now with pliers, gently twist off the end 31mm of sheath &amp;amp; shielding&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEapFw-28RkcTebWa2KiG3AjjnSGT59gOmowimFH4SjCyz4odfIKn5rTnGbvvWnNIy7dF7YHYUY5OnesIx89Ecr4kzx6om0ERrrchP-ARKH6nZ8fPoHUVbvZZAhStoG8WOd86-n3YYPw/s1600-h/omni9.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 87px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEapFw-28RkcTebWa2KiG3AjjnSGT59gOmowimFH4SjCyz4odfIKn5rTnGbvvWnNIy7dF7YHYUY5OnesIx89Ecr4kzx6om0ERrrchP-ARKH6nZ8fPoHUVbvZZAhStoG8WOd86-n3YYPw/s320/omni9.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534038321065410&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;This should leave the cenral insulator exposed. Using the stanley knife score round through the central insulator, but not too hard, or you will cut the central cable. Now twist off the insulation. You should be able to see the twist in the central cable through the insulation, which will show you which way to twist off the insulation, resulting in the central core twisting more tightly.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFMtuZ8cfFn2cBmPSmJbwLnQHOpck6kgCm1XxOM49x9vdDFCrBZkwhjk8m77yHwwt_p7QuccpXq22e6GNpoFcZEcisyzbAaA_lzNBZ9zrFnsI_J0nEuQpjZTGdKk-VGaVQqY6H9NaLQ/s1600-h/omni10.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 103px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFMtuZ8cfFn2cBmPSmJbwLnQHOpck6kgCm1XxOM49x9vdDFCrBZkwhjk8m77yHwwt_p7QuccpXq22e6GNpoFcZEcisyzbAaA_lzNBZ9zrFnsI_J0nEuQpjZTGdKk-VGaVQqY6H9NaLQ/s320/omni10.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534039920872034&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The next mark is 37mm down (68mm from end of the cable) and is the cut for other end of the sheathed section of the top sector. The next mark is 13mm down (consists of 6mm core from each sector and 1mm for cut between sectors) (81mm from end) and is the top of the sheathed section of the second sector. The next mark is 37mm down, then 13mm, then 37mm, and so on and so forth until you have each of the sheathed sections marked out.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyfKO1uaOm10kzxmi5JbpRZeoLhyAL3vElHa-Qb-mb3xFGooeTIDCsZKcqNmxNyawBFtTNrMp4kP821QLsqdYZPDw6j0N0KElVlmbFwKwj7LGSZx9mV9Uu8BYNuj10UnGs8bxHKtdqvA/s1600-h/omni11.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 103px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyfKO1uaOm10kzxmi5JbpRZeoLhyAL3vElHa-Qb-mb3xFGooeTIDCsZKcqNmxNyawBFtTNrMp4kP821QLsqdYZPDw6j0N0KElVlmbFwKwj7LGSZx9mV9Uu8BYNuj10UnGs8bxHKtdqvA/s320/omni11.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534636933019234&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;You can now start making the cuts, remembering to only cut through the sheath, shielding and just into the central insulation. First make the cut at 37mm down, then the next cut a further 13mm down. You may find that some of the shielding pulls out when you make this cut, as the 13mm length of sheath cannot hold the shielding tight enough. Don&#39;t worry, it doesn&#39;t matter.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsRWkEA12J-CPEF_XHYUt4fDx8RgYOYqDXXz76GOwZermVufShis4BbTclscWiX-pwAnsk6eXBJ8beMRT6Lcl0YB3M8CiC7-OhBGZawXziM1tQetHJb-uFmw9SpfS2iDXasx1oHyh33w/s1600-h/onni12.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 62px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsRWkEA12J-CPEF_XHYUt4fDx8RgYOYqDXXz76GOwZermVufShis4BbTclscWiX-pwAnsk6eXBJ8beMRT6Lcl0YB3M8CiC7-OhBGZawXziM1tQetHJb-uFmw9SpfS2iDXasx1oHyh33w/s320/onni12.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292537350153596226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now you are ready to cut off the top sector from the cable. You want to cut through the whole cable at the mid point of the two cuts you have just made, that is about 43.5 mm from the end of the sheath, or 74.5 mm from the end of the cable. See position 4 in the diagram above. Just saw carefully the whole way through the cable.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf9oNwYP22EoNTFsW6miBlVquj6OqqShmAuRiiVKyszxSxqeh-DNtCpR2tAok6pG_hVjhHgq3iqaVZjjEVU4j4bkXNL1iSov9VGWvaJ1hazHd5_M9DvpoVd1dbvMe9S0PGT5oB7OTWHA/s1600-h/omni13.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 61px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf9oNwYP22EoNTFsW6miBlVquj6OqqShmAuRiiVKyszxSxqeh-DNtCpR2tAok6pG_hVjhHgq3iqaVZjjEVU4j4bkXNL1iSov9VGWvaJ1hazHd5_M9DvpoVd1dbvMe9S0PGT5oB7OTWHA/s320/omni13.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534641283192642&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now you can pull off the sheath and shielding from the each end.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnRNGg-A5w7LfItQN7ZaAkeK6OTDNPYNThLCbtEdZBUHm915qe4-y3dBOeIC6HbukJI1ApuWZNa8jYDwJm2VhShSqe2zilPiHpXezCLPXdluZmWlNf9mQEQtNrUQNQKoCvoSU601MaFA/s1600-h/omni14.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 62px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnRNGg-A5w7LfItQN7ZaAkeK6OTDNPYNThLCbtEdZBUHm915qe4-y3dBOeIC6HbukJI1ApuWZNa8jYDwJm2VhShSqe2zilPiHpXezCLPXdluZmWlNf9mQEQtNrUQNQKoCvoSU601MaFA/s320/omni14.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534641480082834&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Now score round the insulation as you did before, being careful not to cut the central cable&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheJtxwl3euPA9HnDoxwPIb5glHIIoR5ZMKK89ZM2VEGKdJ3oTQj-FR3h6tORwHmeP2nW6MeX3UtYuS23UIS7MEZ___dKZMPezH8GHWU8RvP9B8cMPeHwK6LREOtCM6ZvJ52CQHL-vh8g/s1600-h/omni15.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 58px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheJtxwl3euPA9HnDoxwPIb5glHIIoR5ZMKK89ZM2VEGKdJ3oTQj-FR3h6tORwHmeP2nW6MeX3UtYuS23UIS7MEZ___dKZMPezH8GHWU8RvP9B8cMPeHwK6LREOtCM6ZvJ52CQHL-vh8g/s320/omni15.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534644351230658&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now carry on making cuts 37mm down from the end of the sheath, and then 13mm further down (50mm from the end of the sheath), and then cut through the cable in the middle of the two cuts. Another sector made. You will need eight sectors in total. Make the same cuts as usual for the eighth sector as it will make top of the flylead as well. Now you have all eight sectors you need to check round the end of each sector to make sure that none of the shielding is touching the central cable, as odd strands can get left.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio9o-HWj2d0bbRp1vHg8ok0R5I6_FmMuwcec4OLU6JvsQ0CctdRfP3CviWYswXwOTZPfzWeio3UxgZDOQ2yP9N-JpaB7RiBcTG1kj8ILgoNOI43IfONoQy2PZARxBPliP4kLp6mlkE0Q/s1600-h/omni16.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 218px; height: 125px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio9o-HWj2d0bbRp1vHg8ok0R5I6_FmMuwcec4OLU6JvsQ0CctdRfP3CviWYswXwOTZPfzWeio3UxgZDOQ2yP9N-JpaB7RiBcTG1kj8ILgoNOI43IfONoQy2PZARxBPliP4kLp6mlkE0Q/s320/omni16.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292534646381810242&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now you need to make a gentle V shaped cut with the stanley knife, at each end of the sectors, to expose the shielding, which is where the central core of the next sector will be soldered.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP7_QbjQmXcPFmOdIoYnzJK6qt3DzftTXqSBHUJEMIEu_c99VcMg7J7gJ4Hw2kcqBi_e3I1n3qqPTeGnY_0CLz8SBfvnJ7_Ca_gTSlk_YMj1-Fuei1WGkFWWPV0RaQnk-Lw9KK6k7q2Q/s1600-h/omni17.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 176px; height: 146px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP7_QbjQmXcPFmOdIoYnzJK6qt3DzftTXqSBHUJEMIEu_c99VcMg7J7gJ4Hw2kcqBi_e3I1n3qqPTeGnY_0CLz8SBfvnJ7_Ca_gTSlk_YMj1-Fuei1WGkFWWPV0RaQnk-Lw9KK6k7q2Q/s320/omni17.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292537308773157954&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Make sure that the V cuts at each end of the sector line up, othwise, when you come to solder the antenna together, the whole thing will be twisted all around. Once you have all eight sectors finished, its time to put them together.&lt;br /&gt;Build a Jig&lt;br /&gt;If you do not have a handy helper to hold the sectors together, then you will find it easier to make a small jig from offcuts of wood, to hold the sectors together as you solder them. The clamps on the right hand side of the picture need to be no more than 30mm long. The base board of the jig, needs to extend out to the right long enough to take the whole length of the completed antenna, as it will need to support it during the soldering, as the antenna is not rigid enough to support itself.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgriC-upN3JbJ63Fva39FHNhk3GW9lQ3WQnYfmxYAkIJog1BM5ov5KvhkZejOzix_BSVFz4STNXKeHH3fLQTp58oqdp3t2vRRdCKhyphenhyphenC86j-PHmr19GKyn6hlvU8sCoSIxrKE70q7jZdZQ/s1600-h/omni18.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 168px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgriC-upN3JbJ63Fva39FHNhk3GW9lQ3WQnYfmxYAkIJog1BM5ov5KvhkZejOzix_BSVFz4STNXKeHH3fLQTp58oqdp3t2vRRdCKhyphenhyphenC86j-PHmr19GKyn6hlvU8sCoSIxrKE70q7jZdZQ/s320/omni18.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292537315591192322&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Don&#39;t make the clamps too tight, as you need to be able to easily lift the cable out after it has been soldered.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit2zOQkxBUWH22njw9vv3GBJw-zcqt-Lwe4aCteY8HNh95USgw1c9_1y1Awc4Pdp9KEXh_lFoNqJcnysz4FJy8q0xwcRZ7QDX4JA909BOTUE0IvbxIq8ikcasv6G2tGuvXiuBcDnVeAw/s1600-h/omni19.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 66px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit2zOQkxBUWH22njw9vv3GBJw-zcqt-Lwe4aCteY8HNh95USgw1c9_1y1Awc4Pdp9KEXh_lFoNqJcnysz4FJy8q0xwcRZ7QDX4JA909BOTUE0IvbxIq8ikcasv6G2tGuvXiuBcDnVeAw/s320/omni19.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292537312953483714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;When you are readly to solder the sectors together, you need to take care , that each sector is correctly spaced. The overall length of each sector needs to be 40.5mm , measure from one end of the shielding of the sector you are adding, to the same end on the next sector, and slide the sectors together/apart until the distance is 40.5 mm. Try to get it as accurate as you can, as it affects the direction the antenna transmits in if you get it wrong. There should be a small 3mm gap between the sheaths of each sector.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2PEZqtvncDozbsNqYDpotBBQO7-TpjGWemzOxeBAxo0L4n6HS0DI0vn25Y2tIJQreabkpgrd4fSLF4InnQcy47FpwbkQ7ZHB0yjIJ2Dc30CmX4DFYHt2w9Hw9JyE7k33ByDBOkhYDRg/s1600-h/omni19.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 105px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2PEZqtvncDozbsNqYDpotBBQO7-TpjGWemzOxeBAxo0L4n6HS0DI0vn25Y2tIJQreabkpgrd4fSLF4InnQcy47FpwbkQ7ZHB0yjIJ2Dc30CmX4DFYHt2w9Hw9JyE7k33ByDBOkhYDRg/s320/omni19.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292539873098760706&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigZp8Hz3dU3MYEfzGAbjVcN8QtDwHbccGYfjrycieIHC7419GhncRlrm0q8qdRfHOKRiC2y351dT0gPaI_w-AvjvAAdHOk90JqxEJyCtI_oBSJdP1ruYN0zOtL2x1nowcpozSgJZ6EYA/s1600-h/omni20.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 122px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigZp8Hz3dU3MYEfzGAbjVcN8QtDwHbccGYfjrycieIHC7419GhncRlrm0q8qdRfHOKRiC2y351dT0gPaI_w-AvjvAAdHOk90JqxEJyCtI_oBSJdP1ruYN0zOtL2x1nowcpozSgJZ6EYA/s320/omni20.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5292537312609938738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Once you have soldered each sector together, lift it up, turn it over, and move it down the clamp ready for the next sector. This results in a nice straight antenna. When soldering, remember to heat both the shielding and core so that the solder runs smoothly and fixes them together.&lt;br /&gt;&lt;br /&gt;Once complete, test the cable with either a bulb and battery or a multimeter. The center of the fly lead should form a circuit to the 1/4 wave section, and the shield of the flylead to the shield of the top section. Now test that there are no crossed connections, by ensuring there is no circuit between the center of the flylead and the shielding of the top sector, and no circuit between the 1/4 wave section and the shielding of the flylead.&lt;br /&gt;&lt;br /&gt;Now fix the N connector of your choice onto the end of the fly lead. The type of connector you use depends on what you want to connect to. I use inline connectors, but you could use any connector you like. Slide the antenna into a length of conduiting. It should be a snug fit, you may need to gently ease it in. Now find an old soft drink bottle top, and pop it on the top end of the antenna. Voila one complete antenna ! Securing the antenna in the conduit is best left until you are ready to mount it somewhere. You can cut 5cm slots in the bottom if the conduit, and use a jubilee clamp to grip the flylead, or drill a hole through the conduit and use a cable tie to hold the fly lead, or use a bulkhead mount connector on a botle cap, and glue it to the bottom of the conduit, or glue the flylead in place. It&#39;s up to you.&lt;br /&gt;Testing&lt;br /&gt;&lt;br /&gt;I will assume you are connecting the antenna to a wireless card in a laptop, and connecting to an accesspoint somewhere. You will need to a signal to noise meter to examine the signal strength. Most wifi cards come with software that does this. Now its time to test that the antenna actually works. This can be harder than it sounds, as unless you can remove the existing aerial from the card or ap, you can&#39;t tell it is using your new homebrew antenna. Well wrapping the existing antenna completely in 6-8 layers of tinfoil, has a dramatic reduction on signal strength, now connect the antenna, and the signal should go back up. Remember that omni antenna send out the signal horizontally, so don&#39;t test it from the room below your access point. Hopefully you should see that your new antenna actually works. There are three ways to test the gain of the new antenna&lt;br /&gt;&lt;br /&gt;* Use spectrum analyser in a professional radio lab&lt;br /&gt;* compare the gain of your new antenna, to the gain of a known antenna (Not the pcmcia card)&lt;br /&gt;* Carry out an empirical range test with your new antenna&lt;br /&gt;&lt;br /&gt;If you have access to a spectrum analyser I&#39;d love to know your findings. If you have an existing omni or yagi antenna, then you can compare the snr readings between the two antenna. Remember to do the test outside, as bouncing the signal off walls can really give odd results. Try to stand as far away from the antenna as possible when doing the test, as even moving near it can change the results a lot. Position the two antenna in the same place for the test. Don&#39;t try and compare the snr of your new antenna to that of the wireless card in your laptop, as just by turning the laptop round, or lifting it up, or holding it, can dramatically change the snr. Try it and see what I mean. If you don&#39;t have another antenna, then wander down your street until you are out of range. Now wander back towards your AP, and wait for the laptop to chime that it has made a connection. Note how far from home you are. Try it again, with the laptop connected to the new antenna. Remember to keep the antenna vertical. I found carrying them in a bag with the antenna poking out the top works well. Try not to hold the antenna, as this will change the snr. You should now be able to pick up your AP about twice as far away, assuming there are no new massive obstacles.&lt;br /&gt;&lt;br /&gt;If you have a go at making this antenna, and get it working, drop me an email (address at bottom of page) and let me know how you found building it, whether you&#39;ve found a simpler way, and ... be honest ... how long it took.&lt;br /&gt;&lt;br /&gt;source : &lt;a href=&quot;http://wireless.gumph.org/articles/homemadeomni.html&quot;&gt;wireless.gumph.org&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/7163055801147095308/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/make-omni-antenna.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/7163055801147095308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/7163055801147095308'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/make-omni-antenna.html' title='MAKE OMNI  ANTENNA'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS7nVAsaNJMbpRKqZaXWWx8kx4zA0VBDd5-tB6HSC7CjlCWtxPyXfSHCN0AKR1uRp4KClRdvFU2dFNKSsmoBpONIKs6g_7rbI3dRGGgH3yd2xThtD3zIeTqYiEuFYB9mNcFPDJK4jF4g/s72-c/omni2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-381293205811432360</id><published>2009-01-15T15:55:00.000-08:00</published><updated>2009-01-15T19:16:21.968-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="3G"/><category scheme="http://www.blogger.com/atom/ns#" term="4G"/><category scheme="http://www.blogger.com/atom/ns#" term="HSDPA"/><category scheme="http://www.blogger.com/atom/ns#" term="modem"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><title type='text'>Top review of HSDPA Modem</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Here discuss about review HSDPA modem that may be tested that technology. This review I got from the people who already used.  From here we can see what the feature, or the bad of HSDPA modem. I hope this review can be helping you to use HSDPA modem.&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;The Sierra Wireless AirCard 881U&lt;/span&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpWNx5JJunnVa5FqIWlGBJkSGWJazoTWxSlvCOXJs2QzvjzfJknJrZpRGbTl1EgcO0YTKZPlyUdTfC0nggaVKOC_w0P5MocbZWEV2XPFpnfoNBkzD7g_UBUTxG5pzxJquY8DtI7SdqA/s1600-h/Sierra881U.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 147px; height: 149px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpWNx5JJunnVa5FqIWlGBJkSGWJazoTWxSlvCOXJs2QzvjzfJknJrZpRGbTl1EgcO0YTKZPlyUdTfC0nggaVKOC_w0P5MocbZWEV2XPFpnfoNBkzD7g_UBUTxG5pzxJquY8DtI7SdqA/s320/Sierra881U.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291715838521949650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;At first glimpse, the AirCard 881U from Sierra Wireless is a beast of a gadget. Big, ugly, and surprisingly heavy, the USB modem isn&#39;t nearly as stylish as the other modems.&lt;br /&gt;Similarly annoying is the install process. If you&#39;re a Windows user, it&#39;s easy -- simply pop the disc into your machine and follow the screen prompts. But if you&#39;re a Mac user, it&#39;s much more difficult. To install it on my Mac OS X 10.4 MacBook, I had to go to the Sierra Wireless Web page&#39;s support section and download the correct software for my operating system. Once that download was complete, I was finally able to install the software, restart my computer, and connect to AT&amp;amp;T&#39;s 3G network.&lt;br /&gt;&lt;br /&gt;The AirCard 881U&#39;s software was delightfully easy to use and far more bearable than the ridiculous install. To connect to the 3G network, you need only to open the program and click the Connect button. In a matter of seconds, the modem is up and running and you&#39;re free to surf.&lt;br /&gt;I was pleasantly surprised with the speed I experienced while browsing the Web. Simple pages like Google (NSDQ: GOOG).com opened in just a few seconds with 3G connectivity and more complex Web sites like ESPN.com opened about twice as fast as my EDGE-connected cell phone, but about 10 seconds slower than my Wi-Fi connection. All in all, I was getting about 1.0 Mbps on the downlink and roughly 375 kbps up.&lt;br /&gt;Although 3G connectivity with the AirCard 881U was a great experience, it suffers from the same limitations that all USB modems do: it&#39;s governed by the data coverage that wireless carriers provide. And unless you live in a big city or around a densely populated area, don&#39;t expect 3G wherever you go. In fact, I quickly found myself surfing at EDGE speeds when I ventured away from the metro area.&lt;br /&gt;The Sierra Wireless AirCard 881U is a generally lackluster USB modem that&#39;s bloated, too heavy, and more of an eyesore than anything else. And although connecting to 3G was delightfully easy and the price tag -- free after mail-in rebate -- is attractive, AT&amp;amp;T&#39;s $60 per month data plan and the AirCard 881U&#39;s aforementioned issues should make you think twice before picking it up.&lt;br /&gt;source: &lt;a href=&quot;http://www.informationweek.com/news/mobility/reviews%20/showArticle.jhtml?articleID=208404374&amp;amp;pgno=3&amp;amp;queryText=&amp;amp;isPrev=&quot;&gt;www.informationweek.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Sierra Wireless 875U HSDPA USB Modem&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6OfCD7vHHYkBdeH8_ERcheyeaRclZjvItjVWeJKgeDUFSdrCJJBmw7E8P30VLBkL9UjwpxkwVKyWBe2zepwOo182sGMsh8ZobJue6n31D3-jA9i1V1RKFOv8lx8avnltevxFiNjwecg/s1600-h/Sierra+Wireless+875U.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 168px; height: 126px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6OfCD7vHHYkBdeH8_ERcheyeaRclZjvItjVWeJKgeDUFSdrCJJBmw7E8P30VLBkL9UjwpxkwVKyWBe2zepwOo182sGMsh8ZobJue6n31D3-jA9i1V1RKFOv8lx8avnltevxFiNjwecg/s320/Sierra+Wireless+875U.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291710704288734002&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;by:Sascha Segan&lt;br /&gt;Blaze across the virtual globe with the Sierra AirCard 875U, the fastest, most flexible way to connect your laptop PC to AT&amp;amp;T&#39;s high-speed network and to dozens of other computer systems in foreign lands. High-speed wireless connection solutions are available from three major carriers, in four different forms. You can get them from Sprint, Verizon, or AT&amp;amp;T, and they come either as chips embedded in laptops, as PC Cards, ExpressCards, or USB dongles.&lt;br /&gt;USB dongles such as the AirCard 875U are less compact than the other options, but they&#39;re a lot more flexible. Since pretty much every PC has a USB port, it&#39;s easy to move them between computers. The 875U&#39;s SIM card slot is also relatively easy to access under its front cover. This lets you move your SIM between the dongle and your phone more readily than you could with a card.&lt;br /&gt;About the size of an old-school pager, the 875U has a USB jack that pops out of the modem&#39;s body on an easy-to-release latch. Plugged into your laptop, it sits upright like a periscope, with unobtrusive green power and signal lights. There&#39;s an easy-to-access external antenna port covered by a little rubber plug on the side.&lt;br /&gt;The 875U operates with AT&amp;amp;T&#39;s standard LaptopConnect plans. One option costs $69.99 per month for unlimited use in the U.S., and the other will set you back $139.99 per month for unlimited U.S. data plus 100MB of data overseas, with additional overseas MB $5 each. Those prices are on a par with what&#39;s offered by Sprint and Verizon.&lt;br /&gt;AT&amp;amp;T&#39;s network, meanwhile, has come a long way since I first looked at it last year. AT&amp;amp;T uses HSDPA technology, which also works in dozens of countries overseas, including most of Western Europe. Over the past year, AT&amp;amp;T has extended its network to most major U.S. cities and metro areas. The current HSDPA spec allows for 3.6-Mbps downloads and 384-Kbps uploads, in theory.&lt;br /&gt;In reality, we got average speeds of just over a megabit for downloads on the 875U, with download speeds peaking at 1.63 Mbps. Uploads averaged 275 Kbps, but with a strong signal frequently hovered around 350 Kbps. That&#39;s broadband speed, although if you&#39;re used to wired or Wi-Fi broadband, you&#39;ll still feel that Web pages load slowly because of the average 240-millisecond latency on network requests. The 875U supports the 850, 1800, 1900, and 2100-MHz bands, so you&#39;ll be able to get access in Buffalo or Berlin, provided you&#39;re on the right service plan.&lt;br /&gt;When the 875U isn&#39;t in 3G range, it drops down to AT&amp;amp;T&#39;s EDGE network, which offers speeds of around 80 to 120 Kbps down. I generally don&#39;t recommend EDGE cards for laptop users for a different reason—EDGE transmissions tend to make some laptop speakers buzz annoyingly. If you&#39;re traveling primarily through EDGE country, I&#39;d recommend tethering a phone to your laptop via Bluetooth instead.&lt;br /&gt;The 875U proved faster than the competing AirCard 875 PC Card and Option GT MAX 3.6 Express in head-to-head download tests. It&#39;s also faster than older models such as the AirCard 860. The competition was tight. Of 35 downloads, the 875U was the fastest on 15 of them; the ExpressCard was faster on 14 tries. Differences in signal strength between the 875U and the Option ExpressCard were negligible.&lt;br /&gt;Rather, it&#39;s the AirCard&#39;s flexibility I like. As a USB device, it&#39;s easy to plug and unplug at will, and the SIM card slot is easier to extract cards from than on the ExpressCard. Better still, the 875U is compatible with Microsoft Windows XP, Vista, and Mac OS 10.4.9, though its driver isn&#39;t integrated into the Mac OS. You have to download a &quot;Sierra AirCard Watcher&quot; application from Sierra&#39;s Web site.&lt;br /&gt;source: &lt;a href=&quot;http://www.pcmag.com/article2/0,2817,2156458,00.asp&quot;&gt;www.pcmag.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Huawei E272&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB696NTTVFmoc0zrr0dWwBqjiEnWH8VeTtxnUmnVcMbsOYiw-XdAi8d6E3VahjMkDNhWoXZoFE6ILiCeSndS_wnKkpi3oX8wnS0u-lBTz2Hns7vA_5CFbWT8lsqAQ9OCw2law_Ua37bQ/s1600-h/272.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 98px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB696NTTVFmoc0zrr0dWwBqjiEnWH8VeTtxnUmnVcMbsOYiw-XdAi8d6E3VahjMkDNhWoXZoFE6ILiCeSndS_wnKkpi3oX8wnS0u-lBTz2Hns7vA_5CFbWT8lsqAQ9OCw2law_Ua37bQ/s320/272.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291702046378307346&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;he E272 enables uplink speeds of up to 2Mbps and download rates of 7.2 Mbps. Within HSPA network, the device will facilitate fast internet browsing, instant access and the uninterrupted ability both to upload and download data. Combining cutting edge technologies with sleek design, customers can look forward to enjoying high-speed wireless access, both at home and on the go. The plug-and-play featured devices are compatible with Windows (Vista and XP) and Mac OSX, whether run on a PC, laptop or handheld device.&lt;br /&gt;&lt;br /&gt;Benefits:&lt;br /&gt;Boost your efficiency with 14 times faster download speeds than standard 3G.&lt;br /&gt;Work more effectively with 22 times faster upload speeds than standard 3G.&lt;br /&gt;Plug and go with any laptop or desktop, including Macs.&lt;br /&gt;Enjoy seamless coverage at home and roaming abroad.&lt;br /&gt;Connect with speeds of up to 7.2Mbps.&lt;br /&gt;&lt;br /&gt;Specification:&lt;br /&gt;&lt;br /&gt;* The USB Modem works with all laptops including Macs. It can also be used with any PC.&lt;br /&gt;&lt;br /&gt;Microsoft Windows requirements:&lt;br /&gt;* Standard USB interface&lt;br /&gt;* Microsoft Windows 2000, XP or Vista&lt;br /&gt;* Microsoft Internet Explorer 5.5 or higher&lt;br /&gt;* At least 50MB free disk space and 128MB RAM&lt;br /&gt;&lt;br /&gt;Apple Mac requirements:&lt;br /&gt;* Standard USB interface&lt;br /&gt;* Optimised for Power PC based Macs and Intel based Macs&lt;br /&gt;* Mac OS X Panther 10.3.9 or higher&lt;br /&gt;&lt;br /&gt;Technical Specification:&lt;br /&gt;* 3G (UMTS/HSDPA/HSUPA) Frequency supported 2100Mhz&lt;br /&gt;* EDGE/GPRS Frequency supported 900,1800 and 1900Mhz&lt;br /&gt;* Support for USA/Canada :Yes For GPRS/EDGE at 1900MHz&lt;br /&gt;&lt;br /&gt;Auto switch frequency: YES&lt;br /&gt;WLAN network supported: NO&lt;br /&gt;Apple Mac compatible: Yes , with special VMC software for Mac OS&lt;br /&gt;&lt;br /&gt;source : &lt;a href=&quot;http://hkoffer.com/huawei-e272-p-737.html&quot;&gt;hkoffer.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Huawei E220 USB Modem&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoMQefzeraU6_ICyZ_0IJLH_CVTgXESE7GekhAN7nNBrl9JHz_y3mfoK1TAyprF8GF3poafFN7CwjDAlLaT8HeLbSNjeznGftKQcH-WtCcM2Jh9nKbLvYfgwBm4wXTfY05fN1V7ruALw/s1600-h/220.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 111px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoMQefzeraU6_ICyZ_0IJLH_CVTgXESE7GekhAN7nNBrl9JHz_y3mfoK1TAyprF8GF3poafFN7CwjDAlLaT8HeLbSNjeznGftKQcH-WtCcM2Jh9nKbLvYfgwBm4wXTfY05fN1V7ruALw/s320/220.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291702043213063826&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Been using Huawei E220 for around 1 month, I could say that this modem does its function well. No issue related to hardware. The installation process completed with auto-run in Windows Operating System, no need any installation CD, just plug the modem to any USB port and it will prompt you to start the software installation.&lt;br /&gt;The connection is stable, however it depends on your network provider as well. in my home area, around Pangkalan Jati, Kalimalang. It could run very well for nights and days, without any need of reconnection.&lt;br /&gt;This modem was launched back in 2006. Maximum speed is 3.6 Mbps, you could set this modem to use 3G only signal, or 3G prefered if you are not sure you will get a good reception of 3G signal.&lt;br /&gt;Bought it for Rp.1.450.000 in a store at ITC Kuningan Jakarta, I am surprise to see this modem sold for Rp.1.250.000 at a small computer store in Palembang .&lt;br /&gt;I use this modem along with Telkomsel Flash Unlimited Package which has virtually unlimited capacity but with limited maximum speed of 256Kbps (up to 3Gb per-month, before the speed is reduced to 64Kbps).&lt;br /&gt;Connection of max 256Kbps is quite decent for me, allows me to check web mail, update anti virus, connect to my company VPN - Virtual Private Network, and do some downloads (never yet try to download big files though). However because the speed limitation of Telkom Flash unlimited package, I have never test the maximum speed of this modem.&lt;br /&gt;I have tested this modem along with Telkomsel Flash in area of Kalimalang Jakarta (HSDPA connection - Very Good), Kuningan Jakarta (HSDPA connection - Very Good), Plaju - Palembang (HSDPA connection - not to good, some re-connection needed, sometime could not connect), Tuban - East Java (EDGE connection, but stable).&lt;br /&gt;The whole body of this modem is plastics. There is no lock on the SIM card port, so you need to be careful not to drop this modem to the floor. It might spit out your SIM Card. Also don’t step on it, I believe it will break a part.&lt;br /&gt;If you are a mobile person who need a notebook computer to work and be online, or you need a HSDPA modem which you could use on your home PC and notebook computer; and you just can’t rely on with your HSDPA smartphone for some reasons, I recommends Huawei E220.&lt;br /&gt;source :&lt;a href=&quot;http://myweathertop.wordpress.com/&quot;&gt;myweathertop.wordpress.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;NOVATEL OVATION MC930D/MC950D&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBe2mIU1yRHXaG9OumRyjXjLAMJ7cab1iEi-9zizdk0pr-qN_iH-tuTVKp593bSX_fyBaBoXOwDnUji6OgYc198EcLYQYTZdgtPNycOMEDFuGuzcm0lGSr0p5txRc-4tirO79CZmkgSA/s1600-h/hsdpa+novatel.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 225px; height: 150px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBe2mIU1yRHXaG9OumRyjXjLAMJ7cab1iEi-9zizdk0pr-qN_iH-tuTVKp593bSX_fyBaBoXOwDnUji6OgYc198EcLYQYTZdgtPNycOMEDFuGuzcm0lGSr0p5txRc-4tirO79CZmkgSA/s320/hsdpa+novatel.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291702049142460642&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Nowadays, Internet connectivity ranks high in our hectic everyday schedules, regardless of the fact that we have places to visit, people to meet, and things to get done. It’s not surprising that we’re practically as dependent on the Internet as we are on electricity. Thus, we need absolute on-the-road mobility with universal connectivity. Today we’re going to review Novatel’s Ovation MC950D HSPA mobile broadband USB modem.&lt;br /&gt;The Ovation MC950D is a 3G modem based on the latest HSUPA, HSDPA, and UMTS technologies. HSUPA stands for High-Speed Uplink Packet Access, HSDPA stands for High-Speed Downlink Packet Access, and UMTS represents Universal Mobile Telecommunications System technology. These are key technologies of 3G, which offers the most cutting-edge high performance data access speeds.&lt;br /&gt;&lt;br /&gt;resumably, the Ovation MC950D and its younger sister, the MC930D, are the world’s smallest modems. This is possible thanks to their latest innovative design, which is similar to the USB stick form factor standards. It fits comfortably in a pocket. And most importantly, backwards compatibility isn’t neglected because the modem can switch back to quad-band GPRS/EDGE 2G technologies when tri-band UMTS 3G signals aren’t reachable.&lt;br /&gt;The modem supports up to 7.2mbps downlink data access speeds and 2.1mbps uplink. The aforementioned are architectural limitations by design because these speeds are 100% dependent on carriers and network operators. This gadget doesn’t bring you the Internet “for free;” you need to sign up with a carrier for a plan or account in your area, and then you receive an UMTS HSUPA/HSDPA compatible SIM card.&lt;br /&gt;Novatel Wireless optimized this modem for North America, Europe, and Japan, but technically worldwide support is possible as long as there is the necessary network coverage on the supported bands. It is platform independent so it works fine on Microsoft Windows, MAC OSX, UNIX, and Linux operating systems.&lt;br /&gt;There are lots of network partners that are selling the Ovation MC950D modem. More often than not, these partners are network operators and, therefore, you can also sign up with them right away. For this review, the modem was acquired through Vodafone so it sports the “Vodafone” logo instead of Novatel Wireless. The red SIM card is also from Vodafone.&lt;br /&gt;Nevertheless, we can’t continue before examining its price. The Ovation MC950D is available for around £159.80, €210, and US$320 at the time of writing. Sure, it’s not a bargain, but you need to pay the price for innovation and universal connectivity. Additionally, the plans can go up to €30 per month, but mostly this depends on features - whether it’s unlimited or not, your area, how the network looks there, etc.&lt;br /&gt;source : &lt;a href=&quot;http://www.devhardware.com/c/a/Networking-Hardware/Novatel-Wireless-Ovation-MC950D-USB-HSPA-Modem&quot;&gt;www.devhardware.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Sierra Wireless&#39; Compass 597&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZzU6eUPorUPy55eNsuSowjaVzSRVemGnWxflZEXcmzcEIOhPhsBmR53kTQ3ctvZhltNo8RgKgDHKS-qy_zS4HtH2nk-UW8CZKqXQ1W4MWbjzCuTXFfZK7reF2AD84_A45T6AUN7noRg/s1600-h/images.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 82px; height: 125px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZzU6eUPorUPy55eNsuSowjaVzSRVemGnWxflZEXcmzcEIOhPhsBmR53kTQ3ctvZhltNo8RgKgDHKS-qy_zS4HtH2nk-UW8CZKqXQ1W4MWbjzCuTXFfZK7reF2AD84_A45T6AUN7noRg/s320/images.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291711424097671826&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Unlike its older brother, the AirCard 881U, the Sierra Wireless Compass 597 is an attractive addition to any computer. Better yet, the company&#39;s smallest USB modem offers a fully equipped device that easily outshines other Sierra Wireless products and competes admirably with the Novatel USB727. And with a beautiful black finish and an attractive light on the end to tell you it&#39;s in use, you won&#39;t be put off by this modem&#39;s looks.&lt;br /&gt;The Compass 597&#39;s installation on my MacBook was quick and easy. In a matter of seconds, I popped the modem into my computer, installed the software, restarted my computer, and connected toSprint (NYSE: S)&#39;s Mobile Broadband Network without a hiccup. Much like the Novatel USB727, the installation process was seamless. But no disc was required to install the software. Instead, the Compass 597 has all drivers and software already installed on it, which speeds and simplifies installation.&lt;br /&gt;While connected to Sprint&#39;s Mobile Broadband Network, Google loaded quickly and detailed sites like ESPN popped up at an adequate, but noticeably slower speed than the load times I witnessed on Verizon&#39;s BroadbandAccess and AT&amp;amp;T&#39;s 3G network. According to Speedtest.net, I achieved speeds of about 875 kbps down and 300 kbps up.&lt;br /&gt;The Compass 597 uses Sprint&#39;s SmartView software, which is easily the best package on the market and much better than the tools I used on the other modems. Aside from GPS tracking and the ability to search points of interest in your area, the tool also allows you to test upload and download times, get an updated view of Sprint&#39;s Broadband coverage map, manage your Sprint account, and access the company&#39;s Digital Lounge service.&lt;br /&gt;Sprint&#39;s Digital Lounge allows you to buy anything from screensavers for your phone, to music, TV, and games. Even though most of the content is too expensive to justify a purchase, it&#39;s nice to have the option.&lt;br /&gt;The Sierra Wireless Compass 597 is a fine USB modem that won&#39;t take up too much room in your pocket, nor look too foolish hanging off the side of your computer. And with a fantastic software package, it&#39;s not a bad idea to pick this one up -- if you don&#39;t mind spending $100 (after rebate) for the modem plus $60 per month for 5 GB of data.&lt;br /&gt;source : &lt;a href=&quot;http://www.informationweek.com/news/mobility/reviews%20/showArticle.jhtml?articleID=208404374&amp;amp;pgno=3&amp;amp;queryText=&amp;amp;isPrev=&quot;&gt;www.informationweek.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;VODAFONE HUAWEI E172&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0xI3fGgpyenBDLSh8pr2LIxKxxsX40-V-Ih6wKA8bzvIYkbgZ3bFr86dcAT50dy7WwznVNgiSWTDy6_vy1CT-SsOFlxfPYXC6hsvDdyuCa5AzeTkpAVVJyorhRMgMCPT8CZOXV61VFg/s1600-h/vodavone.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 120px; height: 120px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0xI3fGgpyenBDLSh8pr2LIxKxxsX40-V-Ih6wKA8bzvIYkbgZ3bFr86dcAT50dy7WwznVNgiSWTDy6_vy1CT-SsOFlxfPYXC6hsvDdyuCa5AzeTkpAVVJyorhRMgMCPT8CZOXV61VFg/s320/vodavone.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291710700216920018&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Vodafone has partnered with Chinese telecoms equipment maker Huawei to create a USB 3G modem the size of a flash drive, but still capable of accessing HSUPA mobile data networks.&lt;br /&gt;&lt;br /&gt;The mobile broadband USB modem stick, the Huawei E172, is Vodafone&#39;s smallest ever plug-and-play device and significantly smaller than any previous data card or 3G modem it has offered. It is compatible with Windows (Vista and XP) as well as Mac OS X.&lt;br /&gt;&lt;br /&gt;Vodafone will offer the stick alongside its existing, E220 USB modem which was released last year. &quot;They are exactly the same inside,&quot; said Vodafone spokeswoman Bryony Clow. &quot;It&#39;s just that the E172 has a smaller form factor. We are looking to sell both as the different forms will appeal to different people. We&#39;ll be pushing the stick, but the modem will be available as well.&quot;&lt;br /&gt;&lt;br /&gt;The E172 supports uplink speeds of up to 1.44Mb/sec and download rates of 7.2 Mb/sec, which they claim is theoretically 14 times the speed of standard 3G. However, the 7.2Mb service is currently only supported within Central London and at certain UK airports. This will increase as Vodafone continues the rollout of HSUPA to the rest of its 3G network.&lt;br /&gt;&lt;br /&gt;&quot;Vodafone was the first to improve download speeds with HSPDA, the first to increase upload speeds with HSPUA. And now we&#39;re pushing the boundaries of usability even further with a compact modem design,&quot; said Kyle Whitehill, enterprise director at Vodafone.&lt;br /&gt;&lt;br /&gt;The mobile broadband market is getting more competitive, with network operators cutting prices and adding value to service plans to entice both consumer and business customers. Last week IT PRO reported that Carphone Warehouse and mobile network 3 had joined forces to offer a £35-a-month bundle comprising a mobile broadband service, bundled text messages and a Dell laptop.&lt;br /&gt;source :&lt;a href=&quot;http://www.itpro.co.uk/155391/vodafone-and-huawei-launch-3g-usb-stick&quot;&gt;www.itpro.co.uk&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/381293205811432360/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/top-review-hsdpa-modem.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/381293205811432360'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/381293205811432360'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/top-review-hsdpa-modem.html' title='Top review of HSDPA Modem'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpWNx5JJunnVa5FqIWlGBJkSGWJazoTWxSlvCOXJs2QzvjzfJknJrZpRGbTl1EgcO0YTKZPlyUdTfC0nggaVKOC_w0P5MocbZWEV2XPFpnfoNBkzD7g_UBUTxG5pzxJquY8DtI7SdqA/s72-c/Sierra881U.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-6123169111458756938</id><published>2009-01-14T21:02:00.001-08:00</published><updated>2009-01-14T21:15:21.145-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="3G"/><category scheme="http://www.blogger.com/atom/ns#" term="EDGE"/><category scheme="http://www.blogger.com/atom/ns#" term="GPRS"/><category scheme="http://www.blogger.com/atom/ns#" term="GSM"/><category scheme="http://www.blogger.com/atom/ns#" term="HSDPA"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><title type='text'>Guide to GSM, GPRS, 3G, EDGE, HSDPA</title><content type='html'>It can be confusing trying to understand the differences between the various mobile connectivity options listed in the specifications of smartphones and touted by the mobile networks as the best way to connect to the internet. In this guide we will try to summarise these technologies and point out the advantages and disadvantages of each technology. &lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;p style=&quot;font-weight: bold;&quot;&gt;GSM&lt;/p&gt;&lt;p&gt;GSM (Global system for mobile communications) is the standard by which the vast majority of mobile handsets work in Europe and is becoming dominant in other parts of the world with over 2 billion people currently using the system. When you purchase a mobile or smartphone it is important to understand what frequencies are used by each technology because manufacturers and networks have a tendency to quote these figures with little explanation as to what they mean.&lt;/p&gt; &lt;p&gt;The majority of GSM networks use 900MHz and 1800MHz but in the US the 850MHz and 1900Mhz are prominent. If these are quoted the phone will be classed as a tri-band phone and can be used in Europe, the US and many other territories (provided your SIM is enabled). If you require mobile access in the Far East and areas such as Scandanavia you will need to check with your mobile provider because at the minimum a quad-band phone will be required and in some areas only a phone purchased in the country will work.&lt;/p&gt; &lt;p&gt;Most GSM phones are primarily used for voice but can be used for mobile internet access via the GPRS Core Network.&lt;/p&gt; &lt;p style=&quot;font-weight: bold;&quot;&gt;GPRS&lt;/p&gt; &lt;p&gt;GPRS is a system used to transmit data at speeds of up to 60 kbits per second and is a battery friendly way to send and receive emails and to browse the internet but in these days of broadband connectivity it will be seen as slow by some. To set up GPRS connections on your smartphone you will need to obtain specific information from your mobile provider to input into your phone. Most are happy to provide this information and some manufacturers such as Nokia offer pre-configured files that you can install onto your phone for your network. &lt;/p&gt; &lt;p&gt;GPRS is a tried and tested system and is therefore very reliable for standard mobile data use and will suit people with moderate data needs. Once you have the required settings in place you can use the network whenever you like and it requires no further adjustment as it works in the background of your internet enabled applications.&lt;/p&gt; &lt;p style=&quot;font-weight: bold;&quot;&gt;EDGE&lt;/p&gt; &lt;p&gt;EDGE (Exchanged Data rates for GSM Evolution) is a recent development based on the GPRS system and has been classified as a &#39;3G&#39; standard due to the fact that it can run at up to 473.6 kbits per second. If a smartphone is EDGE compliant it can be used for heavy mobile data transmission such as receiving large email attachments and browsing complex web pages at great speed. To use EDGE cell sites must be modified to accept transmissions of this type so coverage can be patchy in certain areas- it is a technology well worth having built in to any smartphone though.&lt;/p&gt; &lt;p style=&quot;font-weight: bold;&quot;&gt;3G&lt;/p&gt; &lt;p&gt;3G was initially marketed as a way to make video calls on the mobile network but is also a highly efficient way of browsing the internet and communicating on your smartphone using voice over IP and by email and instant messaging. Most UK and some European networks now have 3G networks and with speeds similar to EDGE it is fast becoming a common way to connect while on the road.&lt;/p&gt; &lt;p&gt;In areas where 3G coverage is poor the handset will constantly try to find a 3G signal and this can have a dramatic affect on battery life. Some phones handle constant 3G enablement well but some can have their battery life reduced by up to 50% so it is worth checking that your potential purchase is able to cope with this. At this time though 3G has good coverage and enables high speed internet access from your phone and is fast becoming a standard for mobile connectivity. &lt;/p&gt; &lt;p style=&quot;font-weight: bold;&quot;&gt;HSDPA&lt;/p&gt; &lt;p&gt;HSDPA (High speed Downlink Packet Access) is a technology based on the 3G network which can support speeds of up to 7.2 mbits per second. In reality you will most likely get a top speed of around 3 mbits but this is useful for mobile TV streaming and other high end data transmissions. To use HSDPA your phone must be able to support the technology and of course you will need to be located within range of a cell site that has been upgraded to offer the service.&lt;/p&gt; &lt;p&gt;&lt;br /&gt;The key to all of these technologies is to understand what your typical usage will be and which of the above suit your needs. It could also be worth future proofing your needs because well connected devices often cost little more than phones with basic connectivity.&lt;/p&gt;&lt;p&gt;source : &lt;a href=&quot;http://www.clove.co.uk/viewTechInfo.aspx?Content=3B2BD491-6465-4C70-ABDB-5A12A06C3D8D&amp;amp;Category=TECHINFO&quot;&gt;www.clove.co.uk&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/6123169111458756938/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/guide-to-gsm-gprs-3g-edge-hsdpa.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6123169111458756938'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6123169111458756938'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/guide-to-gsm-gprs-3g-edge-hsdpa.html' title='Guide to GSM, GPRS, 3G, EDGE, HSDPA'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-5615971344346519217</id><published>2009-01-14T20:22:00.000-08:00</published><updated>2009-02-09T03:09:09.094-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="3G"/><category scheme="http://www.blogger.com/atom/ns#" term="4G"/><category scheme="http://www.blogger.com/atom/ns#" term="bandwidth"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>2.5G, 3G, 3.5G and 4G technology</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What is 4G? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4G takes on a number of equally true definitions, depending on who you are talking to. In simplest terms, 4G is the next generation of wireless networks that will replace 3G networks sometimes in future. In another context, 4G is simply an initiative by academic R&amp;amp;D labs to move beyond the limitations and problems of 3G which is having trouble getting deployed and meeting its promised performance and throughput. In reality, as of first half of 2002, 4G is a conceptual framework for or a discussion point to address future needs of a universal high speed wireless network that will interface with wireline backbone network seamlessly. 4G is also represents the hope and ideas of a group of researchers in Motorola, Qualcomm, Nokia, Ericsson, Sun, HP, NTT DoCoMo and other infrastructure vendors who must respond to the needs of MMS, multimedia and video applications if 3G never materializes in its full glory.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Motivation for 4G Research Before 3G Has Not Been Deployed?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;      3G performance may not be sufficient to meet needs of future high-performance applications like multi-media, full-motion video, wireless teleconferencing. We need a network technology that extends 3G capacity  by an order of magnitude. &lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    There are multiple standards for 3G making it difficult to roam and interoperate across networks. we need global mobility and service portability&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;3G is based on primarily a wide-area concept. We need hybrid networks that utilize both wireless LAN (hot spot) concept and cell or base-station wide area network design. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;We need wider bandwidth&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Researchers have come up with spectrally more efficient modulation schemes that can not be retrofitted into 3G infrastructure&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    We need all digital packet network that utilizes IP in its fullest form with converged voice and data capability. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Comparing Key Parameters of 4G with 3G&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;                        &lt;center&gt;             &lt;/center&gt;               &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: 0px;&quot; width=&quot;80%&quot; bgcolor=&quot;#cccccc&quot; border=&quot;0&quot; bordercolor=&quot;#2f4d74&quot; cellspacing=&quot;1&quot;&gt;&lt;tbody&gt;&lt;tr&gt;                 &lt;td width=&quot;27%&quot;&gt;&lt;br /&gt;&lt;/td&gt;                 &lt;td width=&quot;36%&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;b&gt;3G                   (including 2.5G, sub3G)&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;                 &lt;td width=&quot;37%&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;b&gt;4G&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;               &lt;/tr&gt;               &lt;tr&gt;                 &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Major Requirement                   Driving Architecture &lt;/span&gt;&lt;/td&gt;                              &lt;td width=&quot;36%&quot; align=&quot;center&quot;&gt;                 &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Predominantly voice                 driven - data was always add on&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot; align=&quot;center&quot;&gt;                 &lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Converged data and                 voice over IP&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Network Architecture&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Wide area cell-based&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Hybrid - Integration                 of Wireless LAN (WiFi, Bluetooth) and wide area&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Speeds&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;384 Kbps to 2 Mbps&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;20 to 100 Mbps in                 mobile mode&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Frequency Band&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Dependent on country                 or continent (1800-2400 MHz)&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Higher frequency bands                 (2-8 GHz)&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Bandwidth&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;5-20 MHz&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;100 MHz (or more)&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Switching Design Basis&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Circuit and Packet&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;All digital with                 packetized voice&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Access Technologies&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;W-CDMA, 1xRTT, Edge&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;OFDM and MC-CDMA (Multi                 Carrier CDMA)&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Forward Error                 Correction&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Convolutional rate                 1/2, 1/3&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Concatenated coding                 scheme&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Component Design&lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Optimized antenna design,                 multi-band adapters &lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Smarter Antennas, software                 multiband and wideband radios&lt;/span&gt;&lt;/td&gt;             &lt;/tr&gt;             &lt;tr&gt;               &lt;td width=&quot;27%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;IP &lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;36%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;A number of air link                 protocols, including IP 5.0 &lt;/span&gt;&lt;/td&gt;               &lt;td width=&quot;37%&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;All IP (IP6.0)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What is needed to Build 4G Networks of Future?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A number of spectrum allocation decisions, spectrum standardization decisions, spectrum availability decisions, technology innovations, component development, signal processing and switching enhancements and inter-vendor cooperation have to take place before the vision of 4G will materialize. We think that 3G experiences - good or bad, technological or business - will be useful in guiding the industry in this effort. We are bringing to the attention of professionals in telecommunications industry following issues and problems that must be analyzed and resolved:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    Lower Price Points Only Slightly Higher than Alternatives - The business visionaries should do some economic modeling before they start 4G hype on the same lines as 3G hype. They should understand that 4G data applications like streaming video must compete with very low cost wireline applications. The users would pay only a delta premium (not a multiple) for most wireless applications.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    More Coordination Among Spectrum Regulators Around the World - Spectrum regulation bodies must get involved in guiding the researchers by indicating which frequency band might be used for 4G. FCC in USA must cooperate more actively with International bodies like ITU and perhaps modify its hands-off policy in guiding the industry. When public interest, national security interest and economic interest (inter-industry a la TV versus Telecommunications) are at stake, leadership must come from regulators. At appropriate time, industry builds its own self-regulation mechanisms.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    More Academic Research: Universities must spend more effort in solving fundamental problems in radio communications (especially multiband and wideband radios, intelligent antennas and signal processing.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    Standardization of wireless networks in terms of modulation techniques, switching schemes and roaming is an absolute necessity for 4G.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;      A Voice-independent Business Justification Thinking: Business development and technology executives should not bias their business models by using voice channels as economic determinant for data applications. Voice has a built-in demand limit - data applications do not.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Integration Across Different Network Topologies: Network architects must base their architecture on hybrid network concepts that integrates wireless wide area networks, wireless LANS (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.15 and IEEE 802.16, Bluetooth with fiber-based Internet backbone. Broadband wireless networks must be a part of this integrated network architecture.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Non-disruptive Implementation: 4G must allow us to move from 3G to 4G. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;fullpost&quot; style=&quot;font-size: 100%;&quot;&gt;source : &lt;a href=&quot;http://www.mobileinfo.com/3g/4gvision&amp;amp;technologies.htm&quot;&gt;www.mobileinfo.com &lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/5615971344346519217/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/25g-3g-35g-and-4g-technology.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5615971344346519217'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5615971344346519217'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/25g-3g-35g-and-4g-technology.html' title='2.5G, 3G, 3.5G and 4G technology'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-8619981330186466398</id><published>2009-01-14T16:00:00.000-08:00</published><updated>2009-01-14T16:42:15.028-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="router"/><title type='text'>Router Review</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;This posting discuss about router. Many router product on the world. We never know what the peformance of it. So I compare routers review. The compare product is Linksys WRT56GS, Netgear &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;WGT624&lt;/span&gt;, &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;D-Link DI624&lt;/span&gt;, &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Dell Wireless 2300, &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Microsoft MN-700&lt;/span&gt;, and &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Buffalo AirStation WLA-G54&lt;/span&gt;. I hope you can choose the best router after read it.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;Linksys WRT54GS&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;review by: Xiao Ming Wu&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioSCzRQd9sfVnafBwsQV6X5h5Ed8pOr_DV9_kysi1gnxwmd-2RLWCJGUWEODzwUVlYNLFZVjDRgSzN2xCu2hV8iW7NbgvPQ3mfZP16Az-YwF1Yr1WgpdoJwDu8NWRscklwMEl5x023mA/s1600-h/linksys.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 135px; height: 123px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioSCzRQd9sfVnafBwsQV6X5h5Ed8pOr_DV9_kysi1gnxwmd-2RLWCJGUWEODzwUVlYNLFZVjDRgSzN2xCu2hV8iW7NbgvPQ3mfZP16Az-YwF1Yr1WgpdoJwDu8NWRscklwMEl5x023mA/s320/linksys.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291308703633473954&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Editors&#39; note: The rating and/or Editors&#39; Choice designation for this product has been altered since the review&#39;s original publication. The reason for this is simply the general improvement of technology over time. In order to keep our ratings fair and accurate, it&#39;s sometimes necessary to downgrade the ratings of older products relative to those of newer products. (12/9/04) The Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster makes it easy to set up a typical home or office network, and it comes with all the documentation you need to get it up and running. It touts a wealth of advanced networking and security features, and it&#39;s fast, especially in networks with both 802.11g and 802.11b connections.The illustrated Fast Start guide for the Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster walks you through the basic setup, which includes connecting the router to your computer and broadband modem, configuring all the computers on the network to work with the router, and configuring the router. The Fast Start guide is more thorough than others we&#39;ve seen, with plenty of images and screenshots illustrating the setup process. We were glad to see brief explanations of basic networking terms, such as the difference between static and dynamic IP addressing and what to do if your DSL provider uses PPPoE.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The guide also describes how to connect to the WRT54GS&#39;s browser-based configuration tool if you need to tweak the router&#39;s configuration--for example, to supply the router with a static IP address. No quick-setup guide can cover all possible networking scenarios, but Linksys&#39;s step-by-step guide does an excellent job rounding up the usual suspects and making it easy for most homes and small offices to set up a network in a few minutes. In most cases, you need only to plug in the router and connect the cables. For more complicated setups, Linksys includes a thorough user guide detailing the WRT54GS&#39;s diverse features.Although the Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster is easy to set up, you&#39;ll find a number of advanced features and configuration options under the hood. The Linksys WRT54GS&#39;s browser-based configuration tool gives you access to the router&#39;s networking and security settings, such as DHCP server and client settings, firewall settings, and wireless encryption settings. The router also comes with two types of firewalls. One is a Stateful Packet Inspection (SPI) firewall that makes sure packets are part of a legitimate connection; the other is a NAT firewall that effectively hides computers behind the router. You can lock your network down even tighter by configuring the router to block services such as FTP and Telnet. A DMZ function located on the configuration tool&#39;s Applications and Gaming tab lets you place one computer outside the firewall, which can be useful for Internet gaming and videoconferencing. The Linksys WRT54GS also lets you set up access-control policies that grant Internet access to specific computers on your network at predetermined times of day and days of the week. If you telecommute, the router&#39;s VPN pass-through support will help get you to work.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Linksys WRT54GS router also has good wireless security. You can configure it to use WEP or WPA. WPA is stronger than WEP, but it&#39;s important to have both options, because you may want to connect to older 802.11b devices that lack WPA support. We also like that you can turn off the beacon on the WRT54GS&#39;s integrated 802.11g access point. This helps protect you from uninvited guests by stopping the access point from advertising its presence to the world.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Linksys WRT54GS router comes with removable antennas, giving you the option of attaching high-gain antennas to the unit to increase its range. Our only gripe was that the router lacks a mounting bracket.The Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster is one of a growing number of wireless routers touting proprietary speed enhancements. Like the D-Link DI-624 and the Netgear WGT624, the WRT54GS SpeedBooster router includes a technology (in this case, Broadcom&#39;s Afterburner) that substantially increases wireless network performance. The enhancements kick in only if all the devices on the network are playing by the same proprietary rules; otherwise, the device scales down to standard 802.11g speeds. We think that this limitation makes the SpeedBooster enhancement (and similar Turbo or Super-G offerings from vendors such as D-Link and Netgear) more of a marketing gimmick than a significant feature.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Proprietary solutions depend on networks molded out of homogenous gear, limiting your purchase choices and tying you to a single vendor. On the other hand, the Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster does a fine job supporting standards-based equipment from other vendors, even older 802.11b gear. In CNET Labs&#39; mixed-mode tests, which measure throughput when both 802.11g and 802.11b transmissions occur simultaneously, the WRT54GS delivered the fastest speeds we&#39;ve seen, clocking in at 25.8Mbps. The Linksys also went the distance, stretching as far as 200 feet in our range tests.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Netgear WGT624&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;review by: Allen Fear&lt;/span&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk7-44HrIvb9NaG2TFLXFUe4xHf8hTbKaSQ6ZuV67h1j1vO4DRu4N1EWTKhGPPjeePOP_Tbl32XhU0jFWKvAQoWSLHuVujzrbDnurFyV8YuShhr6NQaT0xAudLXFB3crr6plyUFAlHoA/s1600-h/router1.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 130px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk7-44HrIvb9NaG2TFLXFUe4xHf8hTbKaSQ6ZuV67h1j1vO4DRu4N1EWTKhGPPjeePOP_Tbl32XhU0jFWKvAQoWSLHuVujzrbDnurFyV8YuShhr6NQaT0xAudLXFB3crr6plyUFAlHoA/s320/router1.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291310050044056050&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;The Netgear WGT624 108Mbps wireless firewall router is a good example of the advantages and disadvantages of bleeding-edge technology. It offers nearly double the throughput of standard 802.11g devices and increased range to boot. Plus, the WGT624&#39;s fast throughput over distance combined with its support for portions of the 802.11e draft standard make it well suited for streaming media over your wireless connection. Other advanced features, such as an SPI firewall and support for Dynamic DNS, make the WGT624 a good choice for techies who are looking for a high-performance wireless router and are willing to perform an occasional firmware upgrade. (Netgear has already released one firmware upgrade for the router that fixes some bugs and enhances performance.) If the idea of router maintenance doesn&#39;t appeal to you, consider the Dell Wireless 2300, which lacks the speed of the WGT624 but is easier to set up, or the Microsoft MN-700, which automatically checks for firmware upgrades.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Netgear WGT624 108Mbps wireless firewall router comes with all the hardware and software you&#39;ll need to set up your network. In addition to the router, the product package contains an AC power adapter, a rubber stand, an Ethernet cable, a printed installation guide, and a CD containing a comprehensive reference manual.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;We like the compact design of the WGT624. The router&#39;s rubber stand and built-in mounting bracket on the bottom panel help you position the device for optimum range. The LEDs on the front of the unit let you monitor data passing across the WGT624&#39;s Ethernet and wireless interfaces. Plug the router in, connect it via the Ethernet cable to your broadband modem, and you&#39;ve installed the WGT624 hardware.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The network installation is a little less straightforward, and the printed guide may leave some in the lurch. The guide asks you to manually reconfigure the network settings of each computer if necessary, then it refers you to an online resource to learn how to do this. In contrast, the Dell Wireless 2300 and the Microsoft MN-700 include software that automatically configures the network settings for the router and any connected computers, making these instruments better suited for those new to networking. After you connect the WGT624 to your local network, the router&#39;s browser-based Smart Wizard automatically detects the type of Internet service you have and directs you through the rest of the installation.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Netgear WGT624 108Mbps wireless firewall router has a good feature set that meets the needs of both advanced users and those with little or no networking experience. The WGT624&#39;s browser-based configuration tool is easy to navigate and offers features tailored for family networking. The tool is password-protected and includes a content-filtering section that gives you control over the types of sites your computers can access, letting you restrict access based on keywords, service types, IP addresses, and times of day. The WGT624 also displays detailed logs of the Web sites that your computers have accessed or attempted to access, which lets you police the types of traffic passing through your network.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The router includes two different types of firewalls: network address translation (NAT), which hides your computers&#39; IP addresses behind the router&#39;s IP address, and stateful packet inspection (SPI), which checks individual data packets to make sure they are part of a legitimate connection. Together, these firewalls provide strong security against most attacks originating from the Internet. The WGT624 also supports WEP and the stronger WPA encryption scheme.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;We wish that the WGT624 supported wireless distribution system (WDS). Limited range is a problem for many home networking environments, and WDS makes it easy to expand your coverage area by simply adding a repeater, such as the Buffalo WLA-G54C, to rooms where your signal is weak.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The WGT624 has other performance enhancers under the hood that make it especially well suited for streaming media. Portions of the 802.11e draft specification are built into the router&#39;s firmware. These new features ensure that streaming media applications, such as the voice and video links in a teleconference, aren&#39;t interrupted by a simple file transfer. This means that you can participate in the teleconference over your wireless connection and download data from the Internet without suffering degradation in the audio or video quality of the links.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The most noteworthy feature of the Netgear WGT624 108Mbps wireless firewall router is its inclusion of Super G Technology (link is a PDF file), which boosts the router&#39;s speed to nearly twice the tempo of standard 802.11g devices&#39;. A recent firmware upgrade allows the router to switch dynamically to support standard 802.11g and 802.11b devices when they enter the network. CNET Labs tested the router&#39;s throughput with various adapters concurrently, and the results are impressive. The WGT624 ran circles around the U.S. Robotics USR8054. Better yet, the Netgear router delivered fantastic range in our indoor tests, providing stable connections as far as 225 feet away.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;D-Link DI624&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Review By: Allen Fear&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJnsDea86e7q8mtaLRf90JTDmyVZWL_DmvkASEjzI226yzSpivtfaGWOlFxpuqEH4IjJKnJE6SFLmWKmoy2Z2C08qkRIY_shxUefuypl7H25AeUwKpyw9zR2OeUKRRoZ4PIcEI5xrNIQ/s1600-h/dlink.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 116px; height: 124px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJnsDea86e7q8mtaLRf90JTDmyVZWL_DmvkASEjzI226yzSpivtfaGWOlFxpuqEH4IjJKnJE6SFLmWKmoy2Z2C08qkRIY_shxUefuypl7H25AeUwKpyw9zR2OeUKRRoZ4PIcEI5xrNIQ/s320/dlink.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291308706062716706&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Editor&#39;s note: The rating and/or Editors&#39; Choice designation for this product has been altered since the review&#39;s original publication. The reason for this is simply the general improvement of technology over time. In order to keep our ratings fair and accurate, it&#39;s sometimes necessary to downgrade the ratings of older products relative to those of newer products. (12/14/04)&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;When we first reviewed the D-Link DI-624 AirPlus Xtreme G router a year ago, we were unimpressed, but that was then, and this is now. The new DI-624 is about half the size of the original and twice as fast. It also comes with an improved quick-installation guide, a more comprehensive manual, stronger security features, and an excellent support package that includes a long, three-year warranty. Few routers are as easy to set up as the DI-624, but if the thought of typing an IP address into your browser&#39;s address bar makes you sweat, then consider the less powerful but easier to use, Microsoft MN-700. On the other hand, if you&#39;re looking for a fast router with excellent range and a bushel of features, such as a configurable firewall, parental controls, top-notch wireless security, and VPN pass-through support, then look no further. With a current street price of about $70, the DI-624 is a great buy for both home and small office networks.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;For a router with such an advanced feature set, the D-Link DI-624 AirPlus Xtreme G router is easy to set up. The package includes everything you&#39;ll need: the router; a CD-ROM containing a manual and warranty info; an Ethernet cable; and a 5V DC power adapter. The new DI-624 is compact, about the size of a medium-size paperback, and its bottom panel doubles as a mounting bracket, making it easy to attach to a wall or the ceiling. Unfortunately, the DI-624 doesn&#39;t come with a stand for vertical positioning, which is a feature we like in the Netgear WGT624.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The hardware setup is a snap, literally. Connect the DI-624 to your broadband modem with the cable that came with your modem, use the Ethernet cable in the package to connect the router to your computer, and you&#39;re done.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Although D-Link doesn&#39;t offer an automated configuration routine like the one you&#39;ll find with the Dell Wireless 2300 and the Microsoft MN-700, the DI-624&#39;s network setup is about as easy as it gets; it&#39;s one of the smoothest setup routines we&#39;ve seen. The printed quick-installation guide walks you through every step of the installation process, with screen shots and instructions for both Mac OS X and Windows XP that show you how to connect to the DI-624&#39;s browser-based configuration tool. The browser-based tool itself includes a five-step setup wizard that automatically detects your Internet connection and configures security for your wireless network. The explanations and instructions in the printed quick-installation guide seamlessly complement the wizard, addressing each step in the process.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The D-Link DI-624 AirPlus Xtreme G router is chock-full of features for both homes and small offices. Auto MDI/MDIX ports in the router&#39;s Ethernet switch eliminate the need for costly crossover cables and make the DI-624 easy to connect to other hubs and switches. The router also comes with a removable antenna, so you can expand your coverage area by adding an antenna. The router also features parental controls that include URL filtering, domain blocking, and access scheduling by day of the week and time of day. If you play games over the Internet, you can use the DI-624&#39;s special gaming mode, which adjusts the firewall to allow for network entertainment. For connections that demand even less restrictive access, such as videoconferencing, you can use the router&#39;s DMZ feature, which lets you place a single computer outside the router&#39;s firewall. If you telecommute, the DI-624 also supports VPN pass-through for both PPTP and IPSec.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;With a firewall that is more configurable than most we&#39;ve seen, the DI-624&#39;s security is top-notch for a consumer router. You can turn the firewall on and off, a feature missing from the Microsoft MN-700 and one that can be important for troubleshooting and allowing certain types of connections. You can also create a list of rules that let you allow or deny specific types of traffic between your internal network and the Internet. For example, you can block UDP traffic from the Internet targeted for a specific port on one of your computers.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The DI-624 heaps on wireless security features. The router supports not only 64- and 128-bit WEP encryption, but also WPA and ironclad 802.1x authentication via a RADIUS server.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The D-Link DI-624 AirPlus Xtreme G router is one of the best-performing routers we&#39;ve seen. Like the Netgear GT624, the D-Link DI-624 comes equipped with an Atheros AR5002 chipset, the secret to its blazing throughput and great range. If you already have a DI-624, you can upgrade the router&#39;s firmware to the latest version to take advantage of the new performance enhancements. The so-called 108Mbps firmware is currently available only for DI-624s with a label on the bottom that reads &quot;H/W Ver.:C1.&quot;&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;At close range, the DI-624 clocked in at 44.4Mbps. That&#39;s about twice as fast as a typical 802.11g router and just under the Netgear WGT624&#39;s speed of 47.1Mbps. The DI-624 also matched the WGT624 in range, surpassing other 802.11g performers with a record-setting 225 feet. We were less impressed with the DI-624&#39;s performance in a mixed environment with 802.11b devices. Here, the router was able to eke out only 11.6Mbps at close range, noticeably less than the 18.2Mbps demonstrated by the Dell Wireless 2300.&lt;/span&gt;  &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Dell Wireless 2300&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Rreview By: Patrick Unnold&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBL1u7PYVL2yRT2vboOFyuyptbvFc1cCnqgM1XsvqMsRoCv1-JhV-2rotTnY7IhTjsMr3oUqJdDTl1k_9uYTRfB0HbpQ99GpLJIvZ6fHIXTe3pc3UjFTk3sDSLu4Zo7eOO0Ark87eeyg/s1600-h/dell.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 111px; height: 83px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBL1u7PYVL2yRT2vboOFyuyptbvFc1cCnqgM1XsvqMsRoCv1-JhV-2rotTnY7IhTjsMr3oUqJdDTl1k_9uYTRfB0HbpQ99GpLJIvZ6fHIXTe3pc3UjFTk3sDSLu4Zo7eOO0Ark87eeyg/s320/dell.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291308701930839410&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Editors&#39; note: The rating and/or Editors&#39; Choice designation for this product has been altered since the review&#39;s original publication. The reason for this is simply the general improvement of technology over time. In order to keep our ratings fair and accurate, it&#39;s sometimes necessary to downgrade the ratings of older products relative to those of newer products.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Dell&#39;s Wireless 2300 broadband router offers superior performance and a well-rounded feature set suited for the home user. Windows 2000 and XP users, as well as novices, will like the streamlined installation, which nearly runs itself (other operating systems are supported, but not as seamlessly). The Wireless 2300 supports both 802.11b and 802.11g and touts an excellent array of security options, including WPA, WEP, SSID blocking, stateful packet inspection (SPI) firewall, and parental controls. You can also link the router to two additional Wireless 2300 routers to increase your 802.11g coverage area. This is the most polished 802.11g router we have seen to date.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The initial setup of the Wireless 2300 is simple and quick, especially for those with Windows 2000 or XP systems. Inserting the accompanying CD starts the Setup Wizard. After a quick scan of your network, the Setup Wizard automatically configures the settings for both your computer and the Wireless 2300. With the Setup Wizard making all of the networking changes for us, we connected quickly and were surfing within just a few minutes. The process takes a bit longer with other OSs, but the included user guide walks you through the process.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Changing the router&#39;s configuration requires the Web-based configuration tool; unfortunately, it&#39;s a little convoluted. For example, the Setup Wizard warns you to lock down the wireless network by changing the SSID, enabling WEP or WPA, and turning off SSID broadcasts. The first two items are easily found in the Basic section of the configuration tool, but users must make their way to the wireless settings of the Advanced section to turn off SSID broadcasts.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Wireless 2300 is packed with features and security, and it supports 802.11g and boasts an eye-pleasing exterior design. The sleek, silver-and-black chassis has wall-mounts built into its base. The clearly labeled indicator lights show activity for the Internet connection, each of the four ports on the built-in 10/100 switch, and the wireless LAN.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Wireless 2300 offers the latest in security options for wireless networking. It supports the new WPA encryption scheme as well as the older 64/128-bit WEP standard. There&#39;s no support for 802.1x authentication, but the router does offer an expansive MAC address feature that can be applied to all clients of the Wireless 2300, whether wired or wireless. Stateful Packet Inspection, NAT, packet filtering, and intruder-detection alerts offer a high level of Internet security.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Additional security features include port forwarding, which allows for both a DMZ computer and the forwarding of specific packets to specific computers. The well-rounded parental-control feature lets you block Internet access for specific computers by time of day. You can also limit Internet access completely or restrict it to a list of Web sites.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Another great feature is the router&#39;s ability to create a wireless bridge with up to two additional Wireless 2300s. This lets it function as a bridge and a repeater, similar to the Buffalo WLA-G54.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Dell Wireless 2300 offers some of the best 802.11g throughput rates we&#39;ve seen to date, second only to the U.S. Robotics USR8054. In our tests, the throughput rates for 802.11g peaked at 23.5Mbps for 802.11g, and those for mixed-mode (with both 802.11g and 802.11b clients transmitting simultaneously) reached 18.2Mbps. The throughput degradation over distance is also very good. Most notably, both the Wireless 2300 and the USR8054 outperform their competitors in mixed-mode performance by more than a factor of two.&lt;/span&gt;   &lt;span style=&quot;font-family:arial;&quot;&gt;The Wireless 2300 has a few limitations. The user guide indicates that the Wireless 2300 can support only 16 wireless clients or 64 NAT clients; in addition, having more than 20 simultaneous users of any type degrades the device&#39;s overall performance. Most home users will never stress the Wireless 2300 to this extent, but small offices could begin to hit the performance ceiling if their network grows large enough.&lt;/span&gt;   &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Microsoft MN-700&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;review by: Patrick Unnold&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhzRAeSt0l5BUj4w6fRqqOWChMyT6K3OIcEikAfNZlDQVZgHs9V4hZpVjXaJbR-mgNQtuZwwtvPtJh5br1r_SSV7HIsyKit6UIP2t0tMWyZLyKhXRBv6PSjeNmIpaq0DaYWiRINKW3tg/s1600-h/microsoft.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 110px; height: 83px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhzRAeSt0l5BUj4w6fRqqOWChMyT6K3OIcEikAfNZlDQVZgHs9V4hZpVjXaJbR-mgNQtuZwwtvPtJh5br1r_SSV7HIsyKit6UIP2t0tMWyZLyKhXRBv6PSjeNmIpaq0DaYWiRINKW3tg/s320/microsoft.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291308702717584418&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Microsoft&#39;s new 802.11g MN-700 wireless broadband router is designed so that even a novice user can expand a home network easily, but it has a few shortcomings compared to the Editors&#39; Choice-winning Dell TrueMobile 2300. The setup process and the configuration utility are very user-friendly, and Microsoft&#39;s support options will help with most problems you might encounter. It offers most features that home users need, and the Setup Wizard automatically turns on wireless security--a unique and much-needed detail. Its range is excellent. Experienced users will be frustrated by the lack of advanced configuration options and wireless bridge support, however.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Like the Dell TrueMobile 2300&#39;s streamlined installation routine, the MN-700&#39;s Setup Wizard gathers the necessary network information automatically before configuring both your wireless network adapter and the MN-700. The Setup Wizard supports all Windows platforms; a nonautomated, browser-based interface is available for other OSs.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;We uncovered a bug in the Setup Wizard software that prevented the application from completing normally when we attempted to use a workgroup name that contained a period. Microsoft tech support worked quickly to determine the cause and promised a fix in a future release.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The MN-700&#39;s documentation is excellent. In addition to the printed installation guide, you get a thorough, printed user guide with a lengthy troubleshooting section, as well as detailed instructions for nonstandard installations, such as using the MN-700 as an access point instead of as a router.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;You use the Broadband Network Utility, which you install on one of your networked machines during setup, to check network status and adjust the MN-700&#39;s configuration. Like the Setup Wizard, the Broadband Network Utility is novice-friendly; it&#39;s easy to navigate, with clear help information on each screen. The utility also checks automatically for updates, making it simple to keep the firmware current.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The MN-700&#39;s impressive security setup includes one unique and much-needed touch: wireless security is enabled during setup--no other product we&#39;ve seen does this--and other security features, such as Stateful Packet Inspection (SPI) firewall and NAT, are always on. Additional security features include parental controls, client filtering, 64/128-bit WEP, 256-bit WPA, DMZ, MAC address filtering, and detailed logging.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;While the MN-700 boasts 802.11b/g Wi-Fi certification and an impressive feature set for home users, it doesn&#39;t offer much advanced configurability. For instance, it lacks options such as support for RADIUS and wireless bridging, which are available on similarly priced products, such as the Buffalo AirStation router. Also, you cannot control the output wattage for the wireless network or adjust the security level of the firewall. The only option available for configuring the firewall is a check box for enabling ICMP blocking. The Dell TM2300 gives you more control of the firewall.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The MN-700&#39;s hardware features mirror those of most other home routers. The device sports a rotating external antenna and a four-port 10/100 Ethernet switch that autosenses crossover cables as well as the line speed. The MN-700 is designed for the desktop and is not well suited for mounting on a wall or a ceiling.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;With a healthy throughput of 21Mbps in 802.11g mode and nearly 12Mbps in mixed 802.11b/g mode, the MN-700 outperforms many of the wireless broadband routers we&#39;ve tested. However, the MN-700 still falls short of the throughput we&#39;ve seen in the broadband routers released since the 802.11g specification was ratified, specifically the US Robotics 8054 and the Dell TrueMobile 2300.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Thanks no doubt to its rotating external antenna, the MN-700 showed solid performance over distance, outperforming even the US Robotics 8054 and the Dell TrueMobile 2300. In our tests, the MN-700 achieved a throughput of nearly 6Mbps at a whopping 175-foot distance in 802.11g mode, and it didn&#39;t completely drop off until it approached 200 feet. That gives it about a 25-foot advantage over the Dell and US Robotics products. The extra distance could be important, because unlike the Dell TM2300, the MN-700 cannot be linked via a wireless bridge.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Buffalo AirStation WLA-G54&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Reviewed by:  Patrick Unnold&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisnz810X_KmXoDXa7wgncOZ2Y9egn_p1WEkC5jFvywxIlXxKoDuxZJC90ZSbz3TNW5KjIwmUaVQGVbrXs9KhQ2mc3UT_0_IlqT8Uh3bjpIo8jojIJKC-vy4VDHfUibRzKBKRco_2iybA/s1600-h/buffalo.jpeg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 82px; height: 119px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisnz810X_KmXoDXa7wgncOZ2Y9egn_p1WEkC5jFvywxIlXxKoDuxZJC90ZSbz3TNW5KjIwmUaVQGVbrXs9KhQ2mc3UT_0_IlqT8Uh3bjpIo8jojIJKC-vy4VDHfUibRzKBKRco_2iybA/s320/buffalo.jpeg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5291308702498414130&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;A single wireless router or access point can&#39;t always cover every room in a house. The Buffalo WLA-G54 wireless bridge gives you a plethora of features and options for expanding your home or office network without stringing cable. It includes a four-port switch for wired clients, and it supports both 802.11b and 802.11g standards. Because it&#39;s externally identical to the Buffalo AirStation 54Mbps wireless broadband router we&#39;ve previously reviewed, it suffers from the same flaws, including limited mounting options and hard-to-see LEDs for the four-port switch.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Buffalo WLA-G54 installs easily to a wired network, but connecting it to another Buffalo AirStation to create a bridge is harder than it should be. When you start the initial configuration, you can designate either a wired or wireless connection; the quick-setup guide has decent instructions for both. In either case, you have the option of connecting to the WLA-G54 via the Client Manager software included on the CD-ROM or a browser such as Internet Explorer or Netscape.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Once you&#39;ve connected a computer to the WLA-G54, you&#39;re ready to integrate it into your network by assigning IP addresses and the ESS-ID and configuring security options. The browser-based configuration tool includes wizards for WEP settings and MAC address restrictions, plus an advanced-configuration page that gives you direct access to all of your options.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;If you use the WLA-G54 to create a wireless bridge to another Buffalo AirStation, you must register the MAC address of each Buffalo access point, router, or bridge on your network under the WDS section of the configuration screen. The terse documentation fails to cover this process thoroughly.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The Buffalo WLA-G54 wireless bridge distinguishes itself from other bridges, such as the Linksys WET54G, with its Wireless Distribution System (WDS) support. This lets the WLA-G54 act as a wireless repeater with up to six Buffalo WDS-enabled AirStations, such as the Buffalo AirStation router on a single network, making it an ideal solution for large houses or apartment buildings. Because WDS is not a standard, however, it doesn&#39;t work with non-Buffalo products.&lt;/span&gt;   &lt;span style=&quot;font-family:arial;&quot;&gt;A swivel cover on the top of the back panel conceals an MMX connector.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;For larger sites, the WLA-G54 also works as a point-to-point or point-to-multipoint bridge that&#39;s capable of communicating with up to six other Buffalo base stations--a quick, easy way to extend your wired network or improve your existing WLAN coverage.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The WLA-G54 is packed with the latest security options to lock down your network. It offers both 64- and 128-bit WEP encryption, but the WLA-G54 also supports WPA and 802.1x.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;Remembering some of the WLA-G54&#39;s more complicated settings is easy because the bridge lets you save its configuration on a local PC. This feature, along with the recessed reset/initialization button on the back of the WLA-G54 that resets it to factory defaults, is very handy in case you find yourself locked out of the device. The only feature we didn&#39;t like were the unit&#39;s LEDs, which are positioned on the bridge&#39;s side and difficult to see.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;The performance of your Buffalo WLA-G54 will depend greatly on how you&#39;ve configured it and what it is doing on your network. As an 802.11g access point, the WLA-G54 offers good range, with consistent and decent throughput up to around 100 feet before a swift decline. The Linksys WET54G performs better, but the WLA-G54 offers WDS, which the WET54G lacks.&lt;/span&gt;   &lt;span style=&quot;font-family:arial;&quot;&gt;Assume a throughput hit when you configure the WLA-G54 (or most any wireless bridge) as both a bridge and an access point for wireless clients. That&#39;s because in a bridged network, configuration packets have to be transmitted over the WLAN once to get to the WLA-G54 bridge, then again from the bridge to the next Buffalo AirStation or client adapter connected to your wireless network.&lt;/span&gt;  &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;source:&lt;a href=&quot;http://www.review.cnet.com/&quot;&gt;www.review.cnet.com&lt;/a&gt;&lt;/span&gt;   &lt;/span&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/8619981330186466398/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/best-router-review.html#comment-form' title='1 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/8619981330186466398'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/8619981330186466398'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/best-router-review.html' title='Router Review'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioSCzRQd9sfVnafBwsQV6X5h5Ed8pOr_DV9_kysi1gnxwmd-2RLWCJGUWEODzwUVlYNLFZVjDRgSzN2xCu2hV8iW7NbgvPQ3mfZP16Az-YwF1Yr1WgpdoJwDu8NWRscklwMEl5x023mA/s72-c/linksys.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-6349459310860006336</id><published>2009-01-13T12:26:00.000-08:00</published><updated>2009-01-13T12:49:11.485-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="networking tips"/><category scheme="http://www.blogger.com/atom/ns#" term="tutorial"/><title type='text'>Introduction Linux Networking</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Now that you have a firm grasp of many of the most commonly used networking concepts, it is time to apply them to the configuration of your server. Some of these activities are automatically covered during a Linux installation, but you will often find yourself having to know how to modify these initial settings whenever you need to move your server to another network, add a new network interface card or use an alternative means of connecting to the Internet.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;In &quot;Introduction to Networking&quot;, we started with an explanation of TCP/IP, so we&#39;ll start this Linux networking chapter with a discussion on how to configure the IP address of your server.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How to Configure Your NIC&#39;s IP Address&lt;br /&gt;&lt;br /&gt;You need to know all the steps needed to configure IP addresses on a NIC card. Web site shopping cart applications frequently need an additional IP address dedicated to them. You also might need to add a secondary NIC interface to your server to handle data backups. Last but not least, you might just want to play around with the server to test your skills.&lt;br /&gt;&lt;br /&gt;This section shows you how to do the most common server IP activities with the least amount of headaches.&lt;br /&gt;Determining Your IP Address&lt;br /&gt;&lt;br /&gt;Most modern PCs come with an Ethernet port. When Linux is installed, this device is called eth0. You can determine the IP address of this device with the ifconfig command.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifconfig -a&lt;br /&gt;&lt;br /&gt;eth0 Link encap:Ethernet HWaddr 00:08:C7:10:74:A8&lt;br /&gt;BROADCAST MULTICAST MTU:1500 Metric:1&lt;br /&gt;RX packets:0 errors:0 dropped:0 overruns:0 frame:0&lt;br /&gt;TX packets:0 errors:0 dropped:0 overruns:0 carrier:0&lt;br /&gt;collisions:0 txqueuelen:100&lt;br /&gt;RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)&lt;br /&gt;Interrupt:11 Base address:0x1820&lt;br /&gt;&lt;br /&gt;lo Link encap:Local Loopback&lt;br /&gt;inet addr:127.0.0.1 Mask:255.0.0.0&lt;br /&gt;UP LOOPBACK RUNNING MTU:16436 Metric:1&lt;br /&gt;RX packets:787 errors:0 dropped:0 overruns:0 frame:0&lt;br /&gt;TX packets:787 errors:0 dropped:0 overruns:0 carrier:0&lt;br /&gt;collisions:0 txqueuelen:0&lt;br /&gt;RX bytes:82644 (80.7 Kb) TX bytes:82644 (80.7 Kb)&lt;br /&gt;&lt;br /&gt;wlan0 Link encap:Ethernet HWaddr 00:06:25:09:6A:B5&lt;br /&gt;inet addr:192.168.1.100 Bcast:192.168.1.255 Mask:255.255.255.0&lt;br /&gt;UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1&lt;br /&gt;RX packets:47379 errors:0 dropped:0 overruns:0 frame:0&lt;br /&gt;TX packets:107900 errors:0 dropped:0 overruns:0 carrier:0&lt;br /&gt;collisions:0 txqueuelen:100&lt;br /&gt;RX bytes:4676853 (4.4 Mb) TX bytes:43209032 (41.2 Mb)&lt;br /&gt;Interrupt:11 Memory:c887a000-c887b000&lt;br /&gt;&lt;br /&gt;wlan0:0 Link encap:Ethernet HWaddr 00:06:25:09:6A:B5&lt;br /&gt;inet addr:192.168.1.99 Bcast:192.168.1.255 Mask:255.255.255.0&lt;br /&gt;UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1&lt;br /&gt;Interrupt:11 Memory:c887a000-c887b000&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In this example, eth0 has no IP address because this box is using wireless interface wlan0 as its main NIC. Interface wlan0 has an IP address of 192.168.1.100 and a subnet mask of 255.255.255.0&lt;br /&gt;&lt;br /&gt;You can see that this command gives good information on the interrupts, or PCI bus ID, used by each card. On very rare occasions you might find that your NIC card doesn&#39;t work because it shares both an interrupt and memory access address with some other device. You can look at the contents of the /proc/interrupts file to get a listing of all the interrupt IRQs used by your system. In the example below we can see that there are no conflicts with each IRQ from 0 to 15 having only a single entry. Devices eth0 and eth1 use interrupts 10 and 5, respectively:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# cat /proc/interrupts&lt;br /&gt;CPU0&lt;br /&gt;0: 2707402473 XT-PIC timer&lt;br /&gt;1: 67 XT-PIC i8042&lt;br /&gt;2: 0 XT-PIC cascade&lt;br /&gt;5: 411342 XT-PIC eth1&lt;br /&gt;8: 1 XT-PIC rtc&lt;br /&gt;10: 1898752 XT-PIC eth0&lt;br /&gt;11: 0 XT-PIC uhci_hcd&lt;br /&gt;12: 58 XT-PIC i8042&lt;br /&gt;14: 5075806 XT-PIC ide0&lt;br /&gt;15: 506 XT-PIC ide1&lt;br /&gt;NMI: 0&lt;br /&gt;ERR: 43&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;If there are conflicts, you might need to refer to the manual for the offending device to try to determine ways to either use another interrupt or memory I/O location.&lt;br /&gt;Changing Your IP Address&lt;br /&gt;&lt;br /&gt;If you wanted, you could give this eth0 interface an IP address using the ifconfig command.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifconfig eth0 10.0.0.1 netmask 255.255.255.0 up&lt;br /&gt;&lt;br /&gt;The &quot;up&quot; at the end of the command activates the interface. To make this permanent each time you boot up you&#39;ll have to add this command in your /etc/rc.local file which is run at the end of every reboot.&lt;br /&gt;&lt;br /&gt;Fedora Linux also makes life a little easier with interface configuration files located in the /etc/sysconfig/network-scripts directory. Interface eth0 has a file called ifcfg-eth0, eth1 uses ifcfg-eth1, and so on. You can place your IP address information in these files, which are then used to auto-configure your NICs when Linux boots. See Figure 3-1 for two samples of interface eth0. One assumes the interface has a fixed IP address, and the other assumes it requires an IP address assignment using DHCP.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Figure 3-1 - File formats for network-scripts&lt;br /&gt;Fixed IP Address&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# cd /etc/sysconfig/network-scripts&lt;br /&gt;[root@bigboy network-scripts]# cat ifcfg-eth0&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File: ifcfg-eth0&lt;br /&gt;#&lt;br /&gt;DEVICE=eth0&lt;br /&gt;IPADDR=192.168.1.100&lt;br /&gt;NETMASK=255.255.255.0&lt;br /&gt;BOOTPROTO=static&lt;br /&gt;ONBOOT=yes&lt;br /&gt;#&lt;br /&gt;# The following settings are optional&lt;br /&gt;#&lt;br /&gt;BROADCAST=192.168.1.255&lt;br /&gt;NETWORK=192.168.1.0&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]#&lt;br /&gt;&lt;br /&gt;Getting the IP Address Using DHCP&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# cd /etc/sysconfig/network-scripts&lt;br /&gt;[root@bigboy network-scripts]# cat ifcfg-eth0&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File: ifcfg-eth0&lt;br /&gt;#&lt;br /&gt;DEVICE=eth0&lt;br /&gt;BOOTPROTO=dhcp&lt;br /&gt;ONBOOT=yes&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As you can see eth0 will be activated on booting, because the parameter ONBOOT has the value yes and not no. You can read more about netmasks and DHCP in &quot;Introduction to Networking&quot;, that acts as an introduction to networking.&lt;br /&gt;&lt;br /&gt;The default RedHat/Fedora installation will include the broadcast and network options in the network-scripts file. These are optional.&lt;br /&gt;&lt;br /&gt;After you change the values in the configuration files for the NIC you have to deactivate and activate it for the modifications to take effect. The ifdown and ifup commands can be used to do this:&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]# ifdown eth0&lt;br /&gt;[root@bigboy network-scripts]# ifup eth0&lt;br /&gt;&lt;br /&gt;Your server will have to have a default gateway for it to be able to communicate with the Internet. This will be covered later in the chapter.&lt;br /&gt;How DHCP Affects the DNS Server You Use&lt;br /&gt;&lt;br /&gt;Your DHCP server not only supplies the IP address your Linux box should use, but also the desired DNS servers. When using DHCP for an interface, make sure your /etc/resolv.conf file has the servers configuration lines commented out to prevent any conflicts.&lt;br /&gt;Multiple IP Addresses on a Single NIC&lt;br /&gt;&lt;br /&gt;In the previous section &quot;Determining Your IP Address&quot; you may have noticed that there were two wireless interfaces: wlan0 and wlan0:0. Interface wlan0:0 is actually a child interface wlan0, a virtual subinterface also known as an IP alias. IP aliasing is one of the most common ways of creating multiple IP addresses associated with a single NIC. Aliases have the name format parent-interface-name:X, where X is the sub-interface number of your choice.&lt;br /&gt;&lt;br /&gt;The process for creating an IP alias is very similar to the steps outlined for the real interface in the previous section, &quot;Changing Your IP Address&quot;:&lt;br /&gt;&lt;br /&gt;* First ensure the parent real interface exists&lt;br /&gt;* Verify that no other IP aliases with the same name exists with the name you plan to use. In this we want to create interface wlan0:0.&lt;br /&gt;* Create the virtual interface with the ifconfig command&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifconfig wlan0:0 192.168.1.99 netmask 255.255.255.0 up&lt;br /&gt;&lt;br /&gt;* You should also create a /etc/sysconfig/network-scripts/ifcfg-wlan0:0 file so that the aliases will all be managed automatically with the ifup and ifdown commands. Here is a sample configuration:&lt;br /&gt;&lt;br /&gt;DEVICE=wlan0:0&lt;br /&gt;ONBOOT=yes&lt;br /&gt;BOOTPROTO=static&lt;br /&gt;IPADDR=192.168.1.99&lt;br /&gt;NETMASK=255.255.255.0&lt;br /&gt;&lt;br /&gt;The commands to activate and deactivate the alias interface would therefore be:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifup wlan0:0&lt;br /&gt;[root@bigboy tmp]# ifdown wlan0:0&lt;br /&gt;&lt;br /&gt;Note: Shutting down the main interface also shuts down all its aliases too. Aliases can be shutdown independently of other interfaces.&lt;br /&gt;&lt;br /&gt;After completing these four simple steps you should be able to ping the new IP alias from other servers on your network.&lt;br /&gt;IP Address Assignment for a Direct DSL Connection&lt;br /&gt;&lt;br /&gt;If you are using a DSL connection with fixed or static IP addresses, then the configuration steps are the same as those outlined earlier. You plug your Ethernet interface into the DSL modem, configure it with the IP address, subnet mask, broadcast address, and gateway information provided by your ISP and you should have connectivity when you restart your interface. Remember that you might also need to configure your DNS server correctly.&lt;br /&gt;&lt;br /&gt;If you are using a DSL connection with a DHCP or dynamic IP address assignment, then the process is different. Your ISP will provide you with a PPP authentication over Ethernet (PPPoE) username and password which will allow your computer to login transparently to the Internet each time it boots up. Fedora Linux installs the rp-pppoe RPM software package required to support this.&lt;br /&gt;&lt;br /&gt;Note: Unless you specifically request static IP addresses, your ISP will provide you with a DHCP based connection. The DHCP IP address assigned to your computer and/or Internet router will often not change for many days and you may be fooled into thinking it is static.&lt;br /&gt;&lt;br /&gt;Downloading and installing RPMs isn&#39;t hard. If you need a refresher, &quot;Installing Linux Software&quot;, on RPMs, covers how to do this in detail. When searching for the file, remember that the PPPoE RPM&#39;s filename usually starts with the word rp-pppoe followed by a version number like this: rp-pppoe-3.5-8.i386.rpm.&lt;br /&gt;&lt;br /&gt;After installing the RPM, you need to go through a number of steps to complete the connection. The PPPOE configuration will create a software-based virtual interface named ppp0 that will use the physical Internet interface eth0 for connectivity. Here&#39;s what you need to do:&lt;br /&gt;&lt;br /&gt;* Make a backup copy of your ifcfg-eth0 file.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;[root@bigboy tmp]# cd /etc/sysconfig/network-scripts/&lt;br /&gt;[root@bigboy network-scripts]# ls ifcfg-eth0&lt;br /&gt;ifcfg-eth0&lt;br /&gt;[root@bigboy network-scripts]# cp ifcfg-eth0 DISABLED.ifcfg-eth0&lt;br /&gt;&lt;br /&gt;* Edit your ifcfg-eth0 file to have no IP information and also to be deactivated on boot time.&lt;br /&gt;&lt;br /&gt;DEVICE=eth0&lt;br /&gt;ONBOOT=no&lt;br /&gt;&lt;br /&gt;* Shutdown your eth0 interface.&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]# ifdown eth0&lt;br /&gt;[root@bigboy network-scripts]#&lt;br /&gt;&lt;br /&gt;* Run the adsl-setup configuration script&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]# adsl-setup&lt;br /&gt;&lt;br /&gt;It will prompt you for your ISP username, the interface to be used (eth0) and whether you want to the connection to stay up indefinitely. We&#39;ll use defaults wherever possible.&lt;br /&gt;&lt;br /&gt;Welcome to the ADSL client setup.� First, I will run some checks on&lt;br /&gt;&lt;br /&gt;your system to make sure the PPPoE client is installed properly...&lt;br /&gt;&lt;br /&gt;LOGIN NAME&lt;br /&gt;&lt;br /&gt;Enter your Login Name (default root): bigboy-login@isp&lt;br /&gt;&lt;br /&gt;INTERFACE&lt;br /&gt;&lt;br /&gt;Enter the Ethernet interface connected to the ADSL modem&lt;br /&gt;For Solaris, this is likely to be something like /dev/hme0.&lt;br /&gt;For Linux, it will be ethX, where &#39;X&#39; is a number.&lt;br /&gt;(default eth0):&lt;br /&gt;&lt;br /&gt;Do you want the link to come up on demand, or stay up continuously?&lt;br /&gt;If you want it to come up on demand, enter the idle time in seconds&lt;br /&gt;after which the link should be dropped.� If you want the link to&lt;br /&gt;stay up permanently, enter &#39;no&#39; (two letters, lower-case.)&lt;br /&gt;NOTE: Demand-activated links do not interact well with dynamic IP&lt;br /&gt;addresses. You might have some problems with demand-activated links.&lt;br /&gt;&lt;br /&gt;Enter the demand value (default no):&lt;br /&gt;&lt;br /&gt;It will then prompt you for your DNS server information. This step edits your /etc/resolv.conf file. If you&#39;re running BIND on your server in a caching DNS mode then you might want to leave this option blank. If you want your ISP to provide the IP address of its DNS server automatically then enter the word server.&lt;br /&gt;&lt;br /&gt;Please refer to &quot;Configuring DNS&quot;, for more information on BIND and DNS.&lt;br /&gt;&lt;br /&gt;DNS&lt;br /&gt;&lt;br /&gt;Please enter the IP address of your ISP&#39;s primary DNS server.&lt;br /&gt;If your ISP claims that &#39;the server will provide dynamic DNS addresses&#39;, enter &#39;server&#39; (all lower-case) here.&lt;br /&gt;If you just press enter, I will assume you know what you are doing and not modify your DNS setup.&lt;br /&gt;Enter the DNS information here:&lt;br /&gt;&lt;br /&gt;The script will then prompt you for your ISP password&lt;br /&gt;&lt;br /&gt;PASSWORD&lt;br /&gt;&lt;br /&gt;Please enter your Password:&lt;br /&gt;Please re-enter your Password:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Then it will ask whether you want regular users (not superuser root) to be able to activate/deactivate the new ppp0 interface. This may be required if non-root members of your family or home office need to get access to the Internet:&lt;br /&gt;&lt;br /&gt;USERCTRL&lt;br /&gt;&lt;br /&gt;Please enter &#39;yes&#39; (two letters, lower-case.) if you want to allow normal user to start or stop DSL connection (default yes):&lt;br /&gt;&lt;br /&gt;The rp-pppoe package has two sample iptables firewall scripts located in the /etc/ppp directory named firewall-standalone and firewall-masq. They are very basic and don&#39;t cover rules to make your Linux box a web server, DNS server, or mail server. I&#39;d recommend selecting none and using a variant of the basic script samples in &quot;Linux Firewalls Using iptables&quot;, or the more comprehensive one found in Appendix II, &quot;Codes, Scripts, and Configurations&quot;.&lt;br /&gt;&lt;br /&gt;FIREWALLING&lt;br /&gt;&lt;br /&gt;Please choose the firewall rules to use. Note that these rules are very basic. You are strongly&lt;br /&gt;encouraged to use a more sophisticated firewall setup; however, these will provide basic security.&lt;br /&gt;If you are running any servers on your machine, you must choose &#39;NONE&#39; and set up firewalling&lt;br /&gt;yourself. Otherwise, the firewall rules will deny access to all standard servers like Web, e-mail,&lt;br /&gt;ftp, etc. If you are using SSH, the rules will block outgoing SSH connections which allocate a&lt;br /&gt;privileged source port.&lt;br /&gt;&lt;br /&gt;The firewall choices are:&lt;br /&gt;&lt;br /&gt;0 - NONE: This script will not set any firewall rules. You are responsible&lt;br /&gt;for ensuring the security of your machine. You are STRONGLY&lt;br /&gt;recommended to use some kind of firewall rules.&lt;br /&gt;1 - STANDALONE: Appropriate for a basic stand-alone web-surfing workstation&lt;br /&gt;2 - MASQUERADE: Appropriate for a machine acting as an Internet gateway&lt;br /&gt;for a LAN&lt;br /&gt;&lt;br /&gt;Choose a type of firewall (0-2): 0&lt;br /&gt;&lt;br /&gt;You&#39;ll then be asked whether you want the connection to be activated upon booting. Most people would say yes.&lt;br /&gt;&lt;br /&gt;Start this connection at boot time&lt;br /&gt;&lt;br /&gt;Do you want to start this connection at boot time?&lt;br /&gt;Please enter no or yes (default no):yes&lt;br /&gt;&lt;br /&gt;Just before exiting, you&#39;ll get a summary of the parameters you entered and the relevant configuration files will be updated to reflect your choices when you accept them:&lt;br /&gt;&lt;br /&gt;** Summary of what you entered **&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ethernet Interface: eth0&lt;br /&gt;&lt;br /&gt;User name: bigboy-login@isp&lt;br /&gt;Activate-on-demand: No&lt;br /&gt;DNS: Do not adjust&lt;br /&gt;Firewalling: NONE&lt;br /&gt;User Control: yes&lt;br /&gt;Accept these settings and adjust configuration files (y/n)? y&lt;br /&gt;&lt;br /&gt;Adjusting /etc/sysconfig/network-scripts/ifcfg-ppp0&lt;br /&gt;Adjusting /etc/ppp/chap-secrets and /etc/ppp/pap-secrets&lt;br /&gt;(But first backing it up to /etc/ppp/chap-secrets.bak)&lt;br /&gt;(But first backing it up to /etc/ppp/pap-secrets.bak)&lt;br /&gt;&lt;br /&gt;At the very end it will tell you the commands to use to activate /deactivate your new ppp0 interface and to get a status of the interface&#39;s condition.&lt;br /&gt;&lt;br /&gt;Congratulations, it should be all set up!&lt;br /&gt;&lt;br /&gt;Type &#39;/sbin/ifup ppp0&#39; to bring up your xDSL link and &#39;/sbin/ifdown ppp0&#39;to bring it down.&lt;br /&gt;Type &#39;/sbin/adsl-status /etc/sysconfig/network-scripts/ifcfg-ppp0&#39; to see the link status.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note: This example recommends using the adsl-status command with the name of the PPPoE interface configuration file. This command defaults to show information for interface ppp0, and therefore listing the ifcfg-ppp0 filename won&#39;t be necessary in most home environments.&lt;br /&gt;&lt;br /&gt;After you have completed installing rp-pppoe you should be able to access the Internet over your DHCP DSL connection as expected.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Some Important Files Created By adsl-setup&lt;br /&gt;&lt;br /&gt;The adsl-setup script creates three files that will be of interest to you. The first is the ifcfg-ppp0 file with interface&#39;s link layer connection parameters&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]# more ifcfg-ppp0&lt;br /&gt;USERCTL=yes&lt;br /&gt;BOOTPROTO=dialup&lt;br /&gt;NAME=DSLppp0&lt;br /&gt;DEVICE=ppp0&lt;br /&gt;TYPE=xDSL&lt;br /&gt;ONBOOT=yes&lt;br /&gt;PIDFILE=/var/run/pppoe-adsl.pid&lt;br /&gt;FIREWALL=NONE&lt;br /&gt;PING=.&lt;br /&gt;PPPOE_TIMEOUT=20&lt;br /&gt;LCP_FAILURE=3&lt;br /&gt;LCP_INTERVAL=80&lt;br /&gt;CLAMPMSS=1412&lt;br /&gt;CONNECT_POLL=6&lt;br /&gt;CONNECT_TIMEOUT=60&lt;br /&gt;DEFROUTE=yes&lt;br /&gt;SYNCHRONOUS=no&lt;br /&gt;ETH=eth0&lt;br /&gt;PROVIDER=DSLppp0&lt;br /&gt;USER= bigboy-login@isp&lt;br /&gt;PEERDNS=no&lt;br /&gt;[root@bigboy network-scripts]#&lt;br /&gt;&lt;br /&gt;The others are the duplicate /etc/ppp/pap-secrets and /etc/ppp/chap-secrets files with the username and password needed to login to your ISP:&lt;br /&gt;&lt;br /&gt;[root@bigboy network-scripts]# more /etc/ppp/pap-secrets&lt;br /&gt;# Secrets for authentication using PAP&lt;br /&gt;# client server secret IP addresses&lt;br /&gt;&quot;bigboy-login@isp&quot; * &quot;password&quot;&lt;br /&gt;[root@bigboy network-scripts]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Simple Troubleshooting&lt;br /&gt;&lt;br /&gt;You can run the adsl-status command to determine the condition of your connection. In this case the package has been installed but the interface hasn&#39;t been activated.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# adsl-status&lt;br /&gt;Note: You have enabled demand-connection; adsl-status may be inaccurate.&lt;br /&gt;adsl-status: Link is attached to ppp0, but ppp0 is down&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;After activation, the interface appears to work correctly.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifup ppp0&lt;br /&gt;[root@bigboy tmp]# adsl-status&lt;br /&gt;adsl-status: Link is up and running on interface ppp0&lt;br /&gt;ppp0: flags=8051 mtu 1462 inet&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;For further troubleshooting information you can visit the Web site of rp-ppoe at Roaring Penguin (www.roaringpenguin.com). There are some good tips there on how to avoid problems with VPN clients.&lt;br /&gt;IP Address Assignment for a Cable Modem Connection&lt;br /&gt;&lt;br /&gt;Cable modems use DHCP to get their IP addresses so you can configure your server&#39;s Ethernet interface accordingly.&lt;br /&gt;How to Activate/Shut Down Your NIC&lt;br /&gt;&lt;br /&gt;The ifup and ifdown commands can be used respectively to activate and deactivate a NIC interface. You must have an ifcfg file in the /etc/sysconfig/network-scripts directory for these commands to work. Here is an example for interface eth0:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ifdown eth0&lt;br /&gt;[root@bigboy tmp]# ifup eth0&lt;br /&gt;&lt;br /&gt;How to View Your Current Routing Table&lt;br /&gt;&lt;br /&gt;The netstat -nr command will provide the contents of the touting table. Networks with a gateway of 0.0.0.0 are usually directly connected to the interface. No gateway is needed to reach your own directly connected interface, so a gateway address of 0.0.0.0 seems appropriate. The route with a destination address of 0.0.0.0 is your default gateway.&lt;br /&gt;&lt;br /&gt;* In this example there are two gateways, the default and one to 255.255.255.255 which is usually added on DHCP servers. Server bigboy is a DHCP server in this case.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# netstat -nr&lt;br /&gt;&lt;br /&gt;Kernel IP routing table&lt;br /&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;br /&gt;255.255.255.255 0.0.0.0 255.255.255.255 UH 40 0 0 wlan0&lt;br /&gt;192.168.1.0 0.0.0.0 255.255.255.0 U 40 0 0 wlan0&lt;br /&gt;127.0.0.0 0.0.0.0 255.0.0.0 U 40 0 0 lo&lt;br /&gt;0.0.0.0 192.168.1.1 0.0.0.0 UG 40 0 0 wlan0&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;* In this example, there are multiple gateways handling traffic destined for different networks on different interfaces.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# netstat -nr&lt;br /&gt;&lt;br /&gt;Kernel IP routing table&lt;br /&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;br /&gt;172.16.68.64 172.16.69.193 255.255.255.224 UG 40 0 0 eth1&lt;br /&gt;172.16.11.96 172.16.69.193 255.255.255.224 UG 40 0 0 eth1&lt;br /&gt;172.16.68.32 172.16.69.193 255.255.255.224 UG 40 0 0 eth1&lt;br /&gt;172.16.67.0 172.16.67.135 255.255.255.224 UG 40 0 0 eth0&lt;br /&gt;172.16.69.192 0.0.0.0 255.255.255.192 U 40 0 0 eth1&lt;br /&gt;172.16.67.128 0.0.0.0 255.255.255.128 U 40 0 0 eth0&lt;br /&gt;172.160.0 172.16.67.135 255.255.0.0 UG 40 0 0 eth0&lt;br /&gt;172.16.0.0 172.16.67.131 255.240.0.0 UG 40 0 0 eth0&lt;br /&gt;127.0.0.0 0.0.0.0 255.0.0.0 U 40 0 0 lo&lt;br /&gt;0.0.0.0 172.16.69.193 0.0.0.0 UG 40 0 0 eth1&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;How to Change Your Default Gateway&lt;br /&gt;&lt;br /&gt;Your server needs to have a single default gateway. DHCP servers will automatically assign a default gateway to DHCP configured NICs, but NICs with configured static IP addresses will need to have a manually configured default gateway. This can be done with a simple command. This example uses a newly installed wireless interface called wlan0, most PCs would be using the standard Ethernet interface eth0.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# route add default gw 192.168.1.1 wlan0&lt;br /&gt;&lt;br /&gt;In this case, make sure that the router/firewall with IP address 192.168.1.1 is connected to the same network as interface wlan0!&lt;br /&gt;&lt;br /&gt;Once done, you&#39;ll need to update your /etc/sysconfig/network file to reflect the change. This file is used to configure your default gateway each time Linux boots.&lt;br /&gt;&lt;br /&gt;NETWORKING=yes&lt;br /&gt;HOSTNAME=bigboy&lt;br /&gt;GATEWAY=192.168.1.1&lt;br /&gt;&lt;br /&gt;Note: In Debian based systems the default gateway is permanently defined in the /etc/network/interfaces file. See the section &quot;Debian / Ubuntu Network Configuration&quot; later in this chapter for more details.&lt;br /&gt;&lt;br /&gt;Some people don&#39;t bother modifying network specific files and just place the route add command in the script file /etc/rc.d/rc.local which is run at the end of each reboot.&lt;br /&gt;&lt;br /&gt;It is possible to define default gateways in the NIC configuration file in the /etc/sysconfig/network-scripts directory, but you run the risk of inadvertently assigning more than one default gateway when you have more than one NIC. This could cause connectivity problems. If one of the default gateways has no route to the intended destination, every other packet will become lost. Firewalls that are designed to block packets with irregular sequence numbers and unexpected origins could also obstruct your data flow.&lt;br /&gt;How to Configure Two Gateways&lt;br /&gt;&lt;br /&gt;Some networks may have multiple router/firewalls providing connectivity. Here&#39;s a typical scenario:&lt;br /&gt;&lt;br /&gt;* You have one router providing access to the Internet that you&#39;d like to have as your default gateway (see the default gateway example earlier)&lt;br /&gt;&lt;br /&gt;* You also have another router providing access to your corporate network using addresses in the range 10.0.0.0 to 10.255.255.255. Let&#39;s assume that this router has an IP address of 192.168.1.254&lt;br /&gt;&lt;br /&gt;The Linux box used in this example uses interface wlan0 for its Internet connectivity. You might be most likely using interface eth0, please adjust your steps accordingly.&lt;br /&gt;&lt;br /&gt;There are a number of ways to add this new route.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Adding Temporary Static Routes&lt;br /&gt;&lt;br /&gt;The route add command can be used to add new routes to your server that will last till the next reboot. It has the advantage of being univeral to all versions of Linux and is well documented in the man pages. In our example the reference to the 10.0.0.0 network has to be preceded with a -net switch and the subnet mask and gateway values also have to be preceded by the netmask and gw switches respectively.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# route add -net 10.0.0.0 netmask 255.0.0.0 gw 192.168.1.254 wlan0&lt;br /&gt;&lt;br /&gt;If you wanted to add a route to an individual server, then the &quot;-host&quot; switch would be used with no netmask value. (The route command automatically knows the mask should be 255.255.255.255). Here is an example for a route to host 10.0.0.1.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# route add -host 10.0.0.1 gw 192.168.1.254 wlan0&lt;br /&gt;&lt;br /&gt;A universal way of making this change persistent after a reboot would be to place this route add command in the file /etc/rc.d/rc.local, which is always run at the end of the booting process.&lt;br /&gt;Adding Permanent Static Routes&lt;br /&gt;&lt;br /&gt;In Fedora Linux, permanent static routes are added on a per interface basis in files located in the /etc/sysconfig/network-scripts directory. The filename format is route-interface-name so the filename for interface wlan0 would be route-wlan0.&lt;br /&gt;&lt;br /&gt;The format of the file is quite intuitive with the target network coming in the first column followed by the word via and then the gateway&#39;s IP address. In our routing example, to set up a route to network 10.0.0.0 with a subnet mask of 255.0.0.0 (a mask with the first 8 bits set to 1) via the 192.168.1.254 gateway, we would have to configure file /etc/sysconfig/network-scripts/route-wlan0 to look like this:&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File /etc/sysconfig/network-scripts/route-wlan0&lt;br /&gt;#&lt;br /&gt;10.0.0.0/8 via 192.168.1.254&lt;br /&gt;&lt;br /&gt;Note: The /etc/sysconfig/network-scripts/route-* filename is very important. Adding the wrong interface extension at the end will result in the routes not being added after the next reboot. There will also be no reported errors on the screen or any of the log files in the /var/log/ directory.&lt;br /&gt;&lt;br /&gt;You can test the new file by running the /etc/sysconfig/network-scripts/ifup-routes command with the interface name as the sole argument. In the next example we check the routing table to see no routes to the 10.0.0.0 network and execute the ifup-routes command, which then adds the route:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# netstat -nr&lt;br /&gt;&lt;br /&gt;Kernel IP routing table&lt;br /&gt;&lt;br /&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;br /&gt;192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0&lt;br /&gt;169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 wlan0&lt;br /&gt;0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0&lt;br /&gt;[root@bigboy tmp]# ./ifup-routes wlan0&lt;br /&gt;[root@bigboy tmp]# netstat -nr&lt;br /&gt;Kernel IP routing table&lt;br /&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;br /&gt;192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0&lt;br /&gt;169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 wlan0&lt;br /&gt;10.0.0.0 192.168.1.254 255.0.0.0 UG 0 0 0 wlan0&lt;br /&gt;0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;Note: In Debian based systems, permanent static routes are configured using the /etc/network/interfaces file. See the section &quot;Debian / Ubuntu Network Configuration&quot; later in this chapter for more details.&lt;br /&gt;How to Delete a Route&lt;br /&gt;&lt;br /&gt;Here&#39;s how to delete the routes added in the previous section.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# route del -net 10.0.0.0 netmask 255.0.0.0 gw 192.168.1.254 wlan0&lt;br /&gt;&lt;br /&gt;The file /etc/sysconfig/network-scripts/route-wlan0 will also have to be updated so that when you reboot the server will not reinsert the route. Delete the line that reads:&lt;br /&gt;&lt;br /&gt;10.0.0.0/8 via 192.168.1.254&lt;br /&gt;&lt;br /&gt;Changing NIC Speed and Duplex&lt;br /&gt;&lt;br /&gt;There is no better Linux investment than the purchase of a fully Linux compatible NIC card. Most Linux vendors will have a list of compatible hardware on their Web sites: read this carefully before you start hooking up you machine to the network. If you can&#39;t find any of the desired models in your local computer store, then a model in the same family or series should be sufficient. Most cards will work, but only the fully compatible ones will provide you with error-free, consistent throughput.&lt;br /&gt;&lt;br /&gt;Linux defaults to automatically negotiating the speed and duplex of it&#39;s NIC automatically with that of the switch to which it is attached. Configuring a switch port to auto-negotiate the speed and duplex often isn&#39;t sufficient because there are frequently differences in the implementation of the protocol standard.&lt;br /&gt;&lt;br /&gt;Typically, NICs with failed negotiation will work, but this is usually accompanied by many collision type errors being seen on the NIC when using the ifconfig -a command and only marginal performance. Don&#39;t limit your troubleshooting of these types of errors to just failed negotiation; the problem could also be due to a bad NIC card, switch port, or cabling.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Using mii-tool&lt;br /&gt;&lt;br /&gt;One of the original Linux tools for setting the speed and duplex of your NIC card was the mii-tool command. It is destined to be deprecated and replaced by the newer ethtool command, but many older NICs support only mii-tool so you&#39;ll need to be aware of it. Issuing the command without any arguments gives a brief status report, as seen in the next example, with unsupported NICs providing an Operation not supported message. NICs that are not compatible with mii-tool often will still work, but you have to refer to the manufacturer&#39;s guides to set the speed and duplex to anything but auto-negotiate.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# mii-tool&lt;br /&gt;SIOCGMIIPHY on &#39;eth0&#39; failed: Operation not supported&lt;br /&gt;eth1: 100 Mbit, half duplex, link ok&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;By using the verbose mode -v switch you can get much more information. In this case, negotiation was OK, with the NIC selecting 100Mbps, full duplex mode (FD):&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# mii-tool -v&lt;br /&gt;eth1: negotiated 100baseTx-FD, link ok&lt;br /&gt;product info: vendor 00:10:18, model 33 rev 2&lt;br /&gt;basic mode: autonegotiation enabled&lt;br /&gt;basic status: autonegotiation complete, link ok&lt;br /&gt;capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD&lt;br /&gt;advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD&lt;br /&gt;link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Setting Your NIC&#39;s Speed Parameters with mii-tool&lt;br /&gt;&lt;br /&gt;You can set your NIC to force itself to a particular speed and duplex by using the -F switch with any of the following options: 100baseTx-FD, 100baseTx-HD, 10baseT-FD, or 10baseT-HD. Remember that you could lose all network connectivity to your server if you force your NIC to a particular speed/duplex that doesn&#39;t match that of your switch:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# mii-tool -F 100baseTx-FD eth0&lt;br /&gt;&lt;br /&gt;Unfortunately there is no way to set this on reboot permanently except by placing it the command in the /etc/rc.local file to let it be run at the very end of the booting process or by creating your own startup script if you need it set earlier. Creating your own startup scripts is covered in &quot;The Linux Boot Process&quot;.&lt;br /&gt;Using ethtool&lt;br /&gt;&lt;br /&gt;The ethtool command is slated to be the replacement for mii-tool in the near future and tends to be supported by newer NIC cards.&lt;br /&gt;&lt;br /&gt;The command provides the status of the interface you provide as its argument. Here we see interface eth0 not doing autonegotiation and set to a speed of 100 Mbps, full duplex. A list of supported modes is also provided at the top of the output.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ethtool eth0&lt;br /&gt;Settings for eth0:&lt;br /&gt;Supported ports: [ TP MII ]&lt;br /&gt;Supported link modes: 10baseT/Half 10baseT/Full&lt;br /&gt;100baseT/Half 100baseT/Full&lt;br /&gt;Supports auto-negotiation: Yes&lt;br /&gt;Advertised link modes: 10baseT/Half 10baseT/Full&lt;br /&gt;100baseT/Half 100baseT/Full&lt;br /&gt;Advertised auto-negotiation: No&lt;br /&gt;Speed: 100Mb/s&lt;br /&gt;Duplex: Full&lt;br /&gt;Port: MII&lt;br /&gt;PHYAD: 1&lt;br /&gt;Transceiver: internal&lt;br /&gt;Auto-negotiation: off&lt;br /&gt;Supports Wake-on: g&lt;br /&gt;Wake-on: g&lt;br /&gt;Current message level: 0x00000007 (7)&lt;br /&gt;Link detected: yes&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Setting Your NIC&#39;s Speed Parameters with ethtool&lt;br /&gt;&lt;br /&gt;Unlike mii-tool, ethtool settings can be permanently set as part of the interface&#39;s configuration script with the ETHTOOL_OPTS variable. In our next example, the settings will be set to 100 Mbps, full duplex with no chance for auto-negotiation on the next reboot:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File: /etc/sysconfig/network-scripts/ifcfg-eth0&lt;br /&gt;#&lt;br /&gt;DEVICE=eth0&lt;br /&gt;IPADDR=192.168.1.100&lt;br /&gt;NETMASK=255.255.255.0&lt;br /&gt;BOOTPROTO=static&lt;br /&gt;ONBOOT=yes&lt;br /&gt;ETHTOOL_OPTS=&quot;speed 100 duplex full autoneg off&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You can test the application of these parameters by shutting down the interface and activating it again with the ifup and ifdown commands. These settings can also be changed from the command line using the -s switch followed by the interface name and its desired configuration parameters.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ethtool -s eth1 speed 100 duplex full autoneg off&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;The Linux man pages give more details on other ethtool options, but you can get a quick guide by just entering the ethtool command alone, which provides a quicker summary.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ethtool&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;ethtool -s DEVNAME \&lt;br /&gt;[ speed 10|100|1000 ] \&lt;br /&gt;[ duplex half|full ] \&lt;br /&gt;[ port tp|aui|bnc|mii|fibre ] \&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;A Note About Duplex Settings&lt;br /&gt;&lt;br /&gt;By default, Linux NICs negotiate their speed and duplex settings with the switch. This is done by exchanging electronic signals called Fast Link Pulses (FLP). When the speed and duplex are forced to a particular setting the FLPs are not sent. When a NIC is in auto-negotiation mode and detects a healthy, viable link but receives no FLPs, it errs on the side of caution and sets its duplex to half-duplex and sometimes it will also set its speed to the lowest configurable value. It is therefore possible to force a switch port to 100 Mbps full duplex, but have the auto-negotiating server NIC set itself to 100Mbps half-duplex which will result in errors. The same is true for the switch if the switch port is set to auto-negotiate and server NIC is set to 100 Mbps full duplex. It is best to either force both the switch port and server NIC to either auto-negotiate or the same forced speed and duplex values.&lt;br /&gt;How to Convert Your Linux Server into a Simple Router&lt;br /&gt;&lt;br /&gt;Router/firewall appliances that provide basic Internet connectivity for a small office or home network are becoming more affordable every day, but when budgets are tight you might seriously want to consider modifying an existing Linux server to do the job.&lt;br /&gt;&lt;br /&gt;Details on how to configure Linux firewall security are covered in &quot;Linux Firewalls Using iptables&quot;, but you need to understand how to activate routing through the firewall before it can become a functioning networking device.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Configuring IP Forwarding&lt;br /&gt;&lt;br /&gt;For your Linux server to become a router, you have to enable packet forwarding. In simple terms packet forwarding enables packets to flow through the Linux box from one network to another. The Linux kernel configuration parameter to activate this is named net.ipv4.ip_forward and can be found in the file /etc/sysctl.conf. Remove the &quot;#&quot; from the line related to packet forwarding.&lt;br /&gt;&lt;br /&gt;Before:&lt;br /&gt;&lt;br /&gt;# Disables packet forwarding&lt;br /&gt;net.ipv4.ip_forward=0&lt;br /&gt;&lt;br /&gt;After:&lt;br /&gt;&lt;br /&gt;# Enables packet forwarding&lt;br /&gt;net.ipv4.ip_forward=1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This enables packet forwarding only when you reboot at which time Linux will create a file in one of the subdirectories of the special RAM memory-based /proc filesystem. To activate the feature immediately you have to force Linux to read the /etc/sysctl.conf file with the sysctl command using the -p switch. Here is how it&#39;s done:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp] sysctl -p&lt;br /&gt;sysctl -p&lt;br /&gt;net.ipv4.ip_forward = 1&lt;br /&gt;net.ipv4.conf.default.rp_filter = 1&lt;br /&gt;kernel.sysrq = 0&lt;br /&gt;kernel.core_uses_pid = 1&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Please refer to Appendix I for more information on adjusting kernel parameters.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Configuring Proxy ARP&lt;br /&gt;&lt;br /&gt;If a server needs to send a packet to another device on the same network, it sends out an ARP request to the network asking for the MAC address of the other device.&lt;br /&gt;&lt;br /&gt;If the same server needs to send a packet to another device on a remote network the process is different. The server first takes a look at its routing table to find out the IP address of the best router on its network that will be able to relay the packet to the destination. The server then sends an ARP request for the MAC address that matches the router&#39;s IP address. It then sends the packet to the router using the router&#39;s MAC address and a destination IP address of the remote server.&lt;br /&gt;&lt;br /&gt;If there is no suitable router on its network, the server will then send out an ARP request for the MAC address of the remote server. Some routers can be configured to answer these types of ARP requests for remote networks. This feature is called proxy ARP. There are some disadvantages with this. One of the most common problems occurs if two routers are on the network configured for proxy ARP. In this scenario there is the possibility that either one will answer the local server&#39;s ARP request for the MAC address of the remote server. If one of the routers has an incorrect routing table entry for the remote network, then there is the risk that traffic to the remote server will occasionally get lost. In other words you can lose routing control.&lt;br /&gt;&lt;br /&gt;Note: It is for this and other reasons that it is generally not a good idea to configure proxy ARP on a router. It is also good to always configure a default gateway on your server and use separate routing entries via other routers for all networks your default gateway may not know about.&lt;br /&gt;&lt;br /&gt;Some types of bridging mode firewalls need to have proxy ARP enabled to operate properly. These devices are typically inserted as part of a daisy chain connecting multiple network switches together on the same LAN while protecting one section of a LAN from traffic originating on another section. The firewall typically isn&#39;t configured with an IP address on the LAN and appears to be an intelligent cable capable of selectively blocking packets.&lt;br /&gt;&lt;br /&gt;If you need to enable proxy ARP on a Linux server the /proc filesystem comes into play again. Proxy ARP is handled by files in the /proc/sys/net/ipv4/conf/ directory. This directory then has subdirectories corresponding to each functioning NIC card on your server. Each subdirectory then has a file called proxy_arp. If the value within this file is 0, then proxy ARP on the interface is disabled; if the value is 1 then it is enabled.&lt;br /&gt;&lt;br /&gt;You can use the /etc/sysctl.conf file mentioned in Appendix II to activate or disable proxy ARP. The next example activates proxy ARP, first for all interfaces and then for interfaces eth0 and wlan0.&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File: /etc/sysctl.conf&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;# Enables Proxy ARP on all interfaces&lt;br /&gt;net/ipv4/conf/all/proxy_arp = 1&lt;br /&gt;&lt;br /&gt;# Enables Proxy ARP on interfaces eth1 and wlan0&lt;br /&gt;net/ipv4/conf/eth1/proxy_arp = 1&lt;br /&gt;net/ipv4/conf/wlan0/proxy_arp = 1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You can then activate these settings with the sysctl command.&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp] sysctl -p&lt;br /&gt;&lt;br /&gt;Configuring Your /etc/hosts File&lt;br /&gt;&lt;br /&gt;The /etc/hosts file is just a list of IP addresses and their corresponding server names. Your server will typically check this file before referencing DNS. If the name is found with a corresponding IP address then DNS won&#39;t be queried at all. Unfortunately, if the IP address for that host changes, you also have to also update the file. This may not be much of a concern for a single server, but can become laborious if it has to be done companywide. For ease of management, it is often easiest to limit entries in this file to just the loopback interface and also the server&#39;s own hostname, and use a centralized DNS server to handle most of the rest. Sometimes you might not be the one managing the DNS server, and in such cases it may be easier to add a quick /etc/hosts file entry till the centralized change can be made.&lt;br /&gt;&lt;br /&gt;192.168.1.101 smallfry&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In the example above server smallfry has an IP address of 192.168.1.101. You can access 192.168.1.101 using the ping, telnet or any other network aware program by referring to it as smallfry. Here is an example using the ping command to see whether smallfry is alive and well on the network:&lt;br /&gt;&lt;br /&gt;[root@bigboy tmp]# ping smallfry&lt;br /&gt;PING zero (192.168.1.101) 56(84) bytes of data.&lt;br /&gt;64 bytes from smallfry (192.168.1.101): icmp_seq=0 ttl=64 time=0.197 ms&lt;br /&gt;64 bytes from smallfry (192.168.1.101): icmp_seq=1 ttl=64 time=0.047 ms&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;--- smallfry ping statistics ---&lt;br /&gt;2 packets transmitted, 2 received, 0% packet loss, time 2017ms&lt;br /&gt;rtt min/avg/max/mdev = 0.034/0.092/0.197/0.074 ms, pipe 2&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You can also add aliases to the end of the line which enable you to refer to the server using other names. Here we have set it up so that smallfry can also be accessed using the names tiny and littleguy.&lt;br /&gt;&lt;br /&gt;192.168.1.101 smallfry tiny littleguy&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You should never have an IP address more than once in this file because Linux will use only the values in the first entry it finds.&lt;br /&gt;&lt;br /&gt;192.168.1.101 smallfry # (Wrong)&lt;br /&gt;192.168.1.101 tiny # (Wrong)&lt;br /&gt;192.168.1.101 littleguy # (Wrong)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The loopback Interface&#39;s localhost Entry&lt;br /&gt;&lt;br /&gt;Usually the first entry in /etc/hosts defines the IP address of the server&#39;s virtual loopback interface. This is usually mapped to the name localhost.localdomain (the universal name used when a server refers to itself) and localhost (the shortened alias name). By default, Fedora inserts the hostname of the server between the 127.0.0.1 and the localhost entries like this:&lt;br /&gt;&lt;br /&gt;127.0.0.1 bigboy localhost.localdomain localhost&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;When the server is connected to the Internet this first entry after the 127.0.0.1 needs to be the fully qualified domain name (FQDN) of the server. For example, bigboy.mysite.com, like this:&lt;br /&gt;&lt;br /&gt;127.0.0.1 bigboy.my-site.com localhost.localdomain localhost&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Some programs such as Sendmail are very sensitive to this and if they detect what they feel is an incorrect FQDN they will default to using the name localhost.localdomain when communicating with another server on the network. This can cause confusion, as the other server also feels it is localhost.localdomain.&lt;br /&gt;&lt;br /&gt;Note: You must always have a localhost and localhost.localdomain entry mapping to 127.0.0.1 for Linux to work properly and securely.&lt;br /&gt;Debian / Ubuntu Network Configuration&lt;br /&gt;&lt;br /&gt;Many of the core Fedora / Redhat commands and configuration files covered in this chapter can be used in Debian based operating systems, but there are some key differences.&lt;br /&gt;The /etc/network/interfaces File&lt;br /&gt;&lt;br /&gt;The main network configuration file is the /etc/network/interfaces file in which all the network interface parameters are defined. The file is divided into stanzas:&lt;br /&gt;The auto Stanza&lt;br /&gt;&lt;br /&gt;The auto stanza defines the interfaces that should be automatically initialized when the system boots up.&lt;br /&gt;The mapping Stanza&lt;br /&gt;&lt;br /&gt;This stanza maps configuration parameters for an interface depending on the output of a script. For example, on booting the script could prompt you as to whether your laptop Linux system is at home or work with the mapping statement using the answer to configure the appropriate IP address.&lt;br /&gt;&lt;br /&gt;By default the much simpler hotplug system is used which assumes that the interfaces will have only one purpose. Typical hotplug configurations simply assign each physical interface with a matching logical interface name (nick name).&lt;br /&gt;&lt;br /&gt;mapping hotplug&lt;br /&gt;script grep&lt;br /&gt;map eth0 eth0&lt;br /&gt;map eth1&lt;br /&gt;&lt;br /&gt;In this case interface eth0 is specifically given the logical name eth0, while the logical name for eth1 is implied to be the same.&lt;br /&gt;The iface Stanza&lt;br /&gt;&lt;br /&gt;The iface stanza defines the characteristics of a logical interface. Typically the first line of these stanzas starts with the word iface, followed by the logical name of the interface, the protocol used, and finally the type of addressing scheme to be used, such as DHCP or static. Protocol keywords include inet for regular TCP/IP, inet6 for IPv6, ipx for the older IPX protocol used by Novell, and loopback for loopback addresses.&lt;br /&gt;&lt;br /&gt;Subsequent lines in the stanza define protocol characteristics such as addresses, subnet masks, and default gateways. In this example, interface eth1 is given the IP address 216.10.119.240/27 while interface eth0 gets its IP address using DHCP.&lt;br /&gt;&lt;br /&gt;# The primary network interface&lt;br /&gt;auto eth1&lt;br /&gt;iface eth1 inet static&lt;br /&gt;address 216.10.119.240&lt;br /&gt;netmask 255.255.255.224&lt;br /&gt;network 216.10.119.224&lt;br /&gt;broadcast 216.10.119.255&lt;br /&gt;gateway 216.10.119.241&lt;br /&gt;dns-nameservers 216.10.119.241&lt;br /&gt;&lt;br /&gt;# The secondary network interface&lt;br /&gt;auto eth0&lt;br /&gt;iface eth0 inet dhcp&lt;br /&gt;&lt;br /&gt;Note: When static IP addresses are used, a default gateway usually needs to be defined. Remember to place the gateway statement in the correct stanza with the appropriate router IP address.&lt;br /&gt;Creating Interface Aliases&lt;br /&gt;&lt;br /&gt;IP aliases can be easily created in the /etc/network/interfaces file once the main interface has already been defined. A modified duplicate of the main interfaces&#39; iface stanza is required. A colon followed by the sub interface number needs to be added to the first line, and only the subnet mask and the new IP address needs to follow as can be seen in this example for interface eth1:1 with the IP address 216.10.119.239.&lt;br /&gt;&lt;br /&gt;auto eth1:1&lt;br /&gt;iface eth1:1 inet static&lt;br /&gt;address 216.10.119.239&lt;br /&gt;netmask 255.255.255.224&lt;br /&gt;&lt;br /&gt;Adding Permanent Static Routes&lt;br /&gt;&lt;br /&gt;The up option in the appropriate iface stanza of the /etc/network/interfaces file allows you to selectively run commands once the specified interface becomes activated with the ifup command. This makes it useful when adding permanent static routes.&lt;br /&gt;&lt;br /&gt;In this example, a route to the 10.0.0.0/8 network via router address 216.10.119.225 has been added. Remember, the up option and the command must reside on the same line of the stanza.&lt;br /&gt;&lt;br /&gt;# The primary network interface&lt;br /&gt;auto eth1&lt;br /&gt;iface eth1 inet static&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;up route add -net 10.0.0.0 netmask 255.0.0.0 gw 216.10.119.225 eth1&lt;br /&gt;&lt;br /&gt;A complete /etc/network/interfaces file&lt;br /&gt;&lt;br /&gt;We can now construct a complete file based on the previous examples we discussed. Just like in Fedora, interfaces can be activated with the ifup and ifdown commands.&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# Debian / Ubuntu&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# File: /etc/network/interfaces&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;# The loopback network interface&lt;br /&gt;auto lo&lt;br /&gt;iface lo inet loopback&lt;br /&gt;&lt;br /&gt;# This is a list of hotpluggable network interfaces.&lt;br /&gt;# They will be activated automatically by the hotplug subsystem.&lt;br /&gt;mapping hotplug&lt;br /&gt;script grep&lt;br /&gt;map eth0 eth0&lt;br /&gt;map eth1 eth1&lt;br /&gt;&lt;br /&gt;# The primary network interface&lt;br /&gt;auto eth1&lt;br /&gt;iface eth1 inet static&lt;br /&gt;address 216.10.119.240&lt;br /&gt;netmask 255.255.255.224&lt;br /&gt;network 216.10.119.224&lt;br /&gt;broadcast 216.10.119.255&lt;br /&gt;gateway 216.10.119.241&lt;br /&gt;# dns-* options are implemented by the resolvconf package, if installed&lt;br /&gt;dns-nameservers 216.10.119.241&lt;br /&gt;wireless-key 98d126d5ac&lt;br /&gt;wireless-essid schaaffe&lt;br /&gt;&lt;br /&gt;up route add -net 10.0.0.0 netmask 255.0.0.0 gw 216.10.119.225 eth1&lt;br /&gt;&lt;br /&gt;auto eth1:1&lt;br /&gt;iface eth1:1 inet static&lt;br /&gt;address 216.10.119.239&lt;br /&gt;netmask 255.255.255.224&lt;br /&gt;&lt;br /&gt;# The secondary network interface&lt;br /&gt;auto eth0&lt;br /&gt;iface eth0 inet dhcp&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For more information on the /etc/network/interfaces file just issue the command man interfaces from the command line.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;source : &lt;a href=&quot;http://www.linuxnetworking.com&quot;&gt;www.linuxnetworking.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/6349459310860006336/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/linux-networking.html#comment-form' title='1 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6349459310860006336'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6349459310860006336'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/linux-networking.html' title='Introduction Linux Networking'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-2656247824533437043</id><published>2009-01-13T03:44:00.000-08:00</published><updated>2009-01-14T02:37:30.119-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fiber optic"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><title type='text'>Detection Device Uses Laser Light fiber optic Technique</title><content type='html'>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;div align=&quot;justify&quot;&gt;A compact fiber-optic probe developed for the space program has now proven valuable for patients in the clinic as the first non-invasive early detection device for cataracts, the leading cause of vision loss worldwide.&lt;br /&gt;&lt;br /&gt;Researchers from the National Eye Institute (NEI), part of the National Institutes of Health, and the National Aeronautics and Space Administration (NASA) collaborated to develop a simple, safe eye test for measuring a protein related to cataract formation. If subtle protein changes can be detected before a cataract develops, people may be able to reduce their cataract risk by making simple lifestyle changes, such as decreasing sun exposure, quitting smoking, stopping certain medications and controlling diabetes.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&quot;By the time the eye&#39;s lens appears cloudy from a cataract, it is too late to reverse or medically treat this process,&quot; said Manuel B. Datiles III, M.D., NEI medical officer and lead author of the clinical study. &quot;This technology can detect the earliest damage to lens proteins, triggering an early warning for cataract formation and blindness.&quot;&lt;br /&gt;&lt;br /&gt;The new device is based on a laser light technique called dynamic light scattering (DLS). It was initially developed to analyze the growth of protein crystals in a zero-gravity space environment. NASA&#39;s Rafat R. Ansari, Ph.D., senior scientist at the John H. Glenn Research Center and co-author of the study, brought the technology&#39;s possible clinical applications to the attention of NEI vision researchers when he learned that his father&#39;s cataracts were caused by changes in lens proteins.&lt;br /&gt;&lt;br /&gt;Several proteins are involved in cataract formation, but one known as alpha-crystallin serves as the eye&#39;s own anti-cataract molecule. Alpha-crystallin binds to other proteins when they become damaged, thus preventing them from bunching together to form a cataract. However, humans are born with a fixed amount of alpha-crystallin, so if the supply becomes depleted due to radiation exposure, smoking, diabetes or other causes, a cataract can result.&lt;br /&gt;&lt;br /&gt;&quot;We have shown that this non-invasive technology that was developed for the space program can now be used to look at the early signs of protein damage due to oxidative stress, a key process involved in many medical conditions, including age-related cataract and diabetes, as well as neurodegenerative diseases such as Alzheimer&#39;s and Parkinson&#39;s,&quot; said NASA&#39;s Dr. Ansari. &quot;By understanding the role of protein changes in cataract formation, we can use the lens not just to look at eye disease, but also as a window into the whole body.&quot;&lt;br /&gt;&lt;br /&gt;The recent NEI-NASA clinical trial, reported in the December 2008 Archives of Ophthalmology, looked at 380 eyes of people aged 7 to 86 who had lenses ranging from clear to severe cloudiness from cataract. Researchers used the DLS device to shine a low-power laser light through the lenses. They had previously determined alpha-crystallin&#39;s light-scattering ability, which was then used to detect and measure the amount of alpha-crystallin in the lenses.&lt;br /&gt;&lt;br /&gt;They found that as cloudiness increased, alpha-crystallin in the lenses decreased. Alpha-crystallin amounts also decreased as the participants&#39; ages increased, even when the lenses were still transparent. These age-related, pre-cataract changes would remain undetected by currently available imaging tools.&lt;br /&gt;&lt;br /&gt;&quot;This research is a prime example of two government agencies sharing scientific information for the benefit of the American people,&quot; said NEI director Paul A. Sieving, M.D., Ph.D. &quot;At an individual level, this device could be used to study the effectiveness of anti-cataract therapies or the tendency of certain medications to cause cataract formation.&quot;&lt;br /&gt;&lt;br /&gt;The DLS technique will now assist vision scientists in looking at long-term lens changes due to aging, smoking, diabetes, LASIK surgery, eye drops for treating glaucoma, and surgical removal of the vitreous gel within the eye, a procedure known to cause cataracts within six months to one year. It may also help in the early diagnosis of Alzheimer&#39;s disease, in which an abnormal protein may be found in the lens. In addition, NASA researchers will continue to use the device to look at the impact of long-term space travel on the visual system.&lt;br /&gt;&lt;br /&gt;&quot;During a three year mission to Mars, astronauts will experience increased exposure to space radiation that can cause cataracts and other problems,&quot; Dr. Ansari explained. &quot;In the absence of proper countermeasures, this may pose a risk for NASA. This technology could help us understand the mechanism for cataract formation so we can work to develop effective countermeasures to mitigate the risk and prevent it in astronauts.&quot;&lt;br /&gt;&lt;br /&gt;SOURCE: The National Eye Institute (NEI) &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/2656247824533437043/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/new-cataract-early-detection-device.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2656247824533437043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2656247824533437043'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/new-cataract-early-detection-device.html' title='Detection Device Uses Laser Light fiber optic Technique'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-5663513674361477604</id><published>2009-01-12T14:05:00.000-08:00</published><updated>2009-01-13T13:01:13.210-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic"/><category scheme="http://www.blogger.com/atom/ns#" term="Introduction"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="tutorial"/><title type='text'>Introduction to Networking</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Installing the Linux operating system is only the first step toward creating a fully functional departmental server or Web site. Almost all computers are now networked in some way to other devices therefore a basic understanding of networking and issues related to the topic will be essential to feeling comfortable with Linux servers. &lt;/div&gt;Some groups of IP addresses are reserved for use only in private networks and are not routed over the Internet. These are called &lt;b&gt;private IP addresses&lt;/b&gt; and have the following ranges: &lt;span class=&quot;fullpost&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This introductory chapter forms the foundation on which the following network configuration and troubleshooting chapters will be built. These chapters will then introduce the remaining chapters that cover Linux troubleshooting, general software installation and the configuration of many of the most popular Linux applications used in corporate departments and Small Office/Home Office (SOHO) environments. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Familiarity with the concepts explained in the following sections will help answer many of the daily questions often posed by coworkers, friends, and even yourself. It will help make the road to Linux mastery less perilous, a road that begins with an understanding of the OSI networking model and TCP/IP.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_OSI_Networking_Model&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The OSI Networking Model &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The Open System Interconnection (OSI) model, developed by the International Organization for Standardization, defines how the various hardware and software components involved in data communication should interact with each other. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A good analogy would be a traveler who prepares herself to return home through many dangerous kingdoms by obtaining permits to enter each country at the very beginning of the trip. At each frontier our friend has to hand over a permit to enter the country. Once inside, she asks the border guards for directions to reach the next frontier and displays the permit for that new kingdom as proof that she has a legitimate reason for wanting to go there. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In the OSI model each component along the data communications path is assigned a layer of responsibility, in other words, a kingdom over which it rules. Each layer extracts the permit, or header information, it needs from the data and uses this information to correctly forward what&#39;s left to the next layer. This layer also strips away its permit and forwards the data to the next layer, and so the cycle continues for seven layers. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The very first layer of the OSI model describes the transmission attributes of the cabling or wireless frequencies used at each &quot;link&quot; or step along the way. Layer 2 describes the error correction methodologies to be used on the link; layer 3 ensures that the data can hop from link to link on the way to the final destination described in its header. When the data finally arrives, the layer 4 header is used to determine which locally installed software application should receive it. The application uses the guidelines of layer 5 to keep track of the various communications sessions it has with remote computers and uses layer 6 to verify that the communication or file format is correct. Finally, layer 7 defines what the end user will see in the form of an interface, be it graphical on a screen or otherwise. A description of the functions of each layer in the model can be seen in Table 2-1.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Table_2-1:_The_Seven_OSI_Layers&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Table 2-1: The Seven OSI Layers &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: 0px;&quot; border=&quot;1&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot;&gt;  &lt;tbody&gt;&lt;tr&gt; &lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Layer &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Name &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Description &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Application &lt;/th&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 7 &lt;/td&gt;&lt;td&gt; Application &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; The user interface to the application &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;td rowspan=&quot;3&quot;&gt; &lt;p&gt;telnet &lt;/p&gt;&lt;p&gt;FTP &lt;/p&gt;&lt;p&gt;sendmail &lt;/p&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 6 &lt;/td&gt;&lt;td&gt; Presentation &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Converts data from one presentation format to another. For example, e-mail text entered into Outlook Express being converted into SMTP mail formatted data. &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 5 &lt;/td&gt;&lt;td&gt; Session &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Manages continuing requests and responses between the applications at both ends over the various established connections. &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 4 &lt;/td&gt;&lt;td&gt; Transport &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Manages the establishment and tearing down of a connection. Ensures that unacknowledged data is retransmitted. Correctly re-sequences data packets that arrive in the wrong order. &lt;/li&gt;&lt;li&gt; After the packet&#39;s overhead bytes have been stripped away, the resulting data is said to be a &lt;b&gt;segment&lt;/b&gt;. &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;td&gt; &lt;p&gt;TCP UDP &lt;/p&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 3 &lt;/td&gt;&lt;td&gt; Network &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Handles the routing of data between links that are not physically connected together. &lt;/li&gt;&lt;li&gt; After the link&#39;s overhead bytes have been stripped away, the resulting data is said to be a &lt;b&gt;packet&lt;/b&gt;. &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;td&gt; &lt;p&gt;IP ARP &lt;/p&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 2 &lt;/td&gt;&lt;td&gt; Link &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Error control and timing of bits speeding down the wire between two directly connected devices. &lt;/li&gt;&lt;li&gt; Data sent on a link is said to be structured in &lt;b&gt;frames&lt;/b&gt;. &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;td&gt; &lt;p&gt;Ethernet &lt;/p&gt;&lt;p&gt;ARP &lt;/p&gt; &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt; 1 &lt;/td&gt;&lt;td&gt; Physical &lt;/td&gt;&lt;td&gt; &lt;ul&gt;&lt;li&gt; Defines the electrical and physical characteristics of the network cabling and interfacing hardware &lt;/li&gt;&lt;/ul&gt; &lt;/td&gt;&lt;td&gt; Ethernet &lt;/td&gt;&lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;An_Introduction_to_TCP.2FIP&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;mw-headline&quot;&gt; &lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;mw-headline&quot;&gt;An Introduction to TCP/IP &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TCP/IP is a universal standard suite of protocols used to provide connectivity between networked devices. It is part of the larger OSI model upon which most data communications is based. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;One component of TCP/IP is the Internet Protocol (IP) which is responsible for ensuring that data is transferred between two addresses without being corrupted. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;For manageability, the data is usually split into multiple pieces or packets each with its own error detection bytes in the control section or header of the packet. The remote computer then receives the packets and reassembles the data and checks for errors. It then passes the data to the program that expects to receive it. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;How does the computer know what program needs the data? Each IP packet also contains a piece of information in its header called the type field. This informs the computer receiving the data about the type of layer 4 transportation mechanism being used. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The two most popular transportation mechanisms used on the Internet are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;When the type of transport protocol has been determined, the TCP/UDP header is then inspected for the &quot;port&quot; value, which is used to determine which network application on the computer should process the data. This is explained in more detail later.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;TCP_Is_a_Connection-Oriented_Protocol&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; TCP Is a Connection-Oriented Protocol &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TCP opens up a virtual connection between the client and server programs running on separate computers so that multiple and/or sporadic streams of data can be sent over an indefinite period of time between them. TCP keeps track of the packets sent by giving each one a sequence number with the remote server sending back acknowledgment packets confirming correct delivery. Programs that use TCP therefore have a means of detecting connection failures and requesting the retransmission of missing packets. TCP is a good example of a connection-oriented protocol.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_TCP_Establishes_A_Connection&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How TCP Establishes A Connection &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Any form of communication requires some form of acknowledgement for it to become meaningful. Someone knocks on the door to a house, the person inside asks &quot;Who is it?&quot;, to which the visitor replies, &quot;It&#39;s me!&quot; Then the door opens. Both persons knew who was on the other side of the door before it opened and now a conversation can now begin. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TCP acts in a similar way. The server initiating the connection sends a segment with the SYN bit set in TCP header. The target replies with a segment with the SYN and ACK bits set, to which the originating server replies with a segment with the ACK bit set. This SYN, SYN-ACK, ACK mechanism is often called the &quot;three-way handshake&quot;. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The communication then continues with a series of segment exchanges, each with the ACK bit set. When one of the servers needs to end the communication, it sends a segment to the other with the FIN and ACK bits set, to which the other server also replies with a FIN-ACK segment also. The communication terminates with a final ACK from the server that wanted to end the session. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This is the equivalent of ending a conversation by saying &quot;I really have to go now, I have to go for lunch&quot;, to which the reply is &quot;I think I&#39;m finished here too, see you tomorrow...&quot; The conversation ends with a final &quot;bye&quot; from the hungry person. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a modified packet trace obtained from the tethereal program discussed in Chapter 4, &lt;a href=&quot;http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch04_:_Simple_Network_Troubleshooting&quot; title=&quot;Quick HOWTO : Ch04 : Simple Network Troubleshooting&quot;&gt; &quot;Simple Network Troubleshooting&quot;&lt;/a&gt;. You can clearly see the three way handshake to connect and disconnect the session. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;hostA -&gt; hostB TCP 1443 &gt; http [SYN] &lt;b&gt;Seq=9766 Ack=0 Win=5840&lt;/b&gt; Len=0&lt;br /&gt;hostB -&gt; hostA TCP http &gt; 1443 [SYN, &lt;b&gt;ACK] Seq=8404 Ack=9767 Win=5792&lt;/b&gt; Len=0&lt;br /&gt;hostA -&gt; hostB TCP 1443 &gt; http [ACK] &lt;b&gt;Seq=9767 Ack=8405 Win=5840&lt;/b&gt; Len=0&lt;br /&gt;hostA -&gt; hostB HTTP HEAD/HTTP/1.1&lt;br /&gt;hostB -&gt; hostA TCP http &gt; 1443 [ACK] &lt;b&gt;Seq=8405 Ack=9985 Win=54&lt;/b&gt; Len=0&lt;br /&gt;hostB -&gt; hostA HTTP HTTP/1.1 200 OK&lt;br /&gt;hostA -&gt; hostB TCP 1443 &gt; http [ACK] &lt;b&gt;Seq=9985 Ack=8672 Win=6432&lt;/b&gt; Len=0&lt;br /&gt;hostB -&gt; hostA TCP http &gt; 1443 [FIN, ACK] &lt;b&gt;Seq=8672 Ack=9985 Win=54&lt;/b&gt; Len=0&lt;br /&gt;hostA -&gt; hostB TCP 1443 &gt; http [FIN, ACK] &lt;b&gt;Seq=9985 Ack=8673 Win=6432&lt;/b&gt; Len=0&lt;br /&gt;hostB -&gt; hostA TCP http &gt; 1443 [ACK] &lt;b&gt;Seq=8673 Ack=9986 Win=54&lt;/b&gt;&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In this trace, the sequence number represents the serial number of the first byte of data in the segment. So in the first line, a random value of 9766 was assigned to the first byte and all subsequent bytes for the connection from this host will be sequentially tracked. This makes the second byte in the segment number 9767, the third number 9768 etc. The acknowledgment number or Ack, not to be confused with the &lt;b&gt;ACK&lt;/b&gt; bit, is the byte serial number of the next segment it expects to receive from the other end, and the total number of bytes cannot exceed the &lt;b&gt;Win&lt;/b&gt; or window value that follows it. If data isn&#39;t received correctly, the receiver will re-send the requesting segment asking for the information to be sent again. The TCP code keeps track of all this along with the source and destination ports and IP addresses to ensure that each unique connection is serviced correctly.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;UDP.2C_TCP.27s_.22Connectionless.22_Cousin&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; UDP, TCP&#39;s &quot;Connectionless&quot; Cousin &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;UDP is a connectionless protocol. Data is sent on a &quot;best effort&quot; basis with the machine that sends the data having no means of verifying whether the data was correctly received by the remote machine. UDP is usually used for applications in which the data sent is not mission-critical. It is also used when data needs to be broadcast to all available servers on a locally attached network where the creation of dozens of TCP connections for a short burst of data is considered resource-hungry.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;TCP_and_UDP_Ports&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; TCP and UDP Ports &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The data portion of the IP packet contains a TCP or UDP segment sandwiched inside. Only the TCP segment header contains sequence information, but both the UDP and the TCP segment headers track the port being used. The source/destination port and the source/destination IP addresses of the client &amp;amp; server computers are then combined to uniquely identify each data flow. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Certain programs are assigned specific ports that are internationally recognized. For example, port 80 is reserved for HTTP Web traffic, and port 25 is reserved for SMTP e-mail. Ports below 1024 are reserved for privileged system functions, and those above 1024 are generally reserved for non-system third-party applications. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Usually when a connection is made from a client computer requesting data to the server that contains the data: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The client selects a random previously unused &quot;source&quot; port greater than 1024 and queries the server on the &quot;destination&quot; port specific to the application. If it is an HTTP request, the client will use a source port of, say, 2049 and query the server on port 80 (HTTP) &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The server recognizes the port 80 request as an HTTP request and passes on the data to be handled by the Web server software. When the Web server software replies to the client, it tells the TCP application to respond back to port 2049 of the client using a source port of port 80. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The client keeps track of all its requests to the server&#39;s IP address and will recognize that the reply on port 2049 isn&#39;t a request initiation for &quot;NFS&quot;, but a response to the initial port 80 HTTP query. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_TCP.2FIP_.22Time_To_Live.22_Feature&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The TCP/IP &quot;Time To Live&quot; Feature &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Each IP packet has a Time to Live (TTL) section that keeps track of the number of network devices the packet has passed through to reach its destination. The server sending the packet sets the initial TTL value, and each network device that the packet passes through then reduces this value by 1. If the TTL value reaches 0, the network device will discard the packet. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This mechanism helps to ensure that bad routing on the Internet won&#39;t cause packets to aimlessly loop around the network without being removed. TTLs therefore help to reduce the clogging of data circuits with unnecessary traffic. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Remember this concept as it will be helpful in understanding the traceroute troubleshooting technique outlined in Simple Network Troubleshooting, that covers Network Troubleshooting.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_ICMP_Protocol_and_Its_Relationship_to_TCP.2FIP&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt;The ICMP Protocol and Its Relationship to TCP/IP&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There is another commonly used protocol called the Internet Control Message Protocol (ICMP). It is not strictly a TCP/IP protocol, but TCP/IP-based applications use it frequently. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;ICMP provides a suite of error, control, and informational messages for use by the operating system. For example, IP packets will occasionally arrive at a server with corrupted data due to any number of reasons including a bad connection; electrical interference, or even misconfiguration. The server will usually detect this by examining the packet and correlating the contents to what it finds in the IP header&#39;s error control section. It will then issue an ICMP reject message to the original sending machine saying that the data should be re-sent because the original transmission was corrupted. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;ICMP also includes echo and echo reply messages used by the Linux ping command to confirm network connectivity. ICMP TTL expired messages are also sent by network devices back to the originating server whenever the TTL in a packet is decremented to zero. More information on ICMP messages can be found in both Appendix 1, Miscellaneous Linux Topics, and Simple Network Troubleshooting, on network troubleshooting.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_IP_Addresses_Are_Used_To_Access_Network_Devices&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How IP Addresses Are Used To Access Network Devices &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;All TCP/IP enabled devices connected to the Internet have an Internet Protocol (IP) address. Just like a telephone number, it helps to uniquely identify a user of the system. The Internet Assigned Numbers Authority (IANA) is the organization responsible for assigning IP addresses to Internet Service Providers (ISPs) and deciding which ones should be used for the public Internet and which ones should be used on private networks. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;IP addresses are in reality a string of 32 binary digits or &lt;b&gt;bits&lt;/b&gt;. For ease of use, network engineers often divide these 32 bits into four sets of 8 bits (or octets), each representing a number from 0 to 255. Each number is then separated by a period (.) to create the familiar dotted &lt;b&gt;decimal notation&lt;/b&gt;. An example of an IP address that follows these rules is 97.65.25.12. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Private_IP_Addresses&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Private IP Addresses&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;pre&gt;10.0.0.0 - 10.255.255.255&lt;br /&gt;172.16.0.0 - 172.31.255.255&lt;br /&gt;192.168.0.0 - 192.168.255.255&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Home networking equipment/devices usually are configured in the factory with an IP address in the range 192.168.1.1 to 192.168.1.255. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You may be wondering how devices using private addresses could ever access the Internet if the use of private addresses on the Internet is illegal. The situation gets even more confusing if you consider the fact that hundreds of thousands of office and home networks use these same addresses. This must cause networking confusion. Don&#39;t worry, this problem is overcome by NAT.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_localhost_IP_Address&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The localhost IP Address &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Whether or not your computer has a network interface card it will have a built-in IP address with which network-aware applications can communicate with one another. This IP address is defined as 127.0.0.1 and is frequently referred to as localhost. This concept is important to understand, and will be revisited in many later chapters.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Network_Address_Translation_.28NAT.29_Makes_Private_IPs_Public&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Network Address Translation (NAT) Makes Private IPs Public &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Your router/firewall will frequently be configured to give the impression to other devices on the Internet that all the servers on your home/office network have a valid &lt;b&gt;public IP address&lt;/b&gt;, and not a &quot;private&quot; IP address. This is called &lt;b&gt;network address translation (NAT)&lt;/b&gt; and is often also called &lt;b&gt;IP masquerading&lt;/b&gt; in the Linux world. There are many good reasons for this, the two most commonly stated are: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; No one on the Internet knows your true IP address. NAT protects your home PCs by assigning them IP addresses from &quot;private&quot; IP address space that cannot be routed over the Internet. This prevents hackers from directly attacking your home systems because packets sent to the &quot;private&quot; IP will never pass over the Internet. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Hundreds of PCs and servers behind a NAT device can masquerade as a single public IP address. This greatly increases the number of devices that can access the Internet without running out of &quot;public&quot; IP addresses. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You can configure NAT to be &lt;b&gt;one to one&lt;/b&gt; in which you request your ISP to assign you a number of public IP addresses to be used by the Internet-facing interface of your firewall and then you pair each of these addresses to a corresponding server on your protected private IP network. You can also use &lt;b&gt;many to one&lt;/b&gt; NAT, in which the firewall maps a single IP address to multiple servers on the network. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As a general rule, you won&#39;t be able to access the public NAT IP addresses from servers on your home network. Basic NAT testing requires you to ask a friend to try to connect to your home network from the Internet.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Port_Forwarding_with_NAT_Facilitates_Home-Based_Web_sites&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Port Forwarding with NAT Facilitates Home-Based Web sites &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In a simple home network, all servers accessing the Internet will appear to have the single public IP address of the router/firewall because of many to one NAT. Because the router/firewall is located at the border crossing to the Internet, it can easily keep track of all the various outbound connections to the Internet by monitoring: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The IP addresses and TCP ports used by each home based server and mapping it to &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The TCP ports and IP addresses of the Internet servers with which they want to communicate. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This arrangement works well with a single NAT IP trying to initiate connections to many Internet addresses. The reverse isn&#39;t true. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;New connections initiated from the Internet to the public IP address of the router/firewall face a problem. The router/firewall has no way of telling which of the many home PCs behind it should receive the relayed data because the mapping mentioned earlier doesn&#39;t exist beforehand. In this case the data is usually discarded. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Port forwarding is a method of counteracting this. For example, you can configure your router/firewall to forward TCP port 80 (Web/HTTP) traffic destined to the outside NAT IP to be automatically relayed to a specific server on the inside home network &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As you may have guessed, port forwarding is one of the most common methods used to host Web sites at home with DHCP DSL.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;DHCP&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; DHCP &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The Dynamic Host Configuration Protocol (DHCP) is a protocol that automates the assignment of IP addresses, subnet masks default routers, and other IP parameters. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The assignment usually occurs when the DHCP configured machine boots up, or regains connectivity to the network. The DHCP client sends out a query requesting a response from a DHCP server on the locally attached network. The DHCP server then replies to the client PC with its assigned IP address, subnet mask, DNS server and default gateway information. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The assignment of the IP address usually expires after a predetermined period of time, at which point the DHCP client and server renegotiate a new IP address from the server&#39;s predefined pool of addresses. Configuring firewall rules to accommodate access from machines who receive their IP addresses via DHCP is therefore more difficult because the remote IP address will vary from time to time. You&#39;ll probably have to allow access for the entire remote DHCP subnet for a particular TCP/UDP port. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most home router/firewalls are configured in the factory to be DHCP servers for your home network. You can also make your Linux box into a DHCP server, once it has a fixed IP address. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The most commonly used form of DSL will also assign the outside interface of your router/firewall with a single DHCP provided IP address.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_DNS_Links_Your_IP_Address_To_Your_Web_Domain&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How DNS Links Your IP Address To Your Web Domain &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The domain name system (DNS) is a worldwide server network used to help translate easy to remember domain names like www.linuxhomenetworking.com into an IP address that can be used behind the scenes by your computer. Here step by step description of what happens with a DNS lookup. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Most home computers will get the IP address of their DNS server via DHCP from their router/firewall. &lt;/li&gt;&lt;li&gt; Home router/firewall providing DHCP services often provides its own IP address as the DNS name server address for home computers. &lt;/li&gt;&lt;li&gt; The router/firewall then redirects the DNS queries from your computer to the DNS name server of your Internet service provider (ISP). &lt;/li&gt;&lt;li&gt; Your ISP&#39;s DNS server then probably redirects your query to one of the 13 &quot;root&quot; name servers. &lt;/li&gt;&lt;li&gt; The root server then redirects your query to one of the Internet&#39;s &quot;.com&quot; DNS name servers which will then redirect the query to the &quot;linuxhomenetworking.com&quot; domain&#39;s name server. &lt;/li&gt;&lt;li&gt; The linuxhomenetworking.com domain name server then responds with the IP address for www.linuxhomenetworking.com &lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As you can imagine, this process can cause a noticeable delay when you are browsing the Web. Each server in the chain will store the most frequent DNS name to IP address lookups in a memory cache which helps to speed up the response. Configuring DNS, explains how to you can make your Linux box into a caching or regular DNS server for your network or Web site if your ISP provides you with fixed IP addresses. Chapter 19, Dynamic DNS, explains how to configure DNS for a Web site housed on a DHCP DSL circuit where the IP address constantly changes. It explains the auxiliary DNS standard called dynamic DNS (DDNS) that was created for this type of scenario.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;IP_Version_6_.28IPv6.29&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; IP Version 6 (IPv6) &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most Internet-capable networking devices use version 4 of the Internet Protocol (IPv4) which I have described here. You should also be aware that there is now a version 6 (IPv6) that has recently been developed as a replacement. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;With only 32 bits, the allocation of version 4 addresses will soon be exhausted between all the world&#39;s ISPs. Version 6, which uses a much larger 128-bit address offers eighty billion, billion, billion times more IP addresses which it is hoped should last for most of the 21st century. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;IPv6 packets are also labeled to provide quality-of-service information that can be used in prioritizing real-time applications, such as video and voice, over less time-sensitive ones such as regular Web surfing and chat. IPv6 also inherently supports the IPSec protocol suite used in many forms of secured networks, such as virtual private networks (VPNs). &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most current operating systems support IPv6 even though it isn&#39;t currently being used extensively within corporate or home environments. Expect it to become an increasingly bigger part of your network planning in years to come.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_Subnet_Masks_Group_IP_Addresses_into_Networks&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How Subnet Masks Group IP Addresses into Networks &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Subnet masks are used to tell which part of the IP address represents the network on which the computer is connected (network portion) and the computer&#39;s unique identifier on that network (host portion). The term &lt;b&gt;netmasks&lt;/b&gt; is often used interchangeably with the term &lt;b&gt;subnet masks&lt;/b&gt;, this book will use the latter term for the sake of consistency. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A simple analogy would be a phone number, such as (808) 225-2468. The (808) represents the area code, and the 225-2468 represents the telephone within that area code. Subnet masks allow you to specify how long you want the area code to be (network portion) at the expense of the number of telephones in that are in the area code (host portion) &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most home networks use a subnet mask of 255.255.255.0. Each 255 means this octet is for the area code (network portion). So if your server has an IP address of 192.168.1.25 and a subnet mask of 255.255.255.0, the network portion would be 192.168.1 and the server or host would be device #25 on that network. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In all cases, the first IP address in a network is reserved as the network&#39;s base address and the last one is reserved for broadcast traffic that is intended to be received by all devices on the network. In our example, 192.168.1.0 would be the network address and 192.168.1.255 would be used for broadcasts. This means you can then use IP addresses from #1 to #254 on your private network. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Calculating_The_Number_of_Addresses_Assigned_to_a_Subnet&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Calculating The Number of Addresses Assigned to a Subnet &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most office and home networks use networks with 255 IP addresses or less in which the subnet mask starts with the numbers 255.255.255. This is not a pure networking text, so I&#39;ll not discuss larger networks because that can become complicated, but in cases where less than 255 IP addresses are required a few apply. There are only seven possible values for the last octet of a subnet mask. These are 0, 192, 128, 224, 240, 248 and 252. You can calculate the number of IP addresses for each of these by subtracting the value from 256. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In many cases the subnet mask isn&#39;t referred to by the dotted decimal notation, but rather by the actual number of bits in the mask. So for example a mask of 255.255.255.0 may be called a /24 (slash 24) mask instead. A list of the most commonly used masks in the office or home environment is presented in Table 2-2. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Table_2-2:_The_.22Dotted_Decimal.22_And_.22Slash.22_Subnet_Mask_Notations&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Table 2-2: The &quot;Dotted Decimal&quot; And &quot;Slash&quot; Subnet Mask Notations &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: 0px;&quot; border=&quot;1&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot;&gt;  &lt;tbody&gt;&lt;tr&gt; &lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Dotted Decimal Format &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Slash Format &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Available Addresses &lt;/th&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.0 &lt;/td&gt;&lt;td&gt;/24 &lt;/td&gt;&lt;td&gt;256 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.128 &lt;/td&gt;&lt;td&gt;/25 &lt;/td&gt;&lt;td&gt;128 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.192 &lt;/td&gt;&lt;td&gt;/26 &lt;/td&gt;&lt;td&gt;64 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.224 &lt;/td&gt;&lt;td&gt;/27 &lt;/td&gt;&lt;td&gt;32 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.240 &lt;/td&gt;&lt;td&gt;/28 &lt;/td&gt;&lt;td&gt;16 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.248 &lt;/td&gt;&lt;td&gt;/29 &lt;/td&gt;&lt;td&gt;8 &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;255.255.255.252 &lt;/td&gt;&lt;td&gt;/30 &lt;/td&gt;&lt;td&gt;4 &lt;/td&gt;&lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;So for example, if you have a subnet mask of 255.255.255.192, then you have 64 IP addresses in your subnet (256 - 192)&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Calculating_the_Range_of_Addresses_on_Your_Network&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Calculating the Range of Addresses on Your Network &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If someone gives you an IP address of 97.158.253.28 and a subnet mask of 255.255.255.248, how do you determine the network address and the broadcast address, in other words the boundaries, of your network? The following section outlines the steps to do this using both a manual and programmed methodology. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Manual_Calculation&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Manual Calculation &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Take out your pencil and paper, manual calculation can be tricky. Here we go! &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Subtract the last octet of the subnet mask from 256 to give the number of IP addresses in the subnet. (256 - 248) = 8 &lt;/li&gt;&lt;li&gt; Divide the last octet of the IP address by the result of step 1; don&#39;t bother with the remainder (for example 28 / 8 = 3). This gives you the theoretical number of subnets of the same size that are below this IP address. &lt;/li&gt;&lt;li&gt; Multiply this result by the result of step 1 to get the network address (8 x 3 = 24). Think of it as the third subnet with 8 addresses in it. The network address is therefore 97.158.253.24 &lt;/li&gt;&lt;li&gt;The broadcast address is the result of step 3 plus the result of step 1 minus 1. (24 + 8 -1 = 31). Think of it as the broadcast address being the network address plus the number of IP addresses in the subnet minus 1&quot;. The broadcast address is 97.158.253.31 &lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Let&#39;s do this for 192.168.3.56 with a mask of 255.255.255.224: &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; 256 - 224 = 32 &lt;/li&gt;&lt;li&gt; 56/32 = 1 &lt;/li&gt;&lt;li&gt; 32 x 1 = 32. Therefore the network base address is 192.168.3.32 &lt;/li&gt;&lt;li&gt; 32 + 32 - 1 = 63. Therefore the broadcast address is 192.168.3.63 &lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Let&#39;s do this for 10.0.0.75 with a mask of 255.255.255.240 &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; 256 - 240 = 16 &lt;/li&gt;&lt;li&gt; 75/16 = 4 &lt;/li&gt;&lt;li&gt; 16 x 4 = 64. Therefore the network base address is 10.0.0.64 &lt;/li&gt;&lt;li&gt; 64 + 16 -1 = 79. Therefore the broadcast address is 10.0.0.79 &lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;b&gt;Note:&lt;/b&gt; As a rule of thumb, the last octet of your network base address must be divisible by the &quot;256 minus the last octet of your subnet mask&quot; and leave no remainder. If you are sub-netting a large chunk of IP addresses it&#39;s always a good idea to lay it out on a spreadsheet to make sure there are no overlapping subnets. Once again, this calculation exercise only works with subnet masks that start with &quot;255.255.255&quot;. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Calculation_Using_a_Script&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Calculation Using a Script &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There is a BASH script in Appendix II,&lt;span style=&quot;text-decoration: underline;&quot;&gt; Codes, Script, and Configuration&lt;/span&gt;, that will do this for you. Here is an example of how to use it, just provide the IP address followed by the subnet mask as arguments. It will accept subnet masks in dotted decimal format or /value format &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;[root@bigboy tmp]# ./subnet-calc.sh 216.151.193.92 /28&lt;br /&gt;IP Address           : 216.151.193.92&lt;br /&gt;Network Base Address : 216.151.193.80&lt;br /&gt;Broadcast Address    : 216.151.193.95&lt;br /&gt;Subnet Mask          : 255.255.255.240&lt;br /&gt;Subnet Size          : 16 IP Addresses&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt; &lt;a name=&quot;Subnet_Masks_for_the_Typical_Business_DSL_Line&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Subnet Masks for the Typical Business DSL Line &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you purchased a DSL service from your ISP that gives you fixed IP addresses, they will most likely provide you with a subnet mask of 255.255.255.248 that defines 8 IP addresses. For example, if the ISP provides you with a public network address of 97.158.253.24, a subnet mask of 255.255.255.248, and a gateway of 97.158.253.25, then your IP addresses will be: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;97.158.253.24 - Network base address&lt;br /&gt;97.158.253.25 - Gateway&lt;br /&gt;97.158.253.26 - Available&lt;br /&gt;97.158.253.27 - Available&lt;br /&gt;97.158.253.28 - Available&lt;br /&gt;97.158.253.29 - Available&lt;br /&gt;97.158.253.30 - Available&lt;br /&gt;97.158.253.31 - Broadcast&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt; &lt;a name=&quot;The_Physical_and_Link_Layers&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The Physical and Link Layers &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TCP/IP can be quite interesting, but a knowledge of the first two layers of the OSI model are important too, because without them, even the most basic communication would be impossible. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There are very many standards that define the physical, electrical, and error-control methodologies of data communication. One of the most popular ones in departmental networks is Ethernet, which is available in a variety of cable types and speed capabilities, but the data transmission and error correction strategy is the same in all. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Ethernet used to operate primarily in a mode where every computer on a network section shared the same Ethernet cable. Computers would wait until the line was clear before transmitting. They would then send their data while comparing what they wanted to send with what they actually sent on the cable as a means of error detection. If a mathematical comparison, or cyclic redundancy check (CRC), detected any differences between the two, the server would assume that it transmitted data simultaneously with another server on the cable. It would then wait some random time and retransmit at some later stage when the line was clear again. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Transmitting data only after first sensing whether the cable, which was strung between multiple devices, had the correct signaling levels is a methodology called &lt;b&gt;carrier sense, multiple access&lt;/b&gt; or CSMA. The ability to detect garbling due to simultaneous data transmissions, also known as collisions, is called &lt;b&gt;collision detect&lt;/b&gt; or CD. You will frequently see references to Ethernet being a CSMA/CD technology for this reason and similar schemes are now being used in wireless networks. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Ethernet devices are now usually connected via a dedicated cable, using more powerful hardware capable of simultaneously transmitting and receiving without interference, thereby making it more reliable and inherently faster than its predecessor versions. The original Ethernet standard has a speed of 10 Mbps; the most recent versions can handle up to 40Gbps! &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The 802.11 specifications that define many wireless networking technologies are another example of commonly used layer 1 and 2 components of the OSI model. DSL, cable modem standards and, T1 circuits are all parts of these layers. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The next few sections describe many physical and link layer concepts and the operation of the devices that use them to connect the computers in our offices and homes.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Networking_Equipment_Terminology&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Networking Equipment Terminology &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Up to this point you have had only an introduction to the theory of the first two OSI layers. Now we&#39;ll cover the hardware used to implement them. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Network_Interface_Cards&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Network Interface Cards &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Your network interface card is also frequently called a NIC. Currently, the most common types of NIC used in the home and office are Ethernet and wireless Ethernet cards. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_Meaning_of_the_NIC_Link_Light&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The Meaning of the NIC Link Light &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The link light signifies that the NIC card has successfully detected a device on the other end of the cable. This indicates that you are using the correct type of cable and that the duplex has been negotiated correctly between the devices at both ends. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Duplex_Explained&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Duplex Explained &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Full duplex data paths have the capability of allowing the simultaneous sending and receiving of data. Half duplex data paths can transmit in both directions too, but in only one direction at a time. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Full duplex uses separate pairs of wires for transmitting and receiving data so that incoming data flows don&#39;t interfere with outgoing data flows. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Half duplex uses the same pairs of wires for transmitting and receiving data. Devices that want to transmit information have to wait their turn until the &quot;coast is clear&quot; at which point they send the data. Error-detection and data-retransmission mechanisms ensure that the data reaches the destination correctly and are specifically designed to remedy data corruption caused when multiple devices start transmitting at the same time. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A good analogy for full duplex communications is the telephone, in which both parties can speak at the same time. Half duplex on the other hand is more like a walkie-talkie in which both parties have to wait until the other is finished before they can speak. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Data transfer speeds will be low and error levels will be high if you have a device at one end of a cable set to full duplex and a device at the other end of the cable set to half duplex. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Most modern network cards can autonegotiate duplex with the device on the other end of the wire. It is for this reason that duplex settings aren&#39;t usually a problem for Linux servers. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_MAC_Address&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The MAC Address &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The media access control (MAC) address can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame that uses MAC addresses to direct traffic on your locally attached network. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;MAC addresses therefore have significance only on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_ARP_Maps_the_MAC_Address_to_Your_IP_Address&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How ARP Maps the MAC Address to Your IP Address &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The Address Resolution Protocol (ARP) is used to map MAC addresses to network IP addresses. When a server needs to communicate with another server it does the following steps: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; The server first checks its routing table to see which router provides the next hop to the destination network. &lt;/li&gt;&lt;li&gt; If there is a valid router, let&#39;s say with an IP address of 192.168.1.1, the server checks its ARP table to see whether it has the MAC address of the router&#39;s NIC. You could very loosely view this as the server trying to find the Ethernet serial number of the next hop router on the local network, thereby ensuring that the packet is sent to the correct device. &lt;/li&gt;&lt;li&gt; If there is an ARP entry, the server sends the IP packet to its NIC and tells the NIC to encapsulate the packet in a frame destined for the MAC address of the router. &lt;/li&gt;&lt;li&gt; If there is no ARP entry, the server issues an ARP request asking that router 192.168.1.1 respond with its MAC address so that the delivery can be made. When a reply is received, the packet is sent and the ARP table is subsequently updated with the new MAC address. &lt;/li&gt;&lt;li&gt; As each router in the path receives the packet, it plucks the IP packet out of the Ethernet frame, leaving the MAC information behind. It then inspects the destination IP address in the packet and use its routing table to determine the IP address of the next router on the path to this destination. &lt;/li&gt;&lt;li&gt; The router then uses the &quot;ARP-ing&quot; process to get the MAC address of this next hop router. It then reencapsulates the packet in an Ethernet frame with the new MAC address and sends the frame to the next hop router. This relaying process continues until the packet reaches the target computer. &lt;/li&gt;&lt;li&gt; If the target server is on the same network as the source server, a similar process occurs. The ARP table is queried. If no entry is available, an ARP request is made asking the target server for its MAC address. Once a reply is received, the packet is sent and the ARP table is subsequently updated with the new MAC address. &lt;/li&gt;&lt;li&gt; The server will not send the data to its intended destination unless it has an entry in its ARP table for the next hop. If it doesn&#39;t, the application needing to communicate will issue a timeout or time exceeded error. &lt;/li&gt;&lt;li&gt; As can be expected, the ARP table contains only the MAC addresses of devices on the locally connected network. ARP entries are not permanent and will be erased after a fixed period of time depending on the operating system used. &lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Linux Networking, which covers Linux network topics, shows how to see your ARP table and the MAC addresses of your server&#39;s NICs. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Common_ARP_Problems_When_Changing_A_NIC&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Common ARP Problems When Changing A NIC &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You may experience connectivity problems if you change the MAC address assigned to an IP address. This can happen if you swap a bad NIC card in a server, or replace a bad server but have the new one retain the IP address of the old. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Routers typically save learned MAC to IP address map entries in a cache and won&#39;t refresh them unless a predefined period of time has elapsed. Changing the NIC, while retaining the IP address can cause problems as the router will continue to send frames onto the network with the correct target IP address but the old target MAC address. The server with the new NIC won&#39;t respond as the frame&#39;s target MAC doesn&#39;t match it&#39;s own. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This problem can be fixed in one of two ways. You can delete all the ARP entries in the router&#39;s cache. The second solution is to log into the server&#39;s console and ping it&#39;s gateway. The router will detect the MAC to IP address change and it will readjust its ARP table.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_Two_Broad_Types_Of_Networking_Equipment&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The Two Broad Types Of Networking Equipment &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There are two main types of networking equipment; Data Communications Equipment (DCE) which is intended to act as the primary communications path, and Data Terminal Equipment (DTE) which acts as the source or destination of the transmitted data. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Data_Terminal_Equipment&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Data Terminal Equipment &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;DTE devices were originally computer terminals located at remote offices or departments that were directly connected modems. The terminals would have no computing power and only functioned as a screen/keyboard combination for data processing. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nowadays most PCs have their COM and Ethernet ports configured as if they were going to be connected to a modem or other type of purely networking-oriented equipment. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Data_Communications_Equipment&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Data Communications Equipment &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A DCE is also known as Data Circuit-Terminating Equipment and refers to such equipment as modems and other devices designed primarily to provide network access. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Using_Straight-Through.2FCrossover_Cables_to_Connect_DTEs_And_DCEs&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Using Straight-Through/Crossover Cables to Connect DTEs And DCEs &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;When a DCE is connected to a DTE, you will need a &lt;b&gt;straight-through cable&lt;/b&gt;. DCEs connected to DCEs or DTEs connected to DTEs require &lt;b&gt;crossover cables&lt;/b&gt;. This terminology is generally used with Ethernet cables. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The terminology can be different for cables used to connect serial ports together. When connecting a PC&#39;s COM port (DTE) to a modem (DCE) the straight-through cable is frequently called a &lt;b&gt;modem cable&lt;/b&gt;. When connecting two PCs (DTE) together via their COM ports, the crossover cable is often referred to as a &lt;b&gt;null modem cable&lt;/b&gt;. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Some manufacturers configure the Ethernet ports of their networking equipment to be either of the DTE or the DCE type, and other manufacturers have designed their equipment to flip automatically between the two types until it gets a good link. As you can see, confusion can arise when selecting a cable. If you fail to get a link light when connecting your Ethernet devices together, try using the other type of cable. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A straight-through Ethernet cable is easy to identify. Hold the connectors side by side, pointing in the same direction with the clips facing away from you. The color of the wire in position #1 on connector #1 should be the same as that of position #1 on connector #2. The same would go for positions #2 through #8, that is, the same color for corresponding wires on each end. A crossover cable has them mixed up. Table 2-3 provides some good rules of thumb. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Table_2-3:_Cabling_Rules_of_Thumb&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Table 2-3: Cabling Rules of Thumb &lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;table style=&quot;text-align: left; margin-left: 0px; margin-right: 0px;&quot; border=&quot;1&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot;&gt;  &lt;tbody&gt;&lt;tr&gt; &lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Scenario &lt;/th&gt;&lt;th style=&quot;background: rgb(0, 128, 0) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; color: white;&quot;&gt; Likely Cable Type &lt;/th&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;PC to PC &lt;/td&gt;&lt;td&gt;Crossover &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;Hub to hub &lt;/td&gt;&lt;td&gt;Crossover &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;Switch to switch &lt;/td&gt;&lt;td&gt;Crossover &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;PC to modem &lt;/td&gt;&lt;td&gt;Straight-Through &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;PC to hub &lt;/td&gt;&lt;td&gt;Straight-Through &lt;/td&gt;&lt;/tr&gt; &lt;tr valign=&quot;top&quot;&gt; &lt;td&gt;PC to switch &lt;/td&gt;&lt;td&gt;Straight-Through&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Connectivity_Using_Hubs&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;mw-headline&quot;&gt; &lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;mw-headline&quot;&gt;Connectivity Using Hubs &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A hub is a device into which you can connect all devices on a network so that they can talk together. Hubs physically cross-connect all their ports with one another which causes all traffic sent from a server to the hub to be blurted out to all other servers connected to that hub whether they are the intended recipient or not. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Hubs have no, or very little, electronics inside and therefore do not regulate traffic. It is possible for multiple servers to speak at once with all of them receiving garbled messages. When this happens the servers try again, after a random time interval, until the message gets through correctly. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;It is for these reasons that Ethernet devices that plug into hubs should be set to half duplex. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; Hubs can add a lot of delays to your network because of the message garbling collisions and retransmissions. A switch is a much more reliable and predictable alternative, and ones made for the home often cost only a few dollars more. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Using_Switches_as_a_Faster_Alternative_to_Hubs&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Using Switches as a Faster Alternative to Hubs &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A switch is also a device into which you can connect all devices on a home network so that they can talk together. Unlike a hub, traffic sent from Server A to Server B will be received only by Server B. The only exception is broadcast traffic which is blurted out to all the servers simultaneously. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Switches regulate traffic, thereby eliminating the possibility of message garbling and providing a more efficient traffic flow. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Devices that plug into switches should be set to full duplex to take full advantage of the dedicated bandwidth coming from each switch port. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Local_Area_Networks&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Local Area Networks &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A local area network (LAN) is a grouping of ports on a hub, switch or tied to a wireless access point (WAP) that can communicate only with each other. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;It is possible to connect multiple switches and/or hubs in a chain formation to create a LAN with more ports. This is often called &lt;b&gt;daisy chaining&lt;/b&gt;. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Switches and hubs provide no access control between servers connected to the same LAN. This is why network administrators group trusted servers having similar roles on the same LAN. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Servers use their IP address and subnet mask and the IP address of the remote server to determine whether they are both on the same network. If not, they attempt to communicate with each other via routers that interconnect their LANs. Routers are also capable of filtering traffic passing between the two LANs therefore providing additional security. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Larger, more expensive switches can be configured to assign only certain ports to prespecified virtual LANs or (VLANs) chosen by the network administrator. In this case, the switch houses ports on multiple LANs. A router still needs to be connected to each VLAN for internetwork communication. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_Routers_Interconnect_LANs&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How Routers Interconnect LANs &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As stated before, switches and hubs usually have only servers connected to them that have been configured as being part of the same network. By connecting its NIC cards to multiple LANs, a correctly configured router is capable of relaying traffic between networks. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Routers can also be configured to deny communication between specific servers on different networks. They can also filter traffic based on the TCP port section of each packet. For example, it is possible to deny communication between two servers on different networks that intend to communicate on TCP port 80, and allow all other traffic between them. Routers therefore direct and regulate traffic between separate networks, much like a traffic policeman. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you intend to route between networks, you must reserve an IP address for a router for each network and make sure that the router is directly connected to the LAN associated with that network. The network engineer responsible for the router will also have to specify which locally connected networks can be advertised to the router&#39;s neighbors and whether this information can be relayed to all the routers in an administrative zone, or routing domain. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In this example, we can see that the router is aware of many different networks (represented by the slash notation for subnet masks). The routing table also shows the best serial and VLAN type interfaces to use to get to these destinations and the IP address of the neighboring router through which traffic needs to be relayed to get there. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;router&gt;show ip route&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;Gateway of last resort is 10.1.1.1.1 to network 0.0.0.0&lt;br /&gt;&lt;br /&gt;172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks&lt;br /&gt;S       172.16.0.0/16 is directly connected, Null0&lt;br /&gt;S       172.16.6.0/24 is directly connected, Null0&lt;br /&gt;172.17.0.0/24 is subnetted, 2 subnets&lt;br /&gt;S       172.17.2.0 [1/0] via 10.1.1.1.1&lt;br /&gt;S    192.168.200.0/24 is directly connected, Null0&lt;br /&gt;10.0.0.0/8 is variably subnetted, 64 subnets, 8 masks&lt;br /&gt;O E1    10.2.0.0/16 [110/22] via 10.89.0.2, 3w1d, Serial1/0/1&lt;br /&gt;C       10.119.3.0/24 is directly connected, Vlan3&lt;br /&gt;O       10.2.2.0/24 [110/3] via 10.89.0.2, 3w1d, Serial1/0/1&lt;br /&gt;O       10.132.10.0/24 [110/3] via 10.119.2.2, 3w1d, Vlan2&lt;br /&gt;O       10.119.0.20/30 [110/3] via 10.89.0.26, 7w0d, Serial1/0/0&lt;br /&gt;S       10.253.72.0/21 [1/0] via 10.1.1.13&lt;br /&gt;C       10.10.192.0/24 is directly connected, Vlan114&lt;br /&gt;O       10.230.232.0/22 [110/4] via 10.89.0.26, 7w0d, Serial1/0/0&lt;br /&gt;S*   0.0.0.0/0 [1/0] via 10.1.1.1.1&lt;br /&gt;router&gt;&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In home networks, routers usually have only two interfaces that provide connectivity to the Internet via network address translation or NAT. In other words routers act as gateways to the wider world and it won&#39;t be surprising to learn that routers are frequently referred to as &quot;gateways&quot;. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; The term &lt;b&gt;gateway&lt;/b&gt; specifically refers to a device that routes traffic between dissimilar network protocols (IP to Appletalk) or access methods (Ethernet to DSL). Routers transfer traffic where both the protocols and communications medium are the same. The terms are frequently used interchangeably, especially if only one network protocol is being used. Therefore a home DSL router that provides IP Internet access to an Ethernet network is technically both a gateway and a router. The distinction can be important in complicated networking environments where newer technologies need to talk with older ones using incompatible communications protocols.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;How_Simple_Routing_Works&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; How Simple Routing Works &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In the broader networking sense, a &quot;route&quot; refers to the path data takes to traverse from its source to its destination. Each router along the way may also be referred to as a hop. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Usually when we speak about a route on a Linux box, we are referring to the IP address of the first hop needed to reach the desired destination network. It is assumed that this first hop will know how to automatically relay the packet. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As explained previously, routers are designed to exchange routing information dynamically, and can therefore intelligently redirect traffic to bypass failed network links. Home Linux boxes frequently don&#39;t run a dynamic routing protocol and therefore rely on &quot;static&quot; routes issued by the system administrator at the command line or in configuration files to determine the next hop to all desired networks. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Linux Networking, which covers Linux network topics, shows how to add static routes to your Linux box and also how you can convert it into a simple router.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Default_Gateways.2C_The_Routers_Of_Last_Resort&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Default Gateways, The Routers Of Last Resort &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A default gateway is the router that is used when no alternative devices can be found to relay the traffic. They are often called &quot;routers of last resort&quot;. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Say for example you have two routers R1 and R2. R1 is connected to both your SOHO home network and the Internet. R2 is connected to SOHO home network and is capable of relaying data to other corporate networks with addresses starting with 10.X.X.X via another NIC card. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;You could put a route on your SOHO servers that states: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Go to network 10.0.0.0 255.0.0.0 via router R2 &lt;/li&gt;&lt;li&gt; Go to everything else via router R1. R1 therefore would be considered your default gateway &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;For most home networks, your default gateway would be the router/firewall connected to the Internet. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Linux Networking, which covers Linux network topics, shows how to configure the default gateway on your Linux box.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Firewalls_Help_Provide_a_Secure_Routing_Environment&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Firewalls Help Provide a Secure Routing Environment &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Firewalls can be viewed as routers with more enhanced abilities to restrict traffic, not just by port and IP address as routers do. Specifically, firewalls can detect malicious attempts to subvert the TCP/IP protocol. A short list of capabilities includes: &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Throttling traffic to a server when too many unfulfilled connections are made to it &lt;/li&gt;&lt;li&gt; Restricting traffic being sent to obviously bogus IP addresses &lt;/li&gt;&lt;li&gt; Providing network address translation or NAT &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Routers are designed to make packets flow as quickly as possible with the minimum amount of inspection. Firewalls are used as close to the source or target of data communication as possible to try to ensure that the data hasn&#39;t been subverted. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Firewalls can often create an encrypted data path between two Private networks across the Internet providing secure communication with a greatly reduced chance of eavesdropping. These communication channels are called Virtual Private Networks or VPNs and are frequently used to connect branch offices to the corporate headquarters and also to allow sales representatives to get access to sensitive pricing information when traveling from town to town.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Additional_Introductory_Topics&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Additional Introductory Topics &lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The last few topics of this chapter may not appear to be directly related to networking, but they cover Linux help methods that you&#39;ll use extensively and the File Transfer Protocol (FTP) package, which enables you to download all the software you need to get your Linux server operational as quickly as possible. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;The_File_Transfer_Protocol&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; The File Transfer Protocol &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;FTP is one of the most popular applications used to copy files between computers via a network connection. Knowledge of FTP is especially important and is a primary method of downloading software for Linux systems. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;There are a number of commercially available GUI based clients you can load on your PC to do this, such as WSFTP and CuteFTP. You can also use FTP from the command line as shown in Installing RPM Software Installation, on RPM software installation. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;From the remote user&#39;s perspective, there are two types of FTP. The first is &lt;b&gt;regular FTP&lt;/b&gt; which is used primarily to allow specific users to download files to their systems. The remote FTP server prompts you for a specific username and password to gain access to the data. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The second method, &lt;b&gt;anonymous FTP&lt;/b&gt; is used primarily to allow any remote user to download files to their systems. The remote FTP server prompts you for a username, at which point the user types anonymous or ftp with the password being any valid e-mail address. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;From the systems administrator&#39;s perspective, there are another two categories. These are &quot;active&quot; and &quot;passive&quot; FTP which is covered in more detail in Linux FTP server Setup. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;It is good to remember that FTP isn&#39;t very secure as usernames, passwords and data are sent across the network unencrypted. More secure forms such as SFTP (Secure FTP) and SCP (Secure Copy) are available as a part of the Secure Shell package (covered in Secure Remote Login and File Copying) that is normally installed by default with Fedora.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;a name=&quot;Linux_Help&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;&quot;&gt; &lt;span class=&quot;mw-headline&quot;&gt; Linux Help &lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Linux help files are accessed using the man or manual pages. From the command line you issue the man command followed by the Linux command or file about which you want to get information. If you want to get information on the ssh command, then you&#39;d use the command man ssh. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;[root@bigboy tmp]# man ssh&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If you want to search all the man pages for a keyword, then use the man command with the -k switch, for example, man -k ssh which will give a list of all the man pages that contain the word ssh. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;pre&gt;[root@bigboy tmp]# man -k ssh&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;ssh                  (1)  - OpenSSH SSH client (remote login program)&lt;br /&gt;ssh [slogin]         (1)  - OpenSSH SSH client (remote login program)&lt;br /&gt;ssh-agent            (1)  - authentication agent&lt;br /&gt;ssh-keyscan          (1)  - gather ssh public keys&lt;br /&gt;ssh_config           (5)  - OpenSSH SSH client configuration files&lt;br /&gt;sshd                 (8)  - OpenSSH SSH daemon&lt;br /&gt;sshd_config          (5)  - OpenSSH SSH daemon configuration file&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;[root@bigboy tmp]#&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This book is targeted at proficient Linux beginners and above so I&#39;ll be using a wide variety of commands in this book without detailed explanations to help keep the flow brisk. If you need more help on a command, use its man page to get more details on what it does and the syntax it needs. Linux help can sometimes be cryptic, but with a little practice the man pages can become your friend.&lt;br /&gt;&lt;/p&gt;&lt;br/&gt;source : &lt;a href=&quot;http://www.linuxhomenetworking.com/&quot;&gt;www.linuxhomenetworking.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/5663513674361477604/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/introduction-to-networking.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5663513674361477604'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5663513674361477604'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/introduction-to-networking.html' title='Introduction to Networking'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-3974881140071746765</id><published>2009-01-10T14:09:00.000-08:00</published><updated>2009-01-11T12:18:11.327-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bandwidth"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="isp"/><title type='text'>How to Choose an ISP</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;div align=&#39;justify&#39;&gt;Once you&#39;ve had a taste of the Internet and all it has to offer, you will want to stay connected. To make an online connection you need an Internet Service Provider (ISP). This is the company that provides your hook-up to the Internet. Whether you are choosing your first ISP or searching for a better or cheaper one, finding the right service provider can be a challenge.&lt;br /&gt;&lt;span class=&#39;fullpost&#39;&gt;&lt;br /&gt;First you will want to decide what type of Internet service you want to use. There are basically two types. A dial-up connection that uses your current telephone line to connect to the Internet has many drawbacks. It is the slowest type of service. It ties up your telephone line unless you install an extra line or a device to notify you when a call comes in while you are online. It can take several minutes to make a connection. The only advantage of dial-up service is the cost. It is the cheapest way to get on the Internet. So dial-up service may be an option if cost is an important factor or if you only plan to use the Internet on an occasional basis.&lt;br /&gt;&lt;br /&gt;For those of you who want to go online regularly and don&#39;t mind spending more, broadband Internet access is the way to go. It is fast, doesn&#39;t tie up your telephone line, and is &quot;always on&quot; so you don&#39;t have to wait for the telephone to dial and connect. When your computer is on, the Internet is instantly available to you. There are three popular types of broadband connections: DSL, cable, and satellite. To learn more about each of these read my Moving to Broadband article.&lt;br /&gt;&lt;br /&gt;For more general information about the different types of Internet connections, read How to Differentiate Between Internet Connections.&lt;br /&gt;&lt;br /&gt;Once you have decided which type of connection you want, it is time to start your search for an ISP. An Internet Service Provider can be a company like Earthlink or America Online. These are dedicated ISPs that are only in the Internet business. It can also be a telephone company like Sprint, or a cable company like Time Warner. Dedicated ISPs and telephone companies can provide both dial-up and broadband service while cable providers generally only provide broadband cable connections. First check with your own cable service provider and telephone company. Call or visit their Web sites to compare prices and service. Then check out any dedicated Internet Service Providers. You can often locate local service providers through ads in your local newspaper. You can find national service providers by searching the Internet and/or computer-related magazines and material.&lt;br /&gt;&lt;br /&gt;While price is important, don&#39;t choose an ISP based solely on the amount that it charges or you may be disappointed when you cannot get online or get help. In choosing an ISP you should not underestimate the importance of the quality of service and the availability of good support. Often the only way to evaluate these services is to get the opinion of and learn from the experiences of others. So talk to your friends, relatives, and neighbors. See if they are happy with their ISP.&lt;br /&gt;&lt;br /&gt;Web sites like Broadband Reports at www.broadbandreports.com will help you figure out what services are available in your area and also have message boards where people tell about their experiences, often praising or condemning their broadband services. Reading these individual reviews is an eye-opening experience that you will want to have before you decide which service you want to use.&lt;br /&gt;&lt;br /&gt;When investigating Internet Service Providers you will want to find out what actually comes with your account. Most provide the software you need and will help you set up your computer so that you can make the Internet connection for the first time. Many have toll-free numbers and unlimited technical support. Two things that can vary are the number of e-mail accounts the service provides and the amount of Web storage space that comes with your account. If you are getting a dial-up connection, you will need a modem in your computer (most of today&#39;s computers have them pre-installed). To use a broadband connection you will need an external cable or DSL modem. This is usually provided and owned by the ISP and is provided as part of the service, but sometimes there is an additional charge for equipment. So be sure to ask about the equipment. Except for an inexpensive telephone cord, there is no installation cost for a dial-up connection. You simply hook your computer up to your telephone line. Installation for broadband connections is more complicated and must be provided by the ISP. Installation costs can also vary; another thing to check out.&lt;br /&gt;&lt;br /&gt;If you travel, be sure that the Internet service you are considering provides dial-up access that you can use without long distance charges, just in case you want to check your e-mail while you are away. When comparing broadband service, be sure to check the amount of upload and download bandwidth that each service provides. Also, be aware that sometimes you can get very similar services by two different companies. For instance, if you are in an area serviced by Time Warner cable, the Earthlink Internet service will use the Time Warner backbone for your service. So the physical service will actually be identical. However, the Earthlink cable and the Time Warner Road Runner, the Time Warner cable Internet service, may offer different prices, different installation charges, and different incentives, so you will want to compare them.&lt;br /&gt;&lt;br /&gt;The contract that you agree to is also important. Are you signing up for a certain period of time? Can the service be terminated without penalty? Remember, when deciding which company to use for your Internet service, customer service, availability, quality, and responsiveness is very important. There is certainly a lot to investigate when choosing an ISP, but a thorough scrutiny of the ISP and the services they offer will help you make an informed decision that will make you smile for months to come.&lt;br /&gt;&lt;br /&gt;source:http://www.aarp.org&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/3974881140071746765/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-choose-isp.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3974881140071746765'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3974881140071746765'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-choose-isp.html' title='How to Choose an ISP'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-7987654355039406759</id><published>2009-01-05T09:35:00.000-08:00</published><updated>2009-01-05T10:17:44.881-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="make network by vista and XP"/><category scheme="http://www.blogger.com/atom/ns#" term="vista xp network"/><category scheme="http://www.blogger.com/atom/ns#" term="XP network"/><title type='text'>Mixing VISTA and XP on network to work properly</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;When you combine Windows XP and Windows Vista PCs on the same peer-to-peer network, such as you might have at home or a small office, you may run into all kinds of problems. It may be difficult for your Windows Vista PCs to find your Windows XP PCs, and vice versa. And the Windows Vista Network Map which may be the best networking feature Microsoft has ever introduced into Windows won’t work properly with XP PCs. They won’t show up properly on the network map, if they even show up at all.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div  style=&quot;text-align: justify;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;The first problem is that the default name for your workgroup on the network has been changed from Windows XP to Windows Vista. In Windows XP, the default name for the network is Mshome; in Windows Vista, it is Workgroup.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;The fix for this problem is easy; you can change the name of the workgroup on Windows XP to match the name of your Windows Vista network. On Windows XP, right-click My Computer, click the Computer Name tab, then click Change. The screen shown nearby appears. In the Workgroup box, type in the name of your Windows Vista network name. If you’re leaving it as the default used in Windows Vista, type in Workgroup. If you’re not using the Windows Vista default, change it to whatever name you’ve given your Windows Vista network and click OK.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47w0oDfi4ojpMbTLRNOa-dGBhpqgS9535QBWKmrv7zoLTiwUCfSJFUP0A3_wh3PmA5Ig8fbiG6fmPkXYAyepnsKcgq6zQNeNrCc-flmvh9_YWTg4M-HGTmdqZ5ggupp-XYvTFuR5lNg/s1600-h/mix1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 167px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47w0oDfi4ojpMbTLRNOa-dGBhpqgS9535QBWKmrv7zoLTiwUCfSJFUP0A3_wh3PmA5Ig8fbiG6fmPkXYAyepnsKcgq6zQNeNrCc-flmvh9_YWTg4M-HGTmdqZ5ggupp-XYvTFuR5lNg/s200/mix1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287868400212064834&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;After you click OK, you’ll see the confirmation dialog shown in the figure below. Click OK again, then restart your PC.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;You can, instead, give your Windows XP and Windows Vista machines both new workgroup names, as long as they match. To change the name of your workgroup in Windows Vista, right-click Computer and select Properties. You’ll see the name of your PC as well as its workgroup name. Click Change Settings, then from the screen that appears, click Change. In the dialog box, shown in the figure below, type in the new name for your workgroup and click OK.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;As with Windows XP, you’ll get a confirmation that the name has been changed. You’ll have to restart your PC for the changes to go into effect.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;Patching Windows XP for Vista network compatibility&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnDGoLTT1idXYFfgb2iyq4IcIZg-fTgRJIYkhdqt5Rs9clvjMsLpGQ7N5sjUoB0Z5cnyLf_oVOqLzuU_MTkJjudP9mHfWh81BkdnwmF916jQm05MBwWUgRmFWf63MSyjJg6QC6RlnLnA/s1600-h/mix2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 171px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnDGoLTT1idXYFfgb2iyq4IcIZg-fTgRJIYkhdqt5Rs9clvjMsLpGQ7N5sjUoB0Z5cnyLf_oVOqLzuU_MTkJjudP9mHfWh81BkdnwmF916jQm05MBwWUgRmFWf63MSyjJg6QC6RlnLnA/s200/mix2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287867455984427282&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;Making sure that both Windows XP and Windows Vista are on the same workgroup will go part way toward making the PCs get along on your network, but won’t go all the way. A bigger problem has to do with the new Windows Vista network map.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;The network map is possibly the best addition it comes to networking that Windows Vista has made. To get there, select Control Panel –&gt; Network and Internet –&gt; Network and Sharing Center –&gt; View full map. A screen like one below appears.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;The map shows you all the PCs and devices attached to your network — those in your entire network, not just your workgroup. This map is more than nice to look at; it’s extremely useful as well. Hover your mouse over any device, and you’ll be shown information about it, such as its name, IP address and MAC address, as shown in the figure below. Click a PC and you’ll connect to it.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;There’s a rub, though. Look at the bottom of the screen in the network map Vista drew of our network. You’ll see a number of devices listed. Windows Vista has found them, but doesn’t quite know what to make of them. It can’t figure out where they fit in on the network. And it won’t give you any information about them if you hover your mouse over them.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;The problem is that to discover information about devices, Windows Vista uses a new protocol, called Link Layer Topology Discovery. LLTD is built into any Windows Vista PC, which is why they show up properly on the network map. However, LLTD isn’t built into Windows XP, which is why they don’t show up properly.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;div face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;You can fix the problem by downloading and installing the Layer Topology Discovery Responder. Install it and your Windows XP PC will show up on the network map, properly located, with the mouse hover in full working order, as you can see in the figure below.&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;p face=&quot;webdings&quot; style=&quot;text-align: justify;&quot;&gt;resource : pctipsbox.com&lt;/p&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;font-family: arial; text-align: justify;&quot;&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/7987654355039406759/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/mixing-vista-and-xp-on-network-to-work.html#comment-form' title='1 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/7987654355039406759'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/7987654355039406759'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/mixing-vista-and-xp-on-network-to-work.html' title='Mixing VISTA and XP on network to work properly'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47w0oDfi4ojpMbTLRNOa-dGBhpqgS9535QBWKmrv7zoLTiwUCfSJFUP0A3_wh3PmA5Ig8fbiG6fmPkXYAyepnsKcgq6zQNeNrCc-flmvh9_YWTg4M-HGTmdqZ5ggupp-XYvTFuR5lNg/s72-c/mix1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-1355774269329701170</id><published>2009-01-05T08:51:00.006-08:00</published><updated>2009-01-05T09:14:52.693-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="access point"/><category scheme="http://www.blogger.com/atom/ns#" term="AP"/><category scheme="http://www.blogger.com/atom/ns#" term="best accesspoint"/><category scheme="http://www.blogger.com/atom/ns#" term="high gain access point"/><category scheme="http://www.blogger.com/atom/ns#" term="long range"/><category scheme="http://www.blogger.com/atom/ns#" term="networking tips"/><category scheme="http://www.blogger.com/atom/ns#" term="review access point"/><title type='text'>How to chose the best Access Point (AP)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWP07rukDa-GYaAyQVlbaeh2nAjVKMMoCO58uopdI9UpkFcHnF_VqA1pZMpg1gPAAE9gGOX4FtqFnw3TEIa-Ya8cjCoL736uA0yV2s3r1WDZcmyoRT5L2VIv4UnG-Si8MEcGMczNzTEQ/s1600-h/linksys-wrt54g.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 234px; height: 216px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWP07rukDa-GYaAyQVlbaeh2nAjVKMMoCO58uopdI9UpkFcHnF_VqA1pZMpg1gPAAE9gGOX4FtqFnw3TEIa-Ya8cjCoL736uA0yV2s3r1WDZcmyoRT5L2VIv4UnG-Si8MEcGMczNzTEQ/s320/linksys-wrt54g.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287856235727865298&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Today the market is flooded with a range of wireless access points. There are dozens of important features to consider, so much variation in cost and several different performance parameters, that it can become quite confusing to decide which one is right for you. To address most of these concerns, we ripped apart 13 wireless access points with a barrage of tests, and analyzed them for over a dozen features. You&#39;ll find their individual reviews in the subsequent pages, followed by a table comparing the important features as well as the performance results. These include eight access points of 802.11b and five of 802.11g standards. But, before that, we&#39;ll look at the important features that should be considered when buying an access point, followed by the performance parameters. All performance and features parameters discussed here, along with the price and warranty of each access point, have been included in our analysis for the shootout. As usual, we used the Brown-Gibson model to arrive at the weightages for these parameters.&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;font-family: webdings; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Which standard?&lt;/span&gt;&lt;br /&gt;Speaking of standards, it&#39;s still not legal to use 802.11g-based products without a license. Only 802.11b based ones can be used indoors freely. While it&#39;s not very expensive to obtain a license, it&#39;s a long drawn process. Alternatively, you could go for an 802.11b access point that&#39;s upgradable to the g standard, apply for a license and then upgrade once you get the license. It&#39;s, therefore, an important feature to consider when going for an 802.11b access point. If you have a license or don&#39;t mind putting in the effort to get one, then you could also go for 802.11g based access points as they have a maximum throughput capability of 54 Mbps, unlike 802.11b that can deliver only 11 Mbps. Plus, the g standard is backward compatible with b, so even if you have b based wireless clients, they would still work, albeit at 11 Mbps.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How much security?&lt;/span&gt;&lt;br /&gt;Security has always been a concern in wireless networks, so it&#39;s important to check out the security features of an access point before you buy it. First, define the level of security you need in your setup. For instance, if your office is in a crowded area and the chances of your WiFi signal going out of your premise is high, then it&#39;s better to go for tighter security because it would be easy for someone from outside to misuse your WiFi network. What level of accessibility are you planning to provide through your WiFi network to your mobile users? Is it just to surf the Net or will they also be able to access your servers? There are various security modes providing different levels of protection. The most basic is WEP (Wireless Equivalent Privacy) encryption, which is present by default in all access points. But, Wireless Equivalent Privacy has been found to be weak and, therefore, not always suitable for security a WiFi network. Look for other security modes, such as MAC-address based filtering, Radius-based authentication and WPA before you go out on your hunt for the right access point.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Modes of operation&lt;/span&gt;&lt;br /&gt;Most access points can be used in more ways than one, but this functionality varies across vendors. Besides working as a standard access point, it can also work as an access point-to-access point bridge, repeater, gateway and more . Having more modes of operation gives an organization the flexibility to use the access point in any way they need. So, support for more modes is always better.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Management features&lt;/span&gt;&lt;br /&gt;How easy is it for you to manage your access point? Most of them provide a Web-based interface for management, but that&#39;s not enough. Look for more management features available in this interface. Does it support SNMP, so that if you have your network management software running in your organization, it can easily be added in? Is it simple support for SNMP or can you also set traps for certain conditions so it sends out information to the administrator every time there&#39;s a problem? What other information can the access point provide? Does it maintain log files of all system activity? What level of activity can it put in the log file? What kind of statistics can it display about itself? The more management features it has, the easier it will be on the network administrator.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Load balancing and fault tolerance&lt;/span&gt;&lt;br /&gt;If the number of users connecting to a particular access point with load-balancing support increases beyond a predefined limit, it will shift some users to a nearby access point. This feature can be useful if you have high user density per access point. So, look for one that supports load balancing. Fault tolerance, of course, means that if one access point goes down due to some reason, then the clients connecting to it should be diverted to another access point.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Other features&lt;/span&gt;&lt;br /&gt;There are several other features that need to be considered. One is automatic channel selection, which becomes important if you&#39;re deploying lots of access points. This way the administrator doesn&#39;t have to manually define each channel, thereby reducing chances of human error. Can the antenna of the access point be upgraded to a different type or of higher power? What kind of software ships with the access point? How useful is it when deploying WiFi? Does the access point support power over Ethernet? This can be useful if you&#39;re placing an access point where you don&#39;t have a power connection nearby.&lt;br /&gt;&lt;br /&gt;What about the quality of the power adapter itself? We noticed that several access points still shipped with the bulky transformer-based adapters. Today, most devices come with the lightweight, SMPS-based adapters, which have a longer life because they consume lesser power and generate lesser heat. So, an SMPS-based adapter is always preferable over transformer based one.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Performance parameters&lt;/span&gt;&lt;br /&gt;There are a number of parameters that we considered for performance. For measuring all data transfers, we used NetIQ&#39;s Qcheck benchmark. The tests are as follows:&lt;br /&gt;&lt;br /&gt;Max range: What&#39;s the maximum distance that a client can go from an access point without loosing connectivity and also be able to transfer data? While doing this test, we ensured there were no obstructions between the access point and the client. We stopped measuring beyond 200 mtrs as only a few Access Points showed connectivity beyond that distance.&lt;br /&gt;&lt;br /&gt;Max range with max signal strength: While the signal strength of an access point reduces with distance, up till what distance can an access point keep it in excellent condition? The higher this is, the better.Here again we stopped measuring beyond 150 mtrs for same reasons as above.&lt;br /&gt;&lt;br /&gt;Max throughput: For clients connected in close vicinity to the access point, what&#39;s the maximum throughput that it can offer? Surely, it&#39;s impossible to obtain 11 and 54 Mbps, the maximum theoretical limits of 802.11b and g standards, respectively. So, we measured the maximum that each access point could provide with a client when:&lt;br /&gt;&lt;br /&gt;  *It used a WiFi card from the same vendor.&lt;br /&gt;  *It used a third-party WiFi card. Most laptops shipping today are Centrino based, which means that they use an Intel WiFi card. For this test, we used a Centrino-based laptop.&lt;br /&gt;&lt;br /&gt;Latency: We measured the average latency between the client and the access point while transferring some data. Here, lower latency is better.&lt;br /&gt;&lt;br /&gt;Throughput with streaming data: This becomes important when you&#39;re using WiFi for applications that require a constant stream of data without any break., like voice and video apps. For this, we configured the test to maintain 1000 Kbps for 15 seconds.&lt;br /&gt;&lt;br /&gt;Resistance to interference: The 2.4 GHz frequency band that&#39;s used by all these access points is susceptible to interference from other devices like cordless phones and Bluetooth. We checked how susceptible was an Access Point to such interference by measuring the throughput with a Bluetooth device in between.&lt;br /&gt;&lt;br /&gt;A few tips Finally, here are a few tips to keep in mind.&lt;br /&gt;&lt;br /&gt;  *Please check that the features mentioned on the packaging of your access point are actually there. In one access point we found the packaging said 256 bit WEP encryption, while it actually only supported 128.&lt;br /&gt;  *Before setting up an access point, read the instructions carefully. Some access points provide a MAC address that has to be entered during the installation.&lt;br /&gt;  *Place the access point where there&#39;s minimum interference from other devices. Usually, it&#39;s advisable to place it near the ceiling.&lt;br /&gt;  *Many access points specify how to position their antennas, so please check the manuals for that. Don&#39;t tamper with the antenna when it&#39;s working.&lt;br /&gt;  *Coexistence of 802.11g and 802.11b wireless clients on the same wireless network could slow down your network performance. So, when upgrading to 802.11g, also try to shift your clients to the same.&lt;br /&gt;&lt;br /&gt;Lastly, there&#39;s a wide price variation that we found in all the access points, ranging from Rs 8,000 to Rs 52,000. So, choose carefully, depending upon the features you want.&lt;br /&gt;&lt;br /&gt;resource : pcquest.ciol.com&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/1355774269329701170/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-chose-best-access-point-ap.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1355774269329701170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1355774269329701170'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-chose-best-access-point-ap.html' title='How to chose the best Access Point (AP)'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWP07rukDa-GYaAyQVlbaeh2nAjVKMMoCO58uopdI9UpkFcHnF_VqA1pZMpg1gPAAE9gGOX4FtqFnw3TEIa-Ya8cjCoL736uA0yV2s3r1WDZcmyoRT5L2VIv4UnG-Si8MEcGMczNzTEQ/s72-c/linksys-wrt54g.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-5947489397929047519</id><published>2009-01-05T08:25:00.000-08:00</published><updated>2009-01-05T09:29:32.629-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="maximize wifi range"/><category scheme="http://www.blogger.com/atom/ns#" term="maximize wifi signal"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="wi-fi"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>How To Maximize Or Increase The Speed Of Your Wi-Fi Connection</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzdX4OwQ15scRvlcB6dKwQb_4voIgecGak7KcEVGr_U19HQOrveDu9W2QKBbtY-nrS5PjklETLf_WjzVaABaAgyZlz2RkvYMjSOVCJW1m_0dujL8lqC0iADvAeYxcUv-P4z9q1uq41Kg/s1600-h/wifi-logo.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 162px; height: 147px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzdX4OwQ15scRvlcB6dKwQb_4voIgecGak7KcEVGr_U19HQOrveDu9W2QKBbtY-nrS5PjklETLf_WjzVaABaAgyZlz2RkvYMjSOVCJW1m_0dujL8lqC0iADvAeYxcUv-P4z9q1uq41Kg/s320/wifi-logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287861993092391714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Today, enterprises are deploying wireless LANs for corporate applications and home users that involve e-mail, Web browsing, and access to various server-based databases. The need for higher data rates and techniques to improve performance of wireless LANs is becoming crucial to support these types of applications. To get that extra performance, you may have a lot to consider.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;h3&gt;Select The Right Physical Layer&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;An important element that impacts the performance of a wireless LAN is the selection of the appropriate Physical (PHY) Layer (i.e., &lt;a href=&quot;http://www.80211-planet.com/tutorials/article.php/1436331&quot;&gt;802.11a&lt;/a&gt;, 802.11b, or&lt;a href=&quot;http://www.80211-planet.com/tutorials/article.php/1009431&quot;&gt;802.11g&lt;/a&gt;). 802.11a offers the highest capacity at 54Mbps for each of twelve (maximum) non-overlapping channels and freedom from most potential RF interference. 802.11b provides 11Mbps data rates, with only three non-overlapping channels. 802.11g will eventually extend 802.11b networks to have 54Mbps operation, but the three non-overlapping channels limitation will still exist. Of course requirements dictate needs for performance, which will point you toward a particular PHY. If you need maximum performance, then 802.11a is the way to go, but you may need more access points because of the weaker range it has compared to 802.11b.&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvR9R2zrcoeHRT-lCM61pVcpGxz2RFb2oFRaYblCrzrVem1MI2ioMXUWXCDQ5NZJqS_uZH7ZR0XwG_2DHw6x8BFEpP9YK5udQPyNnAufZtR1J66Gfgzuq4z4qECpbNYpZP9kGXqLY2Fg/s1600-h/installingvoyager2110-vista-2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 238px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvR9R2zrcoeHRT-lCM61pVcpGxz2RFb2oFRaYblCrzrVem1MI2ioMXUWXCDQ5NZJqS_uZH7ZR0XwG_2DHw6x8BFEpP9YK5udQPyNnAufZtR1J66Gfgzuq4z4qECpbNYpZP9kGXqLY2Fg/s320/installingvoyager2110-vista-2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287848435686092578&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p style=&quot;text-align: left;&quot;&gt;&lt;img style=&quot;width: 184px; height: 18px;&quot; alt=&quot;installingvoyager2110_vista_2&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/installingvoyager2110-vista-2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;MIMO ANTENNA&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;If you are using 802.11g – consider getting an MIMO antenna (which allows faster speeds at greater distances.)&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqRktANDFzG_zx4C2GSW8K49x9CPlXNwQN9I7_3TpGSG44hSWMe42h-PY6xxHF2d63Vq1G1Ug8fHCCtyD2dwVFe7AU6-L_Wf3BfoVWYyc0-o3hUq7txTuinjLx1q-2usovIzpMotOXQw/s1600-h/gxantennas-thumb.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 241px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqRktANDFzG_zx4C2GSW8K49x9CPlXNwQN9I7_3TpGSG44hSWMe42h-PY6xxHF2d63Vq1G1Ug8fHCCtyD2dwVFe7AU6-L_Wf3BfoVWYyc0-o3hUq7txTuinjLx1q-2usovIzpMotOXQw/s320/gxantennas-thumb.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287848443460535266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.addictivetips.com/wp-content/uploads/2008/09/gxantennas.jpg&quot;&gt;&lt;img alt=&quot;GXantennas&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/gxantennas-thumb.jpg&quot; border=&quot;0&quot; height=&quot;304&quot; width=&quot;404&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;h3&gt;Replace Other 2.4 GHz Devices&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;You may need to replace your 2.4GHz cordless phones with either a 900Mhz or 5.8GHz style cordless phone due to interference. These phones and other nearby wireless LANs can offer significant interfering signals that degrade the operation of an 802.11b wireless LAN. These external sources of RF energy in the 2.4GHz band periodically block users and access points from accessing the shared air medium. As a result, the performance of your wireless LAN will suffer when RF interference is present. So obviously you should strive to minimize sources of RF interference and possibly set the access point channels to avoid the interfering signals.&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxx5eS0udC2GFBVtX-z8Ncot1lW6ot-rNjdXby7QXv5E4u5uH9dTvpigQuB2TagHCh_bhscgPrSmZwMo0NjBNihzWYdM1EqMWv0CTvczu_hB4NYzJB7G3HY8oRt-DmL2m6W7Sob5tdvA/s1600-h/mainphoto5489.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxx5eS0udC2GFBVtX-z8Ncot1lW6ot-rNjdXby7QXv5E4u5uH9dTvpigQuB2TagHCh_bhscgPrSmZwMo0NjBNihzWYdM1EqMWv0CTvczu_hB4NYzJB7G3HY8oRt-DmL2m6W7Sob5tdvA/s320/mainphoto5489.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287848445515945314&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/mainphoto5489.jpg&quot; border=&quot;0&quot; height=&quot;484&quot; width=&quot;484&quot; /&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Properly Set Access Point Channels&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;The 802.11b standard defines 14 channels (11 in the U.S.) that overlap considerably, leaving only three channels that don’t overlap with each other. For access points that are within range of each other, set them to different channels (e.g., 1, 6, and 11) in order to avoid inter-access point interference. You can also take advantage of the automatic channel selection features that some access points offer. With 802.11a, this is not an issue because the 802.11a standard defines separate, non-overlapping channels.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Maximize RF Coverage&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;If access points are too far apart, then some users will be associating with the wireless LAN at something less than the maximum data rate. For example, users close to an 802.11b access point may be operating at 11Mbps; whereas, a user at a greater distance may only have 2Mbps capability. In order to maximize performance, ensure that RF coverage is adequate and spread out nearby for optimum performance.&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhF6OVP23zz13AN4wuFq6XXGh-Ra3VKc-8qN36ODpjs6U4VSOgufHzXakkWV-vIcq_HGn1SjpuGx4WQS56jxcPiDAOcHYPm1kxEUABwEF8nR6hQHbSDN-RM2z8SWYCntG_Lo7Q-bO5w/s1600-h/wifi-logo.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 273px; height: 246px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhF6OVP23zz13AN4wuFq6XXGh-Ra3VKc-8qN36ODpjs6U4VSOgufHzXakkWV-vIcq_HGn1SjpuGx4WQS56jxcPiDAOcHYPm1kxEUABwEF8nR6hQHbSDN-RM2z8SWYCntG_Lo7Q-bO5w/s320/wifi-logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287848456439108402&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;wifi_logo&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/wifi-logo.jpg&quot; border=&quot;0&quot; height=&quot;246&quot; width=&quot;273&quot; /&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Same Router And Network Adapter&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;Choose your router and network adapters from the same company. Manufacturers usually have a proprietary “turbo” mode that only works when using both their router and network adapters. As a side benefit; your overall configuration is usually easier.&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-VXQ_6BnZwK949BACO42SxwJTHB45hzLBy0o6xmXYOhNbqFKXyMT1xPc06erJ_tYDjEHHSm6nWuSwnkGsVpV6oWk6saad05YMdZd1LlOHzMKTF0jAl5Z2xORSjguhvGbrXUcpEpeIg/s1600-h/linksys-wrt54g.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 304px; height: 280px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-VXQ_6BnZwK949BACO42SxwJTHB45hzLBy0o6xmXYOhNbqFKXyMT1xPc06erJ_tYDjEHHSm6nWuSwnkGsVpV6oWk6saad05YMdZd1LlOHzMKTF0jAl5Z2xORSjguhvGbrXUcpEpeIg/s320/linksys-wrt54g.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287848461468216210&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;linksys_wrt54g&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/linksys-wrt54g.jpg&quot; border=&quot;0&quot; height=&quot;280&quot; width=&quot;304&quot; /&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Upgrade Your 802.11b&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;Upgrade your 802.11&lt;strong&gt;a&lt;/strong&gt; and 802.11&lt;strong&gt;b&lt;/strong&gt; devices to 802.11&lt;strong&gt;g&lt;/strong&gt;, which is much faster, and is backward-compatible with 802.11b devices, although a small one room environment (i.e. apartment, dorm room) with no future expansion should use 802.11&lt;strong&gt;a&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Wired Connection&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;Whenever possible, connect computers using a wired connection! Yes, this is an “Anti-tip” because you’re not even using the wireless network – but a direct connection is dramatically faster and more secure!&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Wireless Router On Central Location&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;If possible, place your wireless router (or access point) in a central location. Obviously, the closer you are to the access point; the better. But do not necessarily place the device on your roof (or up too high) – 4 to 6 feet off the ground is perfect.&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih5wekBXlj4aBly8HeCltr_MLZwV4FBcai6awSup_A5ay4vsVWM2eka2OWxMknKFgONjMEJYyRMI0XBbMCysucI5NlEJMroJbWYwOukIYgEtvvjD9xE15oiftS6Gzl1WPX32CzxRJoYA/s1600-h/wireless-connections.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 230px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih5wekBXlj4aBly8HeCltr_MLZwV4FBcai6awSup_A5ay4vsVWM2eka2OWxMknKFgONjMEJYyRMI0XBbMCysucI5NlEJMroJbWYwOukIYgEtvvjD9xE15oiftS6Gzl1WPX32CzxRJoYA/s320/wireless-connections.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5287850586644829970&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;wireless_connections&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/wireless-connections.gif&quot; border=&quot;0&quot; height=&quot;348&quot; width=&quot;484&quot; /&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Update Your Windows Wireless Network Driver&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;Update your Windows Wireless Network Driver. While &lt;a href=&quot;http://update.microsoft.com/microsoftupdate/&quot;&gt;Microsoft Update&lt;/a&gt;, is “supposed” to notify you of updates to your drivers – it’s best to visit the manufacturers website to double-check. Updates usually only add a new feature, or increase stability and security; but sometimes can improve performance.&lt;/p&gt; &lt;p&gt;&lt;img alt=&quot;network-adapter-driver-status&quot; src=&quot;file:///J:/addictivetips.com/How%20To%20Maximize%20Or%20Increase%20The%20Speed%20Of%20Your%20Wi-Fi%20Connection_files/networkadapterdriverstatus.jpg&quot; border=&quot;0&quot; height=&quot;371&quot; width=&quot;335&quot; /&gt;&lt;/p&gt; &lt;h3&gt;Update And Upgrade Your Router&lt;/h3&gt; &lt;p style=&quot;text-align: justify;&quot;&gt;Update your Router’s firmware. Most routers easily update their firmware directly from their software. Updates add new features, increase stability and security; and also sometimes help in improving the performance. The antenna that comes with your device is usually a low powered and omni-directional. Upgrade to a more powerful (powered) antenna. If your router is near an outside wall, get a high-gain antenna that focuses the wireless signals only one direction.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;resource    : www.addictivetips.com&lt;/p&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/5947489397929047519/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-maximize-or-increase-speed-of.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5947489397929047519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5947489397929047519'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2009/01/how-to-maximize-or-increase-speed-of.html' title='How To Maximize Or Increase The Speed Of Your Wi-Fi Connection'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzdX4OwQ15scRvlcB6dKwQb_4voIgecGak7KcEVGr_U19HQOrveDu9W2QKBbtY-nrS5PjklETLf_WjzVaABaAgyZlz2RkvYMjSOVCJW1m_0dujL8lqC0iADvAeYxcUv-P4z9q1uq41Kg/s72-c/wifi-logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-5174584326261074405</id><published>2008-12-25T02:06:00.000-08:00</published><updated>2009-01-05T10:05:35.719-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cmd"/><category scheme="http://www.blogger.com/atom/ns#" term="comand promt ipconfig"/><category scheme="http://www.blogger.com/atom/ns#" term="command"/><category scheme="http://www.blogger.com/atom/ns#" term="ipconfig"/><category scheme="http://www.blogger.com/atom/ns#" term="ipconfig command"/><category scheme="http://www.blogger.com/atom/ns#" term="MacOS X"/><category scheme="http://www.blogger.com/atom/ns#" term="network command"/><category scheme="http://www.blogger.com/atom/ns#" term="TCP/IP Configuration Commands for UNIX/Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><title type='text'>Network command in unik/linux, windows or mac OS</title><content type='html'>The following commands will report the TCP/IP configuration on Unix, MacOS X, Windows, and Cisco operating systems. By &quot;Unix&quot; I mean anything vaguely Unix-like — Solaris, Linux, BSD, Tru64, AIX, IRIX, HP-UX, etc., plus MacOS X.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Note that the Cisco IOS allows for command abbreviation. That is, instead of:&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;router&gt; show interfaces&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;you could simply type:&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;router&gt; sh in&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;However, I prefer to use the entire command, using the tab key for command completion. You type just sh and then press &lt;tab&gt;:&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;router&gt; sh&lt;tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;and the system finishes the command itself:&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;router&gt; show&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;At that point you could press ? to see what alternatives are available (in the case of the show command, quite a few!), and then type enough of the parameter to be unambiguous:&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;router&gt; show in&lt;tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;&lt;tab&gt;and it finishes the parameter for you:&lt;/tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;&lt;tab&gt;router&gt; show interfaces&lt;/tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;tab&gt;&lt;tab&gt;&lt;tab&gt;Only two more key presses and you get a clear explanation of what it&#39;s doing. More importantly, your typing errors become much more obvious! &lt;/tab&gt;&lt;/tab&gt;&lt;/tab&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/5174584326261074405/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/12/command-ipconfig-cmd-ipconfig-command.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5174584326261074405'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/5174584326261074405'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/12/command-ipconfig-cmd-ipconfig-command.html' title='Network command in unik/linux, windows or mac OS'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-6807582434883350997</id><published>2008-12-25T01:55:00.000-08:00</published><updated>2008-12-25T02:04:17.082-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cmd"/><category scheme="http://www.blogger.com/atom/ns#" term="command"/><category scheme="http://www.blogger.com/atom/ns#" term="command promt ipconfig"/><category scheme="http://www.blogger.com/atom/ns#" term="ip configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="ipconfig"/><category scheme="http://www.blogger.com/atom/ns#" term="ipconfig command"/><category scheme="http://www.blogger.com/atom/ns#" term="network command"/><title type='text'>WINDOWS IP CONFIG</title><content type='html'>Configure IP (internet protocol configuration)&lt;br /&gt;&lt;br /&gt;Syntax&lt;br /&gt;&lt;br /&gt;  IPCONFIG /all     =    Display full configuration information.&lt;br /&gt;  IPCONFIG /release [adapter]  = Rlease the IP address for the specified adapter.&lt;br /&gt;  IPCONFIG /renew [adapter]    =  Renew the IP address for the specified adapter.&lt;br /&gt;  IPCONFIG /flushdns      =  Purge the DNS Resolver cache.&lt;br /&gt;  IPCONFIG /registerdns   =  Refresh all DHCP leases and re-register DNS names.&lt;br /&gt;  IPCONFIG /displaydns    =  Display the contents of the DNS Resolver Cache.&lt;br /&gt;  IPCONFIG /showclassid adapter = Display all the DHCP class IDs allowed for adapter.&lt;br /&gt;  IPCONFIG /setclassid  adapter [classid] = Modify the dhcp class id.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;If the Adapter name contains spaces, use quotes: &quot;Adapter Name&quot;&lt;br /&gt;wildcard characters * and ? allowed, see the examples below&lt;br /&gt;&lt;br /&gt;The default is to display only the IP address, subnet mask and default gateway for each adapter bound to TCP/IP.&lt;br /&gt;&lt;br /&gt;For Release and Renew, if no adapter name is specified, then the IP address leases for all adapters bound to TCP/IP will be released or renewed.&lt;br /&gt;&lt;br /&gt;For Setclassid, if no ClassId is specified, then the ClassId is removed.&lt;br /&gt;&lt;br /&gt;Examples:&lt;br /&gt;    &gt; ipconfig                   ... Show information.&lt;br /&gt;    &gt; ipconfig /all              ... Show detailed information&lt;br /&gt;    &gt; ipconfig /renew            ... renew all adapters&lt;br /&gt;    &gt; ipconfig /renew EL*        ... renew any connection that has its &lt;br /&gt;                                     name starting with EL&lt;br /&gt;&lt;br /&gt;    &gt; ipconfig /release *Con*    ... release all matching connections,&lt;br /&gt;                                     eg. &quot;Local Area Connection 1&quot; or&lt;br /&gt;                                         &quot;Local Area Connection 2&quot;&lt;br /&gt;&lt;br /&gt;    &gt; ipconfig /setclassid &quot;Local Area Connection&quot; TEST &lt;br /&gt;                                 ... set the DHCP class ID for the &lt;br /&gt;                                     named adapter to = TEST&lt;br /&gt;&lt;br /&gt;&quot;Life is a grand adventure - or it is nothing.&quot; - Helen Keller&lt;br /&gt;&lt;br /&gt;Related:&lt;br /&gt;&lt;br /&gt;BROWSTAT - Get domain, browser and PDC info&lt;br /&gt;NETSTAT - Display networking statistics (TCP/IP)&lt;br /&gt;NETSH - Configure interfaces, routing protocols, filters, routes, RRAS&lt;br /&gt;PATHPING - IP trace utility&lt;br /&gt;PING - Test a network connection&lt;br /&gt;Q192064 - Locate multiple preferred logon servers&lt;br /&gt;Q813878 - How to block specific network protocols and ports.&lt;br /&gt;Q313190 - Use IPSec IP Filter Lists&lt;br /&gt;The Inq/Jon Honeyball - Routing to harden machines against attack&lt;br /&gt;www.ipchicken.com&lt;br /&gt;Equivalent bash command (Linux): lookupd -flushcache, ifconfig - IP configuration&lt;br /&gt;Equivalent bash command (OS X): ipconfig / dscacheutil - View IP config / Query / flush the Directory Service cache&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;resource www.ss64.com&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/6807582434883350997/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/12/windows-ip-config.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6807582434883350997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/6807582434883350997'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/12/windows-ip-config.html' title='WINDOWS IP CONFIG'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-1487539672567629313</id><published>2008-12-23T17:59:00.000-08:00</published><updated>2008-12-23T18:15:53.810-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Atheros"/><category scheme="http://www.blogger.com/atom/ns#" term="backtrack2"/><category scheme="http://www.blogger.com/atom/ns#" term="backtrack3"/><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="hack access point"/><category scheme="http://www.blogger.com/atom/ns#" term="hack AP"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking AP"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking WEP"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="ilegal doing"/><category scheme="http://www.blogger.com/atom/ns#" term="information"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="WEP"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="wlan"/><title type='text'>WIRELESS HACK</title><content type='html'>Ever wondered just how secure your WEP protected wireless network is? Well today I&#39;ll show you how to test it. There have been a lot of articles written about this subject already and by now it is common knowledge that WEP is only the barest of security precautions. I&#39;m going to show you how you can test your own wireless network&#39;s security using the linux livecd distro back|track. Before we go any further, I feel it necessary to mention two things. The first being the ethics of hacking. Most of you are probably familiar with this subject already but, just to refresh your memory. Second, it goes without saying that this is for YOUR OWN NETWORK TESTING PURPOSES ONLY. Unauthorized access of other people&#39;s networks is illegal. If you have problems or questions about anything in this guide, for the love of god use google/wikipedia and look it up first. Don&#39;t just start ranting on forums like a moron without doing a little research first. There are probably other people who have had the same problems and solved them already. Ok, parental rant over. Lets get down to the dirty stuff:&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;First of all, you&#39;ll need to check and make sure your wireless card has the right chipset. Most wireless cards are programmed only to accept data that is addressed to them. Other cards, specifically the ones that are of use for wifi sniffing, are capable of picking up all traffic that is flying through the air. Common types are Atheros, Prism, Aironet, Realtek, Hermes, etc based cards. You are on your own figuring out what type of chipset your wireless card has, as its too vast to get into here, but check this thread for more info. Your probably just going to have to search for your specific card to find out what chipset it has then compare it to this compatability list. For a good discussion on types of cards that work, check this http://forums.remote-exploit.org/showthread.php?t=2191&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;Next, download a copy of back|track, a slackware distro designed for security testing purposes. This is a linux livecd, which means it will boot the entire OS from the cd. Download the ISO and use a burning program such as Nero, Alcohol or my personal favorite, the awesome freeware cd/dvd burning program cdburnerXP to burn the disk image to a cd. Pop the disk in and reboot, and boot from the disk. Back|track may take a while to boot up.&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;When back|track boots up (and hopefully finds all your hardware) you will be presented with a login screen. To quote the venerable xatar, &quot;Read the f**king screen!&quot; The login, as it says above the prompt is &quot;root&quot; and the password is &quot;toor&quot; (minus the &quot;&quot;). Note that linux is case sensitive. After you are logged in, you could run all of the commands I will get into later from this prompt. But thats no fun, so type in:&lt;br /&gt;&lt;br /&gt;xconf&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This should create a file /etc/X11/xorg.conf and autodetect your video settings. (with nvidia cards, you may still have video problems as I did, such as not getting above 640x480... should you choose to install backtrack to the harddrive, check out http://forums.remote-exploit.org/showthread.php?t=2176&amp;amp;highlight=nvidia for more info on fixing this)&lt;br /&gt;&lt;br /&gt;To get the KDE gui desktop to start up, simply type:&lt;br /&gt;&lt;br /&gt;startx&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If everything goes smoothly, you should be awash in the beautiful glow of the back|track KDE desktop. Given the beautiful read only nature of the livecd, you can do anything to this operating system and not have to worry about messing it up. If things get a little weird, or screwed up, just reboot and the OS is back to normal. So GO EXPLORE, run random programs, see what they do, go nuts.&lt;br /&gt;&lt;br /&gt;At the bottom left of the screen is a little icon that looks like a monitor with a black screen. This is called the bash prompt. This is where you will be spending most of your time, so click on this to open up a new bash prompt. Note that you can double click on the bar to the right of the tab that says &quot;Shell&quot; and it will create a new bash tab, negating the necessity to open up multiple instances of the bash window. First, a few networking commands to get you up to speed on your own system. Type&lt;br /&gt;&lt;br /&gt;ifconfig -a&lt;br /&gt;&lt;br /&gt;ifconfig&lt;br /&gt;&lt;br /&gt;This will show you a list of all compatible network cards on your system. You should see a list of devices such as ath0, eth0, wifi0, wlan0 etc. One of these is your wireless card. If you have an Atheros based card, it will be ath0. Make note of the name of your card, as you will be using it later. For the rest of this guide, I will be using ath0 since that is the card I have. Replace ath0 with whatever card you have.&lt;br /&gt;&lt;br /&gt;You can also check out your wireless cards specifically by typing in:&lt;br /&gt;&lt;br /&gt;iwconfig&lt;br /&gt;&lt;br /&gt;I&#39;ve got two wireless cards. The one built into my laptop, an intel card (eth0) and an Atheros pcmcia card (ath0). Now that we have the name of our wireless cards, we can start sniffing. Some like to use Kismet to sniff for networks, but I find using airodump-ng to be easier and ultimately more effective. In your bash prompt, type:&lt;br /&gt;&lt;br /&gt;airodump-ng --write out --ivs --abg ath0&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj7JRhb49WCjnEGhwiLECuyVRQjjqbRNNtR89lXYzCD6jDqS0svRU22MBcpjMjTuoib6ClOrISyiR9ZD8xrw2z-5FoZ472rf5m9orP2xjOKiiUJPIVSVES-_cbIsMIu7WjG95jwBvDPw/s1600-h/aircrack-ngfound.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 500px; height: 289px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj7JRhb49WCjnEGhwiLECuyVRQjjqbRNNtR89lXYzCD6jDqS0svRU22MBcpjMjTuoib6ClOrISyiR9ZD8xrw2z-5FoZ472rf5m9orP2xjOKiiUJPIVSVES-_cbIsMIu7WjG95jwBvDPw/s320/aircrack-ngfound.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5283172721453255842&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This starts airodump-ng and tells it to begin sniffing data, write it to the file out, only capture IVs (Initialization Vectors), search the a, b and g bands using the ath0 card. Keep in mind, every time you specify the same output file name, such as &quot;out&quot;, airodump-ng will append the file name with &quot;-##&quot; such as out-01.ivs, out-02.ivs, etc.You will see a list of access points on the top half of the screen, and clients on the bottom. Find your access point in the list. Write down the BSSID or Mac address of the access point and any connected clients. You&#39;ll need it later. From now on in this document, the access point&#39;s mac address will be referred to as APmac and the client mac as CLmac. The goal of the attack is to capture as many unique IVS as possible. Every time data is sent between the wireless server and client, each packet contains IV which are collected and then run through the aircrack-ng program for computation.&lt;br /&gt;&lt;br /&gt;You should be seeing a ton of numbers flying by, but not updating vary quickly. Thats because airodump-ng is searching all channels. Once you see your network, note what channel it is on (under the CH header). Stop airodump-ng by hitting:&lt;br /&gt;&lt;br /&gt;ctrl-c&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now start it up again but this time we will add --channel # where # is the channel number of the access point, say, channel 6&lt;br /&gt;&lt;br /&gt;airodump-ng --channel 6 --write out --ivs --abg ath0&lt;br /&gt;&lt;br /&gt;airodump&lt;br /&gt;&lt;br /&gt;Airodump-ng should be running much faster now, and updating constantly. You will see a number rising very quickly, this is generally the beacons. Beacons just basically say &quot;hey, i&#39;m an access point&quot; about 10 times a second. You can judge the quality of your connection by how fluid the rise in beacons are. Other than this, they are useless for our purposes. For this type of attack it is important for there to be a client connected to the access point. So march over to your other computer and log on to the net wirelessly. In backtrack, you should see at the bottom a client pop up, the first MAC is the access point and the 2nd is the Client. Write down both. Open a new bash prompt and type:&lt;br /&gt;&lt;br /&gt;aireplay-ng -2 -b APmac -d ff:ff:ff:ff:ff:ff -m 68 -n 68 -p 0841 -h CLmac ath0&lt;br /&gt;&lt;br /&gt;aireplay&lt;br /&gt;&lt;br /&gt;Where APmac is the mac address (bssid) of the access point and CLmac is the mac address of the client. For a detailed explanation of what all these settings do, open up a new bash prompt and just type aireplay-ng and it will spew out all the controls and what they do. The only one not explained is that the very first -2 tells aireplay to do the 3rd attack method in the list at the bottom (the first being 0).&lt;br /&gt;&lt;br /&gt;aireplay-ng will now start sniffing for a certain type of packet with a length no more and no less than 68 bytes between client and access point. It will say &quot;Read ### packets&quot;. At this point, if there is significant data transfer between the client and ap, it may snag the right type of packet already and there is no need to do the next step. In this case, hit Y to use the packet and skip the next step. If however, it keeps reading packets for a while (more than a couple min) and does not pop up saying &quot;Use this packet?&quot; then do the following:&lt;br /&gt;&lt;br /&gt;Open a new bash prompt and type:&lt;br /&gt;&lt;br /&gt;aireplay-ng -0 1 -a APmac -c CLmac ath0&lt;br /&gt;&lt;br /&gt;This command will effectively terminate the connection between the AP and the client forcing the client to re-connect. It is this re-connection packet that we are looking to scoop up with the first instance of aireplay.&lt;br /&gt;&lt;br /&gt;Go back to the first instance of aireplay and you should see something at the bottom of the screen saying &quot;Use this packet?&quot; Hit Y and aireplay will start sending out tons of packets to the AP. Switch over to airodump-ng which should still be running in the first bash prompt. Look at the data rate of the targeted AP. If all is going well, Aireplay is spewing out packets like mad to the access point and airodump-ng is picking up the chatter in between, the data should be rising quickly. This is exactly what we want.&lt;br /&gt;&lt;br /&gt;If for some reason the data isn&#39;t going up quickly, go back to the first aireplay-ng and hit:&lt;br /&gt;&lt;br /&gt;ctrl-c&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If aireplay had picked up any more packets, it will prompt you again if you want to use them. Try more packets. Also, you may need to get closer to your access point or try the aireplay-ng -0 method again. Experiment. Once you&#39;ve got the data rate going up quickly, start aircrack-ng and start crunching the numbers. Type in&lt;br /&gt;&lt;br /&gt;dir&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To get a list of the files. One file should be the out file that you specified in airodump-ng, specifically out-01.ivs. Each time airodump-ng is started with the same file output name, it creates a new one tacking on -01, -02, etc. Make sure you know which one you are outputting to.&lt;br /&gt;&lt;br /&gt;Type in:&lt;br /&gt;&lt;br /&gt;aircrack-ng -f 2 -a 1 -b APmac -n 64 out-01.ivs&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5fdxV_tREWgZqdx4FL7rsu3zIsO1_ar4TGAdW4Wd53Q5pU_tF3W5eGv3O72uf92CBsFr4Od5VkMLKTvkySmpcS47U1Zhb5mVTlBkfEfbSC5VieRwbCX-jBAkkU6YFmjKnvlqQCFlSdQ/s1600-h/airodump-ng1.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 379px; height: 233px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5fdxV_tREWgZqdx4FL7rsu3zIsO1_ar4TGAdW4Wd53Q5pU_tF3W5eGv3O72uf92CBsFr4Od5VkMLKTvkySmpcS47U1Zhb5mVTlBkfEfbSC5VieRwbCX-jBAkkU6YFmjKnvlqQCFlSdQ/s320/airodump-ng1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5283172721460979746&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Again, if you want to know what all the parameters mean, open up a new bash and type aircrack-ng and it will tell you. Basically -f is the fudge factor- default is 2, a higher number will be a more thorough but slower search. -b filters out all but the specified mac of the AP, -n says to search for a 64 bit key. If it runs for a long time and finds nothing, either you don&#39;t have enough IVs, or you are searching under the wrong key length. Try 128. You can also run multiple instances of of aircrack with different variables. Aircrack will continually update, notice the increasing IVs in the upper right as long is airodump-ng and aireplay are still going strong. After a bit of time, it should spit out your WEP key. Congrats! You now know how hard it is breaking into YOUR OWN NETWORK. Perhaps switch to WPA? If it didn&#39;t work, there could be any number reasons why. Do a little searching on the backtrack forums, google, etc, try setting up a different access point or learn how to do another type of attack, learn how to configure your hardware properly, etc, etc, etc. Take your time and explore the OS, if your new to linux, like i was when i started using backtrack, you&#39;ll have a lot to learn.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As a side note, In order to connect to a wireless network in backtrack, you must type in&lt;br /&gt;&lt;br /&gt;iwconfig ath0 essid nameofnetwork key whateverthekeyis&lt;br /&gt;&lt;br /&gt;ifconfig ath0 up&lt;br /&gt;&lt;br /&gt;dhcpcd ath0&lt;br /&gt;&lt;br /&gt;A message should pop up in the bottom right of the screen saying something about ath0 being connected. To disconnect, before switching to another network, type:&lt;br /&gt;&lt;br /&gt;ifconfig ath0 down&lt;br /&gt;&lt;br /&gt;then repeat the steps above with the new network information.&lt;br /&gt;&lt;br /&gt;Further reading: http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm&lt;br /&gt;&lt;br /&gt;I&#39;d like to thank muts, max, redkommie, jacky, digi, creaters of backtrack, xatar for writing a lot of the guides that got me up to speed, the creators of aircrack-ng and all the awesome people on the rexploit forums.&lt;br /&gt;&lt;br /&gt;resource: www.i-hacked.com&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/1487539672567629313/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/12/wireless-hack.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1487539672567629313'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/1487539672567629313'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/12/wireless-hack.html' title='WIRELESS HACK'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj7JRhb49WCjnEGhwiLECuyVRQjjqbRNNtR89lXYzCD6jDqS0svRU22MBcpjMjTuoib6ClOrISyiR9ZD8xrw2z-5FoZ472rf5m9orP2xjOKiiUJPIVSVES-_cbIsMIu7WjG95jwBvDPw/s72-c/aircrack-ngfound.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-2383279969801667942</id><published>2008-11-20T09:47:00.000-08:00</published><updated>2008-11-21T15:18:14.817-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adsense"/><category scheme="http://www.blogger.com/atom/ns#" term="google ads"/><category scheme="http://www.blogger.com/atom/ns#" term="make money"/><category scheme="http://www.blogger.com/atom/ns#" term="money"/><category scheme="http://www.blogger.com/atom/ns#" term="setting google adsense"/><title type='text'>GOOGLE ADSENSE</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;             &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Google AdSense is the program that can give you advertising revenue from each page on your website—with a minimal investment in time and no additional resources.AdSense delivers relevant text and image ads that are precisely targeted to your site and your site content. And when you add a Google search box to your site, AdSense delivers relevant text ads that are targeted to the Google search results pages generated by your visitors’ searc request.&lt;br /&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;h1&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Setting Up Google Adsense Code&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_JFnP1rSoABYzNWJOEPv1zYnB0wsh4FGT8Q8r2PCymzPXkdtBEHAVIztxDY01ATTuuZxeASasRV0AIe20ZQnDBOc870Af2hu0YMnA_uFRn8j2a-giqJGkU0T2Pwv57GofUpjJqS7Wgg/s1600-h/nameadog_p1.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 172px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_JFnP1rSoABYzNWJOEPv1zYnB0wsh4FGT8Q8r2PCymzPXkdtBEHAVIztxDY01ATTuuZxeASasRV0AIe20ZQnDBOc870Af2hu0YMnA_uFRn8j2a-giqJGkU0T2Pwv57GofUpjJqS7Wgg/s320/nameadog_p1.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270798326753446658&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;margin: 5px; display: block; float: left;&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-9384837557811734&quot;; /* 336x280, created 3/13/08 */ google_ad_slot = &quot;9174819177&quot;; google_ad_width = 336; google_ad_height = 280; //--&gt; &lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/div&gt;Since its inception, The Google AdSense has created considerable hoopla all over the world and opened a plethora of opportunities for people interested to earn online in an alternative way. However, a person should know the process of Setting Up Google Adsense properly to reap in maximum profits.&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;For Setting Up Google Adsense account and start earning, one needs to learn some basic steps. The first step a person requires to learn is the way to generate from his account the AdSense code. It is also imperative for a person to learn how to deal with the settings and appearance of his ad units from his accounts. He also needs to know the way to paste the ad code properly and get his article published on the Internet. For doing these, one needs to create an account with ‘HowToDoThings’.&lt;br /&gt;&lt;br /&gt;One can take the help of the AdSense guide called ‘HowToDoThings’ for both Setting Up Google Adsense account and fine-tuning an already existing AdSense account. If one wants to make a Google Adsense account from the scratch successfully he should log in to the site of ‘HowToDoThings’. Thereafter, he should browse his contributor dashboard. Next, he should select “My Google AdSense Info” located on the left side of the page.&lt;br /&gt;&lt;br /&gt;On doing so, the person will get a message saying that he does not have any Google AdSense account related with his HowToDoThings account. Clicking on the link will activate the AdSense account opening process. Here, the person is required to provide a valid e-mail address. In the next step, he will have to go through the conditions and terms laid by Google, which is an important part.&lt;br /&gt;&lt;br /&gt;After reading the terms, he should click on ‘Sign Me Up’. Shortly after this, he will get a message confirming that an account has been created for him. It will also instruct the person to see his mailbox to receive further notifications. The Google email instructions need to be executed to activate the account.&lt;br /&gt;&lt;br /&gt;In case, a person already owns a Google Adsense account he can link it with HowToDoThings. That way he can start getting article revenue quickly. This procedure is quite similar to Setting Up Google Adsense account from the scratch. A person needs to have a valid Google email id. Google informs the user after his HowToDoThings dashboard gets linked with AdSense and provides instructions for activating the account.&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;&lt;em&gt;&lt;/em&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/2383279969801667942/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/11/google-adsense.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2383279969801667942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/2383279969801667942'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/11/google-adsense.html' title='GOOGLE ADSENSE'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_JFnP1rSoABYzNWJOEPv1zYnB0wsh4FGT8Q8r2PCymzPXkdtBEHAVIztxDY01ATTuuZxeASasRV0AIe20ZQnDBOc870Af2hu0YMnA_uFRn8j2a-giqJGkU0T2Pwv57GofUpjJqS7Wgg/s72-c/nameadog_p1.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-3637373011653392317</id><published>2008-11-19T07:07:00.000-08:00</published><updated>2008-11-21T15:19:26.719-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antenna"/><category scheme="http://www.blogger.com/atom/ns#" term="cantenna"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="omni"/><category scheme="http://www.blogger.com/atom/ns#" term="usb wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="wajanbolic"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="wlan"/><category scheme="http://www.blogger.com/atom/ns#" term="wok anntena"/><category scheme="http://www.blogger.com/atom/ns#" term="yagi"/><title type='text'>MAKE WAJAN BOLIC ANTENNA</title><content type='html'>&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Introduce&lt;/span&gt;&lt;br /&gt;Basicly the function of this wok is being wave reflector like parabola. More bigger of the wok more strong the wave we can get. This antenna can connect on the rang 1-1,5 km.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Make USB WIFI ANTENA&lt;/span&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;USB  (Wajanbolic)&lt;/span&gt;&lt;br /&gt;ENGLISH VERSION&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9qNWKC5zCpZx7tnJNJVQ9slLeJ2hC6XCdspGhuWWZCb42k4iHSPEV7k8kOpJgTYJbxvQ-rwzLOkW9FHBMkBfYq-gcremOdOm_F3ZDKWcw9eCd0plht9eEDhdElDvFmmDGjRJsBnxX0g/s1600-h/clip_idasasasdasmage002.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 214px; height: 209px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9qNWKC5zCpZx7tnJNJVQ9slLeJ2hC6XCdspGhuWWZCb42k4iHSPEV7k8kOpJgTYJbxvQ-rwzLOkW9FHBMkBfYq-gcremOdOm_F3ZDKWcw9eCd0plht9eEDhdElDvFmmDGjRJsBnxX0g/s320/clip_idasasasdasmage002.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270386333134693554&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Material&lt;/span&gt;&lt;br /&gt;1.    Big diameter of wok(more bigger more better)&lt;br /&gt;2.    PVC pipe with diameter 3 inch.&lt;br /&gt;3.    Doff 3″ (to close the top of PVC paralon) 2 piece&lt;br /&gt;4.    Aluminium foil&lt;br /&gt;5.    bolt  wit size 12 or 14&lt;br /&gt;6.     Wifi USB Adapter&lt;br /&gt;7.    Double tape&lt;br /&gt;8.    UTP cable 10 meter&lt;br /&gt;9.    Pole (to make antenna more high)&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Equipment&lt;/span&gt;&lt;br /&gt;1.    Ruler&lt;br /&gt;2.    Cutter&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Procedure&lt;/span&gt;&lt;br /&gt;1.    Make the hole on the wok&lt;br /&gt;2.    Make USB ekstension with UTP cable&lt;br /&gt;Calculate the focus of the wok D:diameter d:depth of the woke&lt;br /&gt;F = D^2/(16*d) = 70^2 / (16*20)&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;example:&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRw_lL_lBXO4rXRzfKyB0BIXiJRYxv5yBxZ-EuMIlQE0K9bikYyVZsx0ha94JoWHHI9VNOMbDm6I69Oti_Q0SA7cDfSXPAsfhB2EJJnrOqN95MV2sORdU7lA-Cw2m6diUkIqs4TM5m1w/s1600-h/clip_image002.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 257px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRw_lL_lBXO4rXRzfKyB0BIXiJRYxv5yBxZ-EuMIlQE0K9bikYyVZsx0ha94JoWHHI9VNOMbDm6I69Oti_Q0SA7cDfSXPAsfhB2EJJnrOqN95MV2sORdU7lA-Cw2m6diUkIqs4TM5m1w/s320/clip_image002.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270386325764292594&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Parabolic dish with D = 70 cm, d = 20 cm&lt;br /&gt;Distance focus from center dish : F = D^2/(16*d) = 70^2 / (16*20) = 15.3 cm&lt;br /&gt;&lt;br /&gt;Cut the PVC pipe 30 cm, then give a mark for the distance of the feeder (free aluminium foil area).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.    Make the hole on pipe and don’t forget on the mark of focus to take Usb Wifi adapther&lt;br /&gt;2.    Then wrap pipe with aluminium foil except the feeder, if the alumunium foil doesn’t have a glue, use double tape.&lt;br /&gt;3.    Take the doff to close the pipe.&lt;br /&gt;4.    Then take first doff on hole of the wok. Then use the bolt and rool it.&lt;br /&gt;5.    Take the pipe on the doff.&lt;br /&gt;6.    Make 10 meter usb ekstension with UTP cable. Cut the short ekstension then open the cable. Choose the color of UTP and pair with the short USB ekstension. Nop roblem if u choose diferent color but you have to do again for the other point. With the same color of pair.example usb red&gt;utp brown, usb blueutp green.&lt;br /&gt;7.    Connect the Usb ekstention with usb wifi. Take the antenna on the top of pole. Connect the ekstention cable to the computer and scan the wireless network.&lt;br /&gt;8.    When it’s connect you are ready to browsing, surfing, and wardriving.&lt;br /&gt;pic. Tutuppancibolic (close with usb wajanbolic)&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUQ0V6bUXEVLcAA8eXLtv0iThXnzmjwnKOhEUubkppOprfCCs3T-ONd_CTLUermFMzQWW_CMGGNWUBTQJ1fr7H_urNCltVUtMQFo2EOAro6zfOdJE-DmRf9LKj7vaoD4urpSI9ykt6XQ/s1600-h/ccss.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 251px; height: 189px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUQ0V6bUXEVLcAA8eXLtv0iThXnzmjwnKOhEUubkppOprfCCs3T-ONd_CTLUermFMzQWW_CMGGNWUBTQJ1fr7H_urNCltVUtMQFo2EOAro6zfOdJE-DmRf9LKj7vaoD4urpSI9ykt6XQ/s320/ccss.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270386329119206610&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5O-YT4N1HZv5SgieZDxx3zJCL_h3aKFpPF9CB15RF5_HQRLeQ7CwYhCwjGjNBGEydhtFWzOoQjyRf5PWYtYItedhyYWEyVfy7k4Kcy2qxqH_hh8ejo9rzh-3YxY1WQUoLli_cl3GFeQ/s1600-h/sdsdfsdsdimage002.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 249px; height: 189px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5O-YT4N1HZv5SgieZDxx3zJCL_h3aKFpPF9CB15RF5_HQRLeQ7CwYhCwjGjNBGEydhtFWzOoQjyRf5PWYtYItedhyYWEyVfy7k4Kcy2qxqH_hh8ejo9rzh-3YxY1WQUoLli_cl3GFeQ/s320/sdsdfsdsdimage002.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270386334000545618&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja7qYOqQ-ddjCgROfLdr0VsgngjynAM1WtwUyQafZYK1kb1yXnCQ0ihi4yzl__vlt24MXV_GzgbLB1e7R6RdEtbJ6JATrFR65UPFwEdNavrmTmdGoJQzGdePX54lBWAFkWbkiw4sLKEg/s1600-h/clip_image00fsdsdfsd2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 250px; height: 187px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja7qYOqQ-ddjCgROfLdr0VsgngjynAM1WtwUyQafZYK1kb1yXnCQ0ihi4yzl__vlt24MXV_GzgbLB1e7R6RdEtbJ6JATrFR65UPFwEdNavrmTmdGoJQzGdePX54lBWAFkWbkiw4sLKEg/s320/clip_image00fsdsdfsd2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270386328907150146&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCVviQ6vvKjvhy-w7ytUvtzLxb0D19kuL_iaB5HvHWRWcZ1GRyVDy6xnHMOULKfUHK7rAd1uwmVjLELopZVgoBSSU9cAlBqWlp_3ef7fCjykEo8UP_Vzg3OZm1Rcg1G9oAYxbygfB_5A/s1600-h/clip_image0xcz02.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 250px; height: 187px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCVviQ6vvKjvhy-w7ytUvtzLxb0D19kuL_iaB5HvHWRWcZ1GRyVDy6xnHMOULKfUHK7rAd1uwmVjLELopZVgoBSSU9cAlBqWlp_3ef7fCjykEo8UP_Vzg3OZm1Rcg1G9oAYxbygfB_5A/s320/clip_image0xcz02.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5270387636417420386&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/3637373011653392317/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/11/make-usb-wifi-antena-usb-wajanbolic.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3637373011653392317'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/3637373011653392317'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/11/make-usb-wifi-antena-usb-wajanbolic.html' title='MAKE WAJAN BOLIC ANTENNA'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9qNWKC5zCpZx7tnJNJVQ9slLeJ2hC6XCdspGhuWWZCb42k4iHSPEV7k8kOpJgTYJbxvQ-rwzLOkW9FHBMkBfYq-gcremOdOm_F3ZDKWcw9eCd0plht9eEDhdElDvFmmDGjRJsBnxX0g/s72-c/clip_idasasasdasmage002.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-722670716244102562</id><published>2008-11-19T06:46:00.000-08:00</published><updated>2008-11-21T15:19:50.459-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antenna"/><category scheme="http://www.blogger.com/atom/ns#" term="cantenna"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="omni"/><category scheme="http://www.blogger.com/atom/ns#" term="usb wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="wajanbolic"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="wlan"/><category scheme="http://www.blogger.com/atom/ns#" term="wok anntena"/><category scheme="http://www.blogger.com/atom/ns#" term="yagi"/><title type='text'>MAKE WAJAN BOLIC ANTENNA</title><content type='html'>&lt;span style=&quot;font-weight: bold;&quot;&gt;PENDAHULUAN&lt;/span&gt;&lt;meta equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;meta name=&quot;ProgId&quot; content=&quot;Word.Document&quot;&gt;&lt;meta name=&quot;Generator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;meta name=&quot;Originator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;link style=&quot;font-weight: bold;&quot; rel=&quot;File-List&quot; href=&quot;file:///C:%5CDOCUME%7E1%5CFres01%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml&quot;&gt;&lt;link style=&quot;font-weight: bold;&quot; rel=&quot;Edit-Time-Data&quot; href=&quot;file:///C:%5CDOCUME%7E1%5CFres01%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_editdata.mso&quot;&gt;&lt;!--[if !mso]&gt; &lt;style&gt; v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} &lt;/style&gt; &lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; latentstylecount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-parent:&quot;&quot;; 	margin:0cm; 	margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:12.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-fareast-font-family:&quot;Times New Roman&quot;;} @page Section1 	{size:612.0pt 792.0pt; 	margin:72.0pt 90.0pt 72.0pt 90.0pt; 	mso-header-margin:36.0pt; 	mso-footer-margin:36.0pt; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:&quot;Table Normal&quot;; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-parent:&quot;&quot;; 	mso-padding-alt:0cm 5.4pt 0cm 5.4pt; 	mso-para-margin:0cm; 	mso-para-margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:10.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-ansi-language:#0400; 	mso-fareast-language:#0400; 	mso-bidi-language:#0400;} &lt;/style&gt; &lt;![endif]--&gt;&lt;span style=&quot;font-weight: bold;font-family:&amp;quot;;font-size:12;&quot;  &gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrs8ZSsXhjCUg958wrb7UllzIPdIaBMD1l7bnkgGnF603-xfgINSZIrvQ59oyA4p4AVn63mub-ISBQCfcP6SXlf7dHcBQ6B0hoOEHDmYjJZRr9rQpns3XobeojWXSW8Z4nvYS1oWlRQ/s1600-h/clip_image002.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; spt=&quot;75&quot; preferrelative=&quot;t&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;  &lt;v:stroke joinstyle=&quot;miter&quot;&gt;  &lt;v:formulas&gt;   &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;   &lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;   &lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;   &lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;   &lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;   &lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;   &lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;   &lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;  &lt;/v:formulas&gt;  &lt;v:path extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; connecttype=&quot;rect&quot;&gt;  &lt;o:lock ext=&quot;edit&quot; aspectratio=&quot;t&quot;&gt; &lt;/v:shapetype&gt;&lt;v:shape id=&quot;BLOGGER_PHOTO_ID_5270381321313415090&quot; spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot; alt=&quot;&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrs8ZSsXhjCUg958wrb7UllzIPdIaBMD1l7bnkgGnF603-xfgINSZIrvQ59oyA4p4AVn63mub-ISBQCfcP6SXlf7dHcBQ6B0hoOEHDmYjJZRr9rQpns3XobeojWXSW8Z4nvYS1oWlRQ/s1600-h/clip_image002.jpg&quot; style=&quot;&#39;width:160.5pt;height:156.75pt&#39;&quot; button=&quot;t&quot;&gt;  &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\Fres01\LOCALS~1\Temp\msohtml1\01\clip_image001.jpg&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrs8ZSsXhjCUg958wrb7UllzIPdIaBMD1l7bnkgGnF603-xfgINSZIrvQ59oyA4p4AVn63mub-ISBQCfcP6SXlf7dHcBQ6B0hoOEHDmYjJZRr9rQpns3XobeojWXSW8Z4nvYS1oWlRQ/s320/clip_image002.jpg&quot;&gt; &lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Pada umumnya peranan wajan (parabolic) adalah sebagai reflector, atau pemantul gelombang. Yang kemudian gelombang tersebut dipantulkan dari semua sisi wajan dalam satu titik yang dinamakan focus dengan tujuan sinyal semakin kuat. Dapat kita ambil dalam reflector lampu senter, sinar yang berada pada titik focus lebih terang daripada titik yang lainnya, begitu pula pada fungsi wajan bolic ini. Kesimpulannya Semakin besar wajannya semakin butuh banyak minyak gorengnya(hex2..)&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 214px; height: 209px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgw_Lw_a8v8xnra6sbNc7EnZieJLWaIMAYm1yXVrhyphenhyphenDDvjD0AyvCJBf34wblOWJDLupyVa-9HmDwP6UPKo8fNzNGllPe3-GUDoZlxasnHKaPrVw8q697N2M5AR_MruUQj0pUZTzsNZFQ/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271241279367351666&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/div&gt;BAHAN&lt;br /&gt;&lt;br /&gt;1. Wajan diameter 36″ (semakin besar diametr semakin bagus)&lt;br /&gt;2. PVC paralon tipis diameter 3″ 1 meter&lt;br /&gt;3. Doff 3″ (tutup PVC paralon) 2 buah&lt;br /&gt;4. Aluminium foil&lt;br /&gt;5. Baut + mur ukuran 12 atau 14&lt;br /&gt;6. Wifi USB Adapter&lt;br /&gt;7. Double tape + lakban&lt;br /&gt;8. Kabel utp 10meter&lt;br /&gt;9. Tiang besi atau apabila budget mpet ya tiang bamboo(untuk meninggikan antenna, lebih tinggi dari bangunan)&lt;br /&gt;&lt;br /&gt;PERALATAN&lt;br /&gt;&lt;br /&gt;1. Penggaris&lt;br /&gt;2. Pisau/ Cutter&lt;br /&gt;3. Gergaji besi&lt;br /&gt;&lt;br /&gt;PERKIRAAN HARGA&lt;br /&gt;&lt;br /&gt;Wajan tempat penggorengan kira-kira sekitar Rp.45.000, Terus yang penting USB wirelesnya Rp.250.000 peralon 3 inc 1meter Rp.20.000, Kabel Utp (sebagai ekstensi usb) 10meter Rp.25.000. Bahan-bahan yang lain tidak dihitung dikarenakan harga murah dan mudah didapat.&lt;br /&gt;&lt;br /&gt;TAHAP PENGERJAAN&lt;br /&gt;&lt;br /&gt;1. Siapkan semua bahan dan peralatan yang dibutuhkan.&lt;br /&gt;2. Lubangi wajan tepat di tengah wajan tersebut seukuran baut 12 atau 14, cukup satu lubang saja.&lt;br /&gt;&lt;br /&gt;Kemudia, ukur diametr wajan, kedalaman wajan dan feeder/ titik focus. Untuk lebih jelas nya silahkan liat gambar di bawah.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8nbGyQQp3QCX6qGivXQbzni7CH4HMN72y9SevRYfwQJGmMzXfoYIiHoO1zz6YU4FtV5cwwKrT2XJipuy909TkB9-oq4k1fXSw5u1WB5-RrFzrYcIvCOeN7LK7yFYrXzErVwcW_6mgZA/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 257px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8nbGyQQp3QCX6qGivXQbzni7CH4HMN72y9SevRYfwQJGmMzXfoYIiHoO1zz6YU4FtV5cwwKrT2XJipuy909TkB9-oq4k1fXSw5u1WB5-RrFzrYcIvCOeN7LK7yFYrXzErVwcW_6mgZA/s320/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271242503488101938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Parabolic dish dg D = 70 cm, d = 20 cm&lt;br /&gt;&lt;br /&gt;maka jarak titik focus dari center dish : F = D^2/(16*d) = 70^2 / (16*20) = 15.3 cm(ket :^àpangkat, *àkali, /àbagi)&lt;br /&gt;&lt;br /&gt;Pada titik focus tsb dipasang ujung feeder. Untuk mendapatkan gain maksimum.&lt;br /&gt;&lt;br /&gt;1. Potong PVC paralon sepanjang 30 cm, kemudian beri tanda untuk jarak feeder nya (daerah bebas aluminium foil). Untuk menentukan panjang feeder nya gunakan rumus di atas.&lt;br /&gt;2. Beri lubang pada focus bagian paralon untuk meletakkan Usb Wifi&lt;br /&gt;3. Selanjut nya, bungkus PVC paralon dengan dgn aluminium foil pada daerah selain feeder, klo aluminium foil yang ada tanpa perekat, maka untuk merekatkan nya bisa menggunakan double tape&lt;br /&gt;4. Dan pasangkan doff tersebut ke PVC paralon&lt;br /&gt;5. Kemudian, wajan yang telah di lubangi tadi dipasangkan dengan doff yang satu nya lagi, sebelum nya doff tersebut dilubangi sesuai dengan ukuran bautyang sudah di siapkan, dan kencangkan secukup nya.&lt;br /&gt;6. Kemudian tinggal pasangkan PVC paralon tadi ke wajan yang sudah di pasang doff.&lt;br /&gt;7. Buat Usb Ekstensi perpanjangan 10 m dengan UTP kabel caranya: Potong kabel perpanjangan menjadi 2, satukanlah masing-masing kabel perpanjangan dengan kabel UTP (pilih empat kabel saja) lakukan di ujung yang lain (jangan sampai menyatu) dengan catatan warna kabel dengan pasangan harus sama dengan ujung lainnya. Agar tidak terjadi kesalahan catat. Missal, usb biruàutp hijau, usb kuningà utp coklat. Lakban sambungan kabel tersebut.&lt;br /&gt;8. Sambungkan USB dengan perpanjangan USB yang dibuat tadi. Pasangkan di tiang peninggi. Tancapkan kabel USB kekomputer dan scan wireless network.&lt;br /&gt;9. Wajan bolic sudah siap untuk digunakan browsing, atau paling tidak untuk wardriving.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Gb. Tutuppancibolic (hampir sama dengan wajanbolic)&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1as2EpfPnBUEFPH5sz64Gpfsn06TgTNJuMXI3RLpTwVuwyI1Tw7KbXznprmFKVh2kdCtqFERLiV3-GAgBcF6C6mCX6aV7qa8sv-5Kp0rimZDPhKidODvbrG2M8j0KmbeiMa4vVSEgmQ/s1600-h/clip_image0sxcascascas01.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1as2EpfPnBUEFPH5sz64Gpfsn06TgTNJuMXI3RLpTwVuwyI1Tw7KbXznprmFKVh2kdCtqFERLiV3-GAgBcF6C6mCX6aV7qa8sv-5Kp0rimZDPhKidODvbrG2M8j0KmbeiMa4vVSEgmQ/s320/clip_image0sxcascascas01.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271242504374507090&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzO3zFLfFoMotbmbM0Gn0Z2ieb-1QJp1HHgekcRH7xXkCJW7AB52EQ0dVg9Cau2ejYI9HBgZCUrUF-2t0zAgTIUCBgT6fvOmgbP3tVuz6GlN7fruAjdf1nYWwU9i-8IOcLnWFvD4CUnA/s1600-h/clip_image00dsaasdd1.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzO3zFLfFoMotbmbM0Gn0Z2ieb-1QJp1HHgekcRH7xXkCJW7AB52EQ0dVg9Cau2ejYI9HBgZCUrUF-2t0zAgTIUCBgT6fvOmgbP3tVuz6GlN7fruAjdf1nYWwU9i-8IOcLnWFvD4CUnA/s320/clip_image00dsaasdd1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271242507002344994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio66Ec6lhMofeYs4kqhNkCTsvK1fEU4q2ygRj1aCzTPXS7wf2bN5PrwZqC4_picp9S8K2g4CXF3_-AZz5vMFJH9cFzfut_eS1lEEcouodvAGjmmwmJYjSDHbUduNFWNLgtbaY-Vgyefg/s1600-h/clip_image00fsdsdfsd2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio66Ec6lhMofeYs4kqhNkCTsvK1fEU4q2ygRj1aCzTPXS7wf2bN5PrwZqC4_picp9S8K2g4CXF3_-AZz5vMFJH9cFzfut_eS1lEEcouodvAGjmmwmJYjSDHbUduNFWNLgtbaY-Vgyefg/s320/clip_image00fsdsdfsd2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271242506270114482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWYmhIRt3jzFyWI2bOmcLFce1W8Fl0bB2pHpYYuYpx2GlKqleIPJLzYaiGFvNUzsWOdj0zLuzKbbVLOeS-b3stI76XXh9yilmltT6oHoTUxyXv3cGm6I7Y6S5PkPTOz-lZmaRJ2kUEqA/s1600-h/sdadsd.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWYmhIRt3jzFyWI2bOmcLFce1W8Fl0bB2pHpYYuYpx2GlKqleIPJLzYaiGFvNUzsWOdj0zLuzKbbVLOeS-b3stI76XXh9yilmltT6oHoTUxyXv3cGm6I7Y6S5PkPTOz-lZmaRJ2kUEqA/s320/sdadsd.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5271242508798640114&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/722670716244102562/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/11/make-wajan-bolic-antenna.html#comment-form' title='2 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/722670716244102562'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/722670716244102562'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/11/make-wajan-bolic-antenna.html' title='MAKE WAJAN BOLIC ANTENNA'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgw_Lw_a8v8xnra6sbNc7EnZieJLWaIMAYm1yXVrhyphenhyphenDDvjD0AyvCJBf34wblOWJDLupyVa-9HmDwP6UPKo8fNzNGllPe3-GUDoZlxasnHKaPrVw8q697N2M5AR_MruUQj0pUZTzsNZFQ/s72-c/1.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3876360839559957614.post-8424693317521873474</id><published>2008-11-17T16:45:00.000-08:00</published><updated>2008-11-21T15:20:33.795-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information"/><category scheme="http://www.blogger.com/atom/ns#" term="new feature"/><category scheme="http://www.blogger.com/atom/ns#" term="next generation"/><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 7"/><title type='text'>WINDOWS 7</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Windows 7 (formerly codenamed Blackcomb and Vienna) is the next release of Microsoft Windows, an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, Tablet PCs, and media center PCs.&lt;br /&gt;&lt;br /&gt;Microsoft stated in 2007 that it is planning Windows 7 development for a three-year time frame starting after the release of its predecessor, Windows Vista, but that the final release date will be determined by product quality.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpzidLSE75KJYuVoJk2ai_HqqNcxuSNpDusPC7WyDW10gb5Mcu06lVsucM1koD0z-d_Ke3jLtaq8Jv7DS9GvfdWYAhAhwWrb776-29JL-u8cTi-V5CkdkxGzJ3rIOkvOQVZWVibBBI7A/s1600-h/290px-Windows7Desktop.png&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 290px; height: 218px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpzidLSE75KJYuVoJk2ai_HqqNcxuSNpDusPC7WyDW10gb5Mcu06lVsucM1koD0z-d_Ke3jLtaq8Jv7DS9GvfdWYAhAhwWrb776-29JL-u8cTi-V5CkdkxGzJ3rIOkvOQVZWVibBBI7A/s320/290px-Windows7Desktop.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5269792922426782258&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Unlike its predecessor, Windows 7 is intended to be an incremental upgrade with the goal of being fully compatible with existing device drivers, applications and hardware.Presentations given by the company in 2008 have focused on multi-touch support, a redesigned Windows Shell with a new taskbar, a home networking system called HomeGroup,and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, most notably Windows Mail, Windows Movie Maker and Windows Photo Gallery, are no longer included with the operating system; they are instead offered separately as part of the Windows Live Essentials suite.&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;In 2000, Microsoft started the planning to follow up Windows XP and its server counterpart Windows Server 2003 (both codenamed Whistler) with a major new release of Windows that was codenamed Blackcomb (both codenames refer to the Whistler-Blackcomb resort). This new version was at that time scheduled for a 2005 release.[6][7]&lt;br /&gt;&lt;br /&gt;Major features were planned for Blackcomb, including an emphasis on searching and querying data and an advanced storage system named WinFS to enable such scenarios. In this context, a feature mentioned by Microsoft co-founder Bill Gates for Blackcomb was &quot;a pervasive typing line that will recognize the sentence that [the user is] typing in.&quot;[8]&lt;br /&gt;&lt;br /&gt;Later, Blackcomb was delayed and an interim, minor release, codenamed &quot;Longhorn&quot;, was announced for a 2003 release.[9] By the middle of 2003, however, Longhorn had acquired some of the features originally intended for Blackcomb, including WinFS, the Desktop Window Manager, and new versions of system components built on the .NET Framework. After the 2003 &quot;Summer of Worms&quot;, where three major viruses − Blaster, Sobig, and Welchia − exploited flaws in Windows operating systems within a short time period, Microsoft changed its development priorities, putting some of Longhorn&#39;s major development work on hold in order to develop new service packs for Windows XP and Windows Server 2003. Development of Longhorn was also &quot;reset&quot; in September 2004.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://otherway08.blogspot.com/feeds/8424693317521873474/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://otherway08.blogspot.com/2008/11/windows-7-formerly-codenamed-blackcomb.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/8424693317521873474'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3876360839559957614/posts/default/8424693317521873474'/><link rel='alternate' type='text/html' href='http://otherway08.blogspot.com/2008/11/windows-7-formerly-codenamed-blackcomb.html' title='WINDOWS 7'/><author><name>world</name><uri>http://www.blogger.com/profile/08520592299187850852</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//3.bp.blogspot.com/_qtX19Mu7Dfs/SWvCp2tCLRI/AAAAAAAAAH0/0dkaCN-lxiw/S220-s113/dhanex%27s+life.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpzidLSE75KJYuVoJk2ai_HqqNcxuSNpDusPC7WyDW10gb5Mcu06lVsucM1koD0z-d_Ke3jLtaq8Jv7DS9GvfdWYAhAhwWrb776-29JL-u8cTi-V5CkdkxGzJ3rIOkvOQVZWVibBBI7A/s72-c/290px-Windows7Desktop.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>