Connecting 2 remote places using wireless bridge

Connecting 2 remote places using wireless bridge

point to multi-point, point to point, wireless
So, somebody asked me about a topic about "connecting 2 remote places using wireless bridge". so he has 2 rooms (or office) separated by a road, each location already has its own network, and then the plan is to connect them. as simple as that. lets make this process to be systematic and logical way. first of all, we need to gather requirements and current condition. here are the check lists: Current conditions both sites have computer network already running, and both network use network id of 10.0.0.0/24 both sites is separated by a road and the distance is around 30 meters both are located in second floor Requirements: to connect both sites using wireless connect using mikrotik devices if possible, donot change the current configuration max traffic between 2 sites can…
Read More
Setup mikrotik bridge

Setup mikrotik bridge

bridge, layer 2
This article will give an example of how to setup mikrotik bridge on routerboard. this technique can be applied on mikrotik devices that has more than one interfaces. Before implementing this tutorial, make sure you understand how switch works. ok lets start. prerequisite Make sure feature bridge is supported on your routerOS your device has more than one interface routerboard is looks like a switch, why do we need to make a bridge? can we just plug a cable on and it works like ordinary switch? did you know that on each interface of your routerboard there is a MAC address associated with it? yes, on each port/interface. why on each port? because routerboard is basically a router, and router is connecting networks, and each interface will connect to a network,…
Read More
Simplex, half-duplex, full-duplex

Simplex, half-duplex, full-duplex

tips
When we talk about communication, there are always 2 parties involved: TX (transmitter, the one who send signal/information) and RX (receiver, the one who receive signal/information). Simplex, half-duplex, full-duplex. In this article, we will be discussing about types of communication between TX and RX. they are: simplex, half-duplex, full-duplex. these terms are fundamental terminologies which network / telco engineers need to know. Between TX and RX there is a media that is used to deliver signal. channel could be physical or logical, could be wired or wireless. this media later on is called communication channel. Simplex means one way communication. this happens because the communication channel is only used by TX and RX is the passive side which only receive information. example: broadcast radio/tv, streaming. (more…)
Read More
How packets travel over network by using Layer 2 and 3 information

How packets travel over network by using Layer 2 and 3 information

layer 2, Layer 3
How packets travel over network by using Layer 2 and 3 information. This is a class-based course about Networking. In this session we were discussing how packets travel on the network using layer 2 (data link) and layer 3 (network) information. We decided to explain the concept using simulation, asking a volunteer from students  to become a packet that travels over network. On his front, we put "headers" information (layer 2 and 3) so router can use that information to forward the packet to destination. (more…)
Read More
apa itu ransomware

apa itu ransomware

malware, ransomware
Pada artikel sebelumnya, kita telah membahas apa itu malware. sekarang, kita akan bahas apa itu ransomware. apa itu ransomware? ware artinya perkakas, tools, devices, bisa berupa hardware atau software. ransom artinya tebusan. ransomware artinya software yang meminta tebusan? loh kok bisa minta tebusan / memeras korban? wah saya masih bingung... ada contoh kasusnya? komputer korban terinfeksi malware, dimana pengguna tidak sadar telah terinfeksi. karena baru, software antivirus pun tidak mengenali malware ini karena masih baru malware ini kemudian merajalela. menginfeksi ribuan komputer di seluruh dunia malware ini tidak bekerja secara independen, mereka dikontrol oleh sebuah server yang ada di internet. diam-diam dan terenkripsi, mereka mengirim data/informasi ke server pusat tentang komputer yang telah mereka jangkiti pada suatu hari, server memerintahkan malware tersebut untuk melakukan enkripsi terhadap harddisk korban, dengan key…
Read More