with 2 modems we separate his path in mikrotik for each computer that you specify in a network ..
Topology:
Modem
Modem1 = 192.168.1.1
Modem2 = 192.168.9.1
Mikrotik
Eth1 = 192.168.1.2
Eth2 = 192.168.9.16
Eth3 = 192.168.3.1
Client Computers
Client1 = 192.168.3.2 ---- On To navigate Modem1
Client2 = 192.168.3.3 ---- On To navigate Modem2
Let's get started:
The first step is to name each interface on mikrotik, with the command "New Terminal":
/ Interface set 0 name = public-modem1
/ Interface set 1 name = public-modem2
/ Interface set 2 name = local-client
Furthermore, given ip to ethernet in mikrotik, with the command:
/ Ip address add address = 192.168.1.2 \
netmask = 255.255.255.0 \
interface = public-modem1
/ Ip address add address = 192.168.9.16 \
netmask = 255.255.255.0 \
interface = public-modem2
/ Ip address add address = 192.168.3.1 \
netmask = 255.255.255.0 \
interface = local-client
Next enter the DNS, adjust your dns masing2, with the command:
/ Ip set dns servers = 203.130.193.74,203.130.206.250 \
allow-remote-requests = yes
then enter the ip route modem1, modem2 along with its routing mark:
/ Ip route add gateway = 192.168.1.1
/ Ip route add gateway = 192.168.1.1 routing-mark = MODEM1
/ Ip route add gateway = 192.168.9.1
/ Ip route add gateway = 192.168.1.1 routing-mark = MODEM2
Next enter the IP NAT firewall for each modem with action masquerade, printahnya:
/ Ip firewall nat add chain = srcnat \
out-interface = public-modem1 \
action = masquerade
/ Ip firewall nat add chain = srcnat \
out-interface = public-modem2 \
action = masquerade
Next enter the ip firewall clinet ip address list to be in a mangle rule in later topology on top of her ... there are 2 ip address is 192.168.3.2 and 192.168.3.3, the command as follows:
ip firewall address-list \
add address = 192.168.3.2 \
list = "IP leads to MODEM1"
ip firewall address-list \
add address = 192.168.3.3 \
list = "IP leads to MODEM2"
if let's say your computer is a lot you just add his ip address
Next we create a mangle for the connection of the address lists that we have made along with routing mark that would mangle the ip route with routing arrested earlier mark, and marks the packet for the opportunistic queue trees, with the command:
/ Ip firewall mangle add chain = prerouting \
action = mark-connection \
new-connection-mark = MODEM1 passthrough = yes \
src-address-list = "IP leads to MODEM1" \
in-interface = local-client
/ Ip firewall mangle add chain = prerouting \
action = mark-routing new-routing-mark = MODEM1 \
passthrough = no in-interface = local-client \
connection-mark = MODEM1
/ Ip firewall mangle add chain = forward \
action = mark-packet new-packet-mark = "MODEM1 DOWN" \
passthrough = no dst-address = 192.168.3.2 \
connection-mark = MODEM1
/ Ip firewall mangle add chain = forward \
action = mark-packet new-packet-mark = "MODEM1 UP" \
passthrough = no src-address = 192.168.3.2 \
connection-mark = MODEM1
/ Ip firewall mangle add chain = prerouting \
action = mark-connection \
new-connection-mark = MODEM2 passthrough = yes \
src-address-list = "IP leads to MODEM2" \
in-interface = local-client
/ Ip firewall mangle add chain = prerouting \
action = mark-routing new-routing-mark = MODEM2 \
passthrough = no in-interface = local-client \
connection-mark = MODEM2
/ Ip firewall mangle add chain = forward \
action = mark-packet new-packet-mark = "MODEM2 DOWN" \
passthrough = no dst-address = 192.168.3.3 \
connection-mark = MODEM2
/ Ip firewall mangle add chain = forward \
action = mark-packet new-packet-mark = "MODEM2 UP" \
passthrough = no src-address = 192.168.3.3 \
connection-mark = MODEM2
Next we create a queue type with pcq to the mark in the queue trees with less download and upload it automatically to the average bandwidth, the command:
/ Queue type add name = DOWN \
kind = pcq pcq-classifier = dst-address, dst-port
/ Queue type add name = UP \
kind = pcq pcq-classifier = src-address, src-port
Next we create its queue trees, to download and upload, the command:
/ Queue tree add name = "CLIENT MODEM1 DOWN" \
parent = global-out packet-mark = "MODEM1 DOWN" \
limit-at = 0 queue = DOWN priority = 1 \
max-limit = 0 burst-limit = 0 burst-threshold = 0 burst-time = 0s
/ Queue tree add name = "CLIENT MODEM2 DOWN" \
parent = global-out packet-mark = "MODEM2 DOWN" \
limit-at = 0 queue = DOWN priority = 1 max-limit = 0 \
burst-limit = 0 burst-threshold = 0 burst-time = 0s
/ Queue tree add name = "CLIENT MODEM1 UP" \
-modem1 parent = public packet-mark = "MODEM1 UP" \
limit-at = 0 queue = Up priority = 2 max-limit = 0 \
burst-limit = 0 burst-threshold = 0 burst-time = 0s
/ Queue tree add name = "CLIENT MODEM2 UP" \
-modem2 parent = public packet-mark = "MODEM2 UP" \
limit-at = 0 queue = Up priority = 2 max-limit = 0 \
burst-limit = 0 burst-threshold = 0 burst-time = 0s
Further test results, I first created in the computer ip address 192.168.3.2
Then I test and the results are browsing traffic headed modem1 and its queue toward modem1 also, means have been running
Further test results, I first created in the computer ip address 192.168.3.3
Then I test and the results are browsing traffic headed modem2 and its queue toward modem2 also, means have been running
Done and good luck .......
HOW TO RESET MIKROTIK WIRELESS HARDWARE AND WIRELESS ROUTER-PROXY Mikrotik Mikrotik
If you forget the password or mikrotik mikrotik wireless router, currently in press the reset button behind it, also did not want tereset mikrotik, you are forced to hardware reset it, here's how to reset mikrotik wireless hardware:
- Open the box mikrotik box with a screwdriver to use your:
- Then turn on the mikrotik is:
- You look at mikrotik board, there is a kind of round yellow gold copper:
- In order for the golden keys did not reset saatg abrasions or scratches screwdriver
then seal your screwdriver with cigarette tin:
- With the Mikrotik that is still lit, tin-plated screwdriver touch the cigarette to the
copper colored round kuing earlier:
- Then in turn, so mikrotiknya suddenly died:
- Hold for about 10 seconds:
- Then remove the screwdriver from the copper-colored yellow round earlier, and the wait
about 5 minutes:
- Hardware mikrotik you have tereset, log back into admin and the password in clear
- Good luck -
- Open the box mikrotik box with a screwdriver to use your:
- Then turn on the mikrotik is:
- You look at mikrotik board, there is a kind of round yellow gold copper:
- In order for the golden keys did not reset saatg abrasions or scratches screwdriver
then seal your screwdriver with cigarette tin:
- With the Mikrotik that is still lit, tin-plated screwdriver touch the cigarette to the
copper colored round kuing earlier:
- Then in turn, so mikrotiknya suddenly died:
- Hold for about 10 seconds:
- Then remove the screwdriver from the copper-colored yellow round earlier, and the wait
about 5 minutes:
- Hardware mikrotik you have tereset, log back into admin and the password in clear
- Good luck -
HOW TO SEE WIRELESS PASSWORD
see there may be a wireless password pda know and there who do not know .... Example application Here ....:
From the above applications look very simple ... is simple ... gan just ....: The one in need:
1. Network Wifi / Hotspot
2. brain
3. The strong faith ...
4. How his laptop:
1. open application
2. click reply berpassword wifi network
3. click on the menubar edit
4. then click Copy Key (Hex) Copy Key (Ascii) Select one ..
5. Paste in the last column berpassword wifi ...
6. Done ...
From the above applications look very simple ... is simple ... gan just ....: The one in need:
1. Network Wifi / Hotspot
2. brain
3. The strong faith ...
4. How his laptop:
1. open application
2. click reply berpassword wifi network
3. click on the menubar edit
4. then click Copy Key (Hex) Copy Key (Ascii) Select one ..
5. Paste in the last column berpassword wifi ...
6. Done ...
INFO SMTP SETTING IN MICROSOFT OUTLOOK 2007
Following the instructions below for users who use Microsoft Outlook Email-Client to change the SMTP settings
1. Log in first at the email account through Outlook Mikrosoft and select the menu: TOOLS ---> ACCOUNT SETTINGS,
2. Choose E-mail tab, then Select the email address and click Change.
3. Then will come the Internet E-mail Settings page, as below, then click the MORE SETTINGS.
4. After clicking settings will appear more like the display below, and the crux is to check the My outgoing server (SMTP) requires authentication and select Use Same Underneath in settings as my incoming mail server, then click OK, then NEXT and FINISH
1. Log in first at the email account through Outlook Mikrosoft and select the menu: TOOLS ---> ACCOUNT SETTINGS,
2. Choose E-mail tab, then Select the email address and click Change.
3. Then will come the Internet E-mail Settings page, as below, then click the MORE SETTINGS.
4. After clicking settings will appear more like the display below, and the crux is to check the My outgoing server (SMTP) requires authentication and select Use Same Underneath in settings as my incoming mail server, then click OK, then NEXT and FINISH
Routing
Routing is a process for forwarding network packets from one network to another through an internetwork. Routing can also refer to a method of combining multiple networks so that data packets can be lurches from one network to the next. To do this, is used a device called a router network. Routers will receive packets addressed to a network outside the network first, and will forward packets it receives to other routers until the destination.
In general there are two categories of routing, namely:
* Static Routing
This routing requires the intervention of network administrators in determining the route. Static routing is suitable for network conditions that only have a route / path.
* Dynamic Routing
This routing uses routing protocols that can determine their own route based on the situation and conditions at any time. Dynamic routing suitable for the network which has many routes / pathways.
Dynamic routing is used by the network formed by several routers. Each - each router will give each other routing information to its neighbors and together forming a routing table.
There are two types of routing protocols, namely:
* Distance Vector
Named such because it involves two factors, namely: the distance (or metric distance) and direction (vector) to achieve the goal. Routing information is only obtained from the nearest router (neighbor). To prevent routing loops split horizon commonly used techniques and poison reverse.
* Link State
All routers know the path (path) which was formed in the network. Each - each router calculates the distance terpendek.Protocol distance vector can not know the condition of inter-links, such as the reliability factor and speed of data transfer. While the link-state smarter.
In general there are two categories of routing, namely:
* Static Routing
This routing requires the intervention of network administrators in determining the route. Static routing is suitable for network conditions that only have a route / path.
* Dynamic Routing
This routing uses routing protocols that can determine their own route based on the situation and conditions at any time. Dynamic routing suitable for the network which has many routes / pathways.
Dynamic routing is used by the network formed by several routers. Each - each router will give each other routing information to its neighbors and together forming a routing table.
There are two types of routing protocols, namely:
* Distance Vector
Named such because it involves two factors, namely: the distance (or metric distance) and direction (vector) to achieve the goal. Routing information is only obtained from the nearest router (neighbor). To prevent routing loops split horizon commonly used techniques and poison reverse.
* Link State
All routers know the path (path) which was formed in the network. Each - each router calculates the distance terpendek.Protocol distance vector can not know the condition of inter-links, such as the reliability factor and speed of data transfer. While the link-state smarter.
GOOGLE BUY TECHNOLOGY COMPANIES FACE IDENTITY
Google recently bought software companies face recognitiontechnology, Pittsburgh Pattern Recognition (PittPatt), according to a statement from the company's internet secret on its website.
"Joining with Google is a good step of the journey that started from the Robotics Institute at Carnegie Mellon University in the late '90s,until finally the launch PittPatt in
2004," wrote the PittPatt on its website.
"We have worked hard for this technology. On Google there arealready many excellent products such as Image Search, YouTube,Picasa, and others, which allows matching with the technology wedevelop this," he added.
Previously Google had been reported to be exploring the possibility of adding facial recognition technology on the products of their output, but was suspended due to issues of privacy violations. In March, the giant Internet companies say they will not issue a face detection technology in mobile applications, due to strict privacyrules in it.
But in May, Eric Schmidt had said that Google will not use facial recognition technology.
"The team from Pittsburgh Pattern Recognition has developedinnovative technologies in the areas of pattern recognition. We think the research and technology they are able to benefit many of our users in many ways, and we also want to cooperate with them,"Google said on its website regarding the purchase.
Unfortunately, not announced how much the PittPatt purchase made by Google.
SOFTWARE TO CHANGE INTO 2 FlashDisk 1 GB
Subscribe to:
Comments (Atom)
