Thursday, June 26, 2008

Yahoo Mail hopes to lure users with 'ymail.com'


Yahoo Mail, the top provider of Web-based e-mail, is letting users sign up with the ymail.com and rocketmail.com domains in an attempt to attract new users and keep existing ones loyal.

Yahoo headquarters in Sunnyvale, Calif.

Yahoo headquarters in Sunnyvale, Calif.

The move is geared to help people find a better e-mail address, said John Kremer, vice president of Yahoo Mail. "We want users to get the exact e-mail account they want so they stay with us for life," he said.

Because "yourname@yahoo.com" is likely taken by now, a lot of people must resort to unpleasant and hard-to-remember addresses such as "yourname1988@yahoo.com." Yahoo wants to give people a new chance with a name they like.


The rocketmail name dates back to Yahoo's $92 million acquisition in 1997 of Four11, a company that offered the free RocketMail service.

"It's a great brand," Kremer said. "Those who have no memory of our service in the late 1990s indicated they like it, and those who indicated they want to be retro like it for the fact that it's associated with Yahoo.com since the beginning."

Maybe it's retro for Yahoo, too, which is under fire from shareholders after a bruising takeover attempt by Microsoft. Probably plenty of employees enjoy thinking nostalgically about the company's dot-com glory days. But the company is trying to move forward, too, with Mail one major part of the company's Yahoo Open Strategy (YOS) strategy.

Open mail
Through YOS, Yahoo is trying to make its online services a foundation for third-party applications. For mail, that means letting other applications appear on the Mail "canvas," Kremer said.

In this area, Kremer said, Yahoo was inspired by technology the Yahoo got through its acquisition of online e-mail specialist Zimbra in 2007.

"Zimbra was a pioneer in opening up Web services within the Zimbra application. They have open applications within their space that are used all over the place," he said.

There are now "no walls" between Yahoo Mail and Zimbra engineers, he added, though the business units are separate. "They share a lot of what they do. You'll see in very short order products on our site built on their technology, and vice versa," Kremer said.

The Internet company revamped its Yahoo Mail interface beginning three years ago, calling the update the "all-new Yahoo Mail" for well over a year now. The new interface is based on technology from Yahoo's 2004 acquisition of Oddpost.com.

The "all-new" badge will be removed "pretty soon," Kremer added.

Rolling Thunder
Yahoo plans a "rolling thunder of announcements" around Yahoo Mail in the next six to eight months, he added. Some significant changes will include as a "smarter inbox," work to make Yahoo Mail fit better in today's world of social networking, and the opening of the mail platform, he added.

It's a good thing, because there are plenty of competitors--not just traditional Web mail outfits such as Microsoft Hotmail, AOL, and up-and-coming Google Gmail, but also social sites such as Facebook and MySpace. Yahoo considers the full spectrum of competition, though.

"What we believe here at Yahoo is all communication is eventually coming together," Kremer said. "You don't need to bounce out to a separate social communications site or a different social event site when most of those tools are really just communications. If it's built on the same address book and calendar information, you can see them coming together in a single, more productive, smarter inbox."



Get it now or get this

Read more...

Tuesday, June 24, 2008

How to configure DNS for Internet access in Windows Server 2003

How to Start with a Stand-Alone Server Running Windows Server 2003

The stand-alone server running Windows Server 2003 becomes a DNS server for your network. In the first step, you assign this server a static Internet Protocol (IP) address. DNS servers must not use dynamically assigned IP addresses because a dynamic change of address could cause clients to lose contact with the DNS server.



Step 1: Configure TCP/IP

1.Click Start, point to Control Panel, point to Network Connections, and then click Local Area Connection.
2.Click Properties.
3.Click Internet Protocol (TCP/IP), and then click Properties.
4.Click the General tab.
5.Click Use the following IP address, and then type the IP address, subnet mask, and default gateway address in the appropriate boxes.
6.Click Advanced, and then click the DNS tab.
7.Click Append primary and connection specific DNS suffixes.
8.Click to select the Append parent suffixes of the primary DNS suffix check box.
9.Click to select the Register this connection's addresses in DNS check box.

Note that DNS servers running Windows Server 2003 must point to themselves for DNS. If this server needs to resolve names from its Internet service provider (ISP), you must configure a forwarder. Forwarders are discussed in the How to Configure Forwarders section later in this article.
10.Click OK three times.

NOTE: If you receive a warning from the DNS Caching Resolver service, click OK to dismiss the warning. The caching resolver is trying to contact the DNS server, but you have not finished configuring the server.

Step 2: Install Microsoft DNS Server

1.Click Start, point to Control Panel, and then click Add or Remove Programs.
2.Click Add or Remove Windows Components.
3.In the Components list, click Networking Services (but do not select or clear the check box), and then click Details.
4.Click to select the Domain Name System (DNS) check box, and then click OK.
5.Click Next.
6.When you are prompted, insert the Windows Server 2003 CD-ROM into the computer's CD-ROM or DVD-ROM drive.
7.On the Completing the Windows Components Wizard page, click Finish when Setup is complete.
8.Click Close to close the Add or Remove Programs window.

Step 3: Configure the DNS Server

To configure DNS by using the DNS snap-in in Microsoft Management Console (MMC), follow these steps:
1.Click Start, point to Programs, point to Administrative Tools, and then click DNS.
2.Right-click Forward lookup zones, and then click New Zone
3.When the New Zone Wizard starts, click Next.

You are prompted for a zone type. The zone types include:

Primary zone: Creates a copy of a zone that can be updated directly on this server. This zone information is stored in a .dns text file.
Secondary zone: A standard secondary zone copies all of the information from its master DNS server. A master DNS server can be an Active Directory, primary, or secondary zone that is configured for zone transfers. Note that you cannot modify the zone data on a secondary DNS server. All of its data is copied from its master DNS server.
Stub zone: A Stub zone contains only those resource records that are necessary to identify the authoritative DNS servers for that zone. Those resource records include Name Server (NS), Start of Authority (SOA), and possibly glue Host (A) records.
There is also an option to the store zone in Active Directory. This option is only available if the DNS server is a Domain controller.
4.The new forward lookup zone must be a primary or an Active Directory-integrated zone so that it can accept dynamic updates. Click Primary, and then click Next.
5.The new zone contains the locator records for this Active Directory-based domain. The name of the zone must be the same as the name of the Active Directory-based domain, or be a logical DNS container for that name. For example, if the Active Directory-based domain is named "support.microsoft.com", valid zone names are "support.microsoft.com" only.

Accept the default name for the new zone file. Click Next.

NOTE: Experienced DNS administrators may want to create a reverse lookup zone, and are encouraged to explore this branch of the wizard. A DNS server can resolve two basic requests: a forward lookup and a reverse lookup. A forward lookup is more common. A forward lookup resolves a host name to an IP address with an "A" or Host Resource record. A reverse lookup resolves an IP address to a host name with a PTR or Pointer Resource record. If you have your reverse DNS zones configured, you can automatically create associated reverse records when you create your original forward record.

How to Remove the Root DNS Zone

A DNS server running Windows Server 2003 follows specific steps in its name-resolution process. A DNS server first queries its cache, it checks its zone records, it sends requests to forwarders, and then it tries resolution by using root servers.

By default, a Microsoft DNS server connects to the Internet to process DNS requests more with root hints. When you use the Dcpromo tool to promote a server to a domain controller, the domain controller requires DNS. If you install DNS during the promotion process, a root zone is created. This root zone indicates to your DNS server that it is a root Internet server. Therefore, your DNS server does not use forwarders or root hints in the name-resolution process.

1.Click Start, point to Administrative Tools, and then click DNS.
2.Expand ServerName, where ServerName is the name of the server, click Properties and then expand Forward Lookup Zones.
3.Right-click the "." zone, and then click Delete.

How to Configure Forwarders

Windows Server 2003 can take advantage of DNS forwarders. This feature forwards DNS requests to external servers. If a DNS server cannot find a resource record in its zones, it can send the request to another DNS server for additional attempts at resolution. A common scenario might be to configure forwarders to your ISP's DNS servers.
1.Click Start, point to Administrative Tools, and then click DNS.
2.Right-click ServerName, where ServerName is the name of the server, and then click the Forwarders tab.
3.Click a DNS domain in the DNS domain list. Or, click New, type the name of the DNS domain for which you want to forward queries in the DNS domain box, and then click OK.
4.In the Selected domain's forwarder IP address box, type the IP address of the first DNS server to which you want to forward, and then click Add.
5.Repeat step 4 to add the DNS servers to which you want to forward.
6.Click OK.

How to Configure Root Hints

Windows can use root hints. The Root Hints resource records can be stored in either Active Directory or in a text file (%SystemRoot%\System32\DNS\Cache.dns). Windows uses the standard Internic root server. Also, when a server running Windows Server 2003 queries a root server, it updates itself with the most recent list of root servers.
1.Click Start, point to Administrative Tools, and then click DNS.
2.Right-click ServerName, where ServerName is the name of the server, and then click Properties.
3.Click the Root Hints tab. The DNS server's root servers are listed in the Name servers list.

If the Root Hints tab is unavailable, your server is still configured as a root server. See the How to Remove the Root DNS Zone section earlier in this article. You may have to use custom root hints that are different from the default. However, a configuration that points to the same server for root hints is always incorrect. Do not modify your root hints. If your root hints are incorrect and have to be replaced, click the following article number to view the article in the Microsoft Knowledge Base:
237675 (http://support.microsoft.com/kb/237675/) Setting up the Domain Name System for Active Directory

How to Configure DNS Behind a Firewall

Proxy and Network Address Translation (NAT) devices can restrict access to ports. DNS uses UDP port 53 and TCP port 53. The DNS Service Management console also uses RCP. RCP uses port 135. These are potential issues that may occur when you configure DNS and firewalls.


Read more...

Friday, June 20, 2008

Teknik Professional Photoshop CS3

Buku ini memang bukan saya yang membuat, kebetulan saya browsing dan mendapat link tentang buku ini yang di upload seseorang di suatu forum tetangga.

Karena isinya sepertinya cukup bagus maka sayapun tertarik mengunduhnya. Mungkin sangat berguna bagi yang mau atau pernah belajar Photoshop, diantaranya tentu adalah Anda sendiri.

Silahkan download di sini.

Read more...

Antivirus PCMAV 1.4 + USB Disk Filtering

PC Media Antivirus (PCMAV) 1.4
Copyright (c) 2006-2008 Majalah PC Media
A member of Pinpoint Publications

Antivirus lokal yang paling banyak digunakan pengguna komputer pribadi di Indonesia ini telah mengeluarkan versi terbarunya melalui majalah PC Media 07/2008. Fitur baru yang diunggulkan dalam PCMAV 1.4 ini adalah adanya USB Disk Filtering sebagai pengembangan fitur AutoScan yang selama ini ada di RTP, yang memungkinkan ketika sebuah USB Flash Disk dicolokkan, secara otomatis USB Disk Filtering akan bekerja dengan melakukan pemeriksaan.

Di rilis kali ini, PCMAV mampu mengenali 1.937 virus beserta variannya yang banyak dilaporkan menyebar di Indonesia, seperti yang dilaporkan oleh VirusIndonesia.com.

Silahkan download di sini.

Read more...

Thursday, June 19, 2008

Networking Basics: Part 1 - Networking Hardware

Network Adapters


The first piece of hardware that I want to discuss is a network adapter. There are many different names for network adapters, including network cards, Network Interface Cards, NICs. These are all generic terms for the same piece of hardware. A network card’s job is to physically attach a computer to a network, so that the computer can participate in network communications.

Figure A:
This is what an Ethernet card looks like

The first thing that you need to know about network cards is that the network card has to match the network medium. The network medium refers to the type of cabling that is being used on the network. Wireless networks are a science all their own, and I will talk about them in a separate article.

At one time making sure that a network card matched the network medium was a really big deal, because there were a large number of competing standards in existence. For example, before you built a network and started buying network cards and cabling, you had to decide if you were going to use Ethernet, coaxal Ethernet, Token Ring, Arcnet, or one of the other networking standards of the time. Each networking technology had its strengths and weaknesses, and it was important to figure out which one was the most appropriate for your organization.

Today, most of the networking technologies that I mentioned above are quickly becoming extinct. Pretty much the only type of wired network used by small and medium sized businesses is Ethernet. You can see an example of an Ethernet network card, shown in Figure A.

Modern Ethernet networks use twisted pair cabling containing eight wires. These wires are arranged in a special order, and an RJ-45 connecter is crimped onto the end of the cable. An RJ-45 cable looks like the connector on the end of a phone cord, but it’s bigger. Phone cords use RJ-11 connectors as opposed to the RJ-45 connectors used by Ethernet cable. You can see an example of an Ethernet cable with an RJ-45 connector, shown in Figure B.




Figure B: This is an Ethernet cable with an RJ-45 connector installed

Hubs and Switches

As you can see, computers use network cards to send and receive data. The data is transmitted over Ethernet cables. However, you normally can’t just run an Ethernet cable between two PCs and call it a network.

In this day and age of high speed Internet access being almost universally available, you tend to hear the term broadband thrown around a lot. Broadband is a type of network in which data is sent and received across the same wire. In contrast, Ethernet uses Baseband communications. Baseband uses separate wires for sending and receiving data. What this means is that if one PC is sending data across a particular wire within the Ethernet cable, then the PC that is receiving the data needs to have the wire redirected to its receiving port.

You can actually network two PCs together in this way. You can create what is known as a cross over cable. A cross over cable is simply a network cable that has the sending and receiving wires reversed at one end, so that two PCs can be linked directly together.

The problem with using a cross over cable to build a network is that the network will be limited to using no more and no less than two PCs. Rather than using a cross over cable, most networks use normal Ethernet cables that do not have the sending and receiving wires reversed at one end.

Of course the sending and receiving wires have to be reversed at some point in order for communications to succeed. This is the job of a hub or a switch. Hubs are starting to become extinct, but I want to talk about them any way because it will make it easier to explain switches later on.

There are different types of hubs, but generally speaking a hub is nothing more than a box with a bunch of RJ-45 ports. Each computer on a network would be connected to a hub via an Ethernet cable. You can see a picture of a hub, shown in Figure C.





Figure C: A hub is a device that acts as a central connection point for computers on a network

A hub has two different jobs. Its first job is to provide a central point of connection for all of the computers on the network. Every computer plugs into the hub (multiple hubs can be daisy chained together if necessary in order to accommodate more computers).

The hub’s other job is to arrange the ports in such a way so that if a PC transmits data, the data is sent over the other computer’s receive wires.

Right now you might be wondering how data gets to the correct destination if more than two PCs are connected to a hub. The secret lies in the network card. Each Ethernet card is programmed at the factory with a unique Media Access Control (MAC) address. When a computer on an Ethernet network transmits data across an Ethernet network containing PCs connected to a hub, the data is actually sent to every computer on the network. As each computer receives the data, it compares the destination address to its own MAC address. If the addresses match then the computer knows that it is the intended recipient, otherwise it ignores the data.

As you can see, when computers are connected via a hub, every packet gets sent to every computer on the network. The problem is that any computer can send a transmission at any given time. Have you ever been on a conference call and accidentally started to talk at the same time as someone else? This is the same thing that happens on this type of network.

When a PC needs to transmit data, it checks to make sure that no other computers are sending data at the moment. If the line is clear, it transmits the necessary data. If another computer tries to communicate at the same time though, then the packets of data that are traveling across the wire collide and are destroyed (this is why this type of network is sometimes referred to as a collision domain). Both PCs then have to wait for a random amount of time and attempt to retransmit the packet that was destroyed.

As the number of PCs on a collision domain increases, so does the number of collisions. As the number of collisions increase, network efficiency is decreased. This is why switches have almost completely replaced hubs.

A switch, such as the one shown in Figure D, performs all of the same basic tasks as a hub. The difference is that when a PC on the network needs to communicate with another PC, the switch uses a set of internal logic circuits to establish a dedicated, logical path between the two PCs. What this means is that the two PCs are free to communicate with each other, without having to worry about collisions.


Figure D: A switch looks a lot like a hub, but performs very differently

Switches greatly improve a network’s efficiency. Yes, they eliminate collisions, but there is more to it than that. Because of the way that switches work, they can establish parallel communications paths. For example, just because computer A is communicating with computer B, there is no reason why computer C can’t simultaneously communicate with computer D. In a collision domain, these types of parallel communications would be impossible because they would result in collisions.



Read more...

Panduan Praktis Ber Internet #2 Seri CHAT

Beriku ini daftar panduan / petunjuk praktis pemakaian Internet untuk chating.
Mungkin pengguna sudah familiar dengan YM, MIRC, namun sebagian masih belum mengerti bagaimana pemakaiannya, maka silahkan downloan petunjuk berikut :

Pemakaian Yahoo Messenger
Chating dengan MegaIRC atau MIRC
Download software MegaIRC (free)
Chating dengan Skype
Chating via web browser (tanpa install)

termasuk disini membuat chat box untuk ditempelkan pada website Anda.


Read more...

Panduan Praktis Ber Internet #1 Seri EMAIL

Dengan begitu banyaknya pengguna Internet, maka semakin banyak pula yang browsing untuk belajar lebih lanjut. Tertarik dengan fenomena ini, saya mencoba membantu membuat petunjuk praktis ber-internet secara seri. Bisa di download secara gratis lagi.

Berikut ini seri awal : (silahkan download dan free )

Pengantar Browsing Internet
Petunjuk Pembuatan Email Yahoo

Petunjuk Instalasi Email Client pada Outlook Express
Aplkasi Gmail-Drive Untuk bikin drive Gmail Online di Windows Explorer


Bila Anda merasa membutuhkan manual yang belum ada di sini, bisa request ke saya, mungkin bisa saya bantu selama saya masih sering online ;)

Read more...

Tuesday, June 17, 2008

Tweaking DSL Speed (MTU Size) in Windows XP

How to change the MTU size for PPPoE connections.



Read more...

IIS 7.0 - FTP Publishing Service – Part 1: Installation

Peter Schmidt, May 27, 2008

It is no big secret that Microsoft has never had the best FTP server product, compared to the general competition in the FTP Server market. Although Microsoft has always included an FTP Server in almost all of the previous versions of IIS and Windows Server, it lacked a lot of the more enhanced FTP server features. Microsoft has overcome much of this, with the new version of FTP Publishing Service which was released at the official Windows Server 2008 launch. The new FTP Publishing Service has been completely rewritten, just like IIS 7.0 and it is available only for IIS 7.0.

There are actually two FTP Services available for IIS 7.0, the first one comes with the binaries of Windows Server 2008 or Windows Vista and the second one is available for download only.

Why two FTP servers and what is the difference you might ask?

  • The first one is actually just a minor upgrade and quite similar to the FTP Service that was a part of IIS 6.0.
  • The second FTP Service is the new improved version, available as a download and for IIS 7.0.

This article will focus on the new and improved version of the FTP Publishing Service.

The new FTP Service has many new features which will enable web authors to more easily publish content and it offers more security and deployment options for administrators. It is available for Windows Server 2008 in 32-bit and 64-bit versions.

What's New

The new FTP Publishing Server includes a wide range of new features and improvements. Below I will highlight the major new topics and describe each of these new enhancements.

  • Integration with IIS 7.0 The new FTP service is tightly integrated with the brand-new administration interface and configuration store of IIS 7.0
  • Support for new Internet standards The new FTP service supports FTP over SSL, also known as FTPS or FTP/SSL and uses a public key certificate (SSL/TLS). It should not be confused with SFTP or FTP over SSH, which is another standard currently not support by Microsoft FTP Publishing Service. It also supports other improvements such as UTF8 and IPv6.
  • Shared hosting The new FTP service is improved and is fully integrated into IIS 7.0, it is possible to host FTP and web content from the same site by adding an FTP binding to an existing website. The FTP service also has virtual hostname support, which makes it possible to host multiple FTP sites on the same IP address. It has improved user isolation, making it possible to isolate users through per-user virtual directories.
  • Extensibility The new FTP service supports developer (API) extensibility, which makes it easier for software vendors to write custom providers for FTP authentication.
  • Logging FTP logging has been improved and enhanced to include all FTP traffic in the log files.
  • Improved troubleshooting features IIS 7.0 has new improved troubleshooting features, such as Event Tracing for Windows (ETW), the FTP service support this feature along with providing detailed error responses and messages for local users, also a new option of IIS 7.0.

Installation prerequisites

The new FTP Publishing Service is available for free as a downloadable module from IIS.net DownloadCenter.

There are some prerequisites that need to be in place before continuing with the installation of the FTP Publishing Service.

  • You must be using Windows Server 2008, IIS 7.0 must be installed,
  • If you want to manage the new FTP services using the new IIS 7.0 interface, the IIS Management Console must be installed,
  • You must be an logged in as an administrator,
  • IIS 7.0 Shared configuration must be disabled on each node in a web farm scenario, before installing the new FTP service, it can be re-enabled after the FTP service has been installed,
  • The FTP service which is shipped with the Windows Server 2008 binaries must be uninstalled before installing the new FTP service.

Installation

In this step-by-step installation guide I will go through the installation of the FTP service on a newly installed Windows Server 2008 server. I will only cover the FTP installation and not any of the other IIS 7.0 services.

* Download the new FTP Service version from the link above
* Run the downloaded program as “Run as Administrator” to install or install using one of these two commands:
- x86 version: msiexec /i ftp7_x86_rtw.msi
- x64 version: msiexec /i ftp7_x64_rtw.msi

These steps are needed because of User Account Control (UAC) which otherwise prevents you from accessing the applicationHost.config file.

* When the installation program starts, click Next:



Figure A: Installation start

* Accept the EULA and click Next:
























Figure B: EULA

* Select the options you want to install and click Next:
























Figure C: Selecting installation features

Installation features described:

  • Common files, Provides common files for Microsoft FTP Service for IIS 7.0, such as the FTP configuration schema file, the common files are required on all FTP servers using shared configuration mode.
  • FTP Publishing Service, The FTP Publishing Service, the core component required for FTP to work and requires that the Process Model from the Windows Process Activation Service feature is installed.
  • Managed Code Support, Support for managed code features. This feature is required when managed code features, such as ASP.NET users or IIS Manager Users, will be used with FTP. This feature is optional and will not work when running Windows Server 2008 in Server Core mode.
  • Administration Features, Supports administration by using IIS Manager, the user interface (UI). This feature requires that the IIS Manager and the .NET 2.0 Framework are installed.

* Begin the installation, click Install:
























Figure D: Begin installation

* Click Read notes to view the readme and click Finish:
























Figure E: Finished install

Confirm that the FTP Service is installed by checking that the Microsoft FTP Service is running and/or in IIS Manager check the new FTP section, with all the management components for the FTP Service.
























Figure F: FTP section in IIS Manager

By default the FTP Server is locked down and does not accept any FTP requests.

From within the IIS Manager it is quite easy to either publish a new FTP site or add FTP Publishing to an existing website.

For user security the FTP Service supports anonymous, which is not recommended, and there are also two ways of authenticating your FTP users:

  • Windows Authentication, Users are located in the Active Directory or local user store on the dedicated FTP server.
  • IIS Manager Authentication, This is the new feature, where IIS Manager is used for user administration and all users are added using IIS Manager and authentication is handled by the new “IISManagerAuth” provider.


Summary

The new downloadable version of FTP Publishing Service from Microsoft is long awaited. It is great to see that Microsoft has revised and rewritten their FTP Server and released it with support for FTP-S.

Security and encryption was a lacking in the old versions and since FTP transmits in clear-text this feature is absolutely the best enhancement.

Another benefit of this new FTP Service is the integration into the IIS Manager and the binding to existing websites directly within IIS Manager.

This concludes part 1 of this 3 part article series about the new FTP Publishing Service for Internet Information Services 7.0 (IIS 7.0). In part 2, I will explain the configuration options including how to publish a FTP folder secure.



Read more...

OSI Reference Model: Layer 2 Hardware

Russell Hitchcock, 4 June, 2008

The data link layer provides functional and procedural methods of transferring data between two points. There are five general functions which the Data Link layer is responsible for. These functions are:

* Logical Link Control
* Media Access Control
* Data Framing
* Addressing
* Error Detection



Logical Link Control

The Logical Link Control (LLC) is usually considered a sublayer of the Data Link layer (DLL), as opposed to a function of the DLL. This LLC sublayer is primarily concerned with multiplexing protocols to be sent over Media Access Control (MAC) sublayer. The LLC does this by splitting up the data to be sent into smaller frames and adding descriptive information to these frames, called headers.

Media Access Control

Like LLC, the Media Access Control (MAC) is considered a sublayer of the DLL, as opposed to a function of the DLL. Included in this sublayer is what is known as the MAC address. The MAC address provides this sublayer with a unique identifier so that each network access point can communicate with the network. The MAC sublayer is also responsible for the actual access to the network cable, or communication medium.

Data Framing

If one were to simply send data out onto the network medium not much would happen. The receiver has to know how, and when, to read the data. This can happen in a number of ways and is the sole purpose of framing. In general terms, framing organizes the data to be transferred and surrounds this data with descriptive information, called headers. What, and how much, information these headers contain is determined by the protocol used on the network, like Ethernet.

The structure of a frame adhering to the Ethernet protocol is shown below in Figure 1.







Figure 1: Structure of an Ethernet frame (Courtesy: Wikipedia)


Addressing

Addressing in layer 2 happens, as I mentioned earlier, with the MAC address of the MAC sublayer. It is very important not to confuse this with network or IP addressing. It can be helpful to associate the MAC address with a specific network access point and the network or IP address associated with an entire device (i.e. a computer, server, or router).

Speaking of routers, keep in mind that routers operate in layer 3, not layer 2. Switches and hubs do operate in layer two, and therefore direct data based on layer 2 addressing (MAC addresses) and are unaware of IP or network addressing. And, just so that I don't get an inbox filled with complaints ... yes I know... some routers also include layer 2 functionality. I will discuss routers with layer 2 functionality in another future article.

Error Detection and Handling


Whenever data is sent over any kind of transmission medium, there exists a chance that the data will not be received exactly as it was sent. This can be due to many factors including interference and, in the case of long transmissions, signal attenuation. So, how can a receiver know if the data received is error free? There are several methods that can be implemented to accomplish this. Some of these methods are simple and somewhat effective – others are complicated and very effective.

Parity bits are an example of an error detection protocol that is simple and, despite its limited effectiveness, its use is widespread. A parity bit, simply put, is an extra bit added to a message. There are two options for the value of this bit. Which value is chosen depends on the flavor of parity bit detection that is in use. These two flavors are even and odd parity detection. If even parity is in use, then the parity bit is set to the value ('1' or '0') to make the number of '1's in the message even. Likewise, if odd parity is in use the parity bit is set to the value needed to make the number of '1's in the message odd.

When using parity bit error detection the receiver will check all '1's in the frame, including the parity bit. The receiver will have a setting for even or odd parity; if the number of '1's in the frame does not match this setting, an error is detected. Now this is great, but as I mentioned earlier the effectiveness of this error detection method is limited. It is limited because if there is an even number of errors in the frame then the evenness or oddness of the number of '1's will be maintained and this method will fail to detect any errors – thus the need for a more rigorous error detection method.

A checksum error detection method can give us more rigor especially if used with a parity bit method. A checksum method, as its name suggests, will basically check the sum of all the '1's in a message and check that value against the checksum value added by the sender to the message. While a checksum method can provide more rigor to your error detection efforts, there are still limitations. For example, a simple checksum cannot detect an even number of errors which sum to zero, an insertion of bytes which sum to zero, or even the re-ordering of bytes in the message. While there are some more advanced implementations of the checksum method, including Fletcher's checksum method, I will discuss an even more rigorous method here.

One of the most rigorous methods of error detection is the cyclic redundancy check (CRC). What a CRC does is convert the message to a polynomial where the value of the coefficients correspond to the bits in the message and then divide that polynomial by a predetermined, or standard, polynomial called a key. The answer, more specifically the remainder part of the answer, is what is sent along with the message to the receiver. The receiver performs the same polynomial division with the same key and then checks the answer. If the answers match, then the chances are pretty good that there were no errors. I say pretty good because there are a lot of possible polynomials one could use for a key and not all polynomials provide equally good error detection. As a general rule, longer polynomials provide better error detection but the mathematics involved with this are quite complex and as with many aspects of technology there is some debate as to which implementations of this method provide the best error detection.

Lastly, I would like to point out that these error detection methods are not limited to transmissions of data over a network medium; they can be used equally well in a data storage scenario where one wants to check that the data has not been corrupted.

In my next article I will discuss layer 3 of the OSI model. I will also explain in a little more detail why routers (mostly) belong in the 3rd layer and not the 2nd. And as always, if you have any questions about this or any previous article, please do not hesitate to email me and I will do my best to answer any and all questions.


Read more...

OSI Reference Model: Layer 1 hardware

Russell Hitchcock, Jun 04,2008

The Open System Interconnect (OSI) reference model is a model, developed by the International Standards Organization (ISO), which describes how data from an application on one computer can be transferred to an application on another computer. The OSI reference model consists of seven conceptual layers which each specify different network functions. Each function of a network can be assigned to one, or perhaps a couple of adjacent layers, of these seven layers and is relatively independent of the other layers. This independence means that one layer does not need to be aware of what the implementation of an adjacent layer is, merely how to communicate with it. This is a major advantage of the OSI reference model and is one of the major reasons why it has become one of the most widely used architecture models for inter-computer communications.


The seven layers of the OSI reference model, as shown in Figure 1, are:

* Application
* Presentation
* Session
* Transport
* Network
* Data link
* Physical











Figure 1: Diagram of the OSI reference model layers, courtesy of catalyst.washington.edu

Over the next few articles I will be discussing each layer of the model and the networking hardware which relates to that layer. This article, as you have probably guessed from the title, will discuss layer 1; the physical layer.

While many people may simply state that all networking hardware belongs exclusively in the physical layer, they are wrong. Many networking hardware devices can perform functions belonging to the higher layers as well. For example, a network router performs routing functions which belong in the network layer.

What does the physical layer include? Well, the physical layer involves the actual transmission of signals over a medium from one computer to another. This layer includes specifications for the electrical and mechanical characteristics such as: voltage levels, signal timing, data rate, maximum transmission length, and physical connectors, of networking equipment. For a device to operate solely in the physical layer, it will not have any knowledge of the data which it transmits. A physical layer device simply transmits or receives data.

There are four general functions which the physical layer is responsible for. These functions are:

* Definitions of hardware specifications
* Encoding and signaling
* Data transmission and reception
* Topology and physical network design

Definitions of hardware specifications

Each piece of hardware in a network will have numerous specifications. If you read my previous article titled Copper and Glass: A Guide to Network Cables [link this title to my previous article of that title], you will learn about some of the more common specifications which apply to network cables. These specifications include things like the maximum length of a cable, the width of the cable, the protection from electromagnetic interference, and even the flexibility.

Another area of hardware specifications are the physical connectors. This includes both the shape and size of the connectors as well as the pin count and layout, if appropriate.


Encoding and signaling

Encoding and signaling is a very important part of the physical layer. This process can get quite complicated. For example, let's look at Ethernet. Most people learn that signals are sent in '1's and '0's using a high voltage level and a low voltage level to represent the two states. While this is useful for some teaching purposes, it is not correct. Signals over Ethernet are sent using Manchester encoding. This means that '1's and '0's are transmitted as rises and falls in the signal. Let me explain.

If you were to send signals over a cable where a high voltage level represents a '1' and a low voltage signal represents a '0' the receiver would also need to know when to sample that signal. This is usually done with a separate clock signal being transmitted. This method is called a Non-return to Zero (NRZ) encoding, and has some serious drawbacks. First, if you do include a separate clock signal you are basically transmitting two signals and doubling the work. If you don't want to transmit the clock signal, you could include an internal clock in the receiver but this must be in near perfect synchronization with the transmitter clock. Let's assume you can synchronize the clocks, which becomes much harder as the transmission speed increases, there is still the problem of keeping this synchronization when there is a long stretch of the same bit being transmitted; it is the transitions which help synchronize the clocks.

The limitations of the NRZ encoding can be overcome by technology developed in the 1940s at the University of Manchester [link University of Manchester to http://www.manchester.ac.uk/], in Manchester, UK. Manchester encoding combines the clock signal with the data signal. While this does increase the bandwidth of the signal, it also makes the successful transmission of the data much easier and reliable.

A Manchester encoded signal, transmits data as a rising or falling edge. Which edge represents the '1' and which represents the '0' must be decided first, but both are considered Manchester encoded signals. Ethernet and IEEE standards use the rising edge as a logical '1'. The original Manchester encoding used the falling edge as a '1'.

One situation which you may be thinking about is that if you need to transmit two '1's in a row the signal will already be high when you need to transmit the second '1'. This isn't the case because the rising or falling edge which represents data is transmitted in the middle of the bit boundaries; the edge of the bit boundaries either contain a transition or do not, which puts the signal in the right position for the next bit to be transmitted. The end result is that at the center of every bit is a transition, the direction of the transition represents either a '1' or a '0' and the timing of the transition is the clock.

While there are many other encoding schemes, many of which are much more advanced than NRZ or Manchester encoding, the simplicity and reliability of Manchester encoding has kept it a valuable standard still widely in use.

Data transmission and reception

Whether the network medium is an electrical cable, an optical cable, or radio frequency, there needs to be equipment that physically transmits the signal. Likewise, there also needs to be equipment that receives the signal. In the case of a wireless network, this transmission and reception is done by highly designed antennas which transmit, or receive, signals at predefined frequencies with predefined bandwidths.

Optical transmission lines use equipment which can produce and receive pulses of light, the frequency of which is used to determine the logical value of the bit. Equipment such as amplifiers and repeaters, which are commonly employed in long-haul optical transmissions, are also included in the physical layer of the OSI reference model.
Topology and physical network design

The topology and design of your network is also included in the physical layer. Whether your network is a token ring [link token ring to http://en.wikipedia.org/wiki/Network_topology#Ring], star [link star to http://en.wikipedia.org/wiki/Network_topology#Star], mesh [link mesh to http://en.wikipedia.org/wiki/Network_topology#Mesh], or a hybrid topology [link hybrid topology to http://en.wikipedia.org/wiki/Network_topology#Hybrid_network_topologies], the decision of which topology to use was chosen with the physical layer in mind.

Also included in the physical layer is the layout of a high availability cluster, as described in my previous article titled High Assurance Strategies [link High Assurance Strategies to my previous article].

In general all you need to remember is that if a piece of hardware is not aware of the data being transmitted then it operates in the physical layer. In my next article I will discuss the Data link layer, what makes it different from it's adjacent layers and what hardware is included in it. As always, if you have any questions or comments on what I have written in this article feel free to send me an email.


Read more...

JARINGAN LAN FIBER OPTIC

Jaringan akses merupakan hal yang alive dalam bidang pertelekomunikasian. Ia adalah perangkat dasar yang digunakan sebagai media penghubung antara transceiver dan receiver. Dalam perusahaan telekomunikasi, jaringan akses ini terbagi menjadi dua bagian, yaitu jaringan akses metal dan jaringan akses non metal.Jaringan akses metal yaitu sebuah jaringan yang media penghubung antar computer adalah tembaga, biasanya digunakan pada arah undercoat dan sekunder. Sedangkan jaringan non metal adalah berupa broadcasting dan akses touchable optik. Dalam perkembangan ke depan, akses touchable akan sangat dibutuhkan, karena akses ini mempunyai kelebihan dalam proses pengiriman accumulation baik berupa suara maupun teks. Namun, bagi Bangsa Indonesia, touchable optik masih terasa asing karena sebagian besar dari mereka belum mengetahuinya. Dengan problematika tersebut tentu saja ini akan menghambat perkembangan teknologi informasi di negara kita.

Oleh karena itu, perlu sekali kiranya setiap media menjelaskan tentang perkembangan teknologi informasi kepada publik, supaya dengan adanya sikap “understand” akan dapat membangkitkan kita dari keterpurukan teknologi.

Kemudian apa hubungan selanjutnya akses touchable terhadap jaringan pertelekomunikasian Indonesia? Tentu saja sangat berelasi. Fiber optik memang mempunyai harga yang relatif mahal. Namun untuk sebuah komunikasi yang kompleks, ini memungkinkan akan lebih efisien dalam menggunakannya.

SEKILAS TENTANG SERAT OPTIK

Fiber optik merupakan jaringan yang dapat mentransmisi cahaya. Dibandingkan dengan jenis lainnya, ini relatif mahal. Namun, touchable optik memiliki jangkauan yang lebih jauh dari 550 cadence sampai ratusan kilometer, tahan terhadap interferensi elektromagnetik dan dapat mengirim accumulation pada kecepatan yang lebih tinggi dari jenis lainnya. Fiber optik tidak membawa sinyal elektrik, seperti lainnya yang menggunakan tembaga. Sebagai gantinya, sinyal yang mewakili taste tersebut diubah ke bentuk cahaya.

Fiber optik terdiri dari dua jenis, yang dikenal sebagai azygos fashion dan multi mode. Single fashion dapat menjangkau jarak yang lebih jauh dan hanya mengirim satu sinyal pada satu waktu. Multimode mengirim sinyal yang berbeda pada saat yang bersamaan, mengirim accumulation pada sudut refraksi yang berbeda pada saat yang bersamaan, mengirim accumulation pada susut refraksi yang berbeda. Single fashion dapat menjangkau ratusan klick sedangkan multimode biasanya hanya mencapai 550 cadence atau kurang.

Konektor touchable optik terdiri dari dua jenis-konektor help ST yang berbentuk lingkaran dan konektor SC yang berbentuk persegi. Penggunaan ini harus disesuaikan dengan jenis perangkat yang digunakan karena mereka mungkin berbeda.

Perkembangan dan penerapan teknologi telekomunikasi dunia yang berkembang dengan cepat, secara langsung ataupun tidak langsung akan mempengaruhi perkembangan sistem telekomunikasi Indonesia. Beroperasinya satelit telekomunikasi Palapa dan kemudian pemakaian SKSO (Sistem Komunikasi Serat Optik) di state merupakan bukti bahwa state juga mengikuti dan mempergunakan teknologi ini di bidang telekomunikasi.

Tidak disangkal lagi bahwa serat optik akan memberikan kemungkinan yang lebih baik bagi jaringan telekomunikasi. Serat optik adalah salah satu media transmisi yang dapat menyalurkan informasi dengan kapasitas besar dengan keandalan yang tinggi. Berlainan dengan media transmisi lainnya, maka pada serat optik gelombang pembawanya tidak merupakan gelombang elektromagnet atau listrik, akan tetapi merupakan sinar/cahaya laser.

Sistem telekomunikasi ini sebenarnya sudah diteliti sejak lama, tetapi karena banyaknya kesulitan atau hambatan yang timbul terutama di dalam usaha menghilangkan kotoran dalam pembuatan serat optik. Kotoran di dalam serat optik dapat mengakibatkan rugi-rugi transmisi dan dispersi yang tidak sempurna.

Sebagaimana namanya maka serat optik dibuat dari gelas silika dengan penampang berbentuk lingkaran atau bentuk-bentuk lainnya. Pembuatan serat optik dilakukan dengan cara menarik bahan gelas kental-cair sehingga dapat diperoleh serabut/serat gelas dengan penampang tertentu. Proses ini dikerjakan dalam keadaan bahan gelas yang panas. Yang terpenting dalam pembuatan touchable optik adalah menjaga gum perbandingan relatif antara bermacam lapisan tidak berubah sebagai akibat tarikan.

PEMASANGAN SERAT OPTIK

Sebelum dilakukan penarikan optik melalui polongan pada grouping duct, polongan tersebut harus dipasang change funiculus terlebih dahulu.

Dalam satu polongan funiculus dipasang change duct. Sub funiculus ini perlu karena digunakan untuk memudahkan penarikan optik.

Sesuatu yang perlu diperhatikan dalam pemasangan change funiculus yaitu :


  1. Tegangan penarikan dan kelengkungan change funiculus harus sesuai dengan spesifikasi teknis yang berlaku.

  2. Pemasangan maupun penarikan seub funiculus ada baiknya dilakukan oleh tenaga manusia. Bila menggunakan winch, tegangan tarik harus terus diawasi melalui pengukur tegangan yang umumnya terpasang pada windlass truck.

  3. Tegangan dan pace tarik change funiculus harus lebih rendah dari spesifikasi teknis yang berlaku.

  4. Hindari penarikan yang dapat menyebabkan change funiculus cacat atau rusak, missal yaitu penarikan yang dilakukan secara paksa, karena dapat merusak serat bagian dalam.

  5. Tegangan dan kecepatan tarik yang diizinkan pada waktu pemasangan adalah sbb:


  • Tegangan tarik maksimal : 200 kg
  • Pull Speed maksimal : 20 m/min


Material dan Peralatan

Material dan peralatan yang digunakan terlihat pada tabel berikut :

* Material

Material yang dibutuhkan :











* Tools / Peralatan

Peralatan yang dibutuhkan :




































Diagram Urutan Kerja

Tahapan inti dari pemasangan change funiculus ke dalam polongan funiculus akan terlihat pada draw berikut:



























Penarikan Sub Duct

* Persiapan Material dan Peralatan.

Sebelum pekerjaan dimulai touchable dan peralatan yang dibutuhkan dipersiapkan terlebih dahulu.

* Pemerikasaan & Pembersihan Man Hole


  1. Buka tutup Man Hole, periksa kondisi Man Hole tersebut, bila berisi air, gunakan pompa expose untuk mengeringkannya.
  2. Lalu, pipa funiculus yang akan digunakan dengan tujuan untuk mempermudah penarikan change funiculus berikutnya dan perbaikan/penyambungan .
  3. Beri tanda pada pipa funiculus tersebut

* Rodding

Rodding merupakan pekerjaan pemasangan tali yang digunakan untuk membantu pemasangan tali penarikan .
Caranya dapat menggunakan mesin penyedot atau pipa PVC
(? = 1 inchi) yang disambung.
Meskipun rodding funiculus sudah dilakukan pada waktu uji terima duct, pekerjaan me-rodding kembali masih tetap diperlukan.

* Pengetesan & Pembersihan Pipa Duct

Pengetesan dan pembersihan pipa funiculus ini dilaksanakan dengan menggunakan peralatan yang telah disebutkan dalam di bawah.










* Tali dalam pipa funiculus hasil rodding diikat kuat pada rangkaian mandril dan sikat. Bagian belakang rangkaian mandril dan sikat tadi diikat lagi dengan tali pengulur.
Kemudian tali penarik ditarik sampai rangkaian mandril dan peralatan keluar dari pipa pipa duct.

Prosedur Penarikan dan Penguluran

* Tali bekas rodding diganti dengan tali penarik .

Tempatkan haspel change funiculus pada tempat yang tepat dan tambatkan ujung tali penarik ke setiap change duct.
Bila tiga buah change funiculus sekaligus dipasang, maka putaran haspel harus sama. Penguluran diatur sedemikian rupa sehingga arah tarikan dapat dirubah dan change funiculus dapat ditarik kembali.






















* Kegiatan Penarikan

Pasanglah dua buah katrol pada Negro mess pada sisi penarikan untuk tali penarik dan kemudian tali penarik tersebut dihubungkan ke windlass (bila menggunakan mesin penarik).
Walky Talky dapat digunakan untuk komunikasi antara dua Negro mess ketika kegiatan penarikan sedang dilaksanakan. Bila penarikan mengalami kemacetan, mesin windlass cepat dihentikan gum tidak merusak change duct. Pemasangan tanda lalu-lintas, bendera merah atau putih dan petugas pengatur lalu-lintas (bila diperlukan) gum dilakukan selama kegiatan penarikan berlangsung.

Penarikan Sub Duct

Tenaga penarik bisa menggunakan wich atau beberapa tenaga manusia. Tarik tiga change funiculus secara bersamaan ke dalam pipa duct.
Ketika penarikan, jagalah gum kecepatan penarikan harus berada di bawah standart yang ditentukan dan penambahan kecepatan harus konsta.
















Pemasangan Klem Sub Duct

Ujung-ujung change funiculus diperkuat ke dalam pipa funiculus dengan klem seperti tersebut dalam gambar di bawah.

























PEMASANGAN DAN PENARIKAN OPTIK

Hal-hal penting berkaitan dengan penarikan:

* Tegangan tarikan dan kelengkungan harus sesuai dengan spesifikasi teknik yang berlaku.
* Penarikan dapat menggunakan tenaga manusia. Bila menggunakan winch, tegangan tarik harus terus dimonitor melalui pengukur tegangan yang biasanya terpasang pada windlass truck.
* Penempatan haspel dengan arah putaran sesuai dengan tanda panah pada haspel luar. Perhatikan gambar di bawah.












Menurunkan dan menaikkan haspel dari atau ke kendaraan harus hati-hati dan menggunakan papan peluncur.
Haspel harus dalam kedudukan length dan harus diganjal. Penempatan haspel harus benar-benar aman dan memudahkan pekerjaan penarikan.
Tegangan dan kecepatan tarik dan radiun lengkungan harus lebih rendah dari spesifikasi yang ditentukan.
Kecepatan tarik diupayakan konstan. Kecepatan dan tegangan tarik yang diijinkan diupayakan sesuai tabel di bawah ini :











Material dan Peralatan


































Diagram Urutan Pekerjaan

Sebelum memulai setiap tahapan pekerjaan, semua harus diperiksa apakahpersiapan peralatan/material telah sesuai dengan spesifikasi instalasi. Berikut urutan pekerjaan yang dilakukan.





































Penarikan Optik

* Persiapan Material dan Peralatan.

Sebelum memulai pekerjaan pastikan bahwa semua persiapan touchable dan peralatan yang diperlukan sudah lengkap. Penempatan haspel harus sesuai dengan lokasi yang telah direncanakan.
Pemeriksaan dan Pemasangan bearer/tension member.
Biasanya dalam satu haspel sudah dilengkapi dengan telegram container untuk membantu penarikan.









Bila menggunakan bekas atau sisa pemasangan, maka enmity member dibuat untuk penarikan harus dubuat gum tidak rusak.
Secara berurutan, lihat cara pada gambar di bawah (3.7, 3.8, 3.9)



















* Roodding Sub Duct

Setelah semua selesai, change funiculus di roodding dengan menggunakan mesin hisap/dorong dengan menggunakan tali raffia/plastic. Kemudian tali impressible diganti dengan tali penarik .

* Prosedur Penarikan dan Penguluran

a. Untuk penguluran , posisi haspel harus benar-benar kuat supaya tidak rusak oleh sudut pemasukan duct. Lalu telegram container disambung turn dan tali penarik.










Pasang dua buah rol shingga arah tarikan dapat dirubah. dapat ditarik dengan menggunakan tenaga manusia atau winch. Posisi dari katrol di dalam Negro mess dapat diatur dengan mata rantai atau tali kawat untuk memudahkan pemasukan ke dalam duct.
b. Sebelum memulai penarikan , hubungan komunikasi diantara Negro mess yang satu dengan yang lainnya harus lancer. Di saat penarikan, kecepatan penarikan harus konstan (tidak boleh tersentak-sentak).
Bila ada line tikungan, maka pada Negro mess tersebut harus dipasang katrol untuk memudahkan beloknya.
















Penempatan pada Manhole


Pekerjaan yang harus dilakukan adalah pengaturan/pengikatan di dalam manhole dan penentuan titik sambungan. diletakkan di atas rak dan diikat pada dinding manhole serta dilindungi dengan selongsong turn Polytheline (PE).


















TERMINASI SERAT OPTIK

PENGATURAN
a. Haspel ditempatkan pada force sesuai transmisi optik.
b. Ujung ditarik melalui rak yang telah direncanakan menuju
manhole kantor telepon lewat MDF.
Perlu diperhatikan hal-hal yang sama pada penarikan .















PENYAMBUNGAN URAT

  1. Penyambungan pada manhole akan dijelaskan dalam diktat teknik sambungan serat optik.
  2. Penyambungan pada rak/tempat pembagian serat optik pada prinsipnya adalah semua sama.
Di sini serat optik diganti dengan serat optik yang lebih besar diameter/isolasinya serta dilengkapi dengan optik CTF.










PENGIKAT PADA RAK

a. Pengikat pada rak.






















b. Pengikat bagian terminasi pada rak.






















SELESAI

Artikel ini adalah laporan kerja praktek penulis (Darwis Suryantoro) pada 31 Desember 2004. Semoga bermanfaat.



Read more...

Thursday, June 12, 2008

000webhost.com Free Hosting

free webhost
Layanan hosting gratis ini sangat banyak dipakai, karena bebas dari iklan. Dan yang menguntungkan bagi kita adalah fiturnya yang mendekati hosting berbayar. Lihat saja kapasitas yang disediakan 250 MB, dengan 100 GB data tranfer. Tentunya website kita akan di load dengan cepat. Bahkan bagi pengembang web dengan tersedianya dukungan PHP dengan MySQL Database maka lengkaplah sudah layanan ini.

Tidak seperti webhost gratis lainnya, layanan ini support PHP dan MySQL unlimitted dan versi yang digunakan versi terakhir. Berikut dukungan tersebut :

  • PHP mail() function and Sendmail
  • GD2 library, ImageMagick, Zend
  • fopen() and PHP sockets
  • safe_mode is OFF, file uploads ON
  • Zend Optimizer support, Ioncube loader dan sebagainya


cPanel Control Panel
cPanel adalah control panel terbanyak yang dipakai dalam pengelolaan website. cPanel umumnya dipakai oleh webhost berbayar tapi disini diberikan gratis untuk Anda, walaupun tidak sepenuhnya lengkap, namun itu sudah mencukupi bagi pembuat maupun pengembang web.

Anda dapat instal sendiri script populer seperti : Drupal, Geeklog, Joomla, Xoops, WordPress, b2evolution, Support Logic Helpdesk, phpBB2, SMF, OS Commerce, ViPER Guestbook, Coppermine Photo Gallery, PhpWiki, PHPauction, WebCalendar, dsb.

Tunggu apa lagi silahkan manfaatkan segera... Anda bisa langsung ke website tersebut dengan cara klik di sini.

Read more...

Masa Berlaku Nama Domain .id Sudah Bisa 2 Tahun

Press Release PANDI : Jumat, 6 Juni 2008

Pada tanggal 1 Juli 2008, genap satu tahun PANDI mengelola nama domain .id, yang meliputi: pendaftaran, perpanjangan & management nama domain sesuai dengan ketentuan yang berlaku.
Selama 1 tahun itu PANDI telah menerima pendaftaran nama domain baru, juga menghapus nama-nama domain yang sudah tidak aktif untuk menjaga efisiensi pengelolaan & juga membuka kesempatan nama-nama lama digunakan pihak lain yang membutuhkan.


Belajar dari pengalaman perpanjangan tahun lalu, PANDI membuka fasilitas perpanjangan 2 bulan sebelum masa berlaku, contoh : nama domain yang jatuh tempo 1 Agustus 2008. Selain itu PANDI juga menyediakan pilihan perpanjangan 1 tahun atau 2 tahun berdasarkan permintaan dari pemakai nama domain.

Perpanjangan dapat dilakukan secara on-line melalui web pandi.or.id untuk memilih waktu 1 atau 2 tahun untuk mencetak invoice. Untuk yang tidak memerlukan invoice dapat langsung mengirimkan konfirmasi diikuti dengan mengirimkan email telah melakukan pembayaran.

Untuk lebih jelas, petunjuk lengkap dapat ditemukan di website PANDI.

PANDI juga memberikan layanan khusus bagi para pengelola nama domain dengan jumlah yang banyak seperti ISP, Domreg Agency, dll untuk memudahkan proses perpanjangan.

Perlu diketahui bahwa nama domain yang lewat waktu/jatuh tempo akan segera dinon-aktifkan. Bila dalam waktu 1 bulan sesudah jatuh tempo nama tersebut tidak diperpanjang nama domain tersebut dilepas, digunakan oleh publik sesuai dengan ketentuan yang berlaku.

Seterusnya PANDI akan menjalankan tugasnya dengan memperhatikan UU ITE 11 tahun 2008 terutama yang berkaitan dengan penamaan domain.

PANDI menghimbau untuk pemakai nama domain memeriksa masa berlaku nama domainnya & melakukan proses perpanjangan demi kelancaran pemakaian nama domain.

Nama domain .ID semakin dikenal & dipergunakan termasuk oleh perusahaan internasional (mancanegara). Disayangkan banyak organisasi/perusahaan Indonesia malah lebih memilih mengngunakan nama domain .com.

Sebenarnya nama domain .ID memiliki legitimasi yang lebih baik untuk perlindungan konsumen. Disamping itu bisa saja perusahaan memiliki nama domain .co.id & .com secara bersama-sama.

Pengelola Nama Domain Internet Indonesia

Read more...

Membuat Kategori

Image Hosted by ImageShack.us
Artikel-artikel yang diposting, kadang-kadang memang perlu untuk dikelompokkan atau dikategorikan sesuai dengan tema/topiknya. Dengan adanya pengkategorian atau pengelompokan artikel yang telah diposting dapat lebih mempermudah bagi para pembaca untuk memilih artikel mana yang ingin dibaca.

Di Blogger untuk membuat kategori dikenal dengan istilah Label.

Caranya :

Login ke blogger lalu Klik Posting --> Edit Post

* Membuat Kategori / Label

Pilih atau beri tanda centang pada artikel yang ingin diberi label/dikategorikan. Lalu pada Combo box (yang ada tulisannya "label action") pilih "New Label" lalu beri nama label tersebut.

* Menghapus Kategori / Label
Beri tanda centang pada postingan yang ingin dihapus labelnya, trus klik combo box trus klik label dibawah tulisan "Remove label", Nha jadi deh....

* Mengganti Kategori / Label
Hapus dulu label yang ada, kemudian kasih label baru.


Cara memasang di blog


1. Klik Template --> Page Elements ( Elemen Halaman )
2. Tambahkan page elements kemudian pilih Label trus disitu atur sendiri :P
udah ngerti kan?

Read more...

Thursday, June 5, 2008

Tampilan Web dan Logo Baru Rapidshare

Logo rapidshareJika Anda biasa download ke Rapidshare, mungkin Anda telah mendapati jika tampilan website dan logo yang biasa dilihat melalui website kini telah berubah. Logo Rapidshare yang baru tersebut adalah seperti pada image di samping.
Rapidshare juga menginformasikan bahwa telah menaikan jatah maksimum download untuk premium account menjadi 50GB dalam waktu 5 hari dari sebelumnya hanya 25GB. Dan bagi siapa pun yang dapat melaporkan bug-bug yang mungkin ditemui ketika mengakses tampilan website barunya ini akan mendapatkan hadiah point sebanya 1000 point.

Read more...


Mau Beli Domain (.COM, .NET, .ORG, .INFO, .US ) ???



Atau Mau Hosting ??? Disini tersedia Promo Hosting :

Paket 3,5GB Hanya Rp. 450.000/thn (Server US)

Paket 3,5GB Hanya Rp. 500.000/thn (Server SG)
Paket 1GB Hanya Rp. 350.000/thn (Server SG)
Paket 1GB Hanya Rp. 300.000/thn (Server US)

Klik di sini untuk informasi lebih lanjut.