Diberdayakan oleh Blogger.

Feedjit

Translate

Glider Content

Total kunjungan:

Halaman

Selasa, 15 Juli 2014

REVIEW FINAL LIGA CHAMPIONS 2005



REVIEW FINAL LIGA CHAMPIONS 2005 ISTANBUL
Liverpool datang ke Istanbul sebagai underdog karena publik dan bursa taruhan lebih menjagokan Milan untuk menang. Alasan yang masuk akal mengingat perjalanan Milan menuju final yang jauh lebih mulus dari Liverpool. Liverpool sendiri hanya dianggap beruntung mencapai final mengingat penampilan labil mereka sepanjang musim itu. Di awal musim, The Reds kehilangan icon mereka, Michael Owen yang hijrah ke Real Madrid. Rafael Benitez yang baru datang ke Anfield diangap lambat beradaptasi sehingga The Reds hanya menduduki peringkat lima di liga.
Akhirnya saat pertandingan itu tiba. Pemain A.C. Milan dan Liverpool memasuki lapangan Atarturk yang dipadati oleh 70.024 orang yang rata-rata adalah Liverpudlian. Wasit Manuel Mejuto Gonzalez pun membunyikan peluit dan pertandingan di mulai. Baru sekitar 1 menit pertandingan berlangsung A.C. Milan langsung menjebol gawang liverpool yang dikawal Jerzy Dudek melalui Gol sang kapten Paolo Maldini. Prediksi banyak orang A.C. Milan akan menjuarai Liga Champion musim itu makin terlihat setelah Striker A.C. Milan Hernan Crespo menciptakan gol di menit 38. Belum puas sampai disitu nampaknya A.C. Milan ingin memberikan Pukulan telak bagi Liverpool yang mulai turun semangatnya dengan menciptakan gol di menit ke 42 yang lagi-lagi di ciptakan oleh Hernan Crespo. Liverpool dipukul dengan telak dibabak pertama.
Pendukung Milan bersorak-sorai melihat timnya sudah unggul 3-0 dibabak pertama. berbanding terbalik dengan pendukung liverpool. Mereka yang melihat Liverpool sudah hampir kalah beberapa pendukung liverpool mulai meninggalkan stadion tetapi ada yang tetap tinggal di stadion untuk mendukung liverpool hingga akhir. Di ruang ganti pun hampir sama. Para pemain A.C. Milan Bersorak-sorai hingga larut dalam kegembiraan yang berlebih sedangkan pemain liverpool tertunduk lesu diruang gantinya. Rafael Benitez yang tidak ingin tim nya terus didampingi oleh kemurungan pun menghela nafas dan berdiri di tengah pemainnya. Dia sadar hanya ada 15 menit untuk bisa mengubah timnya. dia harus bisa mengubah kepercayaan diri timnya selama 15 menit. lalu dia dipusingkan mencari kalimat yang bisa mengembalikan kepercayaan diri pemainnya. Akhirnya dia menemukan kalimat yang sederhana namun sangat bagus.
“Don’t let your heads drop. All the players who go on the pitch after half-time have to keep their heads held high.
We are Liverpool. You are playing for Liverpool. Do not forget that. You have to hold yourheads high for the supporters. You have to do it for them. You cannot call yourselves Liverpool players if you haveyour heads down.
If we create a few chances, we have the possibility of getting back into this.Believe you can do it and you will. Give yourself the chance to be heroes.”
(“Jangan tundukkan kepala kalian. Kita Liverpool. Kalian bermain untuk Liverpool. Jangan lupakan itu. Kalian harus tetap menegakkan kepala kalian untuk suporter. Kalian harus melakukkannya untuk mereka. Kalian tak pantas menyebut kalian pemain Liverpool kalau kepala kalian tertunduk. Kalau kita menciptakan beberapa peluang, kita berpeluang bangkit dalam pertandingan ini. Percaya lah kalian mampu melakukannya. Berikan kesempatan buat kalian sendiri untuk keluar sebagai pahlawan.”)
Setelah Rafael Benitez mengatakan kata-kata itu pemain liverpool mulai termotivasi. sebelum kembali kelapangan Rafael Benitez menyusun ulang strategi nya. dia sadar tak ada gunanya bermain bertahan oleh sebab itu dia ingin mengganti Djimi Traore dengan Dietmar Hammann tetapi saat mendengar Steve Finnan cedera maka dia pun mengganti Finnan dengan Hammann. lalu dia pun membuat steven gerrard lebih maju dan membuat hanya ada 3 bek dibelakang. Dan akhirnya para pemain liverpool pun keluar dari ruang ganti dan memasuki lapangan.
Babak kedua dimulai. kedua tim memasuki lapangan. saat itulah semua pendukung liverpool menyanyikan lagu You'll Never Walk Alone yang membuat pemain liverpool semakin termotivasi. Para pemain Liverpool yang sebelumnya tertunduk kembali bangkit. Mereka memulai babak kedua dengan kepala yang tegak. Babak kedua menjadi milik Liverpool. Liverpool terus menekan Milan. terus menekan mereka tidak mau pertandingan cepat berakhir. Milan yang terlalu larut dalam kesenangan pun lengah. Akhirnya 9 menit pertandingan berjalan umpan Riise di tanduk oleh Gerrard yang akhirnya berbuah gol pertama untuk liverpool dilaga itu. setelah gol itu Gerrard berlari kepada rekan-rekannya. Memotivasi rekan-rekannya dan mengangkat-angkat tangannya seperti menyuruh semua pemain liverpool untuk bangkit. bahwa liverpool belum habis dan nampaknya itu berhasil.
Hanya berselang beberapa menit gol Vladimir Smicer dari luar kota pinalti tidak dapat ditahan oleh dida. Milan seperti ketakutan, mereka seperti melawan tim yang berbeda dari tim yang mereka hadapi di babak pertama. Belum lagi milan memperbaiki diri Gennaro Gattuso menjatuhkan steven Gerrard di kotak pinalti. Xabi Alonso yang menjadi eksekutor gagal mengeksekusinya sekejap para pendukung liverpool kecewa tetapi bola muntah itu berhasil direbut Alonso dan di tendangnya kegawang Dida. Alonso membayar kegagalannya mengeksekusi pinalti. KEAJAIBAN ISTANBUL terjadi. Liverpool berada diatas angin setelah gol itu. sayangnya 90 menit pertandingan berjalan tidak ada 1 gol lagi pun tercipta pada laga ini dan harus dilanjutkan pada babak tambahan.
Babak tambahan pun dimulai. 15 menit pertama kedua tim saling balas menyerang. tapi tak ada satupun usaha mereka yang menjadi gol. Pendukung liverpool terus mendukung tim kesayangan mereka. Babak kedua extra time dimulai. Milan yang mulai turun karna terkejar 3 gol pun mulai kurang konsentrasi. Terbukti tendangan dari jarak 6 meter yang dilakukan sevchenko berhasil di tahan oleh reflek seorang jerzy dudek. beberapa kali peluang milan pun gagal diubah menjadi gol. begitu pula liverpool yang nampaknya larut dalam kesenangan setelah mengejar 3 gol. akhirnya babak perpanjangan waktu pun berakhir dan akhirnya harus dilanjutkan dengan babak adu pinalti
Babak Adu Pinalti pun dimulai. Pemain milan yang sudah turun dan ditambah lagi Dukungan suporter liverpool membuat semua pemain liverpool yakin mereka bisa Juara. Sebelum "babak perjudian" itu dimulai, Jamie Carragher datang menghampiri kiper Jerzy Dudek. Carra menyarankan Dudek agar melakukan "sesuatu" untuk mengacaukan konsentrasi pemain Milan. Dudek langsung teringat rekaman video yang pernah disaksikannya. Kaki spaghetti! Saat adu penalti final Piala Champions 1984 melawan AS Roma, pendahulu Dudek, Bruce Grobbelaar, memelintir-melintir kakinya. Entah memang berpengaruh atau tidak, Grobbelaar berhasil membawa Liverpool menang dan merebut Piala Champions. Trik yang sama pun di terapkan Dudek saat menjaga gawangnya agar tidak kebobolan.
Yang pertama kali mengeksekusi adalah Serginho. Entah karena kelelahan atau konsentrasinya terganggu oleh dudek serginho gagal menendang malah meleset jauh dari target yang seharusnya. Penendang pertama liverpool adalah Hammann. walaupun bola bisa dibaca Dida tetap saja bola tetap masuk kegawangnya. 0-1 untuk liverpool. Penendang kedua Milan adalah pirlo. Tendangannya dengan mudah dibaca oleh Dudek dan ditepis dengan baik. Penendang kedua liverpool adalah Cisse. dengan mudah dia menceploskan bola kegawang Dida. 0-2 untuk liverpool. Tomasson yang menjadi penendang ketiga Milan berhasil memperkecil kedudukan menjadi 1-2. Riise yang menjadi algojo Liverpool gagal mengeksekusi setelah tendangannya terbaca oleh Dida. Algojo Milan Kaka dengan tenang memasukkan bola kegawang dudek. begitu pula smicer. dengan mudahnya memasukkan bola ke gawang Dida. dan akhirnya Shevchenko yang ditunjuk sebagai algojo kelima Milan turun. Dia melihat kesekelilingnya. Entah karena tendangannya di babak tambahan dari jarak 6 meter berhasil ditepis oleh dudek atau karena liverpool bisa mengejar ketertinggalan 3-0 dari milan atau juga karena Dukungan dari supporter liverpool membuat dia merinding kita tidak tau. Shevchenko menendang. tendangannya agak pelan mengarah ketengah. Dudek yang sudah melompat kekiri tetap berhasil menepis tendangan shevchenko dengan tangannya.
Liverpool menjuarai Liga Champion. Liverpool pun merajai Eropa! Jerih payah fans Liverpool yang terus menggemuruhkan dukungan untuk klub kesayangan mereka terbayar sudah!Mukjizat di Istanbul ini kemudian diabadikan dalam film Fifteen Minutes That Shook The World. Betapa tidak, final Liga Champions musim itu sangat dramatis dan membuktikan segalanya mungkin terjadi di lapangan sepakbola.Pascafinal Istanbul, hidup tak lagi sama. Tapi, hidup juga berjalan terus. Satu per satu figur pemain heroik, seperti Harry Kewell, Milan Baros, Djibril Cisse, Luis Garcia, Dudek, dan Smicer meninggalkan Anfield dan melanjutkan karir di klub baru.Sebagian tetap tinggal, terutama Gerrard.
Sang kapten sempat disebut-sebut akan hijrah ke Chelsea musim panas 2005 itu. Tapi, Istanbul mengubah segalanya."Bagaimana mungkin saya pindah setelah mengalami final seperti ini?" ujar Gerrard.Arak-arakan bus dengan atap terbuka dan kerumunan satu juta orang, 300 ribu di antaranya memadati St George's Hall, suatu hari di Mei 2005, pasti takkan pernah dilupakan Liverpudlian sepanjang masa.Yang pasti Liverpool melakukan keajaiban, mengejar defisit tiga gol di partai final. Hal yang baru pertama kali terjadi dalam sejarah. Sebaliknya, hal ini merupakan kekalahan tragis bagi Milan. Milan sendiri mencatat dua sejarah malam itu. Pertama, Maldini menjadi pemain tertua yang mencetak gol di final Liga Champions dan yang kedua adalah Hernan Crespo menjadi satu- satunya pemain yang mencetak dua gol bagi timnya di final namun gagal membawa timnya juara.Kemenangan dramatis bagi Liverpool dan kekalahan tragis bagi Milan. Akan tetapi, dua tahun berikutnya Milan berhasil membalas kekalahan dari Liverpool. Di Athena 2007, giliran Milan yang membungkam Liverpool 2-1. Namun tetap saja, kemenangan Liverpool di 2005 akan jadi momen yang paling diingat oleh semua orang.

Sabtu, 18 Januari 2014

Nembak cewek dengan cara keren



Hallo semua, Masih banyak ga nih yang masih jomblo? Hehe. Pada postingan inii kenapa saya nanya masih banyak ga yang jomblo? Karena saya akan memberitahukan cara menembak cewe dengan cara yang terbilang unik untuk para jomblo yang sedang melakukan PDKT dan sedang bersiap untuk menembaknya yaitu menembak lewat program komputer! Keren kan? J Mungkin sudah pada tau karena saya repost dari blog lain tapi saya menggunakan kata kata sendiri di dalam program itu. Caranya mudah saja, yang kamu perlukan hanyalah sebuah software notepad yang sudah otomatis terinstall bila kamu menginstall operating system windows, dan sebuah flash disk. Bukalah notepad di komputer kamu, kemudian Tulislah seperti ini :

Dim Jika
Jika = InputBox ("Itsni, melalui program sederhana ini, aku gabisa untuk tidak mengungkapkan perasaan ini tepat pada waktunya. aku mau bilang kalo aku cinta sama kamu, kamu cinta juga ga sama aku? tetapi.. aku lagi gamau pacaran dulu, aku sedang fokus membenahi masa depan ku yang masih panjang. apakah kamu mau menunggu aku bila kamu juga cinta sama aku?? jawab ya Itsni, ketik Y kalau ya ketik T kalau tidak.. lalu klik OK ya ^_^ setelah kamu pilih jawabannya kamu sms ke aku ya ^_^")
If UCase(Jika) = "Y" Then
MsgBox ":) Kamu serius? Makasih yah Itsni...Aku akan buktikan aku akan jadi orang yang sukses , supaya kamu ga sia sia nunggu aku yang sedang membenahi masa depan ku ini ^_^"
ElseIf UCase(Jika) = "T" Then
MsgBox "hmmm.. Its Okay, Gapapa kok, mungkin aku emang ga di takdirin sama kamu. yg penting kita masih bisa temenan, aku sudah seneng banget kok.. makasih ya,, aku tetep cinta sama kamu.. ^_^"
Else
MsgBox "yaah, kamu belum masukin jawabannya, Pilihan hanya 'Y' kalo ya atau 'T' kalo tidak. nanti kamu klik lagi ya program ini lalu ketik jawabannya yah ^_^ "
End If
Tulisan yang warnanya merah bisa kalian ganti sesuka hati kamu. inget, pakai bahasa yang sopan yah. jangan sampai si cewek justru menjauhkan diri dari kamu. Setelah semuanya di tulis, sekarang save as dalam format .vbs, contoh buat itsni.vbs lalu selesai sudah. Kemudian simpanlah di flash disk, kemudian berikan kepada cewek yang kamu incar. sekarang coba buka program yang kamu buat, penampakannya akan seperti berikut ini :

Gimana, Keren kan? pasti lebih bagaimana gitu kesannya nembak cewek menggunakan program. kelihatan lebih keren. Jika kamu ingin agar programnya terbuka otomatis ketika mencolokkan flash disk, buat lagi program autorun seperti berikut di notepad kamu :

[autorun]
 open=
buatitsni.vbs
Tulisan yang merah kamu sesuaikan dengan nama file yang kamu buat tadi. kemudian save dengan nama Autorun.inf, lalu simpan juga di flash disk, agar program nembaknya berjalan otomatis ketika flash di colokkan di komputer. Silahkan di coba, semoga berhasil kawan. :)


Rabu, 10 Oktober 2012

Rangkuman CCNA Discovery 2 - Chapter 2


HELP DESK

Many business operations depend on a connection to the local network and the Internet. Therefore, network troubleshooting is a top priority for the business.

ISPs provide internet connections for business, and they give their customer support for problems that occur with Internet connectivity. This support usually includes assistance with customer equipment problems. ISP support is typically provided through an ISP help desk. Is it a problem connecting to the Internet or receive email, help desk ISP is usually the first place users or businesses turn to for help.

ISP help desk technicians have the knowledge and experience to fix the problem and get the user connected. ISP help desk technician to provide solutions to customer issues with the goal of network optimization and customer retention.

A good help desk team to ensure that problems are resolved quickly and to the satisfaction of the customer. Providing Internet services is a very competitive business, and poor service can lead to loss of customers to the ISP ISPs compete.

At ISP, there are usually three levels of customer support:

Level 1 is for direct support is handled by a junior-level help desk technician.
Level 2 handle increased calls for more experienced telephone support.
Level 3 is for calls that can not be resolved by phone support and require on-site visits by technicians.


In addition to ISP, different types of media to large businesses employ help desk or customer support team. Title assigned to the technician may differ from those described here, although the hierarchy of three levels is the most common structure. Depending on the size of the organization, help desk may consist of one person doing all three levels of support, or could be comprehensive call center with complex facilities conquest calls and escalation rules. Some ISPs and businesses contract out their help desk functions to a third-party company call center, which provides services from Level 1 and Level 2 technicians.

When the user initially contacted the help desk to resolve the problem, call or message is usually directed to Level 1 support technician. Level 1 support is usually an entry-level position that provides junior technicians with valuable experience. Many customers issued resolved by Level 1 support technician.

Problems can not be solved sent to Level 2 support, which typically have fewer available agents. Tasks and responsibilities of Level 2 technician that is similar to the Level 1 technician, but they are at a higher skill level. These agents are expected to solve problems that are more challenging and require more knowledge.

Many of the larger service providers have expanded their business to include managed service or on-site support of customer networks. Organizations that provide managed services are sometimes referred to as Managed Service Providers (MSP). Managed services can be provided by the ISP, telecom service providers, or any other type of computer support and networking organization. When an ISP that provides managed services, often requiring a technician to visit the customer site for the purpose of installation and support. This type of service is a Level 3 support.

Level 3 support is generally in accordance with the Service Level Agreement (SLA). SLA resemble an insurance policy, as it provides coverage or services if there is a computer or a network problem.

Help desk technicians may be required to provide telephone support, email support, web-based support, online chat support, and possibly on-site support. They are often the first point of contact for customers frustrated and anxious. Until the problem is solved, help desk technician can continue to get calls and correspondence asking for status updates and estimated time to resolve the problem.


Incident management procedures to be followed every time a help desk technician receives a call and begin to address the problem. Incident management including open tickets and follow the interference problem-solving strategies. Using troubleshooting techniques including troubleshooting flowcharts, addressing questions in a template format, and maintain appropriate procedures increased ticket.

A script is used by help desk help desk technicians to collect information and cover the important facts about customer events.

In addition to technical skills, help desk technician should be able to greet customers happy and to be professional and polite throughout the call.

Customer service and interpersonal skills are very important when handling difficult clients and incidents. Help desk technician should know how to relieve stress and respond to customer rude customer.

Ticket trouble opening and logging information on the ticket is very important to help desk operations. When there are a lot of calls regarding a problem or symptoms, it is helpful to have information on how the issue was resolved in the past. It is also important to communicate to the customer what is being done to solve the problem. Good information on open trouble tickets help the communication status accurately, both with customers and other ISP personnel.

While many problems can be handled remotely, some problems require on-site visits to the customer site to install and troubleshoot equipment. When a technician to go anywhere, it is important to represent them in a professional organization. A professional knows how to make customers feel comfortable and confident in the skills of technicians.

On my first visit to the customer site, it is important for technicians to make a good impression. Personal care and how technicians dress is the first thing customers notice. If the technician makes a bad first impression, it may be difficult to change that impression and gain the trust of customers. Many employers provide uniforms or have a dress code for their on-site technicians.

The language and attitude of the technicians also reflects the organization representing technicians. when talking to the customer, the technician should be polite and respectful, and answer all customer questions. If the technician does not know the answers to customer questions or if additional information is required, the technician must write to customer inquiries and follow up as soon as possible.

When network connectivity problems reported to the help desk, many methods are available to diagnose the problem. One common method is to solve the problem by using a layered approach. A layered approach requires that the network engineers become familiar with the various functions that occur as a message is created, presented, and interpreted by the network devices and hosts on the network.

Transferring data over a network is best imagined with seven layers of the Open Systems Interconnection, commonly referred to as the OSI model. The OSI model breaks network communication into multiple processes. Each process is a small part of the larger task.

The seven layers of the OSI model is divided into two sections: the top layer and bottom layer.

The upper layer of the term is sometimes used to refer to any layer above the Transport layer of the OSI model. The top layer deals with the application functionality and are generally only implemented in software. Highest layer, the application layer, closest to the end user.

The bottom layer term is sometimes used to refer to any layer below the Session layer. The combined functions of the lower layers handles data transport. Physical layer and Data Link layers are implemented in hardware and software. The physical layer is closest to the physical network media, or network cabling. The physical layer actually put the information to the media.

End stations, such as clients and servers, usually work with all seven layers. Network devices are only concerned with the bottom layer. Hub works at Layer 1, moved at Layers 1, 2 and routers at Layers 1, 2 and 3, and firewalls at Layers 1, 2, 3, and 4.

When using the OSI model as a framework for troubleshooting, it is important to understand the work performed on each layer, and what information is available to the network device or software programs perform these functions. For example, many processes have to happen because email to successfully travel from the client to the server. The OSI model divides the task of sending and receiving emails becomes smaller, the different measures corresponding to seven layers.

Step 1: The top layer is made of data.

When a user sends an email message, the alphanumeric characters in the message are converted into data that can travel across the network. Layers 7, 6, and 5 are responsible for ensuring that the message is placed in a format that can be understood by the application running on the host destination. This process is called encoding. The top layer then sends a coded message to the lower layers for transport across the network. Transporting mail to the correct server depending on the configuration information provided by the user. Problems that occur at the application layer that is often associated with an error in the configuration of the software program users.

Step 2: Layer 4 packet data for end-to-end transport.

The data consists of email messages in containers for transport network at Layer 4. Layer 4 break messages into smaller segments. A title placed on each segment which shows TCP or UDP port number corresponding to the correct application of the application layer. The functions in the transport layer indicates the type of service delivery. Email using TCP segments, so sending packets acknowledged by the destination. Layer 4 functions are implemented in software running on the source and destination hosts. However, because firewalls often use TCP and UDP port numbers to filter traffic, a problem that occurs at Layer 4 can be caused by a list of appropriate firewall filter set.

Step 3: Layer 3 adds the network IP address information.

Email data received from the transport layer entered into a package that contains a header with source and destination IP address of the network. The router uses the destination address to redirect packets across the network along the right path. One IP address is configured on the source of information or the destination system can cause Layer 3 problems to occur. Because routers also use IP address information, the router configuration errors can cause problems at this layer.

Step 4: Layer 2 adds the data link layer header and trailer.

Every network device in the path from source to destination, including the sending host, encapsulates the packet into a frame. Frame contains the physical address of the device that is connected directly to the next network link. Every device in the network path requires framing chosen so that it can connect to the next device. Switches and network interface cards (NICs) using the information in the frame to convey the message to the correct destination. NIC driver is not correct, interface cards, and hardware problems with the Layer 2 switch can cause the problem to occur.

Step 5: Layer 1 converts data to bits for transmission.

Frame is converted into a pattern of 1s and 0s (bits) for transmission on the medium. A clock function allows the device to distinguish these bits as they travel across the medium. Media can change along the path between the source and destination. For example, an email message can start in one Ethernet LAN, across a campus backbone fiber, and cross serial WAN link to another until it reaches the destination Ethernet LAN remotely. Layer 1 problem can be caused by a loose or incorrect wiring, faulty interface card, or power failures.

On the receiving host, the process described in steps 1 through 5 is reversed, with the message the way back to the appropriate application layer.

As a theoretical model, the OSI model defines the protocols, hardware, and other specifications that operate in seven layers.

The OSI model also provides a systematic basis for network troubleshooting. In each scenario troubleshooting, basic troubleshooting procedures include the following steps:

1. Defining the problem.

2. Isolating the cause of the problem.

3. Solve the problem.

Identify and prioritize alternative solutions.
Select one of the alternatives as a solution.
Implement the solution.
Evaluate the solution.


If the solution does not address the identified problem, undo the change and move on to the next possible solution. Go through the steps until the solution works.

Besides basic troubleshooting procedures, the OSI model can be used as a guide for troubleshooting. Using a layered model, there are three different problem-solving approaches that a technician can use to isolate the problem:

Bottom-Up - bottom-up approach starts with the physical components of the network and works its way up layers of the OSI model. Bottom-up approach to problem solving is an effective and efficient for suspected physical problems.
Top-Down - top-down approach starts with the user's application and work your way down the layers of the OSI model. This approach begins with the assumption that the problem is with the application and not the network infrastructure.
Divide-and-Conquer - The divide-and-conquer approach more commonly used by experienced network engineers. Technicians make an educated guess targeting the problem layer, and then based on the results of observations, move up or down the OSI layers.


Using the OSI model as a guide, help desk technician can query customers to help define the problem and isolate the cause.

Help desk technicians usually have a predefined list or script to follow when troubleshooting a problem. Often the script take a bottom-up approach to problem solving. This is due to physical problems are usually the most simple to diagnose and repair, and the bottom-up approach starts with the Physical Layer.

Layer 1 Troubleshooting

Technicians began with Layer 1 first issue. Remember, Layer 1 relate to the physical connectivity of network devices. Layer 1 problem often involves wiring and electricity, and is the reason for many help desk calls. Some problems are more common Layer 1 includes:

Power off the device
Power device is disconnected
Loose network cable connection
One type of cable
Damage to the cable network
Damaged wireless access point
One wireless settings such as SSID


To solve the problem at Layer 1, first check that all devices have the proper power supply, and that the device is turned on. if the problem is with the wireless, make sure the wireless access point operation and that the wireless settings are configured correctly.

When a little troubleshooting a problem, the technician must notify the caller through each step, what to look for, and what to do if an error is found. If it is determined that all Layer 1 issue has been addressed, it is time to go on, the OSI model to Layer 2.

Troubleshooting Layer 2

Network switches and host NIC perform Layer 2 functions. Layer 2 problems can be caused by faulty equipment, incorrect device drivers, or switch is not properly configured. When a little troubleshooting a problem, it may be difficult to isolate a Layer 2 problem.

A technician in place to check whether the NIC is installed and working properly. Reseating the NIC, or replace suspected faulty NIC with a known good NIC, helping to isolate the problem. The same process can be done with a network switch.

Layer 3 Problems

At Layer 3, the technician needs to investigate the logical addressing used in the network. If the network uses IP addressing, the technician verifies that the device has the correct settings, such as:

-Assigned IP address in the network
-True subnet mask
Right-default gateway
-Other settings are required, such as DHCP or DNS


At Layer 3, several utilities to assist with the troubleshooting process. Three of the command line tools are the most common:

-Ipconfig: Shows the IP settings on the computer

-Ping: Tests the basic network connectivity

-Tracert: Determine if the routing path between the source and destination are available

Many network problems can usually be solved using Layer 1, 2, and 3 problem solving techniques.

Layer 4 Troubleshooting

If Layers 1 through 3 all appear to be operating normally and technicians can successfully ping the IP address of the remote server, it is time to examine higher layers. For example, if the network firewall is used throughout the flow, it is important to check that the application TCP or UDP port is open and no filter list to block traffic to the port.

Layer 5 to 7

The technician should also check the application configuration. For example, when troubleshooting an email issue, ensure that the application is configured with the correct shipping and receiving email server information. It is also necessary to ensure that the domain name resolution function as expected.

For remote technician, higher layers can be examined using tools other network utilities, such as packet sniffer to see the traffic as it crosses the network. A network applications, such as Telnet, can also be used to view the configuration.

The number and type of calls received by the help desk can vary widely. Some of the most common calls include problems with email, connectivity host configuration

Common causes of many problems email was using the wrong lift, IMAP, or SMTP server name. It is best to check with your email administrator to confirm the exact name of the POP or IMAP server and the SMTP server. In some cases, the same name servers for both POP / IMAP and SMTP is used. Also, make sure that the username and password are correct. Since passwords are usually not shown, it is a good idea to carefully put it back.

When troubleshooting problems with the phone, it is important to step customers through the configuration parameters carefully. Many customers are not familiar with the term and setting the various configuration parameters. If possible, connect the device to customers through remote management software. This allows technicians to perform the necessary steps for the customer.

Host Configuration Problems

Common problems that can prevent connectivity to the Internet or other network resources are improperly configured host addressing information. This can include the wrong IP address, subnet mask, or default gateway.

In environments where the IP addressing information manually configured, it is possible that the IP configuration is entered incorrectly. In an environment where the occupants set to dynamically receive an IP address from the server tasks, such as DHCP server, the server may fail or become unreachable due to network problems.

If a host is configured to receive dynamic addresses, and one assignment server is not available or not affordable, link-local address will be automatically assigned to the local host by the operating system. IPv4 address 169.254.0.1 in the address block to 169,254,255,254 (169.254.0.0 / 16) defined as the link-local address. A link-local process will randomly select an IP address in the range 169.254.0.0/16. But what prevents the two hosts of the random selection of the same IP address?

After the process of selecting a link-local IP address, it sends an ARP request with the IP to the network to see if there are other devices that use that address. If there is no response, the IP address assigned to the device, if the IP address is selected, and repeated ARP requests. Microsoft refers to the link-local address as Automatic Private IP Addressing (APIPA).

If multiple hosts on the same network have the address link-local, client / server and peer-to-peer applications between that residents will work fine. However, because link-local address is in a Class B address space private communication, outside of the local network is not possible.

When troubleshooting both manually and dynamically configured hosts, use the host command ipconfig / all to verify that the host is using the appropriate IP configuration.

Customer Connectivity Problems
Connectivity problems are more common with new customers trying to connect for the first time. However, sometimes there are customers are experiencing connectivity problems. First time customers may have problems with installing the hardware and software configuration settings. Existing customers experiencing connectivity problems when they can not open a webpage or connect to the instant messaging or email.

There are many reasons why customers have no connectivity, including the following:

-Failure to pay for services
-Hardware failure
Physical-layer failure
-One application settings
-Missing plug-in application
-Missing apps


In many cases, the problem is a faulty cable, or a cable plugged into the wrong port. This type of problem can be solved by checking the cable connections or replace cable.

Other problems, such as a software problem, it may be more difficult to detect. One example is the stack TCP / IP is loaded incorrectly. The stack TCP / IP can be tested and verified using the loopback address. Loopback is a special address, the IPv4 address 127.0.0.1 booked, residents who used to drive traffic to themselves. Loopback address creates shortcut method for TCP / IP applications and services running on the same device to communicate.

You can ping the loopback address to test the TCP / IP configuration on the local host. If you are unable to get a response when pinging the loopback address, suspect TCP / IP stack improperly configured or installed.

Address 127.0.0.0 to 127 255 255 255 are reserved for testing purposes. Each address in this block will be repeated in the local host. There are no addresses in this block should ever appear on any network. Despite the fact that the range 127.0.0.0 / 8 are reserved throughout the network, the address is usually used for testing only loopback address is 127.0.0.1.

When a Level 1 help desk technician receives a call, there is a process to follow to gather information. There is also a special system to store and retrieve relevant information. It is very important to gather information correctly in case the call should be increased to a Layer 2 or require on-site visits.

Meeting information and record the process started as soon as the technician answered the phone. When customers identify who they are, technician access to relevant customer information. Typically, database applications used to manage customer information.

The information was transferred to a disturbance ticket, or incident reports. This document could be a piece of paper in a paper filing system or an electronic tracking system that is designed to follow the problem-solving process from start to finish. Everyone who worked on the matter is expected to record what was done at the ticket interference. When the call is in place necessary, disruption ticket information can be converted into a work order on-site technicians can take to the customer site.

When a problem is solved, the solution was documented in the customer work order or trouble ticket, and within-document knowledge base for future reference.

Sometimes, the technician level 1help table can receive calls that can not be resolved quickly. In this case, the technician is responsible for passing the call to Level 2 technicians are better qualified to resolve the issue. Passing the call to a higher level technicians known as the process of increasing the call.

Both Level 1 and 2 help desk technician level trying to solve customer problems using the phone, web tools, and remote desktop sharing applications possible.

If the help desk techs can not fix the problem remotely, it is often necessary to send a technician on-site Level 3 to the customer premise location. It is the job of the technician in place to visit for a customer premise equipment to physically work on the problem. Help desk technician can make an appointment with the customer to technician on site to carry out repairs, or perhaps responsibility technicians in place to set up an appointment.

To really solve the problem, technicians at the place a trouble ticket to see what was previously done. This review gives engineers some background information and a logical starting point. It also helps the technician to decide which tools and equipment to carry, rather than having to leave the customer site to get supplies.

On-site technicians usually work on the network at a customer site, although there are some instances where the technician was not able to make the necessary repairs and had to bring the damaged equipment back to the site the ISP for additional troubleshooting.

There are four steps in place before beginning technicians perform troubleshooting or repair at the customer site:

Step 1. Provide proper identification to the customer.

Step 2. Review the work order ticket or interference with the customer to verify that the information is correct.

Step 3. Communicate the status of any problems identified and action is expected to take a technician at a customer site that day.

Step 4. Getting permission from the customer to start the work.

Technicians should verify all items on the ticket interference. Once technicians become familiar with all the issues, the work can begin. Technician is responsible for checking all devices and network settings, and run each utility is required. Technicians may also have to swap the suspected faulty hardware with known good hardware to determine if there is a hardware problem.

There are four steps in place before beginning technicians perform troubleshooting or repair at the customer site:

Step 1. Provide proper identification to the customer.

Step 2. Review the work order ticket or interference with the customer to verify that the information is correct.

Step 3. Communicate the status of any problems identified and action is expected to take a technician at a customer site that day.

Step 4. Getting permission from the customer to start the work.

When doing tasks solving customer sites, especially when installing new or replacing existing equipment, it is important to minimize the risk of injury by following safety practices are good. Many employers offer safety training as part of their employee services.

-Appliances

Use the ladder to reach high locations to install network cables and to install or troubleshoot wireless access in places that are hard to reach.
-High or Hazardous Locations

Sometimes network equipment and cables are located in the high and dangerous places, such as on the side of the building, on the roof, or in the internal structures such as the elevator shaft, which is not accessible by stairs. The work done on the location of this type should be done very carefully.
-Electrical

If there is a risk of damaging or come in contact with power lines when handling hardware, consult with electricity from customers about the steps that can be taken to reduce the risk of electric shock
-Awkward Spaces

Network equipment is often located in a cramped and awkward. Ensure that the work area is good tersinari and ventilated. Determine the best way to lift, install, and remove equipment to minimize the risk.

-Heavy Equipment

Network devices can be bulky and heavy. Plan to have the correct equipment and trained personnel when equipment needs to be installed or removed at the customer site.

Once the technician to make configuration changes or install new equipment, the technician should observe the results to ensure proper operation. Once completed, the technician communicates the nature of the problems identified to the customer, what solution is applied, and any follow-up procedures. Before the problem can be considered fully resolved, the technician must obtain a receipt from the customer. Technicians can then close the ticket and document solutions disorders.

Copies of the documentation was left with customer.Technician recording solutions, and customer acceptance is marked on the ticket interference. For future reference, the technician also record problems and solutions in help desk documentation and FAQ.

In some cases, a technician on-site to uncover problems that require network upgrades or reconfiguration of network devices. When this happens, it may be outside the scope of the original ticket disorders. These issues are usually communicated to both the customer and the ISP network personnel for further action.

Kamis, 04 Oktober 2012

Rangkuman CCNA Discovery 2 - Chapter 1

The intenet and standards
The Internet is a network, worldwide publicly accessible at first, the Internet used strictly for scientific research, education, and militer.Pada 1991, the rules changed to allow companies and consumers to connect juga.Internet has grown rapidly, and now global . continues to develop new technology that makes the Internet easier and more attractive for online digunakan.Aplikasi available to Internet users, including email, web browsing, streaming music and video, games, and instant messaging.
The way people interact, share information, and even do business changed to keep up with the continuous evolution of the global network. The Internet is creating a wider audience and customer base for whatever message, product, or service can be delivered. For many businesses, having access to the Internet has become essential, not only for communication, but also for day-to-day operations. Some businesses use the Internet include:
-E-Commerce
-Communication
-Collaboration and Training
With the increasing number of devices and new technologies come online, how is it possible to manage all the changes and still reliably deliver services such as email? Answer is the Internet standard.
A standard is a set of rules that determine how things should be done. Network and Internet standards ensure that all devices connected to the network using the same rules. Using the standard, it is possible for different types of devices to transmit information to each other via the Internet. For example, the way in which the email is formatted, transmitted, and received by all devices in accordance with the standard. If someone sends you an email with a personal computer, other people could use mobile phones to receive and read email using the phone as long as the same standard personal computer.
An Internet standard is the end result of a comprehensive cycle of discussion, problem solving, and testing. When a proposed new standard, each stage of the development process and the approval noted in the Request for Comments numbered (RFC) documents that trace the evolution of the standard.
There are thousands of Internet standards that help define the rules for how devices communicate on-jaringan.Standar different standards are developed, published, and maintained by different organizations. Because organizations create and maintain standards, millions of people can connect to the Internet using a variety of devices, including personal computers, cellular phones, handheld personal digital assistants (PDAs), MP3 players, and even television.

Internet and ISP service
Regardless of the type of device that an individual or business is used to connect to the Internet, the device must be connected via the internet service provider (ISP). ISP is a company or organization in which a customer gain internet access. A customer can be a business, private consumers, government agencies, or even another ISP.
In addition to offering a connection to the Internet, the ISP can offer other services to customers, including:
-Equipment co-location
Web-hosting
-FTP
-Applications and media hosting
-Voice over IP
-Technical Support
-Point of Presence (POP)

Delivering Internet service to end users
To gain access to the Internet, it is first necessary to have a connection to ISP.ISP offers a variety of connection options. The main connection method used by home and small business users are:
Dialup access
Dialup access is an inexpensive option that uses any phone line and modem. To connect to the ISP, the user calls the ISP access phone number. Dialup is the slowest connection options, and is typically used by mobile workers and in areas where high speed connection option is not available.


DSL
provide better connections cepat.DSL also use phone lines, but unlike dialup access, DSL provides a continuous connection to the Internet. This connection option uses a special high-speed modem that separates the DSL signal from the telephone signal and provides an Ethernet connection to a host computer or LAN.
Cable modem
Cable modem connection is an option offered by cable television providers. Internet signal carried on the same coaxial cable that delivers cable television to homes and businesses. A special cable modem separates the Internet signal from other signals carried on cable and provides an Ethernet connection to a host computer or LAN.
Satellite
Satellite connection is the option offered by the satellite service provider. Computer users are connected via Ethernet to a satellite modem that transmits radio signals to the nearest Point of Presence in satellite networks.
Bandwidth is measured in bits per second (bps). Higher bandwidth speeds are measured in kilobits per second (kbps), megabits per second (Mbps), or gigabits per second (Gbps).
There are three main types of high-bandwidth connection options used by businesses:
T1 connections transmit data up to 1.544 Mbps. T1 connections are symmetrical, which means that the upload bandwidth is the same as the download bandwidth. A medium-sized businesses may only need one connection T1.E1 is the European standard that transmits data at 2.048 Mbps.
T3 connections transmit data up to 45 Mbps. Although much more expensive than a T1 connection, a larger business might require a T3 to accommodate the large number of karyawan.Perusahaan with some locations may use a combination of T1 lines and T3.E3 is the European standard that transmits data at 34.368 Mbps.
Metro Ethernet offers a variety of high bandwidth, including Gbps link. Large companies with many branches in the same city, such as banks, use Metro Ethernet. Metro Ethernet connects the main office location and all the branches using switched technology. Metro Ethernet allows the transfer of large amounts of data faster and cheaper than other high-bandwidth connection options.
Having this type of connection is established, it is necessary to connect to the ISP to gain access to these Internet.Masing computers and networks connected to the ISP business in POP.POPs located on the edge of the ISP network and serve geographic areas tertentu.Mereka provide a local point of connection and authentication ( password control) for multiple end users. An ISP may have many POPs, depending on the size of the POP and service areas.
Internet hierarchy
Internet has a hierarchical structure is the peak hirarkis.Pada ISP organization. ISP POPs connect to the Internet Exchange Point (IXP). In some countries, this is called Network Access Point (NAP). An IXP or NAP is where multiple ISPs cooperate to gain access to their respective networks and exchange information. There are currently more than 100 points, the major foreign currencies are located throughout the world.
The backbone of the Internet consists of a group of networks owned by different organizations and interconnected through IXPs connections and private peering.
The backbone of the Internet is like the super information highway that provides high-speed data link to connect the POPs and IXPs in major metropolitan areas throughout the main dunia.Media connecting optik.Kabel Internet backbone fiber cables are usually installed underground to connect cities in the optical fiber benua.Kabel also goes under the sea to connect the continents, countries, and cities.
ISPs are classified into different levels according to how they access the Internet backbone:
Tier 1 ISPs are top of the hierarchy. Tier 1 ISPs are large organizations that connect directly with each other via private peering, physically joining the respective backbone networks together to create a global Internet backbone. Within their own networks, a Tier 1 ISP has a router, high-speed data links, and other pieces of equipment that join them to other Tier 1 networks ISP.Ini including undersea cables connecting the continent.
Tier 2 ISP is the next level in terms of access backbone.Tier 2 ISP can also be very large, even extending in some countries, but very few have a network covering the entire continent or between benua.Untuk provide their customers with access to the global Internet, some Tier 2 ISPs pay Tier 1 ISPs to carry their traffic to other parts of the world. Some Tier 2 ISPs exchange traffic with other ISPs globally cheaper through public peering at IXPs. A large IXP may bring hundreds of ISP in central physical location for access to multiple networks via a joint.
Tier 3 ISPs are farthest from the bone punggung.Tier 3 ISPs are generally found in big cities and provide customers local access to Internet.Tier 3 ISPs pay Tier 1 and 2 ISPs for access to the global internet and internet services.

Using tools to map the Internet
The network utility to create a map of the various interconnections to visualize how ISPs interconnect jaringan.Utilitas also illustrates the speed at which each contact point can be achieved.
Ping command to test the accessibility of a specific IP address. The ping command sends a packet (Internet Control Message Protocol) ICMP echo request to the destination address and then waits for an echo reply packet to return from that host. ICMP is an Internet protocol that is used to verify communication.This measure the time between when the request packet to be sent and a response packet diterima.Output ping command indicates whether the response was received successfully and displays the round-trip time for transmission.
To use the ping command, enter the following command on the Cisco command-line interface (CLI) on the router prompt or Windows command prompt:
ping <ip address>
where <ip address> is the IP address of the destination device.
For example, ping 192.168.30.1.
If the package does not reach the destination, or if the delay encountered along the way, how can it be determined where the problem lies or through the router where packet has passed?
Traceroute utility displays the path that the packets take from the source to the destination host. Each router that the packet passes through is called hop. a Traceroute displays each hop along the way. It also calculates the time between when the packet is sent and when the reply received from the router at each hop.
If there is a problem, use the output of the traceroute utility to help determine where the packets lost or tertunda.Output ISP organizations also showed that the package had passed through during its journey from source to destination.
The Windows tracert utility works the same way. There are also a number of visual traceroute program that provides a graphical display of the route that the packets take.

ISP requirements
ISP requires a variety of devices to receive input from the end user and provide services. To participate in the transport network, the ISP should be able to connect to another ISP. ISPs should also be able to handle large volumes of traffic.
Some of the tools necessary to provide the service include:
-Access devices that enable end users to connect to your ISP, such as DSL Access Multiplexer (DSLAM) for DSL, Cable Modem Termination System (CMTS) for the cable modem for a dialup connection, or a wireless bridge equipment for wireless access.
-Border gateway router to allow ISP to connect and transfer data to other ISPs, IXPs, or large enterprise business customers.
-Server for things like email, network address assignment, web space, FTP hosting, and hosting of multimedia.
Power-conditioning equipment with a backup battery that is large enough to sustain if the main power grid fails.
Air-conditioning unit is a high capacity to maintain temperature control.
ISPs, like any other business, looking to expand so they can increase revenue mereka.Kemampuan to expand their business depends on getting new customers and sell more service.However, as the number of subscribers grows, the traffic on the network of the ISP is also growing.
Finally, the increased traffic may overload the network, causing the router errors, packet loss, and delay berlebihan.Dalam overloaded network, customers can wait minutes for web pages to load, or may even lose connection jaringan.Para customers may choose to switch to ISPs compete for better performance.
Losing customers directly translates into lost revenue for ISP.Untuk this reason, it is important that the ISP provides a reliable and scalable network.
Scalability is the capacity of the network to allow for future changes and growth. Scalable network can expand quickly to support new users and applications without affecting the performance of the services provided to existing users.
The most scalable devices are those that are modular and provides expansion slots for adding modules. Different modules can have different numbers of ports. In the case of the router chassis, the module also offers a choice of several different interfaces, allowing for the different connection options on the same chassis.

Roles RESPONSIBILITIS AND WITHIN IN ISP
ISP organizations consisting of many teams and departments are responsible for ensuring that the network operates smoothly and that the service is available.
Network support services are involved in all aspects of network management, including planning and provision of new equipment and circuits, adding new customers, repair and maintenance of the network, and customer service to network connectivity problems.
When a customer orders a new business ISP services, network support various services team works together to ensure that orders are processed correctly and that the network is ready to provide the service as soon as possible.
Each team of network support services have their own roles and responsibilities:
Customer Service receives orders from customers and ensure that the customer's specified requirements carefully inserted into the order tracking database.
Planning and Provisioning of new customers determine whether the existing network hardware and circuits and if the new circuit should be installed.
Installation at the site suggested the circuits and equipment to use, and then install them at the customer site.
Network Operations Center (NOC) monitors and tests the new connection and make sure it is done correctly.
Help Desk informed by the NOC when the circuit is ready for operation and then contact the customer to guide them through the process of setting up passwords and other account information as needed.

Rabu, 26 September 2012

My Profile

Hello my name wisnu santoso. saya seorang anak TKJ yang newbie hehe :D saya akan memberitahu sedikit tentang saya. saya masih single (promosi), saya suka browsing dan download. suka makan nasi goreng. ya segitu saja yah :D