Selasa, 21 April 2009

Ciri-ciri Orang Yang Mencintai Kita Dengan Tulus


1. Orang yang mencintai kamu tidak pernah bisa memberikan alasan kenapa ia mencintai kamu, yang ia tahu dimatanya hanya ada kamu satu²nya.
2. Orang yang mencintai kamu selalu menerima kamu apa adanya,dimatanya kamu selalu yang tercantik/tertampan walaupun mungkin kamu merasa berat badan kamu sudah berlebihan atau kamu merasa kegemukan .
3. Orang yang mencintai kamu selau ingin tau tentang apa saja yang kamu lalui sepanjang hari ini, ia ingin tau kegiatan kamu.
4. Orang yang mencintai kamu akan mengirimkan sms seperti “slmt pagi”"slmt hr mggu” “slmt tidur”, walaupun kamu tidak membalas pesannya
5. Kalau kamu berulang tahun dan kamu tidak mengundangnya setidaknya ia akan telpon untuk mengucapkan selamat atau mengirim sms.
6. Orang yang mencintai kamu akan selalu mengingat setiap kejadian yang ia lalui bersama kamu, bahkan mungkin kejadian yang kamu sendiri sudah lupa setiap detailnya, karena saat itu adalah sesuatu yang berharga untuknya.
7. Orang yang mencintai kamu selalu mengingat tiap kata2 yang kamu ucapkan bahkan mungkin kata2 yang kamu sendiri lupa pernah mengatakannya.
8. Orang yang mencintai kamu akan belajar menyukai lagu-lagu kesukaanmu, bahkan mungkin meminjam CD/kaset kamu,karena ia ingin tau kesukaanmu, kesukaanmu kesukaannya juga.
9. Kalau terakhir kali ketemu, kamu sedang sakit flu, terkilir, atau sakit gigi, beberapa hari kemudian ia akan mengirim sms atau menelponmu dan menanyakan keadaanmu.. karena ia mengkhawatirkanmu.
10. Kalau kamu bilang akan menghadapi ujian ia akan menanyakan kapan ujian itu dan saat harinya tiba ia akan mengirimkan sms “good luck” atau menelponmu untuk menyemangati kamu.
11. Orang yang mencintai kamu akan memberikan suatu barang miliknya yang mungkin buat kamu itu ialah sesuatu yang biasa, tapi itu ialah suatu barang yang istimewa buat dia.
12. Orang yang mencintai kamu akan terdiam sesaat,saat sedang berbicara ditelpon dengan kamu, sehingga kamu menjadi binggung saat itu dia merasa sangat gugup karena kamu telah mengguncang dunianya.
13. Orang yang mencintai kamu selalu ingin berada didekatmu dan ingin menghabiskan hari2nya denganmu.
14. Jika suatu saat kamu harus pindah ke kota lain untuk waktu yang lain ia akan memberikan nasehat supaya kamu waspada dengan lingkungan yang bisa membawa pengaruh buruk bagimu.
15. Orang yang mencintai kamu bertindak lebih seperti saudara daripada seperti seorang kekasih.
16. Orang yang mencintai kamu sering melakukan hal2 yang konyol spt menelponmu 100x dalam sehari, atau membangunkanmu ditengah malam karena ia mengirim sms atau menelponmu. karena saat itu ia sedang memikirkan kamu.
17. Orang yang mencintai kamu kadang merindukanmu dan melakukan hal2 yang membuat kamu jengkel atau gila, saat kamu bilang tindakannya membuatmu terganggu ia akan minta maaf dan tak kan melakukannya lagi.
18. Jika kamu memintanya untuk mengajarimu sesuatu maka ia akan mengajarimu dengan sabar walaupun kamu mungkin orang yang terbodoh di dunia!
19. Kalau kamu melihat handphone-nya maka namamu akan menghiasi sbgn besar “INBOX”nya.Ya ia masih menyimpan pesan dari kamu walaupun pesan itu sudah kamu kirim sejak berbulan2 bahkan bertahun2 yang lalu.
20. Dan jika kamu menghindarinya atau memberi reaksi penolakan, ia akan menyadarinya dan menghilang dari kehidupanmu walaupun hal itu membunuh hatinya. Karena yang ia inginkan hanyalah kebahagiaanmu.
21. Jika suatu saat kamu merindukannya dan ingin memberinya kesempatan ia akan ada disana menunggumu karena ia tak pernah mencari orang lain. Ya…………ia selalu menunggumu...

Senin, 20 April 2009

with my friends


gw itu klu lage bete muka gw seperti ini
ya geto la gw..
menunggu dan menunggu...
klu lage bosen..
ato bete,,,
ya foto2 seperti gini la..
jadi org narsis..

gw di blg narsis juga kagak la...
pingin aj gw foto2..
pingin liat...
muka gw klu di foto gmn sech...
hihihihi....




dan klu gw lage bete,dan lage pengen merokok tapi di ruangan itu kagak bisa merokok...
muka gw seperti ini....

huff,,,
bete...
kagak bisa merokok..
jadi gw bwt aj neyh foto...
wkkwkwk...
rasanya klu kagak merokok itu aj ada yg kurang,kagak tw napa hehehehe...
hmm....
gw juga gak sendirian donk pasti nya..
ada temen2 gw yang suka narsis juga ternyata,,,
kwkwkwkkwk...
hobby foto2...
dengan berbagai pose...
wkkwkwkwk.....
ada sech kelompok gw namanya FONT3
tapi orangnya pada kagak jelas...
pada gak setia kawan..
makanya gw rada2 malas sech..
cuma beberapa orang doank yang bisa gw percaya..
selebih nya..
SORRY la youw...
kwkwkkwkw..
EGP gw ma lU!!!!!
dan gw ada kok foto bersama mereka...
ini adalah beberapa foto nya....

nha itu..
gw kasi tw beberapa temen gw...
yang mempunya berbagai sifat masing2...
hmm..
y udh la..
CUkup sekian yak ^^

Minggu, 12 April 2009

CISCO

1. LAN (Local Area Networks)
Networks infrastructures can vary greatly in terms of:
The size of the area covered
The number of users connected
The number and types of services available

An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region. This type of network is called a Local Area Network (LAN). A LAN is usually administered by a single organization. The administrative control that governs the security and access control policies are enforced on the network level.

2. WAN (Wide Area Networks)
When a company or organization has locations that are separated by large geographical distances, it may be necessary to use a telecommunications service provider (TSP) to interconnect the LANs at the different locations. Telecommunications service providers operate large regional networks that can span long distances. Traditionally, TSPs transported voice and data communications on separate networks. Increasingly, these providers are offering converged information network services to their subscribers.

Individual organizations usually lease connections through a telecommunications service provider network. These networks that connect LANs in geographically separated locations are referred to as Wide Area Networks (WANs). Although the organization maintains all of the policies and administration of the LANs at both ends of the connection, the policies within the communications service provider network are controlled by the TSP.

WANs use specifically designed network devices to make the interconnections between LANs. Because of the importance of these devices to the network, configuring, installing and maintaining these devices are skills that are integral to the function of an organization's network.

LANs and WANs are very useful to individual organizations. They connect the users within the organization. They allow many forms of communication including exchange e-mails, corporate training, and other resource sharing.

3. The Internet - A Network of Networks
Although there are benefits to using a LAN or WAN, most of us need to communicate with a resource on another network, outside of our local organization.

Examples of this type of communication include:
Sending an e-mail to a friend in another country
Accessing news or products on a website
Getting a file from a neighbor's computer
Instant messaging with a relative in another city
Following a favorite sporting team's performance on a cell phone

Internetwork

A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are owned by large public and private organizations, such as government agencies or industrial enterprises, and are reserved for their exclusive use. The most well-known and widely used publicly-accessible internetwork is the Internet.

The Internet is created by the interconnection of networks belonging to Internet Service Providers (ISPs). These ISP networks connect to each other to provide access for millions of users all over the world. Ensuring effective communication across this diverse infrastructure requires the application of consistent and commonly recognized technologies and protocols as well as the cooperation of many network administration agencies.

Intranet

The term intranet is often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.

Note: The following terms may be interchangeable: internetwork, data network, and network. A connection of two or more data networks forms an internetwork - a network of networks. It is also common to refer to an internetwork as a data network - or simply as a network - when considering communications at a high level. The usage of terms depends on the context at the time and terms may often be interchanged.



The Interaction of Protocols:
An example of the use of a protocol suite in network communications is the interaction between a web server and a web browser. This interaction uses a number of protocols and standards in the process of exchanging information between them. The different protocols work together to ensure that the messages are received and understood by both parties. Examples of these protocols are:

Application Protocol:

Hypertext Transfer Protocol (HTTP) is a common protocol that governs the way that a web server and a web client interact. HTTP defines the content and formatting of the requests and responses exchanged between the client and server. Both the client and the web server software implement HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the messages are transported between client and server

Transport Protocol:

Transmission Control Protocol (TCP) is the transport protocol that manages the individual conversations between web servers and web clients. TCP divides the HTTP messages into smaller pieces, called segments, to be sent to the destination client. It is also responsible for controlling the size and rate at which messages are exchanged between the server and the client.

Internetwork Protocol:

The most common internetwork protocol is Internet Protocol (IP). IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses, and selecting the best path to the destination host.

Network Access Protocols:

Network access protocols describe two primary functions, data link management and the physical transmission of data on the media. Data-link management protocols take the packets from IP and format them to be transmitted over the media. The standards and protocols for the physical media govern how the signals are sent over the media and how they are interpreted by the receiving clients. Transceivers on the network interface cards implement the appropriate standards for the media that is being used.


The Peer-to-Peer Model

In addition to the client/server model for networking, there is also a peer-to-peer model. Peer-to-peer networking involves two distinct forms: peer-to-peer network design and peer-to-peer applications (P2P). Both forms have similar features but in practice work very differently.

Peer-to-Peer Networks

In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files) without having a dedicated server. Every connected end device (known as a peer) can function as either a server or a client. One computer might assume the role of server for one transaction while simultaneously serving as a client for another. The roles of client and server are set on a per request basis.

A simple home network with two connected computers sharing a printer is an example of a peer-to-peer network. Each person can set his or her computer to share files, enable networked games, or share an Internet connection. Another example of peer-to-peer network functionality is two computers connected to a large network that use software applications to share resources between one another through the network.

Unlike the client/server model, which uses dedicated servers, peer-to-peer networks decentralize the resources on a network. Instead of locating information to be shared on dedicated servers, information can be located anywhere on any connected device. Most of the current operating systems support file and print sharing without requiring additional server software. Because peer-to-peer networks usually do not use centralized user accounts, permissions, or monitors, it is difficult to enforce security and access policies in networks containing more than just a few computers. User accounts and access rights must be set individually on each peer device.

Peer-to-Peer Applications

A peer-to-peer application (P2P), unlike a peer-to-peer network, allows a device to act as both a client and a server within the same communication. In this model, every client is a server and every server a client. Both can initiate a communication and are considered equal in the communication process. However, peer-to-peer applications require that each end device provide a user interface and run a background service. When you launch a specific peer-to-peer application it invokes the required user interface and background services. After that the devices can communicate directly.

Some P2P applications use a hybrid system where resource sharing is decentralized but the indexes that point to resource locations are stored in a centralized directory. In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer. The index server can also help connect two peers, but once connected, the communication takes place between the two peers without additional communication to the index server.

Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet.


DNS

In data networks, devices are labeled with numeric IP addresses, so that they can participate in sending and receiving messages over the network. However, most people have a hard time remembering this numeric address. Hence, domain names were created to convert the numeric address into a simple, recognizable name.

On the Internet these domain names, such as www.cisco.com, are much easier for people to remember than 198.133.219.25, which is the actual numeric address for this server. Also, if Cisco decides to change the numeric address, it is transparent to the user, since the domain name will remain www.cisco.com. The new address will simply be linked to the existing domain name and connectivity is maintained. When networks were small, it was a simple task to maintain the mapping between domain names and the addresses they represented. However, as networks began to grow and the number of devices increased, this manual system became unworkable.

The Domain Name System (DNS) was created for domain name to address resolution for these networks. DNS uses a distributed set of servers to resolve the names associated with these numbered addresses.

The DNS protocol defines an automated service that matches resource names with the required numeric network address. It includes the format for queries, responses, and data formats. DNS protocol communications use a single format called a message. This message format is used for all types of client queries and server responses, error messages, and the transfer of resource record information between servers.

DNS is a client/server service; however, it differs from the other client/server services that we are examining. While other services use a client that is an application (such as web browser, e-mail client), the DNS client runs as a service itself. The DNS client, sometimes called the DNS resolver, supports name resolution for our other network applications and other services that need it.

When configuring a network device, we generally provide one or more DNS Server addresses that the DNS client can use for name resolution. Usually the Internet service provider provides the addresses to use for the DNS servers. When a user's application requests to connect to a remote device by name, the requesting DNS client queries one of these name servers to resolve the name to a numeric address.

Computer operating systems also have a utility called nslookup that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.

In the figure, when the nslookup is issued, the default DNS server configured for your host is displayed. In this example, the DNS server is dns-sjk.cisco.com which has an address of 171.68.226.120.

We then can type the name of a host or domain for which we wish to get the address. In the first query in the figure, a query is made for www.cisco.com. The responding name server provides the address of 198.133.219.25.

The queries shown in the figure are only simple tests. The nslookup has many options available for extensive testing and verification of the DNS process.



E-mail Server Processes - MTA and MDA

The e-mail server operates two separate processes:
Mail Transfer Agent (MTA)
Mail Delivery Agent (MDA)

The Mail Transfer Agent (MTA) process is used to forward e-mail. As shown in the figure, the MTA receives messages from the MUA or from another MTA on another e-mail server. Based on the message header, it determines how a message has to be forwarded to reach its destination. If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the appropriate server.


TELNET
Telnet was developed to meet that need. Telnet dates back to the early 1970s and is among the oldest of the Application layer protocols and services in the TCP/IP suite. Telnet provides a standard method of emulating text-based terminal devices over the data network. Both the protocol itself and the client software that implements the protocol are commonly referred to as Telnet.

Appropriately enough, a connection using Telnet is called a Virtual Terminal (VTY) session, or connection. Rather than using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI).

To support Telnet client connections, the server runs a service called the Telnet daemon. A virtual terminal connection is established from an end device using a Telnet client application. Most operating systems include an Application layer Telnet client. On a Microsoft Windows PC, Telnet can be run from the command prompt. Other common terminal applications that run as Telnet clients are HyperTerminal, Minicom, and TeraTerm.

Once a Telnet connection is established, users can perform any authorized function on the server, just as if they were using a command line session on the server itself. If authorized, they can start and stop processes, configure the device, and even shut down the system.

IP
Interrupt Process (IP) - Suspends, interrupts, aborts, or terminates the process to which the Virtual Terminal is connected. For example, if a user started a program on the Telnet server via the VTY, he or she could send an IP command to stop the program.

While the Telnet protocol supports user authentication, it does not support the transport of encrypted data. All data exchanged during a Telnet sessions is transported as plain text across the network. This means that the data can be intercepted and easily understood.

If security is a concern, the Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH provides the structure for secure remote login and other secure network services. It also provides stronger authentication than Telnet and supports the transport of session data using encryption. As a best practice, network professionals should always use SSH in place of Telnet, whenever possible.

User Datagram Protocol (UDP)

UDP is a simple, connectionless protocol, described in RFC 768. It has the advantage of providing for low overhead data delivery. The pieces of communication in UDP are called datagrams. These datagrams are sent as "best effort" by this Transport layer protocol.

Applications that use UDP include:

Domain Name System (DNS)

Video Streaming

Voice over IP (VoIP)

Transmission Control Protocol (TCP)

TCP is a connection-oriented protocol, described in RFC 793. TCP incurs additional overhead to gain functions. Additional functions specified by TCP are the same order delivery, reliable delivery, and flow control. Each TCP segment has 20 bytes of overhead in the header encapsulating the Application layer data, whereas each UDP segment only has 8 bytes of overhead. See the figure for a comparison.

Applications that use TCP are:

Web Browsers

E-mail

File Transfers

Empat jenis temperamen

1). Sanguinis.
Ditandai dengan sifat hangat, meluap-luap, lincah, bersemangat dan pri-
badi yang“menyenangkan.”Pada dasarnya mau menerima. Pengaruh/kejadian luar dengan gampang masuk ke pikiran dan perasaan, yang membangkitkan respons yang meledak-ledak. Perasaan lebih berperan dari pada pikiran refleksif dalam membentuk keputusan.Orang sanguinis sangat ramah kepada orang lain, sehingga dia biasanya dianggap seorang yang sangat ekstrovert.

2). Koleris.
Seorang choleris tampil hangat, serba cepat, aktif, praktis, berkemauan keras, sanggup mencukupi keperluannya sendiri, dan sangat independen. Dia cenderung tegas dan berpendirian keras, dengan gampang dapat membuat keputusan bagi dirinya dan bagi orang lain. Seperti seorang sanguinis, seorang choleris adalah seorang ekstrovert, walau tidak seekstrovertnya seorang sanguinis. Seorang choleris hidup dengan aktif. Dia tidak butuh digerakkan dari luar, malah mempengaruhi lingkungannya dengan gagasan-gagasannya, rencana, tujuan, dan ambisi-ambisinya yang tak pernah surut.

3). Melankolis.
Si melankolis adalah seorang yang paling “kaya” di antara semua temperamen. Dia seorang analisis, suka berkorban, bertipe perfeksionis dengan sifat emosi yang sangat sensitif. Tidak seorang pun yang dapat menikmati keindahan karya seni melebihi seorang melankolis. Sebenarnya dia mudah menjadi introvert, tetapi ketika perasaannya lebih dominan, dia masuk ke dalam bermacam-macam keadaan jiwa. Kadang-kadang mengangkatnya pada kegembiraan yang tinggi yang membuatnya bertindak lebih ekstrovert. Akan tetapi pada saat lain dia akan murung dan depressi, dan selama periode ini dia menarik diri (withdrawn), dan bisa menjadi seorang yang begitu antagonistis (bersif at bermusuhan).

4). Phlegmatis.
Si phlegmatis adalah seorang yang hidupnya tenang, gampangan, tak pernah merasa terganggu dengan suatu titik didih yang sedemikian tinggi sehingga dia hampir tak pernah marah. Dia adalah seorang dengan tipe yang mudah bergaul, dan paling menyenangkan di antara semua temperamen. Phlegmatis berkaitan dengan apa yang dipikirkan oleh Hippocrates mengenai cairan dalam badan yang menghasilkan yang “tenang,”“dingin,”“pelan,” temperamen yang memiliki keseimbangan yang baik.
Baginya hidup adalah suatu kegembiraan, dan kadang menjauh dari hal-hal yang tidak menyenangkan. Dia begitu tenang dan agak diam, sehingga tak pernah
kelihatan terhasut, bagaimana pun keadaan sekitarnya.

Kamis, 09 April 2009

About Me


gw itu orang biasa..
yang merantau ke jakarta untuk menuntut ilmu..
yaitu di UNIVERSITAS BINA NUSANTARA..
di sini,saya mengambil jurusan Teknik Informatika....
dan saya juga sekarang sedang mengikuti cisco di BINUS CENTER..
untuk mendapatkan CCNA ( CISCO CERTIFIED NETWORK ASSOCIATE )

mudah2 an saya bisa mejalani nya ini smua dengan baik...
amin... ^^

oh ya...
saya mw kasi tw neyh...
sifat2 gw yg plg menjengkelkan bagi lu..lu.. pada yg pada kenal ma gw...
1. gw itu sombong...
emang gw itu sombong tapi itu cuma gaya gw aj kok yang sombong..
klu dari ngomongan gw juga rada2 sombong menurut lu...lu... pada..
itu sebenarnya bukan kesombongan menurut gw..karena apa yang gw blg itu semua ke lu
smua itu adalah hal yg sesuai dengan kenyataan yang ada di diri gw...
dan mungkin menurut lu,gara2 gw ngomong spt itu,gw itu sombong,kyk pamer..geto kn??
ya..ya..ya...gw tw kok... dan bnyk banget yg iri ma gw gara2 itu...
gak tw napa.... gw mah EGP :p

2.gw itu pemarah!!
nha,ini salah satu sifat gw yang gak bisa gw ilangin dari dolo..pa lage klu suatu hal yang
gak bisa gw trima yang orang buat ke diri gw...
wah..wah...klu gw gak anggap lu temen,,dah gw hajar lu !!!!
biar la badan lu tinggi, pendek, gede, kecil, gemuk, kurus, punya otot gede.. ato apalah...
gak masalah bagi gw...
klu selagi gw benar.. gw berani kok...
tapi gw ada temen yang selalu ingetin klu gw itu harus selalu sabar..

thnx ya buat kalean teman ^^
aku akan berusaha kok..

3.Egois..
emang,gw ngaku..
gw egois...
tapi gw itu egois sesuai tempat nha...

4.gak munafik..
gw orgnya gak munafik..
gw gak malu kok klu di anggap org laen gw ini gmn la...
ya,spt ini la gw...
dan gw gak mw spt org bloon,bego..,yang cuma baek di depan org laen
tapi di belakang org laen, gw malah sebenarnya ancor banget dari segi sikap,sifat,dll...
dan gw seneng ma temen yg bisa terima gw apa ada nya gw.. ^^

5.setia kawan..
gw klu namanya temen..
pasti gw bela trus.. di tempat mana pun..
biar la org ngomong apa ttg dy,emg tmn gw pasti ada kekurangannya...
tapi di balik kekurangan itu tak menjadi prioritas bwt gw jadi mw aja temen gw di jelek2 in...
gara2 sifat setia kawan seperti ini, kadang temen gw kurang ajar ma gw..
dy kadang nusuk gw dari belakang...
yah...lu pasti dah tw la mksd nya.. dan itu lebih dari sekali

6.paling benci di remehin..
nha...
gw juga org yang paling benci di remehin ma orang lain...
selagi gw masih mampu.. so what???
ya gak??
tapi org laen selalu anggap remeh gw...
ok,, lu jago...
tapi kita liat aj ntar yak ^^

7.pelit...
gw itu orang nya pelit banget seperti nyokap gw...
tapi inget..
pelit pangkal KAYA.. ^^

8.tak ada namanya SOHIB
bagi gw...
sohib itu gak ada..
BULLSHIT...
gw cuma anggap lu..lu..pada itu sebagai temen gw...
karena...gw gak percaya lagi ma tmn.. yg bener2 bisa jadi sohib...
jangankan temen...
keluarga sendiri aj mw saling menjatohkan..
pa lage statusnya temen... itu sama aj org laen,, bukan keluarga.. dan pasti lebih parah dari itu..


tuch..
gw kasi tw sifat2 jelek gw...
dan gw yakin..
itu lum smua nya..
dan ge gak mw kasi tw sifat baek gw...
biar la lu..lu.. pada yg menilai gw gmn orgnya


dan sekarang ini gw dah punya pacar namanya MILA..
nak daerah gw...
gw pacaran ma dy itu ada perbedaan..
yaitu di agama...
dy agama Islam...
klu gw agama Kristen Protestant
tapi bagi gw itu gak masalah kok..
ya..
gw jalanin aja dolo...
ini gambar foto kami berdua

dan akhirnya gw putus