Tuesday, June 23, 2009

Differences in Cable and Wireless Network

Introduction to Wireless Local Area Network (LAN) or in English "Network
Computer system "is a communication system which is implemented
as the development, or an alternative for Wired Local Area Network.
Using radio frequency technology (RF), wireless computer network
send and receive data through the air, reduce / negate the need
through the use of connection cable. Therefore, a wireless computer network
combine data connectivity with user needs that
moved (mobile) or limited to the conditions that make
the use of computer network cables (for example in the area
hinterland).

Wireless LAN (wireless network) has grown rapidly
in almost all group-level computer users, including in the environment
health care, retail businesses, factories, warehouses, and academic. Industries
has been gained from the productivity obtained from the
the use of handheld and notebook computers to send information
real-time to the computer center for processing. Computer Networking at Wireless
This has been recognized as an alternative connectivity for multi-function
reach a wider customer. Business Research Group, a
market research companies predict increased six-fold increase in
sales value of the wireless computer network device at the end of 2000,
worth about two Billion USD.

Why Wireless?
A large dependence on computer networks in various business
with the growth of the Internet and online service that is melesat
strong evidence of important benefits from the system
information (data) that can be used together. By using the network
wireless computer, the computer users can access the information without
need to find a place to stick the cable, and managers
network can build or enlarge the network without the need to install or
move the cable-cable. Wireless computer networks offer productivity
and the benefits of low cost compared to traditional computer network:
• Mobility: The system can provide wireless computer access to information
real-time to each user in the organization. This mobility gives
opportunities and productivity services that were previously not possible
obtained from the computer using the cable network.
• Ease and speed in the Installation: Installing a network system
The wireless computer can actually be done quickly and easily and
does not require the need interesting cable through walls and roof of the room.
• Flexibility in Installation of: wireless technology allows the network
computer access from that previously could not be made by
computer with the cable network.
• Reduce Cost Ownership: While the initial investment needed
the device in the network computer is still more expensive than
device using a computer network cable, the cost of installation and cost
life-cycle and will become cheaper. Benefits of long-term
choice is the best in the business environment that demands change
and constant movement.
• scalability: the wireless computer network system can be configured in
various topology according to the needs of the application and installation
specific. Configuration is very easy to change, starting a short distance from the peer-to-peer,
network is adjusted by the number of users, ranging from a few people
only to the user that allows thousands of users roaming in the scope
a broad.

How to Network Computers Used in Wireless World Nyata
The benefits of a wireless computer network in terms of development compared
computer using the cable network - to provide more value in terms of
connectivity of the network computer using the cable to the
mobile users. The following list of some of the many
the benefits and flexibility of the applications possible with the use of
Computer Networking Wireless:
• Doctors and nurses in hospitals to be more productive because
using a handheld or notebook computer they can access
data with the patient immediately.
• The consultant or the accounting or auditing work group can
increase productivity with quick network setup
• Students can access the online library site on the internet from
classroom to find the subject material.
• The network manager in a dynamic environment can reduce the cost
overhead caused by the movement, the addition of the network, and various
other changes by using a wireless computer network.
• Space-training room in the companies and students in
universities use the Wireless Network Computers to ease
access to information, information exchange, and learning.
• The network manager is installed on the computer network building long
realize that the Computer Network is a Wireless infrastructure solution
cheaper.
• Employees at the exhibition location and branch offices to reduce the requirements
the cost of using the Wireless Network Computers that have been
prepared without the assistance of MIS.
• Employees in the warehouse using a wireless computer network to exchange
information with the central database, thereby increasing productivity.
• The network managers implement wireless computer network to
provide a backup (backup systems) to applications that
running on the network that use cable.
• The company's executives can make decisions quickly because they
have access to real-time information on the fingertips.

Wireless Computer Network Technology
The network device has a line of wireless computer technology
which can be selected when you want to design a wireless computer solutions. Every
technology has various advantages and limitations of each.

use wave
radio "sesempit" may, only to send the information. Possible
crosstalk occurs (collision) be avoided by placing a different user
on a different frequency channel.
This system is similar to a private phone number. If every home in a
environment have a phone number retired, the people in a house not
akan can hear the phone conversation made by neighbors.
In a radio system, privacy and non-interference are the way
using a different radio frequency. The tool receiver (receiver)
filter out all except the radio frequency signal is desired.
From the user side, there is a lack of technology in the narrow band, ie
that each user must request permission from the organization's managers frequency
local radio, eg ORARI.

How Wireless Works Software
Computer network using wireless waves (radio or infrared)
elektromagnetik to exchange information from one point to another point without
must use physical means of connection (ie cable). Radio waves
also often referred to as radio carriers (penghantar) because of the simple
to bring energy to the recipient of a separate tool. Data
which have been delivered "charged" on the radio carrier so that it can dipilah
again by means of the recipient (receiver). This is generally described
as modulation penghantar with information that has been sent. When
radio wave data has been transmitted (modulated) radio signal
occupy more than one frequency, the frequency or bit rate of
the modulation information is added to the carrier.
In a wireless computer network configuration in general, a tool that
function as well as the transmitter / receiver (transceiver), called
as an access point (access point), connect the computer network
traditional (berkabel) from a static location using cable topology
standard. A minimum, Access Point (transceiver equipment) receive,
connect and send data between the Computer Networking and Wireless
network infrastructure using cables. An access point (tool
transceiver) can support a group of computer users and small
operate within a range from one hundred to a few hundred feet. Point
Access (or an antenna installed on the access point) is usually installed on
altitude but also can be installed anywhere as long as needed
can catch the radio signal is expected.
Users to access the computer network using a wireless adapter
Wireless Network Computer (in the form of a PC expansion card) installed in
palmtop, notebook, desktop or handheld computer, adapter
Computer Networking Wireless provides the interface between the client network
operating system (NOS) and the radio waves through an antenna.

Configuring Wireless Network Computers
Wireless computer network can be called at once simple complicated. In the
Basically, the two units are equipped with a computer card adapter Network
Wireless computer is enough to create a network of independent
even though distance separated them. This is called network peert-to-peer.

-Reach and Coverage
Radio Frequency Range of communication (RF) and Infrared (IR) is a
function of product design (including transmits power and receiver design)
and the form of propagation, especially in a closed space environment. Interaction
object against the building, including walls, metal and even humans, can
affect the propagation of energy, to reach and that is the consideration
coverage need to be considered. Benda-solid stop signal
infrared, which lead to limitations. Most systems Network
Computer system using Radio Frequency (RF) because the radio waves
can go through several types of rooms and other obstacles. Reach (or
radius of coverage) for the Network Computer Wireless typical varied
ranging from under 100 feet to more than 300 feet. Can reach
expanded, and freedom of movement via roaming, can be done using
microcells.

-Integrity and Reliability
Wireless technology has been tested for more than fifty years in
wireless applications in the commercial world and the military. Although interference
radio can cause degradation in throughput, such interference
it is very rare in the office space. Design of the
Network equipment manufacturers Computer Wireless technology that has been and
rules limit the distance the signal connection is better than
cellular phone connections and provide data integrity performance equal
or even better than Berkabel Network.

-Compatibility with the Network Already
Most Computer Networking Wireless has been prepared to meet the standard
Network interconnection with the industry Berkabel such as Ethernet or Token
Ring and supported by network operating systems as well as Network
Berkabel computer through the use of the appropriate driver. Once installed,
then the network will treat the computer as a wireless component
the other network.

Interoperability-Wireless Network Devices
Prospective users should be aware that the device system Network Computer
Wireless from some manufacturers may not be interoperable each other (not
compatible), for the following three reasons: technology is not different
mutual support. A system based on spread spectrum technology
frequency hopping (FHSS) will not communicate with other systems that
technology-based direct sequence spread spectrum (DSSS). Second, the system
that uses a different frequency band will not communicate with each other
although both use the same technology. Third, the system's
different manufacturers may not be related even though both
using the same technology and same frequency band, with respect
differences with the implementation of the (technology) on each manufacturer.

Interference-and Co-existence
With no rules on the frequency license products device
Computer Networking Wireless, the other products that emit energy
frequency spectrum in the same potential can lead to
interference to the wireless computer system. For example the oven
microwave, but most of the manufacturers of Wireless Computer Networking
have their products take into account interference with oven
microwave. Another thing that should be considered is the use of some
the device from the Wireless Network Computer manufacturers are different.
Meanwhile, products from some producers menginterferensi other brands,
some products do not interference each other.

-Ease of Use in
User just need to get a little new information to be able to immediately
Computers use the Wireless Network. Because the typical Network Computer
Wireless is compatible with the Network Operating System, the applications will work the same as when using the Network Computer Berkabel. In addition, the system is also Wireless Network Computer combines several diagnostic tools to identify problems that may arise with the elements of the wireless system, but somehow, sistemtelah designed so that most users do not need to use these diagnostic tools.
Computer Networking Wireless simplify many rules in the case
installation and configuration of the spin network manager. Because
only access point (transceiver) that require the cable, then managers
released from the network cable is interesting affairs. With at least a cable
used it is very easy to move, add and change
configuration in the network. Finally, the nature of the network cable and nirkabelable (easily moved)
of Computer Networking Wireless, to provide flexibility for managers
network to perform pre-configuration and improve the entire network
before in a separate location. After terkonfigurasi, Network
Wireless computer can be moved to another place with only a few
modification or without modification at all.

-Security
Because wireless technology comes from military applications, the factors
security is a long time since the criteria, especially in the wireless device.
Security standards is a typical part of the Network Computer
Wireless, making it more secure than most Network
Berkabel computer. It is very difficult for outsiders to tap lalulintas
Wireless Computer Network. Enksripsi techniques that make it complex
is very difficult to be possible, so that needs to be controlled is
the use of access to the network. In general, a client must be made safe
may be allowed prior to participating in a Computer Network
Wireless.

Cost -
Implementation of a Network Computer Wireless involve costs
infrastructure at the point-point wireless access and user fees for
every wireless adapter card. Cost primarily depends on the infrastructure
the number of access point is installed, a price point around U.S. $ Access
1.000 to $ 2.000. Number of the access point depends on the typical
region that want to reach and diliput or type or number of users who
want to serve. Proportional area coverage with the coverage of products. Cards
Computer Networking Wireless adapter needed for a standard platform
computer, the price range of U.S. $ 300 to U.S. $ 1,000.
Installation and maintenance cost of a Wireless Network Computers general
cheaper than the cost of installation and maintenance of Computer Network
Berkabel, with two reasons. First, a Network Computer Wireless
the cost of cable and labor costs to install and improve.
Second, because the Network Computer Wireless facilitate removal, the addition of
and changes, so does not reduce the cost of direct-user downtime and costs
administrative overhead.

-Scalability
Computer Networking Wireless can be designed to be very easy or very
complex. Computer Networking Wireless can support more clients and / or
increase the coverage area with the access point (transceiver) to strengthen
or expand the coverage
Age-Battery for Mobile Platforms
Wireless products are designed to use power from the AC or
battery on the notebook computer or handheld computer, the manufacturer of the product
apply the technique has been specifically designed to maximize
energy use and battery age.

-Influence on Health
Radiation generated from the Wireless Network Computer is very low, more
smaller than that produced by a mobile phone. Because radio waves
fade quickly, then the radiation is sent only a small
jump people working in the Computer Networking Wireless.
Computer Networking Wireless devices must meet the rules and requirements
from strict government and industry. There have been no complaints
about the health effects of Computers Wireless Network.

Conclusion
Flexibility and mobility to create a Wireless Computer Network
complement the effective and interesting alternative compared to Computer Networking
Berkabel. Computer Networking Wireless provides all the functions of the

Computer Networking by Berkabel, without the need to connect physically.
Wireless Computer Network Configuration from the simple topology
peer-to-peer network to offer a complex connectivity
distribution and data roaming. In addition to mobility for users
in the environment covered by the network, also allows the network
nirkabelable cable and network, allows the network to move with the knowledge of users.

Wireless network

The
Wireless network technology is wide spread ranging from voice communication to the data network, which allows the user to build a wireless connection at a certain distance. This technology, including infrared, radio frequency and so forth. Peranti which is generally used for the wireless network is included in the computer, handheld computer, PDA, mobile phone, tablet PC and so on. Wireless technology has a lot of functionality. For example, users can still use their mobile phone to access e-mail. Meanwhile the holiday with laptopnya can connect to the Internet when they are in airports, cafes, trains and other public places. At home, users can connect to their desktop (via bluetooth) to synchronize your PDA with it.
Standards
To press costs, ensure interoperability and promote the wide adoption of wireless technology, the organization such as the Institute of Electrical and Electronics Engineers (IEEE), Internet Engineering Task Force (IETF), Wireless Ethernet Compatibility Alliance (WECA) and the International Telecommunication Union (ITU ), has participated in various standardization efforts. For example, the IEEE working group has been a defining how information is transferred from one peranti to peranti other (using radio frequency or infrared for example) and how and when a transmission media should be used for communication purposes. When standardization to build a wireless network, such as the IEEE organization has overcome the power management problem, bandwidth, security and many unique problems that exist in the world's wireless network.

NETWORK SECURITY WIRRELES
Currently, many people began to install a wireless computer network in their house (wireless home network) which can be used by them to connect to the internet. For example the Court, one of the employees of IT companies in Singapore have been subscribed to Internet access via ADSL Telkom Speedy. Agung buy ADSL modem is also equipped with wireless or Wi-Fi. He purchased a model because he has two computers in the house, a laptop and desktop PC. Everything has been equipped with Wi-Fi card and he wanted everything connected to the internet access point through which he created himself. In addition, Court also has a PDA, which he sometimes need to access the Internet from the PDA when he was at his house. Tepatlah if he built his house on the access point itself.
But problems always appear. It is what a wireless network or access point that he made? Do not-do not have a house next to the hackers tout your data or even participate also enjoy free access to the internet. For any posts that through this time will be served a few tips related to the wireless network in your home.
1. Change the default administrator password (if you need to replace the usernamenya)
Heart of the Wi-Fi network in your home is the access point or router. To do set up the equipment from the access point, the vendor's access point device will provide a web-based interface, where to go to in this interface you will need to fill in the username and password. Sementa ra that, in some cases, the equipment in the access point is set by a vendor with a specific username and password that is easy to guess by the user. For that you need to change the default password from your access point. Even if you also need to change the username.
2. Switch-encryption
All Wi-Fi equipment supports some form of certainty of data security. The idea will make the encryption of data sent on the wireless network so that it can not be easily read by other parties. Wi-Fi equipment at this time have the option to provide security technology that you can use as needed. Make sure all the equipment in your wireless network is also using the security settings the same as used on the access point.
3. Change the default SSID
Access point or router using a network name called the SSID. Vendors usually give the name of the product they access point with a default SSID. For example, the SSID is usually released by Linksys is "linksys." The reality is if someone knows a SSID then it can not break the network, but at least this is a beginning for him. In the eyes of a hacker, if a view is still the default SSID, then it is an indication that the access point is not configured properly and have the possibility to dibobol. Change the default SSID immediately after you set up your access point.
4. Enable MAC Address filtering
Each Wi-Fi equipment surely has a unique identification, called a "physical address" or MAC address. Access point or router will record the MAC address of each peranti connected to him. You can set that only peranti with specific MAC address is allowed access to your wireless network. For example, your PDA has a MAC address, and you enter the MAC address to your PDA in the MAC address filter on your access point. So that you can connect to the network while this is just from your PDA. But you also remain cautious, because the hacker could create a MAC address filtering cajolery to outsmart this.
5. Turn off the SSID broadcast of
In Wi-Fi network, the access point or router typically akan membroadcast SSID regularly. This feature is deliberately designed for hotspot areas where Wi-Fi clients in the area can come and go quickly. In conditions in which your home SSID is surely already know your own, then this feature is not necessary because it can invite the neighbors to know the SSID or you also prevent other people join the network with the internet for free. You can disable SSID broadcast facilities for the security of this network.
6. Give a static IP address to peranti Wi-Fi
Currently, people tend to take advantage of DHCP to provide IP addresses automatically to clients who want to connect to the wireless network. This is a quick and easy for your network, but remember that this is also an easy way for hackers to get a valid IP address on your wireless network. You can turn off DHCP feature on the Access point and set a range of IP addresses that have been set and also fix peranti Wi-Fi that you want to connect to the access point with a range of IP addresses that fix earlier.
7. Think about the location of access point or router is secure
Wi-Fi signals normally can reach out to your home. Signal that is leaking out of the house until the very high risk for the occurrence of eksplotasi to your wireless network. You have to put the equipment on your access point is the area around the living room of your home. Never put the router or access point near a window, because it will increase the range of Wi-Fi signal outside your home.
8. Turn off the wireless network only if it is not used
Rules the most effective security is to turn off the equipment or network access point when not in use. For instance, never leave home with a Wi-Fi is on, although it needs to download data. Access point on a monitor without a very high risk of exploitation.

Flexibility and mobility to create Wireless Network Computer as an effective complementary and alternative interesting than Berkabel Software. Computer Networking Wireless provides all the functions of the Network Computer Berkabel, without the need to connect physically. Wireless Network Configuration Computers topology starting from a simple peer-to-peer network to offer a complex distribution of data connectivity and roaming. In addition to mobility for users in the environment covered by the network, also allows the network to network and cable nirkabelable, allows the network to move with the knowledge of users.

Wireless Security (Hacking Wifi)
Wifi network has more weaknesses than the network cable. Currently, the development of technology wifi is very significant in line with the needs of mobile information systems. Many wireless service providers such as commercial hotspot, ISP, Warnet, campuses and offices are using the wifi network on each, but very little attention to the security of data communications on the network is wireless. This makes the hacker be interested to mengexplore keamampuannya to perform various activities that are usually illegal to use wifi. In this article will discuss various types of activities and methods that the hacker or wireless in the beginners do wardriving. Wardriving is an activity or event to get information on a wifi network and get access to the wireless network. Generally aims to get internet connection, but also many that do for the purposes of a particular start feeling keingintahuan, try try, research, job praktikum, and other crimes.
Difference Between Network and Wireless Network cable
Wireless networks have advantages and disadvantages as follows:
• pemeliharannya advantage is low cost (only station covering the cell is not like the cable network that covers the whole cable), infrastructure berdimensi small, rapid development, easy to be developed (eg with concepts and techniques mikrosel frequency reuse), easy & cheap and relocated to support network cable and nirkabelabelitas.
• Kelemahannya is the cost of expensive equipment (this weakness can be removed with the technology to develop and produce electronic components so that the network can press charges), a large delay, the radio propagasi problems such as stunted, terpantul many sources of interference, and (this weakness can be overcome with the modulation technique, antenna diversity techniques, spread spectrum techniques, etc.), network capacity keterbatas the spectrum (frequency band diperlebar but can not be used efficiently with the help of various techniques such as spread spectrum / DS-CDMA) and data security (kerahasian) less assured (weakness This can be overcome with techniques such as spread spectrum) [1.7 and 9].

• The unique wireless transmission from the media is:

1. Discontinuous signal (intermittence) caused by the object between the sender and recipient so that the signal is not obstructed and to the recipient (this phenomenon is felt in the wireless communication with IR).
2. Be broadcast due to a pattern that radiate radiasinya to all directions, so that all terminals can receive the signal from the sender.
3. Signal in the radio media is very complex for the signal presented kerena use imaginary numbers, has a radiation pattern and polarization have.
4. Experiencing symptoms is called the multipath radio propagasi from the sender to the recipient of many paths through the LOS and the LOS is not / terp

In general, the weakness Wireless
The weakness of wireless networks in general is a weakness in the configuration and weaknesses on the type of encryption used. One example of the weakness in the configuration because at this time to build a wireless network is easy. Many vendors provide a facility that allows users or network admin so often found that wireless is still using the default wireless configuration default vendor. Writers often find that wireless is installed on the network is still using the default settings such as vendor default SSID, IP Address, remote management, DHCP enable, channel frequency, even without encryption user / password for the wireless administration. WEP (wired equivalent privacy) security standard which is the wireless before, at this time can easily be solved with a variety of tools available free on the internet. WPA-PSK and Leap which is considered to be the solution replaces WEP, this can also be solved with the method of offline dictionary attack.

No matter UAS. 2

How to Explain the Influence of Information Technology on Business Company To Win Competition?
The development of information technology to bring significant changes in the business world. There are some benefits that we can get from pemanfaatannteknologi information including:
Tangible benefits (tangible benefit)
An information system is built and maintained properly will provide tangible benefits that can be factual pergerakannya be through the income and costs incurred by the company.
Indicators of success / benefits of the impact on the income increase is the increased sales in existing markets and expanding to new markets.
A good information system can be used not only for storing data electronically but must be able to support the analysis required by management.
So with the support of a good information system so that information can be accurate, reliable, up-to-date and easily accessible on the condition of the sale of the company.
With reports that tersaji quickly and can be accessed at any time in the decisions that can be taken faster and precision of the existing market dynamics.
While the reduction of costs can be reduced on factual analysis of the number of human resources involved in business, reduction of operational costs such as supplies and overhead, reduction of goods and materials in the warehouse stock, reducing the cost of maintenance and provision of equipment that is not too expensive.
Examples of reduction in the number of human resources is in the process of recording financial transactions. If the accounting process must be managed by minimum five people with the implementation of the SIA (accounting information system) is quite well done by one person only.
This is due to the SIA that the process of bookkeeping can each be processed directly from each part must be related through the process without re-charging data.
Besides automatically with SIA implementation of the financial statements can be presented based on transaction data without re-entry.
Problems cumulation supply material for the production of these assets often become the burden of companies with the implementation of the module SCM (supply chain management) in the information system is developed to help solve the problem.
With the support of both the SCM cumulation stock of material production can be minimal as possible. Where the company is ordering suppliers to only when the stock reaches the minimum.
Rates are also very competitive because it can be obtained from several suppliers, so of course this is very profitable company.
The emphasis on the amount of labor would affect the decrease in the amount of equipment investment to be invested the same impact on the decrease in maintenance costs.
No tangible benefits (intangible benefit)
Often this is the tangible benefit that is not a critical point on the road wheel of a company's business.
Not because of the shape, the following aspects are often ignored or not being resistensinya, namely:

1. Increased customer satisfaction
Suppose you come to a Town. Which approximately akan you select as the place to shop, shop at the time the queue is shorter kasirnya or vice versa?
Of course you will choose the first one may have to pay a little more expensive than the second store.
The first store appeared to have been applying sales information system in a more rapid processing and ease of data importation.

2. Increased employee satisfaction
Often arises from the employees who feel their rights is not fulfilled, such as eg lemburnya incentives.
In fact this happens due to a calculation error that the management still do this manually or with the data re-infusion system.
But if the company provides eg attendance system that is integrated in the information systems personnel and the SIA can be automatically created reports insenstif a more accurate and true.
This is a new example in the calculation of the number eg foreign credit, the right leave, career level, education and training, etc..

3. Increasing the quality and amount of information
Information is an important component in the days of business now. Kuasai information that you will act more responsive to changes and trends in the future.
Implementation of information systems that will produce good reports of the results of data compilation, which is managed by a database of quality and comprehensive.
This can be realized as each process of the report is automatically executed by the computer machine.

4. Increasing the quality and number of management decisions
Could not be denied that any decision-making relies heavily on information that supports a policy that will be captured.
This can only be realized if the information system can provide information relevant, accurate, current and can be taken at any time.

5. Increasing the quality and amount of response to the competition conditions
Aspects of business intelligence is very important since a long period of time with various formats and needs.
To reach the point of rapid response and precise dynamics of the top competitors the necessary information system that is able to gather, analyze and compile the information needed by decision-makers in the company.

6. Increased efficiency and operational flexibility
Where business owners who do not want this?
The more efficient operations and a luwesnya then this indicates the low cost incurred to run it.
This can be achieved because dipangkasnya chain bureaucracy in the company after the implementation of information systems that either.

7. Improve the quality of internal and external communication
An information system that would both have to be supported by the system electronic data communication network reliability as well.
With the implementation of information systems that either each party both in and outside the company can exchange information more effectively and efficiently.

8. Quality improvement planning
Planning is the process that are important to business. However, any plan that will be created in the course required the support of adequate information in it.
If not then the plan can lose direction and do not reach the target because kesalah information into basisnya.

9. Quality control and supervision
With the information system is built and maintained with both the activity in each business environment can be constantly monitored.
Monitoring is of course an impact on increasing the control over each of the procedures and activities that occurred in the company.

No comments:

Post a Comment

semarang jawa tengah indonesia service keyboard service computer komputer kendal bali setting hotspot hacking password mysql protected username jasa setting jual beli
bobol password phpmyadmin debian 5 lenny ubuntu server surabaya sumatera american inggris access point microtic MikroTik jawa barat yamaha roland casio korg technic floppy disk emulator usb www universal cara ganti broadcast editing wireless Wi-Fi handphone novel health facebook Sepeda Fixie Jual Beli Sepeda Fixie Rose Network Sepeda Fixie Murah Wimax Wimax Indonesia, Long time waktu lorong waktu facebook twitter

Followers