SEARCH

Found 1530 related files. Current in page 13

contoh profile band bentuk buku

1967 kb/s - Contoh Profile Band Bentuk Buku Full Download


2157 kb/s - [Verified] Contoh Profile Band Bentuk Buku


2864 kb/s - Contoh Profile Band Bentuk Buku Direct Download

Flexible Pipe - Technip
by Negroos 0 Comments favorite 11 Viewed Download 0 Times

Flexible pipe How Technip offers a broad range of flexible pipe systems with the most advanced integrated solutions for deepwater and ultra deepwater field developments Technip profile A world leader in engineering, project management and technologies, serving the energy industry for more than 50 years A workforce of 36,500 Confirmed leadership and proprietary technologies in 3 business activities: Subsea Offshore Onshore In subsea hydrocarbon field development, Technip’s activities include the design, manufacture and installation of rigid and flexible subsea pipelines and umbilicals. Thanks to its portfolio of technologies and industrial and operational assets, Technip offers a unique vertically integrated model in the industry. In the Offshore business segment Technip performs engineering, procurement, construction, installation, commissioning and the refurbishment/upgrading of offshore facilities for the oil & gas industry. Technip covers the full range of onshore facilities for the oil and gas chain, petrochemicals and other energy industries (nuclear, renewables including biofuels and offshore wind). It holds many proprietary cutting-edge technologies and is the leader in the design and construction of LNG and gas treatment plants as well as ethylene, hydrogen and syngas units. The Group has 3 flexible pipe manufacturing plants, 4 umbilical production units, 9 logistics and pipeline assembly bases, and 1 construction yard. Technip’s worldwide leadership is supported by a modern fleet of vessels for subsea construction, pipelay development (rigid and flexible pipes using S-Lay, J-Lay or Reeled technology) and heavy lift applications. 2 Technip provides these services for fixed platforms in shallow water with conventional sub-structures and self installing platforms such as the TPG 500 and for deepwater facilities including Spar, semi-submersible, TLP, FPSO and FLNG units. Technip is a world leader in floatover installation of topsides and its R&D effort is focused on technology transfer for local content and new frontier areas such as ultra-deepwater and the Arctic. Technip is also one of the key actors in refining and petrochemical units, and has developed a leadership in the fertilizer industry. Moreover, the Group is very active in non-energy activities such as mining and metals, life sciences, buildings and infrastructures.

Driveline Vibrations and How To Eliminate Them - Hurst-Driveline

At Classic Motorsports Group, we often receive calls from customers trying to solve driveline vibration problems they are experiencing with their vehicles. Vibrations can be very difficult to detect and eliminate, but if you follow a few basic detection procedures by process of elimination, you should be able to successfully isolate and solve the problem. Installing a Tremec overdrive transmission in your classic car is one of the best improvements you can make, but it sometimes changes the characteristics of how the engine’s power band reacts with the vehicle. This change is usually inconsequential in the first four gears but can be very noticeable in the overdrive gears. Your car has never traveled as fast at such a low rpm before, and this can sometimes bring out noises and/or vibrations caused by engine harmonics or an imbalance that you never experienced before the installation of your new Tremec transmission. The first step is to isolate where the vibration is coming from, how severe it is and whether it is a speed-related vibration or an RPMrelated vibration. RPM related vibrations: 1) With car stopped, the transmission in neutral, and your foot OFF of the clutch rev the engine gradually from idle to about 4000 rpm. This will tell you if the flywheel, pressure plate and disc are in balance. 2) With car stopped, the clutch fully depressed, and the transmission in gear rev the engine as in step 1. Doing this eliminates the clutch disc from rotating with the assembly. If you had a vibration in step 1 and not in step 2, the clutch disc is suspected to be the problem because it’s not turning in step 2. 3) If you have a vibration in step 1 and step 2, the problem could be the flywheel, pressure plate or disc. If the vibration is so severe it could shake the radio out of the dash, STOP THE ENGINE. You could have the wrong flywheel or one with incorrect counter balance weights. Contact us immediately and we will help you determine what the problem is. We try our absolute best to make sure that the correct parts are shipped with your kit, but sometimes shipping mistakes can happen. Also, early 350 Chevy and a 400 Chevy blocks with a two-piece rear main look exactly the same to most people. However, one is internally balanced and the other externally balanced. The flywheel flanges are the same and the wrong flywheel could easily be installed and cause a severe problem. If you don’t know what engine you have, ask someone you can trust before you order your kit. Most 1986+ engines with one-piece rear main seals are considered internally balanced; however, the flywheels have weights to take the place of the flange that was removed for the change to a one-piece seal. A neutrally balanced flywheel WILL cause ...

What Is NoSQL? Why NoSQL? - Usenix
by meevr 0 Comments favorite 22 Viewed Download 0 Times

hardware as it became available. When that didn’t work, they tried to scale existing relational solutions by simplifying their database schema, de-normalizing the schema, relaxing durability and referential integrity, introducing various query caching layers, separating read-only from write-dedicated replicas, and, finally, data partitioning in an attempt to address these new requirements. Although each of these techniques extended the functionality of existing relational technologies, none fundamentally addressed the core limitations, and they all introduced additional overhead and technical tradeoffs. In other words, these were good band-aids but not cures. A major influence on the eventual design of NoSQL databases came from a dramatic shift in IT operations. When the majority of relational database technology was designed, the predominant model for hardware deployments involved buying large servers attached to dedicated storage area networks (SANs). Databases were designed with this model in mind: They expected there to be a single machine with the responsibility of managing the consistent state of the database on that system’s connected storage. In other words, databases managed local data in files and provided as much concurrent access as possible given the machine’s hardware limitations. Replication of data to scale concurrent access across multiple systems was generally unnecessary, as most systems met design goals with a single server and reliability goals with a hot stand-by ready to take over query processing in the event of master failure. Beyond simple failover replication, there were only a few options, and they were all predicated on this same notion of completely consistent centralized data management. Technologies such as two-phase commit and products such as Oracle’s RAC were available, but they were hard to manage, very expensive, and scaled to only a handful of machines. Other solutions available included logical SQL statement-level replication, single-master multi-replica log-based replication, and other home-grown approaches, all of which have serious limitations and generally introduce a lot of administrative and technical overhead. In the end, it was the common architecture and design assumptions underlying most relational databases that failed to address the scalability, latency, and availability requirements of many of the largest sites during the massive growth of the Internet. Given that databases were centralized and generally running on an organization’s most expensive hardware containing its most precious information, it made sense to create an organizational structure that required at least a 1:1 ratio of database administrators to database systems to protect and nurture that investment. This, too, was not easy to scale, was costly, and could slow innovation. A growing number of companies were still hitting the scalability and performance wall even when using the best practices and the most advanced technologies of the time. Database architects had sacrificed many of the most central aspects of a relational database, such as joins and fully consistent data, while introducing many complex and fragile pieces into the operations puzzle. Schema devolved from many interrelated fully expressed tables to something much more like a simple key/value look-up. Deployments of expensive servers were not able to keep up with demand. At this point these companies had taken relational databases so far outside their intended use cases that it was no wonder that they were unable to meet performance requirements. It quickly became clear to them that they could do much better by building something in-house that was tailored to their particular workloads. These in-house custom solutions are the inspiration behind the many NoSQL products we now see on the market.

Tags: Nosql, Hacking,
Al Qaeda in Iraq - Center for Strategic and International Studies

Founded in October 2004, al Qaeda in Iraq (AQI) emerged from a transnational terrorist group created and led by Abu Musab al-Zarqawi. The original iteration of the group, Bayat al Imam, began in Jordan in the early 1990s. The group first associated with al Qaeda’s senior leadership in 1999 and fought alongside al Qaeda core and the Taliban during the U.S. strikes in Afghanistan in late 2001. Shortly after, the group transferred to Iraq in anticipation of the U.S.-led invasion. From 2003 through 2007, the group galvanized the Iraqi insurgency until its high-profile, divisively brutal tactics and failure to deliver meaningful gains to its nominal constituents led to a reversal in its popularity. The death of Zarqawi in 2006 has been followed with a series of successful counterterror strikes against his successors. Nonetheless, the group has proven resilient and though its activities are greatly diminished since its operational peak in 2007, it has proven still capable of carrying out high-profile attacks, particularly against soft targets. The Al Qaeda and Associated Movements (AQAM) Futures Project is a joint study undertaken by the CSIS Transnational Threats Project and the CSIS Homeland Security and Counterterrorism Program. The initiative will produce a series of alternative futures regarding the state of AQAM in the year 2025 and generate recommendations to defeat the threat over the long term. Drawing on historical analysis, social science research, expert interviews, and targeted fieldwork, this project will provide to policymakers and strategists a vision beyond the next few years and will consider the trends and shocks that may shape AQAM over the next decade and a half.   This case study is one of several examining the historic evolution and future prospects of al Qaeda and its range of affiliated groups. The purpose of the case studies is to determine the key drivers that have influenced a terrorist group’s trajectory over time. Ultimately, these drivers, in conjunction with additional supporting analysis, will be used to inform projections about the future of al Qaeda and its affiliates. 1800 k street nw, washington dc 20006 | p. 202.887.0200 | f. 202.775.3199 | www.csis.org/

Dyman & Associates Insurance Group of Companies: Flood Re home insurance

Your questions answered In the summer of 2013 the government and insurance industry came to an agreement about flood-prone homes, to allow owners of such homes to be able to buy affordable insurance. Under a scheme called Flood Re, annual premiums will be capped and payouts for flood damage will come from a central pool of money. How do I know if my home is affected? The scheme covers 350,000 households which the Environment Agency says are at high risk of flooding. You can use its interactive map to find out if your home is one of them. What does this mean for homeowners on flood plains? Unless your property is in council tax band H then the flood aspect of your buildings insurance will be capped from 2015. The Association of British Insurance says the cap will be £210 a year for properties in bands A and B, rising to £540 a year in band G. The premiums will go in a central fund and be used to pay out claims to any insurer.

Outline laporan antara - Direktorat Jenderal Penataan Ruang

Tujuan utama dari pekerjaan ini adalah melakukan penyusunan alternatif kebijakan dan penerapan langkah-langkah kegiatan yang tepat secara operasional pada wilayah yang berada pada daerah yang rawan dan sering terlanda bencana alam. Sasaran dari Penyusunan Operasionalisasi Program Penanganan Bencana Alam Bidang Penataan Ruang ini ialah memberikan arah yang jelas bentuk-bentuk penanganan yang baku untuk semua wilayah yang berada pada daerah yang rawan dan sering terlanda bencana alam, mulai dari identifikasi RTRW, indikasi evakuasi yang sesuai dengan Rencana Tata Ruang Wilayah (RTRW), serta pemulihan dan pembinaan lingkungan dalam rencana tata ruang yang akan datang. Kegiatan ini juga diharapkan sebagai bahan dan petunjuk dengan kondisi geografis, tingkat kerawanan dan tingkat bahaya yang ditimbulkan bila terjadi bencana alam, ditunjang dari aspek keruangan. Salah satu langkah awal yang perlu dikaji dalam melaksanakan pekerjaan “Penyusunan Program Penangan Bencana Alam Bidang Penataan Ruang” adalah : 1. Penetapan Kriteria atau batasan Peristiwa Bencana Alam 2. Gambaran Umum Mekanisma Peristiwa Bencana Alam yang terjadi Di Indonesia Kedua hal tersebut selanjutnya menjadi masukan dalam penyusunan Identifikas Zonasi Daerah Bencana Di Indonesia. Identifikasi Zonasi Daerah Bencana Di Indonesia tersebut selanjutnya menjadi salah satu masukan penting dalam menyusun Standar Operasional Prosedur dan Program Penanganan Bencana alam Bidang Penataan Ruang, yang dapat mewakili berbagai peristiwa bencana alam yang terjadi di Indonesia. Operasionalisasi Program Penanganan Bencana Alam Bidang Penataan Ruang Berdasarkan penyebabnya bencana dapat dibedakan menjadi tiga jenis, yaitu bencana alam, bencana akibat ulah manusia, dan bencana kombinasi (Lihat Gambar 2.1). a) Bencana Alam (natural disaster) Bencana Alam merupakan fenomena atau gejala alam yang disebabkan oleh keadaan geologi, biologis, seismis, hidrologis atau disebabkan oleh suatu proses dalam lingkungan alam mengancam kehidupan, struktur dan perekonomian masyarakat serta menimbulkan malapetaka. Bencana yang termasuk bencana alam antara lain: wabah penyakit, hama dan penyakit tanaman, gempa bumi, letusan gunung berapi, tanah longsor, gelombang laut pasang, banjir, erosi, angin taufan, badai tropis, kekeringan dan kebakaran hutan.

Laporan lengkap
by Hermawan 0 Comments favorite 73 Viewed Download 0 Times

Potensi bencana alam yang tinggi pada dasarnya tidak lebih dari sekedar refleksi fenomena alam yang secara geografis sangat khas untuk wilayah tanah air kita. Indonesia merupakan Negara kepulauan tempat dimana tiga lempeng besar dunia bertemu, yaitu: lempeng Indo-Australia, Eurasia dan Pasifik. Interaksi antar lempeng-lempeng tersebut lebih lanjut menempatkan Indonesia sebagai wilayah yang memiliki aktivitas kegunungapian dan kegempaan yang cukup tinggi. Lebih dari itu, proses dinamika lempeng yang cukup intensif juga telah membentuk relief permukaan bumi yang khas dan cukup bervariasi, dari wilayah pegunungan dengan lereng-lerengnya yang curam dan seakan menyiratkan potensi longsor yang tinggi hingga wilayah yang landai sepanjang pantai dengan potensi ancaman banjir, penurunan tanah dan tsunaminya (Sadisun, 2005-2006). Berbagai potensi bencana alam yang mungkin timbul sudah sebaiknya harus kita kenal agar karakter bahaya alam tersebut dapat kita minimalkan dampaknya. Selain itu, potensi bencana alam ini telah diperparah oleh beberapa permasalahan lain yang muncul di tanah air kita yang memicu peningkatan kerentanannya. Laju pertumbuhan penduduk yang sangat tinggi merupakan salah satu contoh nyata, sehingga akan banyak membutuhkan kawasan-kawasan hunian baru yang pada akhirnya kawasan hunian tersebut akan terus berkembang dan menyebar hingga mencapai wilayah-wilayah marginal yang tidak selayaknya dihuni. Tidak tertib dan tepatnya perencanaan tata guna lahan, sebagai inti dari permasalahan ini merupakan faktor utama yang menyebabkan adanya peningkatan kerentanan. Peningkatan kerentanan ini akan lebih diperparah bila masyarakat sama sekali tidak menyadari dan tanggap terhadap adanya potensi bencana alam di daerahnya. Pengalaman memperlihatkan bahwa kejadian-kejadian bencana alam selama ini telah banyak menimbulkan kerugian dan penderitaan yang cukup berat sebagai akibat dari perpaduan bahaya alam dan kompleksitas permasalahan lainnya. Untuk itu diperlukan upaya-upaya yang komprehensif untuk mengurangi resiko bencana alam, antara lain yaitu dengan melakukan kegiatan migitasi. Bencana (disaster) merupakan fenomena sosial akibat kolektif atas komponen bahaya (hazard) yang berupa fenomena alam/buatan di satu pihak, dengan kerentanan (vulnerability) komunitas di pihak lain. Bencana terjadi apabila komunitas mempunyai tingkat kapasitas/kemampuan yang lebih rendah dibanding dengan tingkat bahaya yang mungkin terjadi padanya. Misalnya, letusan G. Merapi dan bahaya lainnya gempa bumi, banjir, gerakan tanah, dan lainnya tidak akan sertamerta menjadi bencana apabila komunitas memiliki kapasitas mengelola bahaya. Bencana cenderung terjadi pada komunitas yang rentan, dan akan membuat komunitas semakin rentan. Kerentanan komunitas diawali oleh kondisi lingkungan fisik, sosial, dan ekonomi yang tidak aman (unsave conditions) yang melekat padanya. Kondisi tidak aman tersebut terjadi oleh tekanan dinamis internal maupun eksternal (dynamic pressures), misalnya di komunitas institusi lokal tidak berkembang dan ketrampilan tepat guna tidak dimiliki. Tekanan dinamis terjadi karena terdapat akar permasalahan (root causes) yang menyertainya. Akar permasalahan internal umumnya karena komunitas tidak mempunyai akses sumberdaya, struktur dan kekuasaan, sedang secara eksternal karena sistem politik dan ekonomi yang tidak tepat. Oleh karenanya penanganan bencana perlu dilakukan secara menyeluruh dengan meningkatkan kapasitas dan menangani akar permasalahan untuk mereduksi resiko secara total. Siklus penanggulangan bencana yang perlu dilakukan secara utuh. Upaya pencegahan (prevention) terhadap munculnya dampak adalah perlakuan utama. Tsunami tidak dapat dicegah. Pencegahan dapat dilakukan pada bahaya yang manusia terlibat langsung maupun tidak langsung. Pada tsunami misalnya. Pencegahan dapat dilakukan rakyat dengan membuat bendung penahan ombak, bangunan panggung tahan ombak, penataan ruang dan sebagainya. Agar tidak terjadi jebolnya tanggul, maka perlu disusun save procedure dan kontrol terhadap kepatuhan perlakuan. Walaupun pencegahan sudah dilakukan, sementara peluang adanya kejadian masih ada, maka perlu dilakukan upaya-upaya mitigasi...

QUICK GUIDE Data dan Informasi Bencana ... - WordPress.com

Bencana merupakan bagian dari kehidupan manusia yang datang tanpa diduga kapan, dimana dan bagaimana terjadinya. Hal ini menyebabkan ketidaksiapan masyarakata dalam menghadapi dan akhirnya menimbulkan korban dan kerusakan. Fenomena bencana sebagian besar merupakan kejadian berulang pada tempat yang sama, sehingga dapat dilakukan analisa untuk ke depan dengan menggunakan data historis bencana-bencana sebelumnya. Melalui Data dan Informasi Bencana Indonesi (DIBI) dapat dilihat historis kejadian bencana yang terjadi di Indonesia mulai tahun 18152012. Dalam DIBI dapat disajikan data bencana mulai tanggal kejadian, lokasi, korban dan kerusakan yang ditimbulkan. Analisa yang dapat disajikan melalui DIBI ini adalah grafik, statistik, peta tematik dan crosstab. . PERMINTAAN Berfungsi untuk membuat permintaan data kejadian bencana yang akan ditampilkan. Isikan rentang tanggal (YYYY MM DD), dari kapan sampai kapan. Rentang tanggal juga bisa diisikan hanya pada tahun saja. Apabila ingin melihat semua data maka rentang tanggal tidak usah diisi, langsung klik pada “OK”. . LIHAT DATA Berfungsi untuk melihat data kejadian bencana yang diminta. Fungsi ini sama dengan “LIHAT DATA” pada permintaan. Semua data bencana yang diminta akan ditampilakn secara rinci dan berdasarkan database yang tersimpan. GRAFIK Berfungsi untuk menampilkan grafik data kejadian bencana. Grafik dapat berupa grafik batang dan diagram pie (kue). Klik pada “BUAT GRAFIK” maka akan ditanpilkan grafik variabel bencana berdasarkan tahun kejadian. STATISTIK Berfungsi untuk menampilkan data statistikkejadian bencana seperti jumlah, rata-rata, maksimum, varian,dan deviasi standar. Mulai dari lokasi, dampak bencana, korban dan kerusakan. Klik “LANJUT” maka akan ditampilkan data kejadian bencana sesuai dengan permintaan. Data hasil tampilan dapat disimpan dalam bentuk EXCEL maupun CSV. Cara menyimpanya klik pada pojok kanan tulisan “BUAT EXCEL CSV”. Data secara otomatis akan tersimpan dan dapat digunakan sewaktu-waktu. LAPORAN Berfungsi untuk menyajikan laporan bencana sesuai dengan pernintaan. Data yang tersedia hampir sama dengan di menu statistic. Klik “LANJUT” untuk mendapatkan laporan yang diminta. Hasil dari laporan ini dapat disimpan dalam bentuk EXCEl, CSV dan XML. PETA TEMATIK Berfungsi untuk menampilkan peta tematik berdasarkan variable yang diinginkan. Klik pada “BUAT PETA” maka akan menampilkan sebaran kejadian bencana di Indonesia secara langsung. Peta ini dapat didownlaod dengan cara klik kanan pada peta dan simpan sebagai gambar. CROSSTAB Berfungsi untuk mengetahui hubungan antara 2 variabel. Pilih variable pada kolom tersedia kemudian klik “TAMBAH’. Selanjutnya klik “LANJUT” untuk mendapatkan hasil crosstab sesuai yang diinginkan. Tabel ini dapat dianalisa lebih lanjut dengan menggunakan analisa statistikkhusus untuk tabulasi silang (crosstab). Hasil ini dapat disimpan dalam EXCEl dengan menekan tombol “BUAT EXCEL” di pojok kanan atas.

Meet The New LG Chocolate Touch - LG Electronics

GENERAL • Version: 2.1 + EDR (Enhanced Data Rate) • Save up to 20 Bluetooth Pairings • Supported Profiles: headset, handsfree*, dial-up networking, stereo, phonebook access, basic printing, object push**, file transfer, basic imaging, human interface • Listen to Music with Optional Stereo Bluetooth Headset*** • Send all Contacts and Calendar Events via Bluetooth • Print and Send User Generated Pictures (JPEG) via Bluetooth • Customizable Font Size and Type for Dialing, Menus, Lists, and Messages • Charging Screens: Desk Clock, Calendar • Micro USB/Charging Port • USB Charging via Computer • Clear Images, Text, and Fun Animations through Flash User Interface Support • GPS Support for Enhanced Location Accuracy • Airplane/Standalone Mode (RF Off) • Changeable Back Plates: Black and Purple *For Bluetooth vehicle/accessory compatibility, go to www.verizonwireless.com/bluetoothchart. **Phone does not support all Bluetooth OBEX profiles. **Accessories sold separately. sparkling clarity. For music lovers, it’s the sweetest LG Chocolate yet. enhanced listening experience with One-Touch Speakerphone Speaker-Independent Voice Commands Text to Speech Voice-Activated Dialing up to 1,000 Entries Voice Recording Time: 1 min. or 1 hr.* (standby) for up to 1500 memos MP3 Music Ringer Support (clips from hit songs)† 28 Unique Ringtones + Vibrate and Silent Modes TTY/TDD Support Hearing Aid Compatible (M4/T4 - Rating) • Technology: CDMA • Frequency: 1.9 GHz CDMA PCS, 800 MHz CDMA (Digital Dual-Band) • Data Transmission: EVDO† Rev. 0 • Dimensions: 4.30"(H) x 2.20"(W) x 0.47"(D) • Weight: 4.23 oz. • Display: 262K Color TFT, 400 x 240 Pixels, 3.0" • Standard Battery: 1,000 mAh • Usage Time: up to 306 Minutes* • Standby Time: up to 470 Hours* *Depends on available memory. *Certain features may use more power and cause actual usage and standby times to vary. ACCESSORIES • Tools: Calculator, Calendar, Alarm Clock, Stopwatch, World Clock, Notepad, Ez Tip Calculator, Drawing Pad • VZ NavigatorSM Capable† • Phone Book with 1,000 Contacts—each stores 5 numbers, 2 email addresses, 1 physical address and a picture ID* • Back up contacts to a microSD card.** • FOTA Capable—upgrade firmware over the air • Favorites—add up to 11 contacts with picture ID* • Speed Dial (993 entries + 6 pre-programmed) • Call, Messaging, and Dial-up Modem Restrictions† Standard Battery*, Wall/USB Charger*, Purple Backplate*, Stereo Headset, Bluetooth Headset, Bluetooth Stereo Headset, Bluetooth Stereo Speakers, Portable Stereo Speakers, Swivel Holster, Extended Battery (1,500 mAh), Vehicle Power Charger, microSD Memory Card, Silicone Covers, Snap On Hard Covers, Display/Privacy Protectors *Included with phone. †Verizon Wireless service required. V CAST service is not available in all areas. Product features subject to change. Features based on carrier program availability. *Dependent on photos stored in your album (My Pictures). **microSD card sold seperately. LGE MobileComm U.S.A., Inc. 10101 Old Grove Rd., San Diego, CA 92131 Customer Service: (800) 793-8896 www.LGUSA.com

D-Link DGL-4500 Manual
by monarcy 0 Comments favorite 19 Viewed Download 0 Times

Preface.......................................................................... ii Manual Revisions..................................................... ii Trademarks............................................................... ii Product Overview......................................................... 1 Package Contents.................................................... 1 System Requirements.............................................. 2 Introduction............................................................... 3 Features................................................................... Hardware Overview.................................................. 5 Connections........................................................ 5 LEDs................................................................... 6 OLED Screen. .................................................... 7 Installation.................................................................... 8 Before you Begin...................................................... 8 Wireless Installation Considerations. ....................... 9 Network Diagram.................................................... 10 Manual Setup. .................................................. 11 Connect to Cable/DSL/Satellite Modem. ...... 11 Connect to Another Router........................... 12 Getting Started....................................................... 14 Quick Router Setup Wizard.............................. 14 Configuration.............................................................. 15 Web-based Configuration Utility............................. 15 Setup Wizard.................................................... 16 Manual Configuration. ...................................... 20 Dynamic (Cable)........................................... 20 PPPoE (DSL)................................................ 22 PPTP............................................................. 23 L2TP. ............................................................ 25 Static (assigned by ISP)................................ 27 Wireless Settings.............................................. 28 SSID (Wireless Network Name).................... 28 Wireless Band............................................... 28 Change Channel........................................... 29 Transmission Rate. ....................................... 29 Network Settings. ............................................. 30 DHCP Server Settings.................................. 31 DHCP Reservation........................................ 32 Virtual Server.................................................... 33 Application Rules.............................................. 35 Gaming............................................................. 36 GameFuel......................................................... 37 Classification................................................. 37 Change Uplink Speed................................... 37 Routing............................................................. 39 Access Control. ................................................ 40 Access Control Wizard.................................. 40 Website Filters.................................................. 43 MAC Address Filters......................................... 44 Firewall Settings............................................... 45 Enable SPI.................................................... 45 DMZ.............................................................. 45 Inbound Filters.................................................. 46 Advanced Wireless Settings............................. 47 Transmit Power. ............................................ 47 DTIM Interval................................................ 47 802.11d......................................................... 47 WMM............................................................. 47 Enable .......................................................... 47 WISH Settings.................................................. 48 Wi-Fi Protected Setup (WPS)........................... 50 Advanced Network Settings. ............................ 52

 91011121314151617