Course work: Designing a local enumeration measure. Pobudov’s local measures Principles of work and encourage the simplest local measures

Golovna / Contacts

The very name of the local counting measure already has a sign, a function of the exchange of the system. I'll sort out the name in the warehouse. local, adopted in the form of the English local - mystsevy, so the fence is tied to a specific geographical location and may be occupied on the territory, countable, Tied up with a warehouse of merezhі (calculated possession, PZ) and її recognitions, merezha– may be on the territory of the territory near the fence (behind the cables of the cables).

In this way, it is possible to formulate the appointment of a Locally Calculated Merezhі (LAN) - the whole system of mutual counting resources (computers, servers, routers, software, etc.) for receiving and transmitting, collecting and processing information of various kinds.

p align="justify"> Different locally counting lines can function okremo or be tied to each other for additional help in communications, for example, in business with a branch line in different places. Zavdyaki such a connection can be mutually modified with other stations, connected to the chain of locally-calculated borders. Establish local borders, nodes that are geographically dispersed over a distance of 12,500 km (space stations and orbital centres), but still stink all the same to the local ones.

The purpose of LOM is to secure single and one-hour access to a single group of files to data, a software program (computers, printers, graphobudivniki, attachments to save and process files and data bases) and transfer data (electronic graphics, text processing, e-mail, access to remote bases) data, digital motion transmission).

For example: the manager accepts an appointment and enters it into the computer, gives the appointment to go to the accounting office and there the account is formed, one hour you can get information to the legal service for the settlement of the contract.

SCRAP characteristics:

  • High-speed channels (1-400 Mbit/s), which are more important than one core;
  • Vіdstan mіzh working stations that are connected to local lines call warehouses from dekіlkoh hundreds to dekіlkoh thousand meters;
  • Transfer of data between stations of the coristuvachs of the EOM;
  • Decentralization of terminal ownership, such as microprocessors, displays, cash registers, etc.
  • Transfer of data to subscribers, connected to the wire, by a cable;

The main functions of LOM є:

  • Security of one-hour access to the possession, software security and information shared by the company;
  • Minimizing the risk of unauthorized access to information and resources;
  • Razmezhuvannya access to information and merezhevyh resources;
  • Security of security and confidential exchange and one-hour work with information to the singing call of osib;
  • Control over information flows, including inputs and outputs;
  • Separation of control functions and other errors on the skin node (for the skin vuzol, a system administrator is responsible, which serves as a service, as a rule, control functions);
  • Optimization of the number of pages on the software and the possession of the account of their collective selection (for example, one printer per kilka vіddіlіv іn.)

As a result of the accumulation of SCRAP, personal computers are combined, roztashovani on luggage in the distant working areas. The working areas of spivrobitniks cease to be isolated and unite into a single system, as they may have their own special advantages:

  • Possibility remote access to the possession, PZ and information;
  • Optimization of resources of the robotic processor;
  • The smallest number and intensity of pardons at the parishes with a fence on the basis of telephone channels;
  • Building capacity of the building, lower at the global level;
  • Possibility of reconfiguration and development of a way to connect new terminals

Stagnation area local borders are much wider, none of these systems are practical for a skin office (for example, one printer is installed on a computer, a computer is installed on one software, for example, 1C: Accounting and others.). During the day, the flow of information becomes greater, the software security becomes more folded and functional, the geography of activities of organizations expands. The zastosuvannya zasobіv LOM is not just a bazhanim, but necessary for successful activity and development of business, science, training of students, schoolchildren, training and retraining of fahіvtsіv, vykonanny state programs and functions and іn.

The structure of the functioning of the measure.

The structure of the local area is determined by the principle of management and the type of connection, most often it is based on the structure of the organization that is being served. You can see topologies: busbar, kiltseva, radial, tree-like. The largest expansion of the first two types, for the effective choice of channel channels, ease of management, flexible possibilities of expansion and change.


Bus topology
- all computers are connected in a lanyard, connected to the main cable segment (trunk), "terminators" are placed on the other ends, to extinguish the signal, which rozpovsyudzhuetsya in the sides. The computers in the yard are connected by a coaxial cable with a tripod cable. The capacity of the building is 10 Mb/s, for modern programs that actively record video and multimedia data, which is not enough. Perevaga ts_єї topology polygaє in low varst wiring and unification of the connection.

Bus topology is passive. The loss of one computer does not contribute to the success of the measure. Poshkodzhennya main cable (tire) led to the signal and the whole merezha became unproductive. Vimknennya that is especially connected to such a measure of the expansion of the bus, which causes disruption of the circulating flow of information and the system freezes.

Topology "tree"- The most delimited configuration for the "bus" type. To the main trunk bus, through active repeaters or passive multipliers, a sprinkling of simple tires is connected.


Topology "zirka"
(star) – the most common topology, information between peripheral workstations to pass through the central node of the enumeration line. The central control room - the file server can implement an optimal mechanism to protect against unauthorized access to information. The whole counting line can be turned around from the її center.

It is simpler to sew cables, because the skin working station is no longer connected to the central node. Width cable laying should be high, especially if the central vuzol is geographically spread over the center of the topology. With expanded counting lines, it is impossible to know the cable connection earlier than the cable connection: before a new working place, it is necessary to lay a large cable from the center of the line.

At different sequences of configuration, LOM of skin attachments connected to the physical medium transmits information to only one attachment. With this, the vimogi are reduced to transmitting and receiving, and all stations take an active part in the transmission.

Topology "kiltse"(ring) – computers are connected by cable segments, have a shape of a ring, basically identical to the bus one, except for the need to choose “terminators”. In times of failure of one of the segments of the merezh, the whole merezha goes out of tune.

Signals are transmitted only in one straight line. Skin station without intermediary z'єdnana іz dvoma suіdnіmi, аlе eavesdropping transmission, be it a station. Kіltse to become sprat priymachіv i spoluchaє їх іх іхне sredovische. All stations can have the right to equal access to the physical environment. In this case, one of the stations can win the role of the active monitor, which serves as an exchange of information. Laying cables in one working station to another can be foldable and expensive, especially as geographically working stations are spread far away from the country (for example, near the line).

The main problem with the ring topology is that the skin working station is guilty of taking an active part in the transmission of information, and at the same time, if one of them wants to paralyze the entire network. Faults in cable connections are easily localized. The connection of a new working station will be necessary to keep the wires running, the shards for the hour of the installation of the ring may be rozimknene. There are no shards for the length of the counting line, shards of it, zreshtoy, are counted exclusively between the two working stations.

Computers can connect with each other, with different access mediums: copper conductors (twisted pair), optical conductors (optical cables) and through a radio channel (droneless technology). Dart, optical links are installed via Ethernet, wireless - via Wi-Fi, Bluetooth, GPRS and others. Most local networks are based on Ethernet and Wi-Fi technologies. It should be noted that the Frame Relay, Token ring protocols were won earlier, as on this day everything is more appropriate, they can be found only in specialized laboratories, primary foundations and services.

Components of everyday life of a simple local dimension wink:

  • Adapter (network adapter) - an attachment that connects a computer (terminal) from a segment of a network;
  • Mіst (bridge) - attachment, which connects local lines in the distance segments of the border;
  • Router (router) - attachment for interfacing broadband traffic for additional division of networks into segments, securing the protection of information, managing and organizing backup routes between broadband areas;
  • The commutator is an extension of a narrower recognition, effectively segmenting the network, changing the area of ​​\u200b\u200bthe network and increasing the throughput of the building of the skin terminal station.
  • Blocks of uninterrupted life - an extension for ensuring the regularity of the system at the time of disconnection of the main life line.

Installation

Choose the type of topology, the middle of access and storage of the Local-calculated system to deposit, if necessary, Zamovnik. Modern technologies allow to expand an individual option, which is suitable for all efforts and tasks.

Laying cables SCRAP, as those other types of cable ties can be installed in different ways. When choosing the method of installation, there are individual architectural and design features of life, its technical characteristics, the presence of a measure, what to do, that other possession, the order of interaction of low-voltage systems with other systems. It is important to name two ways - vіdkritiy i prihovaniya. For the attached installation of cables, the LOM vicarious structure of the walls, the underlay, the insole looks more aesthetically pleasing, the protection from external inlets, the access to them, the laying is carried out in a special preparation, and it is safe to save the mind for further service. It's a pity, the vikonati roboti's ability in a hospitable way buvaє seldom, more often it happens to carry out work in a critical way for additional plastic boxes, vertical columns and trays. Don’t forget that there is another way to lay the cables again, most of the time it will be installed for communication in the future, if there is no possibility to lay the cable at the canal, otherwise it’s too expensive.

Installation of a LAN , depending on the quality of the deposit, the stability and correctness of the functioning of the system as a whole, the steps of the payment of deposits on it, the speed of transmission and the processing of data, the number of pardons and the number of pardons. It is necessary to do something even more fundamentally and seriously, so be it the foundation (skeleton and blood-bearing system) of the whole organism from low-current systems, which is considered for the great number of functions (from electronic mail to the safety of the object). Skin stepping on the robot of a working system (expansion, repair, etc.), in order to spend time and money, like a lot of time to lie down in the middle of the deposits in the system of parameters, the quality of the robots, the qualifications of the retailers and viconators. Cost savings at the stage of design and installation of scrap, can turn into much more cost at the stage of operation and upgrade



Entry

The method of this course project is to encourage local counting measures. LAN - a computer network that sounds around a small area or a small group of buddies (houses, offices, firms, institutes). Also, local networks are established, nodes of which are geographically separated over 12,500 km (space stations and orbital centers). Irrespective of such places, such borders, all one can be brought to the local ones.

Computers can connect with each other, with different access mediums: copper conductors (twisted pair), optical conductors (fiber optic cables) and through a radio channel (droneless technology). Dart calls are installed via Ethernet, wireless - via Wi-Fi, Bluetooth, GPRS and others. A local numbering network can also be a gateway to other local networks, and also be a part of a global numbering network (for example, the Internet) or a connection to it.

Most local networks are based on Ethernet and Wi-Fi technologies. For simple local networks, routers, switches, wireless access points, wireless routers, modems and network adapters are used. Rіdshe vykoristovuyutsya retvoryuvachі (converters) mids, pіdsilyuvachi signal (repetitions of a different kind) and special antennas.

This robot will have a LOM designed for Ethernet technology, with which horizontal and vertical cables will be the fifth category of UTP, with the ability to transmit 100 Mbit / s.

1. Technical assistance to scrap

1.1 Merezheva model TOV "Maister"

koristuvach computer merezha local

At the first stage, the development of a network of organizations is small in terms of high standards for the association of computers among themselves. These standards described the mechanisms needed to move data from one computer to another. Prote tsі early standards were summed up among themselves.

In the coming years, the International Organization for Standards (ISO - International Standards Organization) and the Institute of Electrical and Electronic Engineers (IEEE - Institute of Electrical and Electronic Engineers) developed their models, as they became the most famous industrial standards for development computer mesh. Both models describe the merezhev technologies in terms of functional equalities.

ISO developed the model, which they called the Open System Interconnection (OSI) model. This model is victorious to describe the flow of data between the program and the coristuvacha and physical data with the measure.

The OSI model adds communication functions to 7 levels:

· Riven dodatkiv.

· Rіven yavlen.

· Session riven.

· Transport cost.

· Merezhevy rіven.

· Channel rіven.

· Physical riven.

The concept of the model - leather rіven nada service of the attacking, higher rіvnya. Tse allows the skin level to intermingle with the same level on another computer. The concept of the seven-layer model is depicted as a small 1.

Malyunok 1 - Semirivneva ISO OSI model

Functional recognition of equals:

The physical line of direct non-structuring flow of data through the physical medium of transmission (cable).

1. Physical rіven vykonuє role bearing all the signals that transmit data generated by the greater rіvenny. Tsey rіven vіdpovіdaє for hardware security. The physical ratio determines the physical, mechanical and electrical characteristics of the line connection (type of cable, number of roses of the connector, recognition of the skin rose on the skin). The physical ratio determines the topology of the network and determines the method of transmitting data over the cable (electrical, optical).

2. Channel level of packaging unstructured bits of data from the physical level of structured packages (data frames).

3. Channel rіven vіdpovіdaє for zabezpechennya bezpolkovoї transfer of packages. Packets can be deleted from the address that the address is recognized, which allows the computer to read data that is only recognized by you.

4. Merezhevy rіven vіdpovіdає for addressing pоvіdomlе thа transformation of logical аnd address іn іn the physical address of the channel іvnya. Merezheviy rіven defines the way (route) of the passage of data transmitted to the computer, which is received. Merezhevy rіven restructures the data packages (frames) of the channel rіvnya (dividing the big ones into a bunch of small or smaller ones).

5. Transportation rіven zdіysnyuє control of the rate of transmission and vіdpovіdaє for the recognition and correction of pardons. Transport cost

6. Guarantee the delivery of an upgrade, made less on equal supplements.

7. Session riven allows two supplements to other computers install, wink and finish the meeting, as it is called a session. The session session coordinates the communication between two application programs that work on different workstations. The session timer ensures the synchronization of the task and the implementation of the control of the dialogue between the mutual processes (it depends on which side is transmitting, if it has been for a long time).

8. Representation to serve for the transformation of data, the removal of equal programs into an intermediate format, which is widely known. Riven vistawi can be called a cross-border translator. The presentation ratio allows you to combine different types of computers (IBM PC, Macintosh, DEC, etc.) into a single thread, converting them to a single format. The riven of the representation is to control the protection of the merezhі, to encrypt the data (for consumption). Be sure to squeeze data by changing the number of bits of data that require transfers.

9. Program name (application name) allows application programs to gain access to a network service. Riven software without intermediary support of the programs of the coristuvacha (software for transferring files, access to data bases, e-mail). Model standard vzaimodії Vіdkritih Sistem vvazhetsya most of the other models and most often vikoristovuєtsya for the description of media.

Local counting merezha є main part corporate, which ensures the functioning and interoperability of various distributions of addenda, which can enter the warehouse information system(ІВ). Today, LOM is responsible for the following main characteristics:

· Productivity, adequate to the powers that are presented by modern ІС;

· scalability;

· vіdmovostіykіst;

· Support of all main communication standards and protocols;

· Sum_snіst z possessing sum_zhnyh subsystems;

· Ability to change the logical configuration of the LOM without changing the physical;

· Curing.

When developing the architecture of LOM, modern methods, technologies and attachments are used, which allow, in the best way, to achieve a balance between the main powers to the LOM and the possibilities of the measure. In addition to the current business, the need to support business supplements is determined by low parameters, among the most important ones:

· High availability of the measure on the river is not lower than 99.99%;

· High-speed switching of packages;

· Yakіst obslugovuvannya koristuvachіv and dodatkіv;

· Rule-based management;

· Integration with catalog services.

In Jostly Osnovy, the prisoners are guilty of the vicoristovyuvati strategies, they are allowed to be stagnated I PIDRIMOVATI Merezhevi.

2. The main help to the measure

One of the most important vimog, which is presented to the current LOM, is the security of the security and protection of the processes that are entered in the LOM, so as to open the door to the access of the zzovnі merezh є indifferently. The implementation of the management system in the LSM, statistics and identification allows for control and protection of the LSM.

In order to manage the measure and the ability to cope with the situation in the LOM robot at the outbuildings, all the services are to be present systemic for monitoring the policy of the quality of service and safety, planning the measure and the service, to give opportunity:

· Collection of statistics for the analysis of the productivity of the enterprise on all levels;

· Redirecting traffic from other ports, groups of ports and virtual ports to the protocol analyzer for detailed analysis;

· Monitoring of real-time data to expand the capabilities of diagnosing the crime of foreign analyzers.

· selection and saving of information about the source of subdivisions, including changes in the configuration of outbuildings, changes in topology, software and hardware pardons

LAN can be used system solution, which allows you to solve the problem in a complex way, which allows you to implement the identification of merging resources and koristuvachiv, protection of information and resources in the form of unauthorized access, dynamic active control over the merging.

LAN can secure all business partners:

· Possibility of processing texts;

· Access to the Internet;

· Possibility of using electronic mail;

· work with data bases;

· Access to overhead printers;

· Ability to transfer data.

The TCP/IP protocol stack is shown in Figure 2.

Figure 2 - TCP/IP protocol stack

The TCP / IP protocol stack is divided into 4 levels: application (application), transport (transport), intermediate (internet) and access to the transmission medium (network access). The terms that can be entered for the identification of the data block that are transmitted are different for different protocols of the transport layer - TCP and UDP, to that in fig. 2 shows two stacks.

Spivvіdnosnja vіvnіv stekі OSI і TCP/IP is shown little 3

Figure 3 - OSI and TCP/IP stack extensions

3. Selecting the necessary material and possession

To design a local counting network of an organization for Ethernet technology, spread out at two booths (Fig.).

Local counting measure of organization

The project is responsible for the satisfaction of the following:

1. The mother is responsible for access to the resources of the decision of the child;

2. Traffic, created by spіvrobіtnikami one vіddіl, is not guilty of joining on local lines of other vіddіlіv, krіm vipadkіv voznennya to the resources of local іnshі vіddіlіv;

3. One file - the service can upload no more than 30 files;

4. File servers that are uncompromisingly victorious with dekilcom vіddіls;

5. Must repeaters, bridges and communicators are guilty of rotting in switching cabinets (WS);

6. Walking between computers on monochannel is not guilty of less than one meter;

7. Switching possession of that file - the server is responsible for the mother's fault in the event of a voltage error;

8. Designed merezha can be pratsyuvati st_yko. In times of inconsistency, robots and measures, the project may be reworked;

9. The following combinations of cables are allowed: twisted pair and optical fiber;

10. The project is to blame for the mother of minimal varst;

11. The speed of transmission is not to be blamed but below 10 Mb/s;

12. Type of wicker tacking technology - Ethernet;

13. The project can win more than the possession from the table. one.

Table 1

name

Umovna vartist (y.e.)

Thin coaxial cable (per one meter)

Unscreened twisted pair (per meter)

Two-core fiber optic cable (per meter)

Margin adapter with BNC socket

Merezhevy adapter with RJ-45 socket

Dual port repeater (HUB) with BNC sockets

Switch for 8 ports with BNC sockets

Switch with 6 optical ports

A two-port location with any combination of ports for coaxial cables, unshielded twisted pairs and fiber optic cables

Switch with 6 optical ports and 24 ports with RJ-45 socket

Switch for 8 ports RJ-45

Switch for 36 RJ-45 ports

Dzherelo uninterrupted life for 800 VA

File server based processor Pentium with a front-mounted operating system (maximum 30 boxes)

The firm has є 4 vіddіli. In that number, three of them stand at building 1, and the fourth, at building two, 300 meters away from the first. The skin care unit has a personal computer (PC) installed at the number of:

At vіddіlі marketing - 7 pcs.

At vіddіlі ACS - 10 pcs.

At the virobnichy vіddіlі - 42 pcs.

At the design office - 30 pcs.

Z'ednannya PC, the middle of the line, will be responsible for the additional coaxial cable. The first task is to place the PC in the skin care, tobto. The PC is due to roztashovuvatisya not in a vipadical order and not in a bunch, but on an acceptable one kind of one country. Small 8 shows the layout of the PC with the designations between them.

To optimize the work, the entire local network (LAN) is divided into segments. The skin segment is affected by its own segment. All segments will be connected to the head switch. Choose from the table 1 switch on 8 optical ports with a BNC socket, which will be the head. 800 VA uninterrupted life protection switch for protection against voltage drop. This switch automatically assigns the speed of the work of the skin segment and supports it. It is not allowed to take the necessary data transmission speed not lower than 10 Mb/s. Head switching switch for switching cabinet WS3

Vіddіl marketing.

At vіddіlі є 7 PCs and switching cabinet WC1. For a stable work, we divide the product into 2 segments of 3 and 4 PCs. Stand between the remaining PCs in the first segment and the head switch, for the segment, which allows you to switch to one single unit, because the length of the segment does not exceed 185 meters.

The switching cabinet WC1 has a file server installed (a file server based on a Pentium processor with a front-mounted operating system), a switch for 8 ports with BNC sockets. All PCs and file server are equipped with wired adapters with BNC sockets and are connected by a thin coaxial cable for additional BNC T-connectors.

Computer call and file server

At the left roses of the remaining T-connector, a plug is inserted - a terminator (little ones). In order for a thin coaxial cable not to be in a stretched frame, between computers it is necessary to place a reserve equal to one meter on the skin space.

terminator

Viddil ASU.

The driver has 10 computers and a WC2 switching cabinet. The WC2 cabinet has a commutator installed, which is connected to the file server without interruption. A file server based on the Pentium processor with a front-installed operating system is known without intermediary. All PCs and file servers are equipped with cross-connect adapters with BNC sockets. Personal computers and file server connected by a thin coaxial cable for additional BNC T-connectors. A plug - a terminator - is inserted at the larger roses of the remaining T-connector. The LS2 segment for more stable robots was divided into 2 segments of 5 PCs. Switcher for connections to the head switcher at the WC3 cabinet for the general manager. In order for a thin coaxial cable not to be in a stretched frame, between computers it is necessary to place a reserve equal to one meter on the skin space. The length of the LS2-a segment from the remaining PC to the head switch and with the cable reserve between the PC installed for the LS2-b segment, which does not exceed the allowable 185 meters.

Virobnichiy viddil.

We have 42 computers and a switching cabinet WC3. At the link with the great number of computers, do notably divide them. In this order, we take 7 segments of LS3-a, LS3-b, LS3-c, etc., in the skin z yak 6 PCs. The segments are interconnected by 8 port switches with BNC sockets (3 pcs.). The switching of the commutator allows you to bypass the “5-4-3” rule without spending money on the security, in addition, the switching of the switch gives greater protection against victorious collisions, lower than the upper rule. Whomever will have two file servers.

The switching cabinet to the WC3 has a roztashovuvatimetya uninterrupted life, as it is connected to the file server; the commutators of the given data, which receive okre segments; the head commutator of the system.

All PCs and file servers are equipped with wired adapters with BNC sockets and connected with a thin coaxial cable for additional BNC T-connectors. In order for a thin coaxial cable not to be in a stretched frame, between computers it is necessary to place a reserve equal to one meter on the skin space. A plug - a terminator - is inserted at the larger roses of the remaining T-connector.

Segmented dozhina of the LS3 segment from the rest of the PC to the switch. Segmented dozhina LS3-b from the rest of the computer to the switch. Segmented dozhina of the LS3 segment from the rest of the PC to the switch. Segmented dozhina of the LS3 segment from the rest of the PC to the switch. Segment LS3-d from the rest of the computer to the commutator. Segmented dozhina of the LS3 segment from the rest of the PC to the switch. Segmented dozhina of the LS3 segment from the rest of the PC to the switch. The length of one of the segments does not exceed the allowable 185 m.

Design project

At vіddіlі є 30 PCs and switching cabinet WC4. The S4 segment for more stable robots was divided into 5 segments. At the switching cabinet, we install an uninterrupted life that protects the file server in case of a voltage drop, a switch for 8 ports with BNC roses connected segments. All PCs and file servers are equipped with wired adapters with BNC sockets and connected with a thin coaxial cable for additional BNC T-connectors. A plug - a terminator - is inserted at the larger roses of the remaining T-connector. In order for a thin coaxial cable not to be in a stretched frame, between computers it is necessary to place a reserve equal to one meter on the skin space. Dovzhina segment LS4-and from the rest of the PC to the switching cabinet WC4 to become. Dovzhina segment LS4-b from the rest of the PC to the switching cabinet WC4 to become. Dovzhina of the LS4 segment from the remaining PC to the switching cabinet WC4 to become. Dovzhina segment LS4-g from the remaining PC to the switching cabinet WC4 to become. Dovzhina segment LS4-d from the rest of the PC to the switching cabinet WC4 to become. The length of one of the segments does not exceed the allowable 185 m.

Z'ednannya vіddіlіv among themselves

Building 2 is 300 meters away from building 1. The buildings are interconnected by a pipeline. In order to connect the WC4 segment with the head switch, a double fiber optic cable is laid in the pipeline (Table 1). Dovzhina cable to become 320 meters. From the skin side, a reserve of 10 meters is left, two of them are needed for cable processing, the gratings are placed in the closets in the closets at the link with technological signals. In order to switch from one data medium to another, select from table 1 two-port site with a combination of ports "coax cable - fiber optic cable", which is installed in the WC4 cabinet, and "fiber optic cable - coaxial cable", which is installed in the WC3 cabinet. Having offended the bridges of protection against the fall of the voltage, the life of uninterrupted life. The “fiber optic cable - coaxial cable” space at the WC3 cabinet is connected to its own line behind the help of a thin coaxial cable directly to the head switch.

In this manner, they took away the measure, which will allow two days, which may have a minimum variability, but if so, during the day, wide-range traffic and data transmission speed can reach no less than 10 Mb/s. Figures 8 and 9 show a diagram of the layout of personal computers that enter the warehouse of a local counting system, and a circuit for connecting personal computers with a scheme of cable laying and dozhina cable segments.

WS1: File - widdilu server

Switcher for marketing for 8 ports with BNC sockets.

WS2: File - widdilu server

Dzherelo uninterrupted life;

ACS switch for 8 ports with BNC roses.

WS3: 2 uninterrupted life jets;

2nd file - server to vіddіlu;

2 switches for 8 ports with BNC sockets;

Head switch for 8 ports with BNC sockets;

Double-mouthed place "coaxial cable - optical fiber".

WS4: File - widdilu server

Dzherelo uninterrupted life;

Design switch for 8 ports with BNC roses;

Mist "coaxial cable - fiber optic cable"

On the little 12 shows the layout of the distribution of the equipment in the cable closets and the switching line of this equipment.

In order for the merezha to work steadily, so that there was no need to create information or disappear, it is necessary to beat the next mind:

1. The length of the segment can be exceeded by the allowable value:

thin coax - 185 m;

optics - 2000 m (maєmo maximum 320 m).

2. Zagalna dovzhina merezhі may move 2.5 km.

3. The number of computers in the merezhі is not guilty of revisiting 90 pcs. (Maybe 89 computers + 5 file servers).

4. One file server can support no more than 30 files (may be a maximum of 30 files).

5. File-servers can't chirp in the same way.

6. All repeaters, bridges and commutators are guilty of roztashovuvatisya in switching cabinets.

7. The rule of "5-4-3" (winning) is due.

There is no necessary transfer of necessary parameters. Also, there is no need to change the stability of the PDV (the hour of the sub-interval - it is not guilty to re-watch 575 bit intervals) and PVV (the change of the inter-frame interval is not to blame to re-watch 49 bit intervals). Dotrimannya tsikh could ensure the safety of the work of merezhі navіt in depressions, if the vishchevikladnі umіvі are broken. Given reverb bude vikonan for a new vpevnennosti at praceszdatnosti merezhi.

For the purpose of rozrahunkіv vikoristovuyutsya dovіdkovі danі organization of IEEE, schо to vindicate gimmicks of signal extension in repeaters, priymachіv and different physical media.

Table 4 Data for PDV

For a rozrahunka for stability, they paint a caravan with the most distant stations.

The left segment is a segment, the signals are based on the passage of the signal.

The right segment is the segment where the signal comes from.

Intermediate segment - a segment between left and right segments.

Rozrahunok is guilty of conducting two, with an extended signal in the offending side, because. the result can be different for different asymmetrical measures. For example, if you want to do it in one way, you don’t win over PDV, framing your shots through the passage of collisions.

Razrahunok will be held for two of the most distant ones, one for one computer for marketing and one for project work. Schematic image baby is shown 13.

Zrobimo rozrahunok stamina merezhi z vikoristannyam PDV and PVV

4. Economic development of the project

Practically, the choice of LOM models in different ways conveys the presence of information about the real characteristics of the enumeration process. Such information can be taken away by empirical methods, on the basis of which infections are created for further hardware and software components of LOM. Necessary information is collected for additional special assistance,

yakі zabezpečuyut vimiryuvannya parameters that characterize the dynamics of the functioning of the LOM in the modes of final and normal operation. Before such zabіv vіdnosyasya merezhі analіzatorі, analіzatori protokolіv і tp. counting technique. Experimental methods make it possible to create the basis for a calculus assessment of the effectiveness of AP to achieve future practical goals: the analysis of the existing LOM, the choice of the best for the synthesis of a new LOM. Estimation of the characteristics of the hardware program contributions due to the conducted experiments, that experiment, which, from a practical point of view, can be seen as a process brown information. The data of vimiryuvan are served at the sight, added for further analysis. Tse zdіysnyuєtsya for the help of special zabіv obrobki, the creation of such pov'yazane іz rozrobkoy analіzatorіv. Tsey vzaimozv'yazok sussuetsya, for example, the choice of single data formats, handy as for simiriv, but also processing of their results. In the global stage, the stage of reconciliation goes before the stage of processing, and make the repayments due, but the insurance is effectively deposited to great arrays of information, shards for reconciliation to the scrap are characteristic, as a rule, of great obliga- tions that the temple is rich in data that is registered. At the final stage of the experimental studies, an analysis of the results of the experiment, which is similar to the analysis of the results of the experiment, is carried out. With an important mental shaping of such visnovkіv є in the distance the results of vimіrіv are presented. The efficiency of experimental methods in a significant world is determined by the quality of the planning of experiments and the correctness of the choice of the type of venture. An experiment is made up of a set of tests that are included in the process, and a test, in its own way, is made up of low sessions or runs. The term “session” is most commonly used for simulation, and “run”, as a rule, for simulation modeling. By running a session or by running, information about the behavior of the system is accumulated, and, perhaps, roboche. Shards are more likely to change, the number of warnings, as it is necessary to take for dermal cicatrices for the corysteve size, may be such that they could be calculated for these values ​​and their moments could be estimated with the necessary accuracy. Otzhe, the triviality of the session lie in the necessary number of guards.

The experiment is trivial in one session, sufficient for evaluation, as it is necessary, to look at just one configuration of the system and one type of work experience. For example, yakscho vymiryuvannya vyroblyayutsya in order to z'yasuvat, chi safer given to the Crowbar at a given work navantazhenn (traffic) enough productivity, tobto. vydpovidaє out of the singing vimog. Experimenting with the trivality of a few sessions is necessary, as it is necessary to signify the impact of the same officials on the productivity of the system.

5. Improving the lacing of the lace and kіntsevy coristuvachіv

The installation of the equipment is the largest folding stage in the installation of a fence. The more folding of the merezha, the more of the technically foldable technically foldable possession in it, the greater knowledge of that additional knowledge is required for the installation of this possession. The rest of the mood and the taxation of the property of the deputy borrower sometimes take more than an hour, lower installation. p align="justify"> Due to the optimization of a large number of parameters in the skin treadmill, the productivity of the future treadmill is to be deposited. Otzhe vіd tsego to lay the productivity of the work and the staff of the company.

The new possession can be turned on, behind the bazhanny of the deputy, the next stages of work:

1. Setting up switches, routers and interfacing screens (Firewall). Configuring ringtones includes subdivision on virtual local networks, debugging and configuring routing rules, security of service quality, security security, security of critical data encryption, organization of remote secure access to corporate data. Before the list of features that can be configured, include active attachments of the tethered medium, such as multiplexers, switches, routers, inter-merge screens, service servers (DNS, DHCP, HTTP, MAIL), as well as often backbone media and optical multiplexers.

2. In this hour with the development of wireless technologies, a corporate data transfer service cannot do without a WI-FI network. To that, in the setup, they also use wireless access points. The organization of manual, scaled, ceramic-coated from a single point of measure will require knowledge of modern technologies. Correctly set up a security measure for high reliability, centralized management, as well as additional services, such as authorization, handover and others.

3. okrіm nezhnogo obladnannya vmagayut nalashtuvannya that іnderzhavі printers, richly functional other additions, copiers. In this hour of stench, autonomous framing outbuildings and analogs with computer technology will require professional adjustment. The introduction of settings is more likely to be entrusted to specialists, because. non-professional reasons with high-tech technology can lead you out of tune. In the Crimea, unauthorized installations are not covered by scammers, and independently carried out the installation of the installation without the authorization of an authorized service center - the risk of wasting the guarantee on the road of possession.

4. Transmission technologies are being fine-tuned, and the list of settings, often made by corporate overseers, is called to enter videoconferencing systems. Correctly adjusting the system allows you to optimize the quality of the image, save on blurry bandwidth, improve the performance of the entire functionality of the system kіntsevogo koristuvach. The videoconferencing system includes as a videoconferencing server, and the end terminals include IP videotelephony, videoterminals, and collective videoconferencing systems. Correctly adjusting the entire class of outbuildings, at once from the central system, to ensure the implementation good service that service for the koristuvach.

A modern wide-range wireless router with a rich functional add-on, in a combination of:

a router

· Fast Ethernet switch (10/100 Mbit/s);

· Point of bezdrotovy access;

firewall

· NAT attachments.

The main task, which is supposed to be on wireless routers - is the union of all computers home measure at a single local network with the possibility of exchanging data between them and the organization of a high-speed, secure connection to the Internet of all home computers.

Wireless Wi-Fi router for connection

In Denmark, the most popular way is to connect to the Internet via a telephone line with an ADSL modem and a visible Ethernet line. For the most part, all wireless routers can be mentally divided into two types:

· For connection via Ethernet-line;

· For connection by telephone line.

For the rest of the day, the router is still running an ADSL modem.

Based on the statistics, providers are becoming more and more popular with the way to connect the seen Ethernet-line. With any indication for which, routers can be used to connect to the Internet via a telephone line, or for which an ADSL modem may be required.

We have given away only routers that are recognized for connecting to the Internet behind a visible Ethernet line.

Also, routers are fixed extensions, as they are installed between the internal local home network and the Internet, henceforth, they play the role of a border gateway. From a constructive point of view, routers are connected to the mother as at least two ports, to one of which a local network is connected (which port is called the internal LAN port), and to the other - the external network, which is the Internet (which port is called the external WAN port). Home routers have one WAN port and two internal LAN ports, which are combined into a switch (Fig. 2). І WAN, і LAN ports can have a 10/100Base-TX interface, і you can connect an Ethernet cable to them.

LAN and WAN - router ports

Integrated into the router, a wireless access point allows you to organize a wireless segment of the network, which for the router lies before the internal network. Whose sensory computer is connected to the router in a dartless way, do not worry about anything that is connected to the LAN port.

The task of the firewall integrated into the router is set up to secure the internal security. For which firewall is to blame, to mask the measure that is being protected, to block vіdomi types hacker attacks that flow of information from internal measures, controlled by programs, as they restrict access to external measures.

In order to implement the assigned functions, the firewall analyzes all traffic between the outer and inner tiers for its compliance with these or other established criteria or rules, which determine the traffic flow from one meter to the other. If the traffic matches the given criteria, the firewall passes it through itself. In the other case, as the criteria for non-delivery are set, traffic is blocked. Firewalls filter both incoming and outgoing traffic, and also allow access to the same network resources or programs.

For their recognition, the firewalls predict the checkpoint of the object, which is protected, where documents are checked, which enter the territory of the object and all, which deprive them of її. If the transfer is in order - access to the territory is allowed. Similarly, there are firewalls, the role of people who pass through the checkpoint is less likely to appear as multiple packets, and the re-passing is to recognize the headers of these packets in a given set of rules.

All modern routers with built-in firewalls and NAT-attaches, so that they support the NAT (Network Address Translation) address translation protocol. This protocol is not a warehouse firewall, but rather a security measure. The main task is the solution to the problem of IP-address deficiency, as it becomes more and more relevant to the growing number of computers.

The NAT protocol determines how the address of the merged address is changed. NAT-attachment rewrites IP-addresses, reserved for private swiping in local networks, on the specified IP-addresses. Private addresses can be seen in the next IP range: 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255. Private IP-addresses cannot be listed in the Global Merge, so the stench can only be stored for internal purposes.

A lot of functional possibilities have been rehabilitated, some models of wireless routers have a number of additional features. For example, stinks can be possessed USB ports 2.0, up to which you can connect outbuildings with the possibility of organizing a subdivision access up to them. So, when connected to a printer router behind a USB 2.0 interface, we will take away the print server, and when connected zorsky disk - storage attachment for data storage type NAS (Network Attached Storage). In addition, in the rest of the cases, which are victorious in routers, it allows you to organize an FTP server.

Find out the models of routers, which can be not only USB-ports, but also built-in hard drive, so they can be installed for the security of data, like FTP servers for access as a call, and from the internal security and enable the functions of multimedia centers.

Irrespective of the similarity of the functional capabilities of wide-range wireless routers, what is available, between them there is a certain amount of power, like in the end of the day and choose, probably, a specific router for your purposes. On the right, in that different Internet providers win different types of connections to the Internet. As far as the connection of one computer is concerned (without blocking the router), then there are no problems, the shards of the operating system of the core (for example, Windows XP/Vista) eliminate the software itself, as they support all types of connections that are victorious by providers. Also, for connecting a home network to the Internet, a router is switched, it is necessary to change the type of connection, blocking by the provider (the type of connection is considered in the distribution, assigned to the configured WAN-interface).

May all routers, oriented at home, may be installed software shvidkogo nalashtuvannya(Maistri nalashtuvannya) or make auto-configuration - for example Quick Setup, Smart Setup, NetFriend etc. However, it is necessary for the mother to know that such a provider can be known, which does not support the function automatic fitting A specific router In addition, the presence of such functions does not necessarily mean that pressing one "enchanting" button will immediately lead to a lot of problems and configure your router. Even more so, in order to remove the “charitable” button, you need to fix the network interface in the computer.

For other reasons, we do not allow for the possibility of automatic configuration of the router and it is considered the most universal way yoga manual pokrokovoy settings.

The adjustment of the router should be completed in the next sequence:

· Removal of access to the web-interface of the router.

· Setting up a LAN-interface and a built-in DHCP server.

· Implementation of the WAN-interface with the organization of connection with the Internet for all computers of the local network.

· Nalashtuvannya bezdrotovoy merezhi (yakshcho є bezdrotovі clients).

· Installed a firewall.

· Implementation of the NAT protocol (as required).

The first step is to set up the router to remove the network access to it, to set up an additional web interface (all routers are set to a web server).

Let's look at the report on the stages of setting up a LAN-interface and a built-in DHCP server, as well as setting up a WAN-interface. About the installation of a wireless barrier, a firewall and the NAT protocol in these articles, we will not become aware of it - other publications will be assigned to them.

Removing access to the web- іrouter interface

To gain access to the web interface of the router, you need to connect a computer (laptop) to the LAN port. First, you need to know the IP addresses of the LAN port of the router, login and password, tasks for locking. Whether a router, being a merged add-on, can control the merged address (IP address). In order to find out the IP address of the LAN port of the router and the password, you have to look at the instructions of the driver.

If the router has not been used before, it will need to be adjusted with patches for locking (factory). The most common IP address of the router's LAN port is 192.168.1.254 or 192.168.1.1 with a subdivision mask of 255.255.255.0, and the login password is admin. If the router is already in operation and in some way changed the settings for locking, but if you do not know the IP address of the LAN port, or the login and the password, then the first thing you happen to be able to do is reset all the settings (turn to factory defaults). For which all routers can have a special reset button. As soon as you press on it (when the router is alive) and stretch for ten seconds, the router will reset and restore its factory settings.

Let's see the possibility of a quick turn to the factory settings, more routers may be able to turn on the DHCP server, activate for locking. This allows you to easily connect to the router, the shard of the computer connected to the LAN port of the router, will automatically be assigned IP addresses to those devices, to which the LAN port of the router itself should lie, and as an IP address to the gateway for locking, IP will be blocked -addresses. LAN port address of the router. In addition, in order to speed up the capacity, it is necessary to reconsider that the power of the networked computer, which is used to connect to the LAN port of the router, has the function of dynamically assigning an IP address (Obtain IP address automatically). It is enabled for locking for all interfaces, and since the operating system was installed, the connections on the computer were not set up specifically, then, better for everything, you can gain access to the settings of the router via the LAN once the computer is connected to the th port .

If you don't want to connect to the router in this way, you need to fix the front of the computer interface that connects to the router. The sense of setting is determined by the fact that the network interface of the computer, which is connected to the LAN port of the router, and the LAN port of the router are small IP-addresses, which can be up to one or the other. Let's say the LAN port of the router is 192.168.1.1 IP address. To the same computer interface that is connected, it is necessary to include static IP addresses 192.168.1.x (for example, 192.168.1.100) masked as 255.255.255.0. In addition, in the IP address of the standard gateway, it is necessary to specify the IP address of the LAN port of the router (in our case - 192.168.1.1).

The configuration of the network interface of the computer should be set to the type of operating system that is victorious.

Visnovok

For this robot, the main warehouses of the LAN were examined, and the process of transferring from the measure of all equals (logical and hardware). Modeled a local calculation of the trade enterprise with improvements to the possible structure. Vykhodyachi z rozmіrіv primіshchennya it is known that it is maximally optimized for the length of the cable, which includes all the components of the network.

Today, the development and supply of scrap is one of the most important and most important tasks in the gallery of information technologies. The need to control information in real-time mode is growing, and the traffic of all equals is constantly growing. At zv'yazku z tsim z'yavlyayutsya new technologies for transmission from the LAN.

For example, in the middle of the rest of the outputs, it is possible to transfer data for additional power lines, moreover, this method allows you to increase not only the speed, but also the reliability of the transmission.

Merezhev technologies are already developing rapidly, so the stench is beginning to be seen in the okrema information galuz. Vcheni predict that the closest access to the center of the galaxy will be more effective than other transmission facilities (television, radio, others, phone too). A computer will come to replace the “old” technologies, and there will be connections to some global flow of information, maybe the Internet, and from this stream you will be able to take away information whether it is in any way.

List of victorious literature

1. SPb1. Kuznetsov M.A., "Modern technologies and standards for a fluffy sound".: Link, 2006.

2. McCullough D., "Secrets of droto-free technologies" / - M .: NT-Press, 2010.

3. Maufer T., “WLAN: a practical tool for administrators and professional correspondents” / - M.: KUDITS-Obraz, 2011.

4. Novikov Yu.V., Kondratenko S.V. Fundamentals of local measures. Course of lectures. - M.: Internet University of Information Technologies, 2010.

5. Kuznetsov M.A., "Modern technologies and standards for a fluffy sound" - St. Petersburg: Link, 2006.

6. Kuznetsov M.A., “Modern technologies and standards of fluffy sound” / Rizhkov A.Є. - St. Petersburg: Link, 2009.

7. McCullough D., "Secrets of droto-free technologies" / - M .: NT-Press, 2010.

8. Maufer T., “WLAN: a practical tool for administrators and professional correspondents” / - M.: KUDITS-Obraz, 2011.

9. Novikov Yu.V., Kondratenko S.V. Fundamentals of local measures. Course of lectures. - M.: Internet University of Information Technologies, 2010.

10. Olifer V.G., Fundamentals of the transfer process. - M: Vidavnitstvo: Peter, 2008.

11. Olifer V.G., "Basic technologies of local measures" - St. Petersburg: Peter, 2009.

12. Olifer V.G., computer systems. Principles, technologies, protocols. Pіdruchnik - St. Petersburg, St. Petersburg, 2011

13. Pedzhman R., “Fundamentals of inducing dartless local merging to the 802.11 standard. A practical help for the development, development and selection of arborless LOM to the 802.11 standard ” / Jonathan Leeri. - M: Cisco Press Translated from English Vydavnichiy dіm "Williams", 2009.

14. Shakhnovich Z., Modern droto-free technologies. - PETER, 2008.

15. Shcherbo V.K. Standards of counting measures. - M.: Kudits - Obraz, 2010.


Similar documents

    Zagalna characteristic local counting measures, their main functions and recognition. Development project for the modernization of the local computer system of the enterprise. Viber of the tethered property, rozrahunok dozhini cable. Methods and methods of obtaining the protection of information.

    thesis work, donation 01.10.2013

    Nalashtovu telekomunikatsiyne obladnannya local enumeration measure. Selection of the architecture of the merezhi. Server configuration services. Rozrahunok cable, pіdbіr obladnannya and software security. Description of physical and logical schemes of counting measures.

    course work, donations 12/22/2014

    Choosing a protocol and technology to induce a local enumeration measure for the increase in throughput capacity - 100 Mbit / s. Choice of mesh installation. Folding the plan of the measure on a scale. Configuration of servers and working stations. Rozrahunok vartosti volodynnya merezhі.

    course work, donations 01/28/2011

    Rozrobka topology merezhі, choice of operating system, type of fiber optic cable. Vyvchennya transfer of functions and services, which are hoped for by the coristuvachi in the local counting system. Rozrahunok necessery amount and varnosti obladnannya, scho to be restored.

    course work, donations 12/26/2011

    Pobudov's segment in the local enumeration, selection of basic technologies of production. Pobudova of the main channels in vzaєmodії mizh segments. Vibration of possession on the main line of the central office - virobnitstvo. Scheme of counting measure.

    course work, donations 01/23/2013

    Investigation of parameters in the design local calculation measure. Zagalna dozhina cable. Rozpodіl IP-address for the designed measure. Specification window materials. Selection of the operating system and application software.

    course work, donations 11/01/2014

    Analysis of the design zone, information flows, mesh topology and mesh technology. Choice of merged ownership of the type of server. Perelіk obladnannya, scho wins. Modeling for the project of the local network for the help of NetCracker.

    course work, donations 27.02.2013

    Choice of passive lace-up. Elucidation of the need for modernization of local counting measures of business. Choose the operating system for the working areas of the server. Similar characteristics of D-Link switches. Schemes of local networks.

    course work, donation 10/10/2015

    Choose and install the SOS Ubuntu Server. Description of the physical scheme of the telecommunications facility that is being designed. Setting up servers, computers and software security.

    course work, donations 06/12/2014

    Vybіr ta obґruntuvannya technical security for local networks in schools with different Ethernet technologies and "star" topology. A change of active and passive technical possession, necessary for local counting.

Significantly from the right moments: a small company, let it be about 15-50 practitioners. As a rule, there is no qualified lace specialist. І shvidshe for all the same "seen" for the work of the yard, the administrator of the yard for the state. Let's move on - our fahivets, after all, is necessary. I you need to pay pennies, moreover - good pennies (what a waste, right? It's a novelty for rich directors). I'll try with this statute (maybe, from sales) to act as an administrator of a company of such a small company. Father, I will measure myself. Why not? There are a lot of arguments "against" "self-made", and all the stench is wrong (yes, obviously, there is no "lokshina" in front of a potential contractor). Still, you can do it yourself. Arguments "for" are also available. Let's not bring them up here - vvazhaemo, what did you work yourself. The world is not new-fangled radio, Wi-Fi and other measures, but an inexpensive, albeit aleksnu cable link of the traditional pole type for the everyday robot company. You need to understand that the robot is guilty of vikonuvat fahіvets (or sprat).

Entry

Significantly from the right moments: a small company, let it be about 15-50 practitioners. As a rule, there is no qualified lace specialist. І shvidshe for all the same "seen" for the work of the yard, the administrator of the yard for the state. Yakshcho є - a master of all trades, moreover, it is often maddening to be engaged in a "terminal" right to the point Windows installation or drivers for any computer, deputy robots with a measure. Together with other "computers" (like stench). Merezha works? Let the deck through the stump, that’s good, you’ll take care of the little things (be busy).


Let's move on - our fahivets, after all, is necessary. I you need to pay pennies, moreover - good pennies (what a waste, right? It's a novelty for rich directors). I'll try with this statute (maybe, from sales) to act as an administrator of a company of such a small company.

Weekly data

Father, I will measure myself. Why not? There are a lot of arguments "against" "self-made", and all the stench is wrong (yes, obviously, there is no "lokshina" in front of a potential contractor). Still, you can do it yourself. Arguments "for" are also available. Let's not bring them up here - vvazhaemo, what did you work yourself.

You need to understand that the robot is guilty of vikonuvat fahіvets (or sprat). It is impossible to train (“hoch filth, ale svіy”) and vihovuvat your specialist in this way. You can put your own practice into the practice of people, like viconu robots (drilling holes with a perforator at the walls and fixing the cable channel is not respectable - it’s the fault of the mind, be it a man).

Another factor, let's say so, "pepper" - our company, krіm office, maє store and warehouse, so you can see it.

The world is not new-fangled radio, Wi-Fi and other measures, but an inexpensive, albeit aleksnu cable link of the traditional pole type for the everyday robot company. For work, and not for surfing from a laptop of the latest and/or porn sites from a hotel sofa. To our food, perhaps, we turn to prodovzhennі (not to the hotel and what about it, it was reasonable, but to modern technologies).

Stay, and, also, more important: pennies are scary, but not greedy.

Plan

On the cob, you need to make one simple language, and even more importantly, take a piece of paper, an olive, and write for a black business plan. It’s even more important to clearly “take on the olive” these key words, like falling into the thought of food “what I want in the merezhі”. Place the number of positions on the first arch. On the other - their grouping by different categories. For example, the category "services". What kind of service do we want to take into account such a measure? What do we need? File-, FTP-, print-, internet-service?

It would have been better if everything was clear, now to write, little ones? Ale, if you don’t take everything on the olive, then we’ll be better. For example, to show up that you need to go to the director and/or to the accounting department: required, but for 500.

Now you can add everything, throw out the supermundane. I all tse vodklast yak minimum for a day. Dali black can be transferred to the third sheet. With "residual" additions and corrections. Why paws - you yourself will understand, not the rest of the sheet, and far from the rest of the "painting".

Services - services, prote base - ce SCS, so the cable system is structured. Let's try not to hit too hard in front of the horse.

Sound two options - office "from scratch" and office "ready". The first step is the bare walls and the stele, the repair is ours, it’s good. The other option is "done". Tobto. - we fix the call for the installation of the SCS. Ale, maybe not so much, for now.

Electrician

An important stage, even if God forbid "fly" is not just one or two rows of computers, everything can "fly". Good, vvazhaemo, scho in our office with a power net, everything is fine. There's only one here important moment- Dzherela uninterrupted life (DBZH). You need stink. Trust me. The diesel generator, obviously, is good, but don’t start the obov'yazkovy, and the axis of shkoduvat pennies for the installation of a DBZH on a leather server or a communication cabinet is simply stupid. Vtіm, before the food about BDZh, we will turn our time.

SCS and basic active possession

Structured cable system (SCS) - one of the outdoor stones. SCS can be properly designed and prompted. Let's divide food into points:

* Communication wardrobe (with "stuffing")
* Cable lines
* Subscriber sockets

Here you will soon become a better plan for the appointment, with clearly designated missions of spivrobitniks. Required memory - wicked power sockets are significant. Dali - in order, let's remember the shafi.

Communication cabinet: we know a better place for the installation of a shafi with possessions. It is important to know the optimal distance to the working stations, with the method of changing the winding to a twisted pair, a cable channel and another “dribnitsa”. Factors are rich: shortening the length of the line up to 100 meters (upper, 90 meters, according to the classic formula 90 + 5 + 5); office planning (put it manually or put up a closet, so that you can manually pass the walls when pulling the cable, so that there will be no cooling on the inside of the clients or the sleepers, etc.); vlasne, constructive shafi (podlogova, nastіnna, її height in U, quantity of possession, as required to be installed in a new one, chi will be a cooling unit).

Shafi is aware of the nairiznomanіtnіshi, it is necessary to respectfully marvel at the price of the transfer of the purchase, do not forget to make a reserve of capacity (!) from the quiet U themselves. Vtіm, at some places you can get along with wall brackets, for fixing the possession. But it's specific. Importantly, we chose a 12-14-high wardrobe for the office, and we cursed the doors. Trochs jumping forward, needing to guess what will be installed in the middle:

Police: if you become in good fortune, you will be born empty (I doubt it) - you can take it. Don’t waste 10-20 dollars, if you happen to put a little extra in the closet, guess the number of rows.

Switch (switch): 24 port for the lower boundary of the spіvrobіtnikіv firms in the office - don't have 10-20 osіb in the office (and don't forget about the server and the other mirezhev obladnannya). In the meantime, if there will be a large number of working areas, there will be no everyday problems to add more commutators and another type of power supply.

Rozpodіlcha panel (patch-panel): 24 ports, everything is similar to the switch. All lines from working stations and servers are connected to the patch panel itself.

Panel (block) of power sockets: for the amount of money that is connected to the closet, plus - a supply of 1-2 sockets on the panel. Here we can be fully qualified as a "zasidka" if we happen to connect life blocks - we can not connect (we guess about 99.9% of the market, filled with mesh filters and from slotted-obliquely planted sockets).

You can put a cheap, simple option (if the axle is in the police station, or you can use it on the cover), you can also 19 ”DBZH, for installation in the closet.

Later, marveling at the products promoted to the market, it’s important that they were appointed to the wardrobe: 14-height (14 U). For example, Molex MODBOX II 14U:

19-inch 1U cabinet fan stowing capacity
. Shafi standard equipment:
. Lightweight steel profile ensures great hardness and durability
. Aesthetic glass doors with a lock
. Doors of universal design with the possibility of overhanging (left, right)
. 19" frame with adjustable depth
. Grounding of all elements of the shaffi
. Open for the introduction of the cable, close the shield for protection against the penetration of the saw into the closet.

Switch. Yogo vibir - folded food. Even cheaper commutators do not want to look. The additions to the road (and even more expensive) are being abandoned, but all the same you will have to choose from two types: non-ceramic and ceramic.

Zupinimo look at the next two outbuildings: ZyXEL Dimension ES-1024 and ES-2024:

It is economically viable for Fast Ethernet solutions and can be victorious for stimulating highly efficient communications. The function of intermediary saving of data is quickly shortening the time of high-width netting. The switchboard is designed for workgroups, for large and medium-sized enterprises. For a large address table and high productivity, the commutator is an excellent solution for connecting a network to a corporate backbone or for connecting segments to a network.

Technical characteristics:

24-port Fast Ethernet Switch
. Compliance with IEEE 802.3, 802.3u and 802.3x standards
. Ethernet RJ-45 ports with automatic speed selection 10/100 Mbps
. Automatically assign crossover cable on all RJ-45 10/100 Mbps Ethernet ports
. Back-Pressure-Base Flow Control Support on Full Duplex Ports
. Pause-Frame-Base flow support on full duplex ports
. Support for commutation from industrial savings
. Support for automatic assignment of address
. The maximum speed of transferring by wire
. The MAC address table has been set (volume 8K MAC address)
. Light indicators of life, LK/ACT and FD/COL


Zastosuvannya of the ES-2024 commutator to allow uniting a group of koristuvachіv and connecting them with shvidkіsnimi lines to the corporative line. Dodatkovo z'appear the possibility of planting the iStackingTM technology to unite a group of commutators for management, independently from their distribution.

Technical characteristics:

24 RJ-45 ports with automatic 10/100 Ethernet speed selection and automatic crossover cable connection
. 2 x 10/100/1000 Ethernet ports
. 2 mini-GBIC slots, mixed with ports
. 8.8 Gb/s non-blocking switching bus
. IEEE 802.3u, 802.3ab, 802.3z, 802.3x, 802.1D, 802.1w, 802.1p protocol support
. Table MAC address 10Kb
. VLAN support: Port-based and 802.1Q
. Possibility of exchange of shipping at the port
. 64 static VLANs and up to 2Kb dynamic VLANs
. MAC filtering - address
. Support for ZyXEL iStacking™, up to 8 switches (up to 24 in the future) mapped to an IP address
. Control via RS-232 and WEB-interface
. Telnet CLI
. SNMP V2c(RFC 1213, 1493, 1643, 1757, 2647)
. IP Management: Static IP or DHCP Client
. Firmware upgrade via FTP
. Updating and saving system configuration
. Standard 19" rack mount visor

Yak bachimo - difference є, і more serious. Such a price difference is approximately 100 and 450 dollars. However, the first commutator is decent, but the "stupid" box, then the other - as a sensi іntelektualny, with richer functionality and coding, with potentially strong sides. We choose another option. Aja mi want to induce a good merezha?

Before the speech, at the very same time, ask yourself for an hour, why, my goodness, I will measure the “weave”? Doesn't another skin computer have just a gigabit interface, but two gigabit?

The axis of the tse and є of that vipadok, de you can boldly zaoschadzhuvati. On the right, in what is more or less enough for a robotic office of 100 megabits. What a decent commutator! So, and for two gigabit interfaces of the same switch, for example, two servers. Axis їm, servers, tіlki on melancholy.

Obviously, you can take a ZyXEL GS-2024 and put them all on a gigabit channel, but it’s also a bit of an unreasonable waste of pennies, and for such pennies you can buy more of the whole wardrobe with more stuffing.

Patch panel. So is that vipadok, if you don’t varto zaoschajuvati. Selectable panel type Molex 19" 24xRJ45, KATT, 568B, UTP, PowerCat 5e, 1U.

Vіdpovіdnіst vimog category ї ї. The compensation system is implemented without intermediary other payment. Zastosuvannya CATT-type connectors will speed up and simplify the installation of the cable. Seen a place for marking channels. The panel is powder coated. All necessary fasteners and marking elements are supplied in the kit.

There are a lot of options here, as already mentioned, you can put it whether it's cheap, you can be more expensive, you can have a 19 ”rack-option - it will be beautiful. Who doesn't know APC? You can look at such a DBJ for example:


APC Smart-UPS SC 1500VA 230V - 2U Rackmount/Tower

Abo, the axis is:

Regardless of the characteristics, it’s worth respecting that a lot of attachments are equipped with a direct power supply for installing a DBZH in a 19" rack. Also, it is possible to equip, for a buggy, with an SNMP module for monitoring and managing a DBZH by computer. Alternately, it can be displayed more manually. We can use your choice on IPPON. Please indicate which SNMP support can be equipped with models 1500, 2000 and 3000, and 750 and 1000 - no.

Block of power sockets:



Without special comments - it is possible, you can know it cheaper, easier. And a dozen "strangled єnotіv" do not break the weather.

Don't forget to take a decision, what is the fan unit of the shafi? Satisfaction on the road, especially for couples with a thermostat unit. However, we can see it down to specifics/office.


Bigger-mensh got rid of the cloak, all sorts of “dribnits” were left behind, without urakhuvannya such then there will be cover ups:

* Gvinti with nuts for installation of a closet near the wardrobe;
* Nylon ties, which do not twist, for laying and fixing the cable (packs of 100 pieces with a length of 100, 150, 200 mm);
* Marking for the cable (leaves are glued from the ball).

In fact, we got away from the SCS itself. Even more important is the "detail" - the cable, which is how the SCS is built. So, I’ll call again, don’t hesitate. A good twisted pair - tse garne insert. Beremo Molex, unshielded UTP PowerCat 5e cable.

The cable is the main element of the PowerCat product line. The line is designed for use with Swedish telecommunications networks (for example, GigaEthernet 1000Base-T).

To the subscriber outlets, mi, obviously, we will come, but what about? Next - buy the necessary number of patch cords for connecting working stations. Naturally, it is necessary to think over the dozhina, to marvel at the plan of the office, as if guessing. But still not all. Consumed strained-cable (primary - solid). This is a special twisted pair, "m'yaka", so that patch cords can be broken. , it is possible (or it is necessary - as you wish) to be short - 30-50 cm, patch cord for crossover of the line SCS and active control in the wardrobe itself, so "take on the olive" a couple of packs of RJ45 connectors, in the common - " packs of humic pads for them. Packs are better to take soft ones and with a hole in the pіd fixator “chips”, and not with a “puffy” pіd fixator.

We have already got practically meshed interfaces on computers, as well as the need for subscriber sockets. Who cares about such a miraculous thing, like Molex OFFICE BLOCK 2xRJ45? ;-)

Vіdpovіdnіst vimog category ї ї. Modules are designated for Swedish telecommunication measures. Possibility of introducing the cable from the sides, to the animal or from the back. As a standard, the modules can swing the blinds into the saw. Strength of marking channels. Vbudovaniya magnet simplifies the installation of modules to metal surfaces. Possibility of fastening for additional screws. Cable fastening in the middle of the module without cable ties. Vilniy vybir sledovnosti z'ednannya (568А/В). Connector type "KATT" for easy installation. The kit includes mounting elements. .

Here it is required to be appointed from the kіlkіst. Adzhe є single options. I'm taking the office plan again. There is one more important moment at the designated place for installing sockets - add one or two to the leather cabinet supplementary lines SCS. One - just "about every vipadok." And raptom trohi change the planning at the office, who needs to connect a laptop? To a friend - a bad mother in a rozrahunka on a print server, for organizing a lace to a friend. It’s even worse for the mother in the office or the office with one or two printers, which work without problems and the Lord’s note (or Windows).

Do you think that's all? Ni. Zabutiy one more factor, present to any office - telephony. It’s even more inappropriate to think about it: if it’s possible to have telephone lines before the working days, then why wouldn’t it be possible to arrange a divorce at the sleeping SCS? You can easily change the power supply: run a line to the necessary places, put an RJ-45 socket into another RJ-12 socket, you can wind it in one case (block). At the socket - DECT, for example, with a kіlkom tubes, and the closet is carried out a line (line) from the PBX - you can put it on the sockets, neatly glued with Velcro in the middle and on the side. Lines in the working areas - on them.

Has the hour come to take up the cable channel and the dowel-flowers? So. It's already time. Ale tse already, be it to the hand of a man, he understood, we won’t be fooled by him for a long time. It's just that you need to check the number of lines that fit into the cable channel. I, obviously, a small reserve is required. Even better, as in the office, you can stretch the line behind him right to the working place and lower it into the cable channel along the wall. When stretching the lines, it is not good to mark them (as if the sockets were pressed). The simplest method is the first left-handed rosette at the door - No. 1, followed by a stake.

After stretching the lines, you can proceed to splitting the patch panel and sockets. Zayve say that this work will require accuracy and qualifications. At the same time, we need to mark the lines - as all the lines are split in order, then in the further operation of the SCS it will be possible to practically do without a card (layout) for installation, approximately like this:

Socket

However, this card is still needed in the future. Become in good condition obov'yazkovo.

When laying cables, it is necessary to follow a number of simple rules (the simplest ones, we won’t go into other ISO standards at once):

* Don't rub hard, don't rub or step on the cable. The twist cable is allowed: during installation - 8, і, during operation - 4 radii of the cable itself;
* Do not lay a line of instructions from the security forces: it is necessary to lay in parallel - on a distance of not less than 20 cm;
* Peretinaty power lines are allowed, under a straight cut;
* Obov'yazkove testuvannya cable tester.

OK, about the rest of the paragraph. Do you remember the anecdote about the Japanese post, what is there? “Shanovni deputies! We don’t know what happened to you, but we still decided to put in the boxes one defective chip per leather ten thousand, apparently up to your needs. So, you can just split it and forget it. Dosvіdcheny installer is not pardoned. Prote, it’s up to the installer to deviate the obov’yazkovo, and not only the layout of the line, but also the fineness.

Axis of mi and dіyshli to naytsіkavіshogo moment. As with a simple and cheap tester, we can’t check the trick, then we need to test and certify the lines - no, we can’t see:


What kind of exit? You don’t want to deprive yourself of the food of the lines of the innocent. There are three options. First - buy a good tester, for example:

Ale, sorry, we have a Skoda $ 6,000, let's get it for such a wonderful and necessary accessory.

This is a compact portable tool, which is tested for certification, testing and detection of faults in coaxial cables and cables based on twisted pairs in local calculation networks. Tester of recommendations conducted by the inspectors of information cable systems for testing for certification of class E systems, inclusive. The high level of arrogance, clarity and accuracy of the prilad provided him with one of the first places in the middle of the world of virobs of this class. For swedish and nuclear testing of cable systems with an extended frequency range up to 350 MHz, the technology of digital processing of the pulse signal is being developed.

Another option is to ask a well-known administrator or installer, which may be such a similar device. Zvichayno, beforehand having bought a case of garnet beer. Pvgodini work, plus a beer evening at the reception company of a friend.

The third option is to officially request fakhіvtsіv from any firm, as you can give such services. I pay for qi services. It's not so rich, especially, because you don't need a paper certificate.

Remote working stations

"Completed" (the paws of that which needs to be back to back still plan everything and make the necessary purchases and negotiations) with robots at the main office, we will think about the warehouse and the store.

At once (in these notes) we can see not the "cunning" solution to the VPN station, but in the simplest way - the organization of communication between computer networks with sub-divisions (working stations with a network) along the line of sight. Effektivno, cheap that angrily. Before the speech, the vision should be brought into the closet and plugged into sockets, like telephones.

As usual, apparently, the opir of the seen line is small, you can try to put a couple of "bridges", for example, firms ZyXEL Prestige 841С and ZyXEL Prestige 841, which was already guessed. Model "C" - "meister", to which it is better to install this attachment in the head office. These inexpensive extensions, which are used for VDSL technology, will also give the necessary results for our task. What to say ZyXEL:

If you look at the cable, and also if you see the Prestige 841 in pairs with the Prestige 841C, I will ensure that the data exchange is safe:

Directly to the subscriber - between 4.17 and 18.75 Mbit/s
. direct from subscriber - from 1.56 to 16.67 Mbit/s
. total capacity of the line can reach 35 Mb/s

Technical characteristics:

VDSL-mist Ethernet
. Closing of local networks at a speed of 15 Mbit/s up to 1.5 km
. Plug&Play, visionary for all protocols
. Pratsiyuyut couple
. Vikonannya on the floor
. Non-volatile memory (Flash ROM)
. Size: 181 x 128 x 30 mm

This option will give 18 MB on the skin side, ideally, great. Tse VDSL.

With vikoristan Prestige 841 there is one more plus. Qi add-ons may have a splitter, and we can take a "free" phone with a remote space. It is enough to turn on the “phone” rosette from one side of the phone of the remote working area, and from the other side - connect the office mini-PBX.

Although the VDSL bridges do not "twist" the line, you need to look at other extensions, xDSL. For example - from the 79th series of ZyXEL, SHDSL.

The optimization of the hardware part and the introduction of advanced technologies made it possible not only to change the dimensions of the building, but also to reduce the variability and improve the functional characteristics. secure symmetrical data transfer at speeds up to 2.3 Mb/s and can work on a 2-wire line in point-to-point mode, as well as a client of an Internet provider's concentrator.

Technical characteristics:

. SHDSL router
. Support G.991.2 on speed up to 2.3 Mbit/s symmetrically
. Z'ednannya merezh or access to the Internet on great roads
. Encapsulation PPPoA, PPPoE, RFC-1483
. TCP/IP routing, Full NAT, packet filtering
. Support for IP Policy Routing, UPnP, call redundancy
. Management via console, Telnet, Web, SNMP

Ideal speed - 2.3 Mb for two darts. If you "charge" 4 darts, the speed will be higher. However, these outbuildings will cost a lot of money - 400-500 dollars per couple. Have a vipadku, rudely seeming, chim more yak_st lines, tim lower swidkіst and more vitrati. However, the adjustment (tuning) of the building is possible on the future, it’s more like a rozmov, more so, that in the wake of VDSL 841, it’s not possible to have a great zmila. put the xDSL-attached varto on the police near the wardrobe. Well, I said that you won’t be empty.

Internet connection

ZyXEL Prestige-660

The current office is unacceptable without the Internet. For connection, we can use ADSL technology, for example - ZyXEL Prestige 660.

How to describe this ZyXEL attachment:

Modem P-660R to lie up to the fourth generation of ADSL-modems and together in one add-on the functionality necessary for connecting the already obvious office or home network to the Internet: ADSL2+ modem, router and intermediary screen. The modem will provide your office with a permanent connection to the Internet, which works safely. Installation and maintenance of the P-660R modem is simple and will not cause daily problems to unprepared koristuvachs.

Main advantages of ZyXEL Prestige 660:

* High-speed Internet- up to 24 Mb/s
* Nadіyne z'єdnannya on problematic lines
* Vilniy phone
* Postiyne z'ednannya
* Does not affect driver installation
* Pratsiuє z W



teleobobka danih- pevna organization of the informational-calculating process, if the resources of one and the same number of EOMs are simultaneously vicorated by rich coristuvachi through different links (channels).

The teledata processing system ensures the implementation of two main data processing methods:

  1. Packet.
  2. Dialogue.

Batch way of processing data transmission:

Combining that grouping of a given set of data for any signs in a single package;

The packet is transmitted per call session;

Data processing is possible after the transfer of the package;

The hour of transmission is not limited.

Dialogue The data processing method is characterized by a small number of data that are transmitted by the EOM (obtained from it) and a small hour of EOM response to the acceptance of the subscriber's request.

You can clearly see the telegrams of these data presented in Table 3.1.

Table 3.1. See the TV boxes of the Danes

Calculating (computer) merezha- a complex of territorially divided EOMs and terminal annexes connected to each other by data transmission channels.

The counting (computer) of the merezha gives the coristuvachas the following possibilities:

Efficiency and reliability of exchange of information;

Increasing confidence for the budget of reserving resources;

Creation of rozpodіlenih and centralized data bases;

Decreased peak demand;

Specialization of the number of resources, transfer of program tasks and one-hour work on the tasks of a small number of employees;

Economy.

Fallow in the form of territorial rotting, the counting measures are divided into three main classes:

Global (WAN - Wide Area Network);

Regional (MAN - Metropolitan Area Network);

Local (LAN - Local Area Network).

Global counting the number of united subscribers, circulating in different countries, different continents.

Regional counting the number of subscribers who are roztashovan in a significant country one type of one (at the borders of a great city, economic region, near the country).

Local enumeration measure (LAN) association of subscribers, distribution at the borders of a small territory (subsidiaries, organizations, VNZ). Local measures are the basis of information technologies in a company.

Local counting merezha-group CompoTerevs of the same attachments, the system of rosema, are incorporate, roseman on the worshiped small spacious (on the vidmin of global, regimony of the calculated form), I would be allowed to be aimedly, aimedly, aimedly, aimedly.

Basic LOM componentsє:

Servers (servers) - computers that give resources to the bordered koristuvachs;

Robotic stations or clients (clients) - computers that provide access to shared resources, which are given by servers to other clients;

Working groups (workgroups) - computers, united until the end of the sleeping days;

Transmission medium (media) – method of connecting computers;

Resources - data, programs or peripheral outbuildings, which are spilly vikoristovuyutsya in merezhі.

The current classification of local lines is transferred:

By confession;

how to organize management;

According to the hierarchy of computers;

For types of victorious computers;

By topology;

how to organize the transfer of information;

Behind the physical wear of signals.

For the hierarchy computers:

1. Peer-to-peer merging.

2. Merezha іz seen by the server.

Perevagoyu peer-to-peer Those that have hardware and peripheral attachments, connected to up to four PCs, are vicorated in full at all working places. Organization and maintenance of peer-to-peer networks is not cheap. Inconsistencies in such a line, there is not a large number of coristuvachs, the possibility of a meaningful expansion of the line, nutrition is not critical. Pobudov peer-to-peer is represented by a small 3.1.

Baby 3.1. Peer-to-peer merging

Merezha with a visible server transferring to your warehouse only working stations (PC), but also servers. Pobudov such a measure is represented by a little 3.2.

Baby 3.2. Merezha with a visible server

How to win such a pobudovi merezhі can mean:

Nadiyna system protection of information;

High svidkodiya;

Number of working stations;

Ease of management is paired with peer-to-peer networks.

Insufficiency of the measure from the server seen by the server is high, as well as the staleness of the code and the reliability of the measure from the server.

Classification of local measures from topology:

  1. tires (bus);
  2. zirka (star);
  3. ring (ring);
  4. star-bus (star-bus);
  5. zirka-kіltse (star-ring);
  6. tree
  7. mesh (mesh);
  8. zmіshana chi is enough.

The main (basic) types of motives for classifying representations are “star” topology, bus and ring topologies.

Bus topology. Pobudov's local calculation of the type "tire" is represented by small 3.3.

Baby 3.3. Pobudova Crowbar for the type "tire"

The advantage of the bus topology is those that the working stations can be installed or switched on without interrupting the work of all networks, and also can be switched one to one without the help of a server.

How short can you say:

Shave the tread cable to produce before the end of the operation of all the treadmills of the treadmill during the opening;

Possibility of unauthorized connection to the fence.

Topology "zirka". The topology of the network comes from the concept of a central node, which is connected to peripheral devices. All information is transmitted through the central hub. Pobudova local merezhi type "zirka" is represented by a small 3.4.

Malyunok 3.4. Pobudova Crowbar for the type "zirka"

Kiltsev topology. Perevagoyu merezhi tsієї topologiiї є skochennya hour access to data. As a shortfall pobudova SCRAP for the type of "kіltse" can be specified:

The inadequacy of one station can destroy the work of the system;

The connection of new working stations is impossible without the wiring.

Pobudov local border on kshtalt "kіltse" is represented by a small 3.5.

Baby 3.5. Pobudova SCRAP for the type "kіltse"

Equal assessment of the measure of different topology for such parameters as reliability, throughput of building and blockage is presented in Table 3.2

Table 3.2. Porіvnyalna ots_nka merezh.

Characteristic Rating
"Tire" and "Tree" "Kilce" "Zirka"
arrogance Having opened the cable, the lead out of the fret of the Crowbar was prompted on the “bus” kshtalt, in the Crowbar with the “tree” type, the visible part. Vіdmova in one of the last systems led to the other systems. Vіdmova of the central vuzla to rob the whole chain of unscrupulous work. Vіdmova kіtsevyh systems pratsyuvati vsієї merezі vplivaє.
Throughput capacity Falls when adding new nodes and when exchanging old reminders. Falls when adding new knots. To lie down in the tightness of the inner bus of the central node.
Zatrimka In the LOM with the “tire” type, it is deposited as a number of knots in the merezhі, in the merezhі with the “tree” type it is not transferred. Deposit in a large number of vuzlіv merezhі. With a great urge to drink, there may be blockage in the central node.

Merez classification for physical carriers of signals:

  1. Twisted couple drotiv. Gіdnіst - low varіst. Noodles:

Filthy shyness;

Low speed of transmission - up to 10 Mbit/s;

Vіdstan – up to 100 m.

  1. coaxial cable . May have high noise immunity and secure transmission speed up to 100 Mbit / s, up to 185 (500) m.
  2. fiber optic cable. The speed of transmission is more than 100 Mb/s, there is no change.
  3. Wi-Fi Wi-Fi(eng. Wireless Fidelity - “drone-free accuracy”) based on IEEE 802.11 standards. Installing a fence there, de-rotting the cable system is impossible or economically unprofitable. The speed of the work and the measure is over 100 Mb/s. Koristuvachs can move between access points on the territory covered by Wi-Fi. Allowing the mother access to a number of mobile outbuildings.

By itself, the understanding of the local dimension means the integration of a number of computers and computer attachments in a single system to exchange information from their neighbors, and as a common choice of their calculation resources and peripheral setup. In this way, local measures allow:

Exchange tributes (films, music, programs, games and others) between members of the community. If you want to watch movies or listen to music, you can’t obligatorily write them down to yourself on a hard disk. The speed of the current mesh allows you to work directly from a remote computer or a multimedia add-on.

Connect one hour a small add-on to the global network of the Internet through one access channel. Without a doubt, it is one of the most necessary functions of local networks, and even today the list of possessions, in which you can win the day for the all-worldly spiders, is already great. We will cover all computer equipment and mobile devices, now televisions, DVD/Blu-Ray programmers, multimedia players and navigation devices have become full-fledged participants in the network by-butov technique, starting with refrigerators and finishing with cauldrons.

Spіlno vikoristovuvaty computer peripherals, such as printers, MFPs, scanners and Merezhevskiy skhovischa danih (NAS).

Compositely count the exhaustion of the computers of the participants in the merezh. For an hour of work with programs that require folded calculations, for example, like 3D visualization, to increase productivity and speed up the processing of data, you can use the resources of other computers that are used at the enterprise. In this rank, looming a few weak machines united at a local network, you can beat their total productivity for the improvement of resource-intensive factories.

Like a bachite, the creation of local networks within the framework of one apartment can bring a lot of chimal. Tim is more, that the presence of a booth in a large number of outbuildings, that requires a connection to the Internet, has not been rare for a long time that they are connected to a bedroom and to actual tasks for a large number of coristuvachivs.

Basic principles for encouraging local measures

Most often, in local networks, there are two main types of data transmission between computers - by wire, such networks are called cable networks and Ethernet technology, as well as for the additional radio signal by wireless networks, based on the IEEE 802.11 standard, which is more commonly called Wi-Fi fi.

For today's day wire lines dosi secure your bandwidth building, allowing short-term users to exchange information with speed up to 100 Mbit / s (12 Mb / s) or up to 1 Gb / s (128 Mb / s) fallow in the presence of Ethernet, which is supported by Ethernet (Fastbit). Even though current wireless technologies can theoretically secure data transmission up to 1.3 Gb/s (Wi-Fi 802.11ac standard), in practice the figure looks rather modest and does not exceed the value of 150 – 300 Mb/s. The reason for this is the high cost of high-width Wi-Fi, and the low price of high-quality Wi-Fi in the lowest mobile outbuildings.

As a rule, all connected networks are based on one principle: computers of coristuvachiv (working stations), possessed of network adapters, connect with each other through special switching attachments, which can act as: routers (routers), commutators (habi chi scrolls), access points chi modems. We will talk more about these details and recognition below, but at the same time just know that without these electronic boxes, you can’t get into one system without these electronic boxes. The maximum that can be achieved is to create a mini-merezh z two PCs, connecting them one by one.

It should not be forgotten that the local line is “virib” with individual solutions for a specific skin type, which does not tolerate an ill-conceived approach. The very same, as if it were a kind of yakіsny virib, the local network can be professionals. Let's take a look at what we need to know in order to carry out a nuclear installation.

On the cob, it is necessary to assign the main factors to your future measure and scale. Adzhe vіd kіlkostі pristroїv, їх physical accommodation and possible ways of connection without intermediary stale vybіr nebhіdnannya. Most of the home local merezha є combined and її warehouse can be included in the same number of types of switching outbuildings. For example, stationary computers can be connected to a wire for additional wires, but different mobile attachments(laptops, tablets, smartphones) via Wi-Fi.

For example, let's look at the scheme of one possible options home local measure. The new one will have the fate of electronic attachments, which are designated for various purposes and work, as well as a different type of connection.

As you can see from the little one, at the same time, a piece of desktop computers, laptops, smartphones, set-top boxes (IPTV), tablets and media players and other attachments can be combined into one. Now let's figure out what kind of possession you need, to inspire a good measure.

Merezhevo map

Merezhna payment є pristroєm, scho allows computers to communicate one with one and exchange data in the measure. All adapters by type can be divided into two large groups - darts and without darts.

Dart tethered boards allow you to connect electronic attachments to the tether for an additional Ethernet technology for an additional cable, and Wi-Fi radio technology is used in the tetherless adapters.

As a rule, all modern desktop computers are already equipped with built-in motherboard ethernet cards, and all mobile devices (smartphones, tablets) - Wi-Fi adapters.At the same time, laptops and ultrabooks of the world are equipped with both meshed interfaces.

Irrespective of those who, in the most important way, in computer attachments, may have built-in interfaces, sometimes blame the need for additional supplementary boards, for example, for equipping the system unit with a wireless Wi-Fi module.

For the constructive implementation of the frame, the cards are divided into two groups - internal and external. Internal cards are approved for installation in desktop computers for additional interfaces and other PCI and PCIe sockets. Calls are connected via USB sockets or outdated PCMCIA (only laptops).

Router (Router)

The main and most important component of a home local network is a router or a router - a special box that allows you to combine a dekilka electronic devices you have a single link that connects them to the Internet through one single channel, which is what your provider expects.

The router is a richly functional attachment, or to build a minicomputer with its own built-in operating system, which can not be less than two network interfaces. The first of them is LAN (Local Area Network) or LOM (Local Obchislyuvalna Merezha) to serve for the creation of internal (home) networks, as it is formed from your computer attachments. The other one is WAN (Wide Area Network) or WAN (Global Counting Network) to serve for connecting local networks (LAN) to other networks and worldwide global web- Internet.

The main features of this type of extension are the designation of routes for the passage (stacking of routes) of packages with denim, as a coristuvach overpowering up to other, larger measures or consuming them. For help itself, routers of great dimensions are divided into impersonal logical segments (sub-dimensions), one of which is a home local boundary. Thus, in domestic minds, the main function of the router can be called the organization of the transition of information from the local dimension to the global one, and back.

Another important task of the router is to block access to your home network from the all-world border. Surely you are unlikely to be satisfied, as if you were somehow able to connect to your computers and take them, or see everything from them that you might be tempted to.

Sob tsgogo not vіdbuvalos, flow of data, appointments for outbuildings that lie up to the singing pіdmerezhі, is not guilty of coming out for її interі. Therefore, the router from the wild internal traffic, created by the participants of the local network, sees that directly from the global network only that information, as it is recognized for other external networks. In this way, the security of internal data is ensured and the overall throughput of the city is saved.

The main mechanism, which allows the router to reach the neighborhood or to avoid the transition from the outer boundary (call) to the annexes at your local boundary, by omitting the name NAT (Network Address Translation). Vіn also secures access to the Internet for all homeowners, and for the transformation of the internal address of the extension to one public address, we give you the postal manager of the Internet services. All the same, it gives the possibility for home computers to exchange information between themselves and take it out of other networks. At the same time, the tributes that are saved in them become inaccessible to the old koristuvachs, wanting at some point access to them may be dues for your bajans.

Zagalom, routers can be divided into large groups - wired and wireless. Already behind the names it is clear that to the first all the extensions are connected only for auxiliary cables, and to others, like for auxiliary darts, so without them for auxiliary Wi-Fi technology. To that, in home minds, most often they use the routerless routers themselves, which allow them to secure the Internet and share a computer with a computer, which has a different technology of communication.

For connecting computer attachments behind auxiliary cables, the router may have special sockets called ports. Most of the ports on the router have two LAN ports for connecting your add-ons and one WAN port for connecting to the provider's cable.

In many cases, the router may appear as a single component, which is necessary for the establishment of a local authority, which in others simply will not be needed. As we have already said, the simplest router allows you to connect to several computer attachments for additional darts. Well, the number of possessions, which takes one-hour access to the border for the help of Wi-Fi technology, can be counted in dozens, or even hundreds.

However, at any given moment, the number of LAN-ports of the router ceases to connect, then to expand the cable network to the router, you can add one or more switches (read about them below), which will change the functions of the switch.

Modem

In modern computer networks, a modem is called an attachment, which provides secure access to the Internet, or access to other networks through a fixed telephone line (xDSL class), or for the help of wireless mobile technologies(Class 3G).

Smartly, modems can be divided into two groups. Until the first time, you can see that they are connected to the computer via a USB interface and provide access to at least one specific PC, which is directly connected to the modem. For another group, for connecting with a computer, we already know LAN and/or Wi-Fi interfaces. It's easy to talk about those that the modem can turn into a router. Such extensions are often called combinations, and they should be victorious for inducing local lines.

With the choice of DSL-possession, coristuvachi can get stuck with singing difficulties, causing confusion in yoga names. On the right, in what is most common in the assortment of computer stores, we can judge two very similar classes of attachments: modems with built-in routers and routers with built-in modems. Why is there a difference?

It is practically impossible to think of any key vіdmіnnosti and two groups of outbuildings. The pickers themselves position the router from the modem as a larger option great kіlkistyu additional functions and increased productivity. However, if you need only basic capabilities, for example, such as connecting to the Internet to all computers in your home, then especially the difference between modem-routers and routers

Also, supposedly, a modern modem, for the help of which you can induce a local network - in fact, a router, which has an xDSL interface or a 3G modem.

Switch

A commutator or a switch (switch) serve to connect between itself different nodes in a computer system and exchange data between them by cables.

In the role of these universities, they can act as a part of an annex, for example, a floor PC, so they can be combined into an independent segment of a unit of a group of annexes. On the view of the router, the switcher can only have one mesh interface - LAN and it works in home minds as an additional attachment, which is important for scaling local meshes.

For connection of computers for additional wires, like routers, switches, special sockets-ports can be installed. For models oriented towards home music, their number is more than five or eight. Even at that moment, for connecting all the extensions, the number of ports of the switch will stop working, until one more lamp can be connected. In this rank, you can expand the home lace of skilka for good.

The commutators are divided into two groups: wired and non-kerned. The first ones, which stand out from the name, can look out for the help of special software. Seemingly functional, the stench is expensive and does not wink in domestic minds. The non-ceramic lamps distribute traffic and regulate the exchange rate of data between the established customers in the automatic mode. Same tsі pristroї є ideal solutions to encourage small and medium local events, the number of participants in the exchange of information is small.

Depending on the model, the switches can provide the maximum speed of data transmission, which can be either 100 Mb/s (Fast Ethernet), or 1000 Mb/s (Gigabit Ethernet). Gigabit lamps are more likely to vikoristovuvaty for stimulating home arrangements, in which it is planned to often transfer files of great size between local outbuildings.

Wireless hotspot

To secure wireless access to the Internet or resources of a local network, such as a wireless router, you can win other attachments, titles of a wireless access point.

On the view of the router, this station does not have an existing tethered WAN interface and is equipped with more than one LAN port for connecting to a router or a switch. In this way, you need an access point, as your local network has a great router or a modem without Wi-Fi support.

Multiple APs in a network with a wireless router can be used in quiet environments if you need a large Wi-Fi coverage area. For example, the intensity of the signal is less than one dromeless router maybe not to wiggle, to completely cover the entire area near the great office, or to the richly topped zamіsky booth.

Also, access points can be selected for organizing dartless bridges, which allow you to connect between yourself for an additional radio signal, such as extensions, segments of the line or lines of lines in the areas, de laying cables in the nebazhan or twisted.

Merezhevy cable, connectors, sockets

Irrespective of the seething development of dart-free technologies, dosі rich local networks will be for additional darts. Such systems may be high-priority, control the throughput of the building and reduce to a minimum the possibility of an unauthorized connection to the border of the call.

For the creation of wired local networks in home and office minds, victorious Ethernet technology, where the signal is transmitted to the so-called “twisted pair” (TP-Twisted Pair) - a cable that has two pairs of wires.

When using computer networks, it is more important to use non-screened cable of category CAT5, and in most cases, the CAT5e version is perfected. Cables of similar category allow transmitting a signal with a speed of 100 Mb/s with less than two pairs (half) of darts, and 1000 Mb/s with a variation of all four pairs.

For connection to extensions (routers, commutators, tie cards and so on), 8-pin modular connectors are used at the end of the betting rounds, RJ-45 everywhere (though the correct name is 8P8C).

Fallow view of your bag, you can either buy it in any case computer shop already ready (with embossed roses) merzhevі cables sevnoy dozhina, called "patch-cords", or else we can add twisted pairs and roses, and then independently prepare the cables of the necessary size in the required quantity.

Vykoristovuyuchi cables for interconnecting computers at the merging, you can connect them without intermediary switches or routers to the sockets on the merged PC cards, or another option - using the merged sockets.

In this case, one end of the cable is connected to the port of the switch, and the other is connected to the internal contacts of the socket;

Merezhnі sockets can be both built into the wall, and so called. Zastosuvannya sockets replace cables, what to wash, give a more aesthetic look to your work space. So the rosettes themselves can be manually twisted as reference points of various segments in the line. For example, you can install a switch or a router near the corridor of the apartment, and then install cables to sockets, located at all necessary premises. In this rank, you take away the sprinkling of points, spread out in different parts of the apartment, to which you can be, if you like, connect not only a computer, but also be a small annex, for example, add-on switches for expanding your home or office space.

One more trick, which you may need when you have a cable tie, you can winch, which you can win for the connection of two twisted pairs with already wrapped RJ-45 roses.

Krim of direct recognition, podzhuvachi manually zastosovuvat at quiet falls, if the end of the cable ends not with one rose, but with two. Such a variant is possible in case of a delay with a capacity of 100 Mbit / s, where two pairs of wires are sufficient for signal transmission.

Also, for connecting up to one cable to two computers without switching the switch, you can switch the wires. But again, I’ll remind you that in this period the maximum speed of data exchange will be 100 Mbit / s.

Report about twisted pairs, plugging sockets and characteristics mesh cables read special material.

Merezha topology

Now that we've learned about the basic components of a local network, it's time to talk about topology. As if to say in simple terms, then the mesh topology is the whole scheme that describes the layout of the way of connecting the mesh outbuildings.

There are three main views of the topology of the mesh: Bus, Kіltse and Zіrka. For bus topology, all computers in the network are connected to one single cable. To unite the PC into a single tier behind the additional topology "Kіltse" zdіysnyuєєs їх sequently z'іdnannya mіzh itself, with which the rest of the computer is connected to the first one. With the "Zirka" topology, the skin is connected to the railing through a special concentrator behind the auxiliary cable.

Surely, a respected reader has already guessed that for a home or a small office space, it is important to win the Zirka topology, which is how routers and commutators win as attachment-concentrators.

The creation of a border from the topology of "Zirka" does not require deep technical knowledge and great financial investments. For example, for the help of a commutator for 250 rubles, you can connect 5 computers in a measure, and for an additional router, for a couple of thousand rubles, you can get a home measure, securing dozens of attachments with access to the Internet and local resources.

Another flawless advantage of this topology is its good expansion and simplicity of modernization. So, the expansion of that scaling of the border can be reached by a simple way of adding supplementary concentrators from the necessary functional capabilities. So, at any given moment, you can change the physical arrangement of the merging outbuildings or change them by places, in order to achieve more practical victorious possession and change the quantity, as well as the very cost of the day wires.

Regardless of those that the topology of "Zirka" allows you to quickly change the mesh structure, the layout of the router, switches and other necessary elements, it is necessary to think over the distance, depending on the planning of the application, the number of extensions, how to connect, how to connect, Tse allow minimizing the risks associated with the purchase of an unreasonable amount of excess possession and optimizing the amount of your financial investments.

Visnovok

Whose material we looked at charitable principles induce local borders, the main possession, as if with whom this recognition is won. Now you know that the main element of a practical home network is a router, which allows you to combine impersonal outbuildings, which vicorate like a dart (Ethernet) and a dartless (Wi-Fi) technology, ensuring all connections to through one unit. channel.

As an additional possession for expanding the points of connection to the local cable for additional cables, the switches are switched, in fact, they are rozgaluzhuvachami. For the organization of non-drotovy z'ednan, serve as access points, which allow, for additional Wi-Fi technology, not only to connect without wires to the house of all the buildings, but in the "bridge" mode to bridge the whole segment of the local network.

In order to understand exactly, how much and what kind of possession you will need to bring for the creation of the future home textiles, to put together the topology. Paint the distribution scheme for all outbuildings-participants in the merezhі, as they will require a cable connection. It is important to choose the optimal location point for the router and, if necessary, additional switches. If there are any single rules, there are no such things as the physical distribution of the router and scrolls to lie down in the presence of various factors: the number of the type of outbuildings, as well as the order, as they will be laid; planning and expansion of accommodation; able to aesthetically view commutation knots; possibilities for laying cables and others.

Father, it's good to show up report plan your future measure, you can begin to proceed to the selection and purchase of the necessary property, installation and installation. Ale on qi those we will talk already at the offensive materials.

© 2022 androidas.ru - All about Android