Course work: Designing a local enumeration measure. Pobudov local networks Knowledge of the basics

Golovna / Main functionality

fold computer system for the processing of these data themselves on the basis of EOM, it is the most promising solutions, the oskilki secure the “clearance of the day” between computers, which does not depend on the annual supplementary data for the exchange of data. Crimium computers, at the edge can be switched on and other attachments (elements of the measure), which will ensure the processing or display of data.

According to the principle of territorial distribution of elements in the borders, the computer borders are subdivided into sprat species:

  • 1) local enumeration of land - recognition of the association of computers in the territory of the area;
  • 2) global computer networks - do not impose a border on the space of distribution of computers that are united;
  • 3) bezdotovі kom'yutern_ merezhi - allow arbitrarily change the position of the elements in the merzhі - fallow in the range of the rozashuvannya of the elements in the merіzhі stink can be implemented within the framework of local and global technology.

Local counting measures

Local counting lines (LAN) - a communication system that supports high-speed transmission channels in the borders of a closed territory digital information between connected outbuildings of a short-hour monopoly vikoristannya.

The work of the computer network is based on a different scheme of data transmission. An analogy for such a scheme can be the organization of telephone conversations between two persons, which are spoken in different ways, as shown in Fig. 3.11.

Rice. 3.11.

The collection of data to the skin level is determined by the merezhev protocol. Merezhevy protocol - ce standardizations set the rules for the sake of victory over the hour of data transmission. The same protocol allows computers to understand one another. Write all the protocols and those that computers send and receive blocks of data - packets (chi frames), delete the addresses of the manager and the controller, data and the control sum of the frame. For different protocols, expanding packets, their headers and formatting addresses of the holder can be changed.

Largest width mezhezhі protocols:

  • Novell IPX(InterPacket Exchange- exchange of data packets) - the main protocol for networks with the network operating system "Novell NetWare";
  • TCP/IP(Transport Control Protocol/Internet Protocol- transport control protocol/Internet protocol) - a set of mutually related protocols that are closely related to one another, recognized for data transfer in UNIX and global Internet networks, but can also be used in Windows networks;
  • "NetBEUI"(Network BIOS Extended User Interface - merging interface extensions) - the main merging protocol for keruvanes of the Windows operating system.

All current mesh protocols are based on the OSI model ( Open System Interconnection), as a transfer of sіm equal to the transformation of data, which will ensure the robot application programs at the border (Table 3.3). The lowest, the first rіven describes the rules of interaction with the application program, and the lowest, first, - the interaction with the transmission medium.

Table 33

Bagatorivne architecture of the OSI model

name

Appointment

Applied

Application programs access to related services

representative

Depending on the format for exchanging data between the elements of the merezhі, the need for their recoding, encryption and embossing

session

Established z'ednannya between the elements of the border, recognition of names and protection of data

Transport

Managing the flow of data, re-verification of pardons, re-manipulation and removal of packages

Addressing of data packets and translation of logical names and address of physical data routing manager

duct

Transfer of frames of data from the mesh line to the physical

Physical

Implementation of data transmission over a cable

Іsnuє impersonal ways of integrating computers at the border. The more computers, the more such methods. Merezha topology- tse її geometrical form or scheme of physical connection of computers one by one, giving the possibility to classify and classify different dimensions.

At wide-range topology all signals of one LOM element can be accepted by any other element of the merezhі. Tsya topology lie down to passive. Computers no longer "listen" to the data that are transmitted as often as possible, and accept those of them, the addresses of which they provide the addresses of the possessor. To that, out of harmony with one of the computers, the robots of others will appear. Before wide topology, there are three main types of mesh topology: “tire”, “tree”, and “star”.

The "bus" topology is shown in Fig. 3.12 vicorist one transmission channel (sound coaxial cable), tire titles.


Rice. 3.12.

All computers are connected without intermediary with the bus. At such a line, it is given to go in both straight lines at the same time. At the ends of the railings, there are special plugs (terminators), which ensure the protection of electrical signals. At the time of termination of the terminators, the signal was vibrated through the ends of the cable and turned into a mesh. This merezhovy topology does not allow sloppy connections at the same point. For other circuits, the "bus" topology allows the connection of computers with a minimum of wired cable.

In a network with "star" topology, all computers are connected via a hub (hub)- special attachment for connecting a group of computers (div. small. 3.12). Hubs can be active, which allow regenerating the signal, passive, which only switch the switching function, and hybrid, which allow connecting cables of various types.

For topology "star" direct connection between computers every day. The data of the skin computer are forced up to the concentrator, which transmits the data for recognition. The main problem of such a mesh topology is that if it is possible to connect between a computer and a hub, then the mesh will continue to function normally, only one computer with a flexible cable will be connected. Mismatch topology "star" є direct result of її troubles: out of tune with the concentrator will paralyze the work of all the networks. Mostly for the topology, you should also be careful about the cable length.

"Tree" topology - a number of "bus" topologies through a concentrator are shared for different networks great kіlkistyu computer.

In the last topology, the skin element of the mesh transmits signals to only one (another) element of the mesh. For this type of topology, the most common type of topology is the "ring" topology (div. Fig. 3.12), which is characterized by the presence of end points of the closure (the rim is closed in the ring). Data in the measure are collapsing in one straight. On the vіdminu vіd "zіrka" "kіltsyu" nebhіdny non-exploring path between computers, that poshkodzhennya cable should be made to the new teeth of all merezhі.

Definitely, it’s important to pay attention to nutrition, as the topology of the border is better. "Zirka" is richly arrogant, shards of a broken link in one exchange can only be produced until the inclusion of that exchange, and the entire line of the chain continues to function normally. However, the "zirka" vymagaє vikoristanny concentrator (to finish the folding and expensive add-on), out of the way to sound the robot of the merezhі. In order to equalize the different topologies, it is necessary to correct the impersonal factors, which should be added to a specific line, and only after their analysis of the growth of the visnovoks on the bark and other merry topology.

When you are prompted to finish the great merezhas, often the zmіshani merezheі topologies are victorious, sometimes even smarter.

At the same time, a part of the computer mesh is important for connecting wires or cables, which act as a physical medium for transmitting data between computers. The most wide are three groups of cables.

Coaxial cable for computer merezh maє 50 Ohm hvilovy opir. The wines are built up from the middle of the living, which exudes insulation, the screen looks like a metal braid and (or) a ball of foil and an outer shell. The presence of the screen well protects the signal from electrical faults. Transmission speed 10 Mbit/s. Thin coaxial cable (RG-58, about 0.5 cm in diameter, 10Base5 standard) connects directly to the tie adapter card and can transmit a signal up to 185 m. up to 500 m. This cable is connected through a special attachment - a transiver ( transceiver).

Vita pair - tse two interchanged one around one insulated honey darts. A sprat of twisted pairs is often placed in a single shell. Curling darts often helps to avoid electrical overshoots. Unshielded twisted pair (UTP - LOBaseT standard) is also widely used in LOM, allowing signal transmission to a distance of up to 100 m and is released in decal categories. In Denmark, the category has been expanded the most, as it allows you to transfer data with a speed of up to 100 Mbit / s, and it consists of a couple of pairs of the middle port. The biggest source of non-canceled betting twists is the low resistance to electromechanical shifts. Screened twisted pair (STP) may be braided midway, and the skin pair of wires is wrapped with foil.

To connect twisted bets to the truss elements, RJ-45 connectors are used with eight contacts, similar in shape to RJ-11 telephones.

On fig. 3.13 shows wiring diagrams up to mesh payment twisted pair computer (topology "star") and coaxial cable (topology "bus").


Rice. 3.13.

a: 1- Merezheva board, 2 - rose RG-45 for torsion pars; b: 1- Merezheva board, 2 - T-connector, 3 - BNC sockets on coaxial cable, 4 - terminator

AT fiber optic cable digital data is expanded by optical fibers at the sight of modulated light pulses. Theoretically, the speed of transmission can reach 200,000 Mb/s, and the range is over 2 km. So is the greatest theft, and the most expensive way of transferring data. Transmitting data is not up to electromagnetic shifts, and it is important to change. As a rule, it is possible to transmit data from a number of devices (digital data, telephone conversations, TV signal and etc.).

The fiber optic cable is made up of two optical fibers for data transmission in two directions. For quality, the cable may be covered with Kevlar. At the main board of the computer, with the use of a fiber optic cable, the light pulses must be converted to digital signals.

Іnfrachervone vipromіnuvannya allows you to transfer data in one place to a distance of three more than 30 meters with a speed of up to 10 Mbps. Sound infrachervone viprominyuvannya vikoristovuєtsya transfers of data between the elements of the local merezhі, yakі can often move, and zadnannya with portable computers.

For the transmission of signals between portable elements, they are vicorated by a local mesh transivery- Installed outbuildings, tied with a cable from a scrap, as they receive and transmit infrared vibration.

Radio broadcast The data is based on a variety of radio receivers and radio transmitters. Radio transmission in the narrow spectrum of frequencies is carried out on one arbitrarily assigned frequency. The distance of the call to lie in the minds of the passage of the radio, and the speed can reach 4.8 Mbit / s. Radio transmission in the smuz of frequencies allows you to establish calls between the elements of the line in dekilkoh radio ranges (channels), choosing the best way to hear the call.

At the present time, for the connection of outbuildings in LOM, a radio transmission according to the IEEE 802.11 standard, more commonly under the Wi-Fi trademark, is widely victorious. Shvidkist transmission of information at the bezdrotovіy merezhі to fall as in vіd vіdstanі mіzh points, which are exchanged with money, so in other factors, for example, equal change. For a speed of 11 Mb/s (maximum for 802.11b), the range becomes 30-50 m. As soon as it is determined by the strength of the signal, the protocol automatically selects the optimal transmission speed.

There, de vikoristovuyutsya computers, є elektromerezі. power lines. To that, it is natural to transfer it through electrical networks like electrical energy, and th data. In this case, it is necessary to install additional cables, so that when the computer is plugged into the wall outlet, it will automatically appear as a connection to the LAN. Advanced systems that transmit data over power lines can transmit data with a speed of up to 2 Mbps. In the future, this security will be promoted.

In order for the computer to work in a local area, it is responsible for the security of a special electronic board - a network interface card (synonyms - a network card, a network adapter), as well as a connection between the computer or another element of the network with the middle. Functions lace adapters different ways: organizing the reception and transmission of data, arranging security for the reception of that transmission, forming packets of data, coding and decoding, control over the correct transmission, etc.

Merezhevі adapters are prepared and functionally up to the standards of various meshing technologies and can be covered by different data transmission speeds. Largest wide Ethernet technology.

Merezhi Ethernet can be like “stars”, and “tires”. If a coaxial cable is selected in the data transmission channel, Ethernet merging configured as a "bus". In this case, the cable connection with the computer's intermediary adapter is connected to the help of a T-shaped BNC connector (div. small. 3.13). The sumarna dozhina cable segment merezhі sound no higher than 180 m-code.

In case of a different twisted bet, the Ethernet is configured as a “star”. Dovzhina exchange of stars (walking from the computer to the hub) may change 80-100 m.

Merezhevі adapters support other transmission channels, tobto. іsnuyu pay for work in Ethernet networks with coaxial cable and pay for work with twisted pair. There are also combined payments, which can be connected to a coaxial cable, and to bet twists.

The tether adapter is responsible for providing access to the trim medium. Access method - tse nabіr rules, yakі vyznachayut, as the computer is guilty nadsilat and receive data over the cable. All the elements of the measure are due to the victoriousness of the very method of access for zapobіgannya sprobі one-hour vikoristannya physical medium. There are three access methods: multiple access by carrier control, access by passing a token, and access by priority request. The rest of the two methods are considered to be selective, but small stations can stop the transmission of data only after the removal of the general permission.

Multiple access with carrier control. In Ethernet networks, data transmission speed is 10 Mb/s, in their own method, all computers in the network “hear” the cable and start data transmission only once, if the cable is available. Through this method is often called the method of supernition, the fragments of the skin computer are able to “catch” the medium that is being transmitted. If two computers start a transmission at the same time, the conflict is resolved and the data transmission is renewed at the same hour interval.

The test of the transfer can be vikonana once the transfer is necessary, which allows organizing shvidka robot in small yards. However, the speed of data transmission drops sharply due to the greater number of elements and the cost of the merezhi.

Access by passing a token. Vicoration method for merezh token ring that ArcNet, scho mayut topology "kіltse". The marker (especially the combination of bits) constantly circulates around the ring. In order to send data, the computer is to blame for the arrival of the marker and the request for yoga. Once the transfer is complete, the computer will allow the token and the next computer may be requested.

Access to priority request. The method is only valid for networks with concentrators that comply with the IEEE 802.12 standard (Ethernet with 100 Mbps data transmission speed - 100VG-AnyLAN). The concentrators have access to the cable, sequentially examining all the elements of the network and influencing the transmission request. Otrimavshi one hour kіlka zapіv, the concentrator gives priority to zapіv with more high priority.

When merging computers in a local area, the role of that other computer may be the same. Ring out the servers and work stations.

The server is a computer, which gives its resources to other computers in the local area. Vin is responsible for ensuring the security of data and authorization of access to them. Below are the main types of servers:

  • 1) the file-server is victorious as a centralized collection of information that will become of interest to a group of correspondents;
  • 2) the addendum server gives its own calculation of the pressure for picking up an "important" addendum; at the same time, on low-power clients, only the results of the work are transferred to the power supply. Most such programs are database management systems;
  • 3) server remote access serve to access remote computer(by telephone line) to the local border;
  • 4) druk server secure the bed of a variety of printers in the local area;
  • 5) mail server is engaged in the transfer of electronic communications between koristuvachs.

Servers can be seenі invisible. At the first turn, the server is no longer working on the network and cannot win as a working station. In another way, in parallel with the keruvannya merezhey, the server can be vikoristovuvatsya and like a working station.

Client (working station)- a computer that uses the resources of other computers in the network and acts as a backup for information from the server.

In some ways, the computers have been placed on the servers and the clients to get smart; one and the same computer at the same time can act as a local network server, and as a work station.

AT peer-to-peer all computers are equal. The skin computer functions as a server and as a client. "Vlasniki" of the computer independently administer all the resources of the personal computer, tobto. skin coristuvach can often vikonuvaty functions of the administrator of the measure. Peer-to-peer merezhichay vikorivuyutsya with a small number of computers at the merezhі (no more than 10-15) and in quiet depressions, if the merezhі does not show high levels of productivity and equal zahistu. Peer-to-peer measures are easy to manage and maintain and do not detract from the knowledge of special knowledge.

In a peer-to-peer network, the skin computer can override the server functions, but also the exchange functions. Sound to see the file server and that server to another. Organize the program server in a peer-to-peer network.

In the operating room Microsoft systems Windows introduced support for peer-to-peer merging - such a merging does not require additional software.

important

If it is necessary to organize the work in a large number of coristuvachivs, then the peer-to-peer merger becomes insufficient: the productivity of the merger decreases sharply and administrative problems are blamed. Bigness local mesh vykoristovuyut vydіlenі servers, specially optimized for svydkoї obrobki vіd koristuvachіv і vіd zahistu danih. In great networks, the productivity can be accumulated depending on the fact that the functions of the network are correctly divided between the servers. Name the role of the file server, addendum server and mail server beat different computers.

Merezhy on the basis of the server allow you to secure centralized access to data, data protection, regular backup. important information nadіynіst sberіgannya rahunіvannya іnformatsії іn the real іnformії іn the real hour (mirror disks) аl main advantage іn such merezh - possibilty of one-hour work and a large number of koristuvachіv for minimal productivity losses.

Active operating systems allow you to beat the server as an invisible server. Such a computer can perform all server functions and become a working station at once. Keep in mind, for example, that in such a mode, the productivity of the server's work is significantly reduced (for small networks, it is acceptable). Vigrash is an additional work place.

It is possible to organize a combined type of mesh. Such merezhes will overcome the advantages of peer-to-peer merging and server-based merging. With this, on client computers, operating systems can function, which only support peer-to-peer networks. Koristuvachs can apply the resources of their computers (catalogues, disks, printers). Operating systems computer-servers in order to ensure the functioning of all server services, the necessary protection of data on the server and administrative access. Pobudova of this type of merezha, ale dumku bagatioh merezhevyh administrators, to the most flexible and rational solutions.

  • Trademark rights belong Wi-Fi add-ons(URL: http://www.wi-fi.org).

Federal Agency for Education

OMSK INSTITUTE

RUSSIAN STATE UNIVERSITY OF TRADE AND ECONOMY

Department "Mathematics and Informatics"

Control robot

On the course "Informatics"

On the topic: “The main ambush

local counting measures "

Option number 25

Introduction……………………………………………………………………………...2

1. Understanding the LAN………………………………………………………………………..3

2. Basic model OSI (OpenSystemInterconnection)…………………………….5

3. LAN architecture………………………………………………………………...8

3.1. Tipi merez…………………………………………………………………...8

3.2. Topologies counting measure………………………………………….11

3.3. Merezhevі pristroї ta zasobi kommunіkatsiy………………………………………………………………………15

3.3.1.See twisted cables……………………………………........15

3.3.2. Measured map…………………………………………………………….16

3.3.3.Rozgaluzhuvach (HUB)…………………………………………………..17

3.3.4.Repeater……………………………………………………………......17

3.4. Tipi encourage merezh methods of information transfer……………..18

4. Rules for the installation of the cable part of the LAN………………………………………………………………………………………………19

References…………………………………………………………………26

Addendum……………………………………………………………………………27

Today, the world has over 130 million computers and over 80% of them are connected to various information and counting networks from small local networks in offices to global Internet-type networks. The all-world trend before the integration of computers in the region is motivated by low important reasons, such as an accelerated transfer informational notes the possibility of a quick exchange of information between correspondents, an otrimannya transfer of information (fax, E - Mail list the other) not in the workplace, the possibility of a meeting of the future, whether it be information from any point of the earth's backwoods, as well as the exchange of information between computers of various companies for the production of programs, without the need to bake

Such great potentiality, as it carries in itself an accountable measure and that new potential pidyom, which, with the knowledge of the information complex, and also significantly accelerated the manufacturing process, do not give us the right not to accept before the development and not to stop in practice.

Therefore, it is necessary to develop the principle of excellence in order to organize ITT (Information and Calculation Measures) on the basis of the already known computer park that software complex in support of the current scientific and technical developments with the improvement of the growing needs and the possibility of a further incremental development of the line at the link with the emergence of new technical and software solutions.


1. Understanding LOM.

What is the local counting of the mesh (LAN)? Under the LAN, it is possible to connect a number of computer workspaces (working stations) to a single transmission channel. For counting the number of measurements, we took away the possibility of a one-hour listing of programs and data bases of the kіlkom koristuvachs.

The concept of a local counting network - LAN (English LAN - Lokal Area Network) is included in the geographic area (territorially or randomly) of hardware and software implementations, for some kilka computer systems po'yazanі one z one for help vodpovidnyh sobіv kommunіkatsiy. Zavdyaki such a connection can be combined with other stations, connected to the station LOM.

Scrap metal plays an even greater role in the manufacturing practice. For the help of LOM, the system will be combined with personal computers, roztashovani on rich remote working areas, like vicorist, software that information. The work of the spivrobitniks ceases to be isolated and united in single system. Let's look at the advantages personal computers at the look of the internal counting line.

Podіl resources.

Podіl resursіv allows you to save resources economically, for example, using peripheral attachments, such as laser attachments to others, from other working stations.

Podіl danih.

Podіl dannyh naє mozhlivіst vozmozhlivіst access і adminіnnya databases z іnіh іnperіynyh working mіsts, yakі trebubuyut іnformatsії.

Submitted program contributions.

Podіl program zabіv, we hope the possibility of a one-hour centralization win, earlier than the installation of program zabіv.

Podіl resources of the processor.

If you add the resources of the processor, it is possible to count the number of pressures for processing data by other systems, which can be entered to the measure. The possibility is given to those who do not have resources “tossed” in the meantime, only through a special processor, an accessible skin working station.

Loans for rich coristuvachіv mode .

Rooted on a rich coristuvachіv power system to spriyat one-hour recovery of centralized applied software, previously installed and keranіh, for example, as a coristuvach system pracciuє z іnshim zavdannya, then in-line vikovaniâ robot vіdsuvaєtsya in the background.

Usi LOM is used in one standard adopted for computer networks - in the standard of Open Systems Interconnection (OSI) - vzaimodisti vіdkrih systems.

Topology of the zirka type.

The concept of the topology of the border at a glance came from the area of ​​the great EOM, in which the main machine takes and processes all the data from the peripheral outbuildings as an active data processing unit. This principle is established in data transmission systems, for example, email RELCOM. All information between two peripheral working areas is entered through the central high school of the counting line.

fig.1 Topology like a mirror

The capacity of the building is determined by the calculation of the pressure of the node and is guaranteed for the skin working station. Kolіzіy (zіtknen) don't blame them.

It's easy to sew cables, the shards of the skin working station are connected with a knot. Witrate the laying of cables high, especially if the central high school is geographically spread over the center of the topology.

With expanded counting lines, it is impossible to know the cable connection earlier than the cable connection: before a new working place, it is necessary to lay a large cable from the center of the line.

The topology at a glance is the most visible of the most common topological counting lines, the data transmission between the working stations passes through the central high school (with good productivity) along the next few lines, which are only used by these working stations. The frequency of powering transmission from one station to another is not high, but it can be reached in other topologies.

The productivity of the counting measure is ahead of us to lie in the tightness of the central file server. Vіn can be a thin piece of counting measure. At the time of exit from the operation of the central node, the robot of all the lines is destroyed.

The central control unit - the file server can implement an optimal mechanism to protect against unauthorized access to information. The whole counting line can be turned around from the її center.

Kiltsev topology.

With a ring topology, the working stations are connected one by one behind a stake, that is. work station 1 with work station 2, work station 3

2. Kiltsev topology

with a working station 4 thinly. The rest of the working station is connected with the first. The communication link is fading at the ring.

Laying cables in one working station to another can be foldable and expensive, especially as geographically working stations are spread far away from the country (for example, near the line).

The messages are regularly circulated through the stake. The working station is navigating to the last address of the information, forwarding the request from the ring. The reassurance is even more effective, so that more reassurance can be sent "on the road" via the cable system one by one. It's just possible to get a call on all stations. The frequency of transmission increases in proportion to the number of working stations, which are included in the calculation.

The main problem with the ring topology is that the skin working station is guilty of taking an active part in the transmission of information, and at the same time, if one of them wants to paralyze the entire network. Faults in cable connections are easily localized.

The connection of a new working station will require a short-line marking of the line, the shards for the hour of the installation of the ring may be rozimknene. The exchange for the length of the counting line is not possible, the shards of it, zreshtoy, are counted exclusively between the two working stations.

With a bus topology, the middle of the transfer is in the form of a communication path, available day to all working stations, which all can be connected. All working stations can contact without interruption from any working station that is in the area.

fig.3 Bus topology

Working stations be, if, without interrupting the work of all counting measures, you can be connected to it. The function of calculating the number of deposits is to become a working station.

In a standard situation for an Ethernet busbar, a thin cable or a Cheapernet cable with a tripe connector is often used. Vimknennya that is especially connected to such a measure of bus expansion that causes disruption of the circulating flow of information and the system freezes.

Wood-like structure of the LOM.

Entrusted with the help of the topologies of the counting of the ring, star and bus, practical zastosovuєtsya and combined, for example, a wood-like structure. It is important to look at the combinations of the best-guessed topologies of the counting lines. The basis of the tree of counting lines is roztashovuєtsya at the point (root), from which the communication lines of information (gіlki tree) are taken.

The counting of the fences with a tree-like structure can be stuck there, where it is impossible to stop the basic fence structures in a clean look.

fig.4 Wood-like structure

3 .3. Merezhevі pristroї ta zasobi kommunіkatsiy.

How to make communications most often twisted pair, coaxial cable, fiber optic lines. When choosing the type of cable, the following indications should be given:

· versatility for installation and maintenance,

· speed of transmission of information,

· substitution for the size of the transmission line without additional subsidiaries-repeaters (repeaters),

· safe transmission.

The main problem lies in the one-hour security of the transmission of data, for example, the security of the transmission of data is surrounded by the most possible means of transmission of data, with the necessary security of the transmission of data. Easy extension and simplicity of expansion of the cable system add to its versatility.

3.3.1. See twisted cables.

Twisted couple.

The most inexpensive cable connection is the most common cable connection, often referred to as "twisted pair". It allows you to transfer information with a speed of up to 10 Mb/s, it is easy to increase, the prote is not protected from the crosscode. The length of the cable cannot exceed 1000 m for a transmission speed of 1 Mb/s. Advantages are low price and ease of installation. In order to increase the noise immunity of information, it is often necessary to use a shielded twisted pair, tobto. twisted pair, placed in a screen shell, similar to the screen of a coaxial cable. Tse zbіshuє vartіst torsion bet and nablizhaє її tsіnu to tsіni coaxial cable.

Ethernet cable.

The Ethernet cable is also a coaxial cable with a 50 ohm support. It is also called thin Ethernet (thick), yellow cable or 10BaseT5. Vіn vikoristovuє 15-contact standard included. After all, switching vins is an expensive alternative to traditional coaxial cables. The maximum available distance without a repeater does not exceed 500 m, and the distance between the Ethernet lines is close to 3000 m. The Ethernet cable has its own backbone topology.

Cheapernet cable.

Cheaper, lower Ethernet cable is a Cheapernet cable or, as it is often called, thin Ethernet or 10BaseT2. This is also a 50-ohm coaxial cable with a speed of ten million bits per second.

When connecting segments of the Searegnet cable, you will also need repeaters. The number of measurements with Cheapernet-cable may be small and the minimum amount of damage when growing. Z'ednannya merzhevy boards carried out for the help of small-sized bayonet roses, which are widely vicorous (CP-50). Additional screening is not needed. The cable is connected to the PC for additional triplets (T-connectors).

The distance between two working stations without repeaters can be a maximum of 300 m, and the distance between two working stations on a Cheapernet cable is about 1000 m.

Fiber optic lines.

The most expensive are optical conductors, which are also called fiberglass cables. The wide range of information from them reaches a few billion bits per second. Permissible distance over 50 km. Zovnishhnіy vpliv pereshkod practically vіdsutnіy. At the moment, the best way to get a scrap for scrap. The stench will stop there, deviating the electromagnetic fields of the crossed code, or the transmission of information on a large scale without repeated repetition is necessary. The stench is driven by protipidushyuchimi authorities, so that the technology of wiring in fiber optic cables is even more foldable. Optotransporters unite in JIBC for the help of a mirror-like network.

The tie adapter board acts as a physical interface, or is connected between the computer and the tie cable. Payments are inserted at special slots (extension slots) of all computers and servers. In order to secure the physical connection between the computer and the truss, to the appropriate socket or port, pay (after it is installed) connect the tether cable. Purpose of the twill adapter:

Preparation of data, which should be taken from the computer, before transmission by a cable;

Data transfer to another computer;

Data flow management between computer and cable system;

The tethered adapter board accepts data from the tethered cable and converts it to a form that is understood by the computer's CPU.


The tether adapter board is made up of the hardware part and the programs that are stored in the ROM (permanent memory device). These programs implement the functions of logical link control and access control to the middle channel layer of the OSI model.

Rozgaluzhuvach to serve as the central node in the merezhakh from the topology "zirka".

When transmitting over a cable electrical signal progressively weaker (extinguishing). І, the floorings appear, that the computer stops receiving it. To prevent the signal from being created, a repeater is installed, which reinforces (introduces) the weakening of the signal and transmits it further along the cable. Set up repeaters in meshes from the “bus” topology.


3.4. Tipi encourage merezh methods of transmission.

Local Token Ring merging.

This standard has been distributed by IBM. As the transmission medium is not screened or shielded twisted pair (UPT or SPT) or fiber optic. Transmission speed 4 Mb/s or 16 Mb/s. As a method of managing the access of stations to the transmission medium, the method - marker ring (Token Ring) is victorious. The main provisions of the method:

Outbuildings are connected to the border topology of the ring;

All attachments, connected to the border, can transmit data, having less than allowed to transmit (marker);

At some point in time, only one station in the city may be right.

There are three main types of packages in IBM Token Ring:

Control/data package (Data/Command Frame);

Marker (Token);

Skidanny package (Abort).

Package Management/Data. For the help of such a package, the transmission of data or commands is carried out by a robotic network.

Marker. The station can start data transmission only after retrieving such a packet. In one quarter, there may be only one marker i, obviously, only the station with the right to transfer data.

Drop package. The power of such a package is called pinning any kind of gear.

At the edge you can connect computers with topology around the circle.

Local Ethernet network.

The specification for Ethernet, for example, seventy years ago, was propagated by the Xerox Corporation. Recently, Digital Equipment Corporation (DEC) and Intel Corporation have joined the project. In 1982, the specification for Ethernet version 2.0 was published. Based on Ethernet and IEEE 802.3 standard. The details between them are insignificant.

The main ambush robots.

On the logical level of Ethernet, the bus topology is established:

Mustache extensions, connections to the fence, equal rights, tobto. whether or not the station can start the transmission at some point in the hour (as the transmission center is free);

Data that is transmitted by one station is available to all stations of the border.

10BaseT

In 1990, the IEEE issued the 802.3 specification for enabling twisted pair Ethernet networks. 10 BaseT (10 - transmission speed 10 Mbit \ s., Base - high-width, T - twisted pair) - Ethernet network, so for connecting computers, call the vicorist unshielded twisted pair (UTP). More networks of this type will be like stars, but the signal transmission system will have a bus, like other Ethernet configurations. Ring the rozgaluzhuvach merezhі 10BaseT to act like a rich port repeater. The leather computer is connected to another end of the cable, connected with a wire, and the other two pairs of wires: one for reception, the other for transmission.

The maximum length of a 10BaseT segment is 100 m. The minimum length of a cable is 2.5 m. A 10BaseT LOM can serve up to 1024 computers.

To encourage merezhі 10BaseT stop:

Z'ednuvachi RJ - 45 on cable ends.

The distance from the working station to the rozgaluzhuvach is no more than 100 m-code.

10Base2

Applies to the IEEE 802.3 specification, this topology is called 10Base2 (10 - transmission speed 10 Mbit / s, Base - high-volume transmission, 2 - transmission to the distance, which is approximately two-width over 100 m (actually, the distance is 185 m).

This type of mesh is oriented to a thin coaxial cable, or thin Ethernet, with a maximum segment length of 185 m. The minimum cable length is 0.5 m. maximum number computers, which can be connected to a 185-meter segment cable - 30 pieces.

Components of the "thin ethernet" cable:

BNC barrel - conectori (zadnuvachі);

BNC T - conectory;

BNC - terminators.

Merezі on a thin Ethrnet, sound the bus topology. The IEEE standards for thin Ethernet do not pass a transceiver cable between a T-connector and a switcher. Natomist T - the connector can be placed directly on the plate of the mesh adapter.

BNC barrel - connector, connecting segments to the cable, allowing you to increase the cable length. However, it is necessary to call them to a minimum, shards of stench will degrade the clarity of the signal.

Merezha on a thin Ethernet is an economical way to implement a network for small businesses for work groups. Wiring in such meshes, the cable is not expensive, easy to install, easy to configure. Merezha on thin Ethernet can support up to 30 nodes (computers and printers) per segment.

A network on a thin Ethernet can be made up of a maximum of five cable segments, connected by two repeaters, and even up to three segments, with which can be connected to working stations. In this way, two segments are reserved for repeaters, which are called interrepeater links. This configuration is called the rule 5 - 4 - 3.

10Base5.

Depending on the IEEE specification, this topology is called 10Base5 (10 - transmission speed 10 Mbit / s, Base - high-speed communications, 5 - segments of 500 meters (5 times of 100 meters)). The second name is standard Ethrnet.

On a thin coaxial cable (those Ethrnet) sound the bus topology. Ethrnet can support up to 100 nodes (working stations, repeaters only) per backbone segment. The backbone, or the backbone segment - the head cable, to which the transceivers connect with working stations and repeaters connected to them. A segment of a thin Ethernet can be up to 500 meters long for a total length of 2500 meters. The tolerances for thin Ethernet are higher, lower for thin Ethernet.

Cable system components:

Transivery. Transiveries, securely communicating between the computer and the head cable LOM, driven from the "vampire's tooth", connected from the cable.

Transceiver cables. Transiver cable (output cable) rear cable from the tether adapter board.

DIX is a connector, and AUI is a connector. This connector is loosened on the cable of the transiver.

Barrel - connectors and terminators.

A network on a solid Ethernet can be composed of a maximum of five backbone segments connected by repeaters (for the IEEE 802.3 specification), and up to three segments can be connected to computers. When calculating the total life of the "twist Ethernet" cable, the length of the transceiver cable is not insured, so it is only the length of the segment to be insured to the "twist Ethernet" cable. The minimum distance between dry connections is 2.5 meters. Qiu vіdstan not to enter the cable of the transiver. Tovstiy Ethernet buv rozbroleny for pobudovi LOM in the framework of the great vіddіlu liv all budіvlі.

Ring at the great strings with the help of thin Ethernet. Tovsty Ethernet is good as a backbone, and for segments that need to be installed, thin Ethernet is installed. You singly remember that Ethernet can have a large core and can transmit signals of a larger width, lower thin Ethernet. The transceiver is connected with the "Ethernet" cable, AUI - connector to the transceiver cable, turn on the repeater. Segments of "thin Ethernet", which are connected, connect with the repeater, and computers are already connected to them.

10BaseFL.

10BaseFL (10 - transmission speed 10 Mbit / s, Base - high-frequency transmission, FL - fiber optic cable) to the Ethernet network, which computer and repeater are interconnected by a fiber optic cable.

The main reason for the popularity of 10BaseFL is the ability to lay a cable between repeaters on a large stand (for example, between telephones). The maximum length of a 10BaseFL segment is 2000 meters.


8-pin modular sockets (modular jack) are used for connecting cables. Installed on the cables for the help of special pliers with 8-pin RJ-45 sockets.

Fig.5 Modular socket Rice. 6 8-pin RJ-45 sockets

When exchanging data between two outhouses, one of the outbuildings may be connected with the transfer of the other one. The twisting of pairs (cross-over) is realized in the middle of one of the extensions under the hour when the cable is connected to the nest. The functions of porting concentrators and switches allow changing the type of wiring of conductors in nests (MDI-X or Normal). Some computer adapters don't allow you to change the port's port type and it will be set to either MDI or Uplink.

Figures 7 and 8 show options for connecting ports with a straight and twisted (cross-over) cable.

Cable sticks are responsible for the safety of at least 750 cycles of closing-opening.


The patch cable category may match the cable category for a horizontal system.

· Patch-cables of a faulty mother with a rich conductor for ensuring sufficient flexibility.

Cable laying

1. In order to avoid the shaving of the conductors, the tightness is not to blame for overshooting 110N.

2. The radius of the twist is not to be blamed for any smaller than 4 diameter cable for horizontal wiring.

3. Avoid cable crushing, the reasons for which may be:

Twisting of cables pіd hour of installation;

Careless installation of cables;

Overhead cable laying at the channel;

Cable characteristics: diameter 0.2", RG-58A/U 50 Ohm;

Acceptable roses: BNC;

Maximum segment length: 185 m;

Minimum distance between nodes: 0.5 m;

Maximum number of nodes per segment: 30

Cable specifications are given in Table 1.

Table 1. Cable specifications 10BASE2 (ThinNet) RG 58 A/U and RG 58 C/U

Table 2. Electrical specifications of cables of category 3, 4 and 5

Cold Opir: 50 Ohm

Maximum segment length: 500 meters

Minimum distance between nodes: 2.5 m

Maximum number of nodes per segment: 100

AUI cables are twisted for connecting AUI ports from backbones to a common coaxial cable. The maximum length of the cable is 50 meters.

Table 3. AUI cable specifications

Visnovok

Which robot had a look at the main warehouses of the LAN. Today, the development and promotion of ITT is one of the most important and most important tasks in the gallery of information technologies. Increasingly, the need for operational information is increasing, and the traffic of all equals is constantly growing. New transmission technologies are being introduced to ITT. In the middle of the rest of the results, it is possible to designate the possibility of transmission for additional power transmission lines, moreover, this method allows you to increase the speed, and the reliability of the transmission. Merezhev technologies are already developing rapidly, so the stench is beginning to be seen in the okrema information galuz. Vcheni predict that the closest access to the center of the galaxy will be more effective than other transmission facilities (television, radio, others, phone too). A computer will come to replace the “old” technologies, and there will be connections to some global flow of information, maybe the Internet, and from this stream you will be able to take away information whether it is in any way. If you can’t believe that everything will be like this, shards mesh technologies, As computer science itself is the youngest science, and everything is young - it’s not overbearing.

List of literature:

1. N. Malikh. Local measures for chatkivtsiv: Pdruchnik. - M.: INFRA-M, 2000.

2. N. Olifer, V. Olifer. Basic technologies of local merezh. Assistant. - M.: Dialogue - МІФІ, 1996.

3. Computer systems. Primary course / Per. from English - M: Vidavnichiy viddil "Russian Redaktsiya" TOV "ChannelTradingLtd.", 1997.

4. Berry Nance. Computer systems: Prov. from English - M: Skhidna book company, 1996.


addendum

Option 5. .

Option 5.

Table 5

Zvorotna vіdomіst z obіku

dietary products

Product name Alone in the world surplus Werewolf surplus
Paraffia Vitrata

Good day to the readers of the blog, today I want to tell you about Cisco's local network in simple words, to that even more often I have to set different nutrition related to this topic. I have written about them in one article, and the information for future engineers will be correct.

Cisco Lifecycle

Lifecycle, English language is translated like an hour of work, or the life of your decision, it includes six stages:

  • Preparing > at this stage, encourage local measures to be taken, investing in a viable economic investment for the whole project
  • Planning > Evaluation of readiness to support the proposed solution, for example, what is fahivtsi, who needs to work out what integrator
  • Design > At this stage, the creation of a maximum report project, in which all the wants and needs of the business with technical assistance are described
  • Provadzhennya > well, here it dawned on me that those who designed, it is necessary to implement
  • Robot > good operation and security of uninterrupted work
  • Optimization > search for solutions or technologies, for which it is possible to improve the work of local networks.

What is the all-world computer network

After that, as we have sorted out the cycle of life and the divisions of the borders, it is necessary to know the signs, as I describe it.

Merezha computer(Computer NetWork) - the totality of computers and other attachments connected by communication lines and exchanged information among themselves according to the rules - the protocol. The protocol plays an even more important role, the shards are not enough to connect the computer with communication lines.

Below is a general scheme, like through the Internet everything is united into one goal, I guess what the Internet can describe let's just describe, Tse merezha merezha, tobto a bunch of local merezhas united into one great merezha. Like a bachite for a little one, you allow offices to communicate with their central offices, mobile koristuvachs to work outside or at home, light becoming mobile. I think you have now realized that such an all-world computer network.

Physical components and measures

Let's explore some of the components of the local dimension. As a task, the engineers stood in front of the engineers, what they are doing, so that I will add A to the operational memory, the information was transferred to the operational memory of the Annex B. They gave them for the account of the addenda, which are worked out for the singing protocols, the information is kept and hoped for. The scheme is like this:

  • The card is inserted into the computer
  • Switch > manage your own line to your other router
  • Router required commutator as soon as possible before the new route, and then the packets are processed by the computer with the same information.

How to bachite a local network (LAN), even more logical and simple.

As if to marvel at the average statistical measure of business, it looks like this. The root switch, the core of the merezhі, to the new connection to the switch of another equal, as it is fixed, I described in the article How to set the cisco switch on the 3rd equal. The entire network can be segmented by VLANs, є Cisco DHCP server or on Windows, it doesn’t matter, send all traffic that goes beyond the local network, go to the router, and go further to the Internet, static Cisco routing. Apply the patching of the Cisco router already leading.

How to pour coristuvatsky programs on the mesh

Let's take a look, see how the traffic is present in the city and how to stink on it.

  • Package programs > butts can be both ftp and tftp protocols, interfacing between computers and no direct messaging of people. Here smuga is missing, obviously, important, but does not play a key role.

  • Interactive programs > tse offensive type of traffic > There is already є іnteraktiv mizh coristuvachem and computers. A simple butt - the same browser or downloads to databases. So, as a courtesy of the points, the hour of the reaction of the system is important for the new, but not playing the most important role, as it is, obviously, no more than a long time. A simple butt came to the work of a person, but for a reason they got nasty and stepped on his foot, that one got wet :) hvilina, And after two wines there will be gundosity, that everything is nasty pracyuє, and from the same wines, having sprung up, having drunk, that ours played football against the English, then be it a zatrimka, there will be no attack on the new viklikati fiercely, wines for an hour ochіkuvannya talk about yesterday's football.

  • Programs in real time > let's look at how busy the communication channels are and here the connection between people and people. Butt can be VOIP and Video traffic, sound is more priority over video. Even more critical after the hour of delay, messengers can serve as a butt, on ICQ kshtalt, de traffic is minimal, but a person can take away yoga mittevo.

  • P2P traffic > all peer-to-peer networks (Peer-to-Peer), with a simple butt, they can be torrented 🙂 for operators in the linkage of the link, like clogged channels, but still not the blame for one simple reason that the tightness of the links in the linkage is allowed process the current needs of supporters and business. Before speech, Skype, so itself works for the p2p protocol.

Characteristics of local merezh

When prompted by the local Cisco network, that and not only її, it is necessary to secure a low level:

  • Shvidkist
  • Vartist
  • Bezpeka
  • Availability
  • Scale
  • topology

Models

We have already explained the main characteristics, now let's figure out how the models should be studied. First topology, yaku guessed, called

  • Bus topology > with this model, wait for a network, one full data transmission bus comes out, and all participants (attachments) receive a signal that nothing can be predicted 🙂 I told you about the hub. The topology is even more unsafe, since it could easily take away the data that is not recognized for you, plus the opening of the central bus, leading to the complete impracticality of the local network. We began to think that it was still possible to grow a solution and guess.

  • Ring topology > transmit signals to the call. Three pluses are less staining on cables, especially for optics. One point of view.

As a result of the struggle for stability to strength, they extended the axis of such a design, FDDI underpinned the Kielce topology. Here the signals are transmitted at the opposite straight lines. Vykoristovuetsya operators zv'yazku.

  • All data is transmitted through the central vuzol, where the point of reference is critical, but in today's minds, everything is duplicated, beyond the clustering. І when shaving one of the line transmissions, the lines continued to be practicable, it was necessary to reach the equals with the lower models to induce a measure.

The axis is a further development and more stable, lower mirror-like topology, ale like a legacy and more expensive. Navіt yakscho to move the core, its segments of the local lines pracyuvatimut, and check if the core is lifted.

If you are going to be a corporate measure, you are to blame for the good to think over everything and know all the weak points, so that, if possible, you will try or zadublyuvat them.

There may be another option, leather with leather, it is completely resistant to wear, but the expensive one is not real. Butt can booty wuzley phone call(not Stilnikovy), it is called tse pov'yazana komіrchasta topology.

Prodovzhuєmo raszbiratsya in pobudovі local ї merezі and razglyany like darts vykoryvayutsya for tsgogo zavdannya.

Merezhnі droti and sockets

Twisted couple

If you want to work on local strings, you need to choose some darts for which you will win. In today's offices, most of the connections for the local area use Ethernet technology, where the signal is transmitted over the so-called twisted pair (TP-Twisted Pair), which consists of several middle twists one by one (for changing the transition) pairs of wires. The leather administrator is guilty of the nobility of the sequence, embossing this dart, to make a new patch cord.

If there is a computer cable, most often it is a non-shielded CAT5 cable, and the CAT5e version is most often perfected. Cables of similar category allow transmitting a signal with a speed of 100 Mb/s with less than two pairs (half) of darts, and 1000 Mb/s with a variation of all four pairs.

For connecting to extensions (routers, commutators, tie cards), 8-pin modular connectors are installed on the ends of the twisted bet, RJ-45 everywhere (though the correct name is 8P8C).

Keep in mind that a great twisted couple is not approved for outdoor activities. Temperature drops, influencing moisture and other natural factors, can lead to gradual collapse of insulation and a decrease in functional capacities, which, perhaps, will lead to the exit of the segment of the border from the fret. In the middle mesh cable is visible on a fresh surface from 3 to 8 years, moreover, the quality of the mesh is more likely to fall back before the cable exits the operation. For tapping on a hardwire, it is necessary to tap a special twisted pair for hardwired wiring.

Pobudova local fencing, which transmits multiple cables for interconnecting computers at the fencing, you can obviously connect them without a middle to switches or routers to roses on the fencing cards of the PC, and also the other option is the receptacle. In this case, one end of the cable is connected to the port of the switch, and in the correct way, the patch panel and from it are already in the switch, and the other with the internal contacts of the socket, at the outer rose, you can connect the computer or both outbuildings.

Why can you tell me to tweak the patch panel in our local area, it's easier to build it directly into the switcher, I'll point the pluses.

On a small animal of representations, the view of the patch panel is from the front and back. Like a leather port of numbering and you can sign the number of the socket with some kind of connection, which allows you to draw a map of the grid, and look for the socket you need to borrow a couple of mittevs from you, to see that the yakby socket would lead directly to the switcher, it’s elementary to fly with a signature and then use a probe to find out.

Another thing is that the patch panel is fixed and all the cables that go into it from the back, fasten with ties, that you transfer, so you don’t tamper with the connection between the socket and the patch panel, and we have a yakbi wired directly into the switch, then bula b the ability to destroy the link with the socket for the rahunok of the fluffy sound of the drota, for example.

Merezhnі sockets can be put as if they were built into the wall, and so they are mounted, for example, in a box. Zastosuvannya sockets replace cables, what to wash, give a more aesthetic look to your work space. So the rosettes themselves can be manually twisted as reference points of various segments in the line. For example, you can install a switch or a router near the corridor, and then install the cables to the sockets, located at all necessary premises. In this rank, you take away the sprinkling of points, spread out in different parts of the apartment, to which you can be, if you like, connect not only a computer, but also be a small annex, for example, add-on switches for expanding your home or office space.

One more trick, which you may need when you have a cable tie, you can winch, which you can win for the connection of two twisted pairs with already wrapped RJ-45 roses. For example, you have a pair of wires 3 meters, and you need 5 meters for connecting a working space, you can wire one for two small boxes.

Also, for connecting up to one cable to two computers without switching the switch, you can switch the wires. But again, I’ll remind you that in this period the maximum speed of data exchange will be 100 Mbit / s.

Like a bachite when you wake up locally, it’s too rich various componentsі nuances, і knowledge of all yogo warehousing, zaruka suspіhu and vidsutnіst problems with the system administrator.

This is one of the first conductors, who victorious for the creation of strings. Take away the central conductor, the ball of the insulator in the copper or aluminum weave and PVC insulation. The maximum speed of data transmission is 10 Mbit. The cable is very thin to the electromagnetic guidance. Some of the sick-fitting is repaired important (Potteribna Skaika І Retheletsі izolyatsіya), Alya, Pisil, Vіdnovna Dіlanka Pratsyuє Rylily і Nestabalo: Z'Anevyuzhuyu Specotnus ECTROTROSHTROGNIKHY CHILL, SHO ROSPOVYUDGUE IN THE KAKSIAL CABLE, SHO CALL TO PATT IINFORMAKY.


In Denmark, the coaxial cable is mainly used as a conductor for the signal of satellite dishes and other antennas. At local fencing, a cable with a soft support of 50 ohms is installed, and the transmission of a TV signal is 75 ohms, stink between them. In modern computer systems, the use of a coaxial cable, it sounds, is not true, and in the article, nothing can be seen.

For example, I have a provider in Moscow via a coaxial cable that gives me internet and TV, how to start my router, and if there is, I already take the internet via rj-45 to the computer.

Dali be

In the world, local merezhi have become uncomplicatedly necessary - stench is practically necessary for achieving a good level of productivity of work. However, first of all, first of all, it is necessary to make such a fringe, and then to create it. Obidva tsi processes dosit folded and vymagayut maximum zoseredzhennya, especially the first. Incorrectly designed and built LOM is not practical, but it will not function properly, as it is necessary, so the creation of a local network can become a center of concern for the respect of people, as they are engaged in cim.

What is a local mesh

As a rule, the creation of such systems is linked to the need for a collective selection of data by coristuvachs, as they work on distant counting machines. SCRAP does not only give the possibility of a simple exchange of information and one-hour work with files, but it also allows you to use printers and other attachments in the distance.

Local border - the whole complex of software and hardware resources, directing the creation of a single information space. In fact, a whole bunch of computers, roztashovannyh z vіdrivom each other and z'єdnієyu zv'yazku - cable. The head office of SCRAP for other types of merging small vіdstan on which work stations are known.

Pre-project preparation and design

Before that, in order to create a local border, it is necessary to design in order to plan the process of creation. This stage is one of the most important, the fragments of scrap include its own anonymous components and knots.

The technical task is built up on the basis of the first data, indicating a few moments:

  • Functions and task LOM.
  • Selected topology.
  • Perelik available possession.

Just having chosen these points, you can expand the design. The project itself is guilty of revenge on the LOM scheme, the distribution points of the trussed property, the list of necessary software and hardware features.

The local truss is a folding mechanism, but if it is designed correctly, and the possession is chosen vaguely to the point of being able to, then the possibility of problems in the operation of the mechanism becomes minimal.

Required hardware

Іsnuє perelіk obladnannya, without some kind of hodn, SCRAP cannot function. Before entering:

  • Transmission lines. The most common choice is coaxial cable and optical fiber. At this time, the coax is impossible to move a few hundreds of meters, but for the necessary lengths of the long line, it is necessary to use special repeaters - repeating the signal, like letting it go out.
  • Communications features: mesh cards (attachment, which is used for duplex exchange of information between a computer and a data transmission medium), concentrators (divide the link into smaller segments, structure the link physically), routers (take the route of packet transfer), switches (logically LAN on segments, connecting the splice of physical channels), repeaters (to secure the signal, allowing to increase the length of the transmission medium), transiveries (to boost the signal and convert it to another view, allowing the transmission to be changed by different mediums).

Transfer of software

Zhodna SCRAP can't be done without software. General language programs for local media include:

  • Operational systems of working nodes. The most frequently beaten OS is abandoned by Windows 7, although Windows XP also does not take positions.
  • Merezhevі OS, which are installed on the servers, is the basis of the LOM, so it is impossible to build a local network without them. The software itself can take over the management of all data flows between the head nodes and other nodes, ensuring the possibility of collective access to the resources of the network. As a rule, the OS of Microsoft Corporation is tagged: Windows Server 2003 chi 2008.

  • Merezhevі services and programs, scho give koristuvachs the ability to access to remote files, other documents on lace printer, reviewing the working nodes that are in the merezhі, as well as strengthening the electronic support. The implementation of such services is behind the software support.

Creation and installation of SCRAP

Assembling and adjusting robots take more than an hour, so that you can create a local border to lie down at a sprinkling of stages:

  • Before the beginning of the installation of the line connection and the switching outbuildings, it is necessary to prepare the installation in advance.
  • Further, you can install the cable, as well as install the necessary equipment.
  • To the cable line, the link is connected by connecting the server and working stations.
  • After that, the installation and adjustment of program facilities is carried out.

Installation of the cable and its possession may have a number of features, which, as a rule, is blamed on the folding, as a connection to the local network, shorter solution what nutrition should be entrusted to specialists.

Combination of two computers at LOM

In some areas, you may need to combine two computers in one measure, for example, to create a shared information space. It’s not too complicated, as it’s possible to win the song algorithm for diy:

  • If necessary, install the required adapters into the computer interface, not forgetting about the drivers.

  • Prydbati crimped cable for connection. For the obviousness of the necessary knowledge and skill, it is possible to vikonate and independently - a local network of two computers will not become the highest quality.
  • Get offended by the working station line of communication.
  • Nalashtuvati SCRAP in the singing order.

Algorithm for setting up local networks between two computers for Windows 7

  • Select the "Start" menu, after which, right-clicking the mouse on the "Computer" icon, go to the "Power" submenu.
  • It is necessary to know in the list "My computer and domain", and then select the item for changing the parameters.
  • I need to change the name of the counting machine by pressing the appropriate icons.
  • This group can be left without change - "Workgroup", however, the computer names are changed to "pc1" and "pc2" for the first and the other subscriber, obviously.
  • You can now click the OK button and restart your computer.

For most patients, you may need to assign a skin node an individual IP address:

  • From the "Start" menu, select "Setup", and then "Merezhni podklyuchennya".
  • Right-click on the sub-menu "Power" on the pictogram "Z'ednannya z local merezhey".
  • For the "Zahalni" depositor, select "Vlastivostі" for the item "Protocol to the Internet".
  • To do this, activate the row "Wake up the IP address" and enter the value 192.168.0.100. If so, save the ruined change.

Local network and internet

Working universities, united in LOM, can be connected to the Internet. Local network, the Internet until you can connect in two ways, if you work with a divided security.

The first way to connect is to use the router, which hopes to identify the IP address. And in another way, you can coristuvatsya without a dart connection.

In this way, the local barrier is the interplay of two computers, master and slave, that IP-addresses are registered in the gateway of the main one, which is forwarded to the all-world barrier.

As a rule, LOM is based on a different server, the skin working station is responsible for its mother's individual IP address, and a proxy server is specified in the settings of the browser, through which it connects to the Internet.

Rootless local mesh

Bezdrotova local merezha - ce subtype of LOM, which transmits information to high-frequency radio waves. WLAN is a miracle alternative to the ultimate cable system, with low traffic:

  • Polypshennya productivity pratsі. WLAN gives you the ability to communicate with the Internet and, for that matter, do not be tied to one site. You can freely change your space without having to connect to the Internet.
  • Easy installation and installation, economy of finances and reliability - all factors connected with the cable line connection.
  • Gnuchkist. Installation of a wireless wire is real there, there is no way to stretch the cable.
  • Possibility of expansion. The scalability of the mesh is completely reduced to the coreless mesh adapters, so you can install any kind of working vuzol.

WLAN has a long range, such as to lie down due to the characteristics of the framing outbuildings and the security of life. As a rule, the range of radio waves reaches 160 m-code.

Necessary equipment for the folding of a non-drotous local fence

To connect other working stations to the border, the access point will win. This attachment is equipped with a special antenna that controls the duplex transmission of data (overpower and transmission) for additional radio signals. Such a point can transmit a signal at a distance of up to 100 m at a distance of up to 50 km on the open territory.

Access points now expand the number of tensions in the communication system, allowing coristuvachs to freely move between the skin of them, without interfering with the LOM or the Internet. In fact, radio channels act as concentrators, ensuring the connection between the mesh.

Wikoristanya access point allows zbіshiti scaling sієї drotovoї ї ї ї ї ї ї ї ї ї ї ї, її ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї ї її ї її ї ї ї її її ї її їріїтірїміс аааааааааааааааааааааааааааааа. The number of subscribers, as if you could see one radio point, lie in the field of interest, and share traffic equally between skin and coristuvachiv.

Rootless local merging: Windows 7. Algorithm for fixing

At the same time, you need to prepare an ADSL modem with WiFi technology, as well as client points with wireless adapters connected to them. The next thing you can do is start without a dart:

  • Connect the modem to the electrical grid.
  • Run the WLAN setup wizard on the client extension.
  • Select the SSID from the list of known dartless networks.

Setting up an access point:

  • We need to increase the authority of the TCP / IP protocol by specifying the IP address and the mask of the subdivision.
  • What is the next meaning DNS servers, so it is impossible to fix the local measure completely without this parameter. Most often, it is enough to add an active item about automatically recognizing DNS addresses.
  • Obov'yazkovim є i nalashtuvannya parametrіv ї samoї drotovoї merezhі, in yakіy important є є bezpechennya bezpeka.
  • At this stage it is necessary to adjust the connection to the Internet and filtering for the Windows 7 firewall.
  • І in the rest of the week, a wiring connection and a re-verification of the WLAN service data will be carried out.

In order to create an optimal information space, you can combine see-merezh - cable and bezdrotov, allowing you to win over the skin from them for the benefit of business. However, it is important to remember those who in our time are becoming more and more stagnant with the most wireless networks of WLAN, as they may be the pluses of cable networks and alleviate their shortcomings.

After the creation of the local network, it is important to transfer the administration and the possibility of technical maintenance. It is ideal to install a broken piece of equipment, in the course of its operation, there will inevitably be various malfunctions in the robots of the hardware or software, and therefore the maintenance may be regular.

Great companies have a great obligation to give a different character to the turnover:

  • text files;
  • graphic;
  • image;
  • tables;
  • schemes.

It is important for kerіvnitstva, that all information is small in a handy format, easily converted, and transferred to any nose at the need of a hand. ale paper documents have long begun to be changed by digitization, so that a computer can take revenge on a large number of data, with which it is more efficient to work on additional automation of processes. Also, to whom they transfer the information, call and contract with partners or companies that are being revised, without trivial relocations.

Thus, the demand for the widespread supply of all kinds of companies with electronic billing appliances was blamed. At the same time, there was a food about the integration of these devices into a single complex for protection, saving and saving the transfer of files.

At the same time, it is possible to make it easier to design a local enumeration (computer) measure for business.

What is SCRAP, її functions

The circuit is connected to a number of computers in one closed space. Often such a method of victorious is used by great companies, it is a waste of time. It is also possible to independently create a small link from 2 - 3 devices by winding it in the minds of the home. The more you turn on the structure, then it becomes foldable.

See the folded hem

There are two types of connection, they differ for the folding and the presence of the stone, central Lanka:

  • Rivnopravnі.
  • Bagatorivne.

Rivnoznachnі, stinks are peer-to-peer, characterized by similarity in technical characteristics. On them, the same rozpodіl functions - leather coristuvach can take access to all important documents, perform the same operations. Such a scheme is easy to manage, for its creation it does not require numerical susilla. The minus is the exchange - three more than 10 members can join the whole, otherwise the overall efficiency of the work, security will be destroyed.

The server design of a local company is more laborious, however, such a system has a higher level of protection of information, as well as a clear distribution of obov'yazkiv in the middle of the web. The best for technical characteristics (pulling, supple, operational memory) the computer is assigned by the server. The center is used as a scrap, here all data is saved, from the points you can either restore or assign access to documents to other shortlisted persons.

Functions of computer networks

The main powers that need to be protected when folding the project:

  • Possibility of connection of additional outbuildings. More often in the city you can find a small number of cars, with expanded companies you may need additional inclusion. In the event of an increase in tension on the tse varto, take care of it, otherwise it is necessary to reschedule and add new stained glass materials promoted mentality.
  • Adaptation pid different technologies. It is necessary to ensure the flexibility of the system and її adherence to various meshed cables and resize software.
  • Availability of reserve lines. In the first place, it is necessary to reach the exit point of ordinary computers. In case of failure, you may be able to connect another cord. In another way, it is necessary to ensure the uninterrupted operation of the server with a bugatory connection. You can also make sure that you automatically switch to another hub.
  • Hopefulness. Equipped with uninterrupted power supplies, reserves of autonomous energy, to minimize the possibility of interruption of calls.
  • Defend against third-party pleas and evil. The data that is saved can be protected not just with a password, but with a whole network of attachments: a hub, a switch, a router and a remote access server.
  • Automated and manual control. It is important to install the program, so that we can analyze the network at the skin moment, and tell you about the inaccuracies for your Swedish son. An example of such software is RMON. With this, you can win special monitoring through the Internet server.

Storage of technical equipment for the design and construction of local barriers (LAN) at the enterprise

Think of the powers that be, as it is necessary to protect the hour of the project's folding. The whole process of designing starts from the warehouse of the technical department (TK). Vono revenge:

  • Norms of safety of statements.
  • Security of all connected computers with access to information.
  • Productivity parameters: hour of reaction from the request of a koristuvach to the vіdkritt required side.
  • Wash away the arrogance, so that the readiness to try and start a steady work without interruption.
  • I will replace the complete set of expanding the network, add-ons included, or installation of equipment in case of pressure.
  • Support for various types of traffic: text, graphics, multimedia content.
  • Security of centralized and remote control.
  • integration different systems and software packages.

If TK is stored with additional needs of coristuvachіv, select the type of inclusion of all points up to one line.

Basic topologies of LOM

Tse methods of physical installation of outbuildings. The most common representations of three figures are:

  • tire;
  • ring;
  • star.

Shinna (linear)

When folded, there is one wired cable, which leads to the computers. The main cord without intermediary connections to the server, which collects information. At the new one, there is a choice and filtering of data, an exchange of access.


Advantages:

  • Vimknennya or problems with one element do not destroy the other network.
  • Designing a local organization is easy to do.
  • Vіdnosno low varіst installation and window materials.

Noodles:

  • Zbіy or poshkodzhennya carrying cable attaches to the robot of the system.
  • A small business can be connected by such a rank.
  • Shvidkodiya can be in the same suffering, it is more, so the call will pass between more and less than 10 outbuildings.

"Kіltse" (kiltseva)

All computers are connected sequentially - from one attachment to another. So often robbing at times of peer-to-peer scrap. In the whole ninth of tsya technology zastosovuєtsya daedals more.


Advantages:

  • There is no charge to the concentrator, the router is the other way around.
  • They can transmit information as soon as a sprat of koristuvachiv.

Noodles:

  • The speed of transmission in all networks depends on the tightness of the most important processor.
  • In the event of a malfunction in the cable, or if there is a connection of any element, the main robot is connected.
  • It’s hard to complete such a system.
  • When connected to an additional working place, the following work should be interrupted.

"Zirka"

Tse parallel inclusion of outbuildings to the edge to the sleeping dzherel - server. As a center, a hub or a concentrator is most likely to be installed. All data is transmitted through the new. In such a way, a robot can operate not only computers, but also printers, faxes and other devices. At present enterprises, it is the most common method of organization of activities that can be established.


Advantages:

  • It is easy to connect one more month.
  • The productivity of depositing in the form of a small number of elements, therefore, is left on a stable high level.
  • Just know the breakdown.

Noodles:

  • The inadequacy of the central attachment attaches to the work of all coristuvachiv.
  • The number of connections is wired to the number of ports of the server building.
  • There are a lot of cables on the grid.
  • Road possession.

Stages of software design LOM

This is a rich process, which takes into account the competent participation of the rich fakhivtsiv, the shards of the next step are necessary I will pass the building cables, change the configuration of the device, install and adjust the equipment.

Planning a place for an organization

Slid roztashuvat cabinet pratsіvnikіv and bosses vіdpovіdno to the topology. If the shape of the star suits you, then place the main technique in the room where the main technique is placed in the center. Tse mozhe buti office kerіvnitstva. At the different bus station, the service can be rebuvat at the most distant corridor of the destination.

Pobudov's schemes of local measures


Armchairs can be built with specialized programs for automated design. Ideally, the products of ZVSOFT company are suitable - the stench is to avenge all the basic elements, which will be needed when you wake up.

Sitka is guilty of lying:

  • maximum voltage;
  • sequence of entry;
  • possible interruptions;
  • economy of installation;
  • handy supply of electricity.

Characteristics of the LOM must be selected according to the plan for the placement of the organization and the possession that wins.

Parameters of computers and framing outbuildings

When choosing and purchasing elements of the network, it is important to insure the following factors:

  • Summation from different programs and new technologies.
  • The speed of transmission of data and the number of devices.
  • Quantity and density of cables to be deposited according to the selected topology.
  • The method of managing exchanges at the merchant.
  • Protection against pereskod and zboїv winding drotіv.
  • Variability and tightness of mesh adapters, transiveries, repeaters, concentrators, commutators.

Principles for the design of SCRAP for the help of computer programs

When folding a project, it is important to pay attention to the great number of nuances. Tse dopomozhe software security vіd ZWSOFT. The company is engaged in the distribution and sale of rich functional software for automating the work of design engineers. Basic CAD is an analogue of the popular, but expensive pact from Autodesk - AutoCAD, but it will turn it over for ease and ease of licensing, as well as for a more loyal pricing policy.


Program benefits:

  • Intuitively intelligible, clear interface in black color.
  • Wide selection tools.
  • Work for the two-world and three-world expanses.
  • 3D visualization.
  • Integration with files of most popular extensions.
  • Organization of elements of SCRAP in visual blocks.
  • Pidrahunok dozhin cable lines.
  • Naochne raztashuvannya elementіv and vuzlіv.
  • One-hour work with graphics and textual tributes.
  • Ability to install additional programs.

For ZWCAD - a module that expands the functions of basic CAD in the field of designing multimedia circuits. All armchairs are connected with an automated distribution of cables in local counting lines and yogo marking.

Advantages:

  • automation of selection of switching systems;
  • wide library of elements;
  • parallel to the filling of the cable magazine;
  • automatic matching of specifications;
  • adding possession to the library;
  • one-hour work of kіlkoh koristuvachіv іz data base;
  • Schematic signs of the refurbishment of outbuildings and objects of furniture.

To help you create a project with a voluminous look, create yoga in 3D. Intellectual tools allow you to easily lay the crowbars to the connection points, visually detect the cable passage area, organize the line spanning, and visualize the expansion of technological furniture (including in dynamic mode). For the help of the component editor, you can create a library like a shaf, switching devices, cables, clamps, etc., and also assign characteristics to them, on the basis of which you can add the specifications of that calculation. In this way, the functions of this software will help to complete the master plan for the placement of organizations from the transfer of the used lines of the scrap.

Create a project of local enumeration at your enterprise at the same time using programs such as ZVSOFT.

© 2022 androidas.ru - All about Android