Fundamentals of encourage computer merezh. Local merezha - tse scho? How to create and build a local border Pobudov's borders lvs

Golovna / Contacts

The very name of the local counting measure already has a sign, a function of the exchange of the system. I'll sort out the name in the warehouse. local, adopted in the form of the English local - mystsevy, so the fence is tied to a specific geographical location and may be occupied on the territory, countable, Tied up with a warehouse of merezhі (calculated possession, PZ) and її recognitions, merezha– may be on the territory of the territory near the fence (behind the auxiliary cables).

In this way, it is possible to formulate the appointment of a Locally Calculated Merezhі (LAN) - the whole system of mutual counting resources (computers, servers, routers, software, etc.) for receiving and transmitting, collecting and processing information of various kinds.

p align="justify"> Different locally counting lines can function okremo or be tied to each other for additional help in communications, for example, in business with a branch line in different places. Zavdyaki such a connection can be mutually modified with other stations, connected to the chain of locally-calculated borders. Establish local borders, nodes that are geographically dispersed over a distance of 12,500 km (space stations and orbital centres), but still stink all the same to the local ones.

The purpose of LOM is to secure single and one-hour access to a single group of files to data, a software program (computers, printers, graphobudivniki, attachments to save and process files and data bases) and transfer data (electronic graphics, text processing, e-mail, access to remote bases) data, digital motion transmission).

For example: the manager accepts an appointment and enters it into the computer, gives the appointment to go to the accounting office and there the account is formed, one hour you can get information to the legal service for the settlement of the contract.

SCRAP characteristics:

  • High-speed channels (1-400 Mbit/s), which are more important than one core;
  • Vіdstan mіzh working stations that are connected to the local line, ring out from a few hundreds to a few thousand meters;
  • Transfer of data between stations of the coristuvachs of the EOM;
  • Decentralization of terminal ownership, such as microprocessors, displays, cash registers, etc.
  • Transfer of data to subscribers, connected to the wire, by a cable;

The main functions of LOM є:

  • Security of one-hour access to the possession, software security and information shared by the company;
  • Minimizing the risk of unauthorized access to information and resources;
  • Razmezhuvannya access to information and merezhevyh resources;
  • Security of security and confidential exchange and one-hour work with information to the singing call of osib;
  • Control over information flows, including inputs and outputs;
  • Separation of control functions and other errors on the skin node (for the skin vuzol, a system administrator is responsible for maintaining the service, as a rule, control functions);
  • Optimization of the number of pages on the software and the possession of the account of their collective selection (for example, one printer per kilka vіddіlіv іn.)

As a result of the accumulation of SCRAP, personal computers are combined, roztashovani on luggage in the distant working areas. The working areas of spivrobitniks cease to be isolated and unite into a single system, as they may have their own special advantages:

  • Possibility of remote access to the possession, PZ and information;
  • Optimization of resources of the robotic processor;
  • The smallest number and intensity of pardons at the parishes with a fence on the basis of telephone channels;
  • Building capacity of the building, lower at the global level;
  • Possibility of reconfiguration and development of a way to connect new terminals

Stagnation area local borders are much wider, none of these systems are practical for a skin office (for example, one printer is installed, a computer is installed, and a computer is installed in one software, for example, 1C: Accounting and others.). During the day, the flow of information becomes greater, the software security becomes more folded and functional, the geography of the activity of organizations expands. The zastosuvannya zasobіv LOM is not just a bazhanim, but necessary for successful activity and development of business, science, training of students, schoolchildren, training and retraining of fahіvtsіv, vykonanny state programs and functions and іn.

The structure of the functioning of the measure.

The structure of the local area is determined by the principle of management and the type of connection, most often it is based on the structure of the organization that is being served. You can see topologies: busbar, kiltseva, radial, tree-like. The largest expansion of the first two types, for the effective choice of channel channels, ease of management, flexible possibilities of expansion and change.


Bus topology
- all computers are connected in a lanyard, connected to the main cable segment (trunk), "terminators" are placed on the other ends, to extinguish the signal, which rozpovsyudzhuetsya in the sides. The computers in the yard are connected by a coaxial cable with a tripod cable. The capacity of the building is 10 Mb/s, for modern programs that actively record video and multimedia data, which is not enough. Perevaga ts_єї topology polygaє in low varst wiring and unification of the connection.

Bus topology is passive. The loss of one computer does not contribute to the success of the measure. Poshkodzhennya main cable (tire) led to the signal and the whole merezha became unproductive. Vimknennya that is especially connected to such a measure of the expansion of the bus, which causes disruption of the circulating flow of information and the system freezes.

Topology "tree"- The most delimited configuration for the "bus" type. To the main trunk bus, through active repeaters or passive multipliers, a sprinkling of simple tires is connected.


Topology "zirka"
(star) – the most common topology, information between peripheral workstations to pass through the central node of the enumeration line. The central control room - the file server can implement an optimal mechanism to protect against unauthorized access to information. The whole counting line can be turned around from the її center.

It is simpler to sew cables, because the skin working station is no longer connected to the central node. Width cable laying should be high, especially if the central vuzol is geographically spread over the center of the topology. With expanded counting lines, it is impossible to know the cable connection earlier than the cable connection: before a new working place, it is necessary to lay a large cable from the center of the line.

At different sequences of configuration, LOM of skin attachments connected to the physical medium transmits information to only one attachment. With this, the vimogi are reduced to transmitting and receiving, and all stations take an active part in the transmission.

Topology "kiltse"(ring) – computers are connected by cable segments, have a shape of a ring, basically identical to the bus one, except for the need to choose “terminators”. In times of failure of one of the segments of the merezh, the whole merezha goes out of tune.

Signals are transmitted only in one straight line. Skin station without intermediary z'єdnana іz dvoma suіdnіmi, аlе eavesdropping transmission, be it a station. Kіltse to become sprat priymachіv i spoluchaє їх іх іхне sredovische. All stations can have the right to equal access to the physical environment. In this case, one of the stations can win the role of the active monitor, which serves as an exchange of information. Laying cables from one working station to another can be foldable and expensive, especially as geographically working stations are spread far away from the country (for example, near the line).

The main problem with the ring topology is that the skin working station is guilty of taking an active part in the transmission of information, and at the same time, if one of them wants to paralyze the entire network. Faults in cable connections are easily localized. The connection of a new working station will be necessary to keep the wires running, the shards for the hour of the installation of the ring may be rozimknene. There are no shards for the length of the counting line, shards of it, zreshtoy, are counted exclusively between the two working stations.

Computers can connect with each other, with different access mediums: copper conductors (twisted pair), optical conductors (optical cables) and through a radio channel (droneless technology). Dart, optical links are installed via Ethernet, wireless - via Wi-Fi, Bluetooth, GPRS and others. Most local networks are based on Ethernet and Wi-Fi technologies. It should be noted that earlier the protocols Frame Relay, Token ring were victorious, as on this day everything is more appropriate, they can be found only in specialized laboratories, primary mortgages and services.

Components of everyday life of a simple local dimension wink:

  • Adapter (network adapter) - an attachment that connects a computer (terminal) from a segment of a network;
  • Mіst (bridge) - attachment, which connects local lines in the distance segments of the border;
  • Router (router) - attachment for interfacing broadband traffic for additional division of networks into segments, securing the protection of information, managing and organizing backup routes between broadband areas;
  • The commutator is an extension of a narrower recognition, effectively segmenting the network, changing the area of ​​\u200b\u200bthe network and increasing the throughput of the building of the skin terminal station.
  • Blocks of uninterrupted life - an extension for ensuring the regularity of the system at the time of disconnection of the main life line.

Installation

Choose the type of topology, the middle of access and storage of the Local-calculated system to deposit, if necessary, Zamovnik. Modern technologies allow the development of an individual option, which is suitable for all efforts and tasks.

Laying cables SCRAP, as those other types of cable ties can be installed in different ways. When choosing the method of installation, there are individual architectural and design features of life, its technical characteristics, the presence of a measure, what to do, that other possession, the order of interaction of low-voltage systems with other systems. It is important to name two ways - vіdkritiy i prihovaniya. For the attached installation of cables LOM vicarious wall construction, underlay, the insole looks more aesthetically pleasing, it is protected from external inflows, access to their surroundings, the laying is carried out in a special preparation, and it is safe to save brains for further service. It's a pity that the possibility of vikonating robots in a hooked way is rare, more often it happens to be carried out in a more practical way for the help of plastic boxes, vertical columns and trays. Don’t forget that there is another way to lay the cables again, most of the time it will be installed for communication in the future, if there is no possibility to lay the cable at the canal, otherwise it’s too expensive.

Installation of a LAN , depending on the quality of the deposit, the stability and correctness of the functioning of the system as a whole, the steps of the payment of deposits on it, the speed of transmission and the processing of data, the number of pardons and the number of pardons. It is necessary to do something even more fundamentally and seriously, because it is the basis (skeleton and blood-bearing system) of the whole organism from low-current systems, which is considered for the great number of functions (from electronic mail to the safety of the object). Skin stepping on the robot of a working system (expansion, repair, etc.), in order to spend time and money, like a lot of time to lie down in the middle of the deposits in the system of parameters, the quality of the robots, the qualifications of the retailers and viconators. Cost savings at the stage of design and installation of scrap, can turn into much more cost at the stage of operation and upgrade


In ієrarkhіchnih local merezhakh there are a few special computers - servers, from which the information is collected, spily vikoristovuvana with different koristuvachs.

The server in ієrarchіchnykh merezhakh - tse postіyne collection of resources, which are divided. The server itself can be a client or less a server of the highest equal of the hierarchy. Therefore, hierarchical lines are sometimes called lines from the seen server. Servers and sound with high-performance computers, possibly, with a small number of parallel processors, with high-capacity hard drives, with a high-capacity tethered card (100 Mb/s and more). Computers with access to information on the server are called stations or clients.

Scrap is classified according to recognition:

    Merezhі terminal service. The stench is turned on by the EOM and the peripherals are possessed, vikoristovuvane in the exclusive mode by the computer, which is connected, or be a blatant resource.

    Merezhі, on the basis of which the system of management of virobnitstvom and the installation activity was induced. The stench is united by a group of MAP / TOP standards. IDA describes standards, like industry. TOP describes the standards for merging, which are used in office mergers.

    Merezhі, scho to build automation systems, design. The robotic stations of such networks are based on hard personal EOMs, for example, by Sun Microsystems.

    Merezhі, z urakhuvannya kah pobudovan rozpodіlenі numbering system.

All LOMs are processed in one standard adopted for computer networks - the Open Systems Interconnection (OSI) standard.

Basic model osi (Open System Interconnection)

In order to mutually, people vikoristovuyu splnu mova. Even though stinks cannot move one by one without a middle, stinks zastosovuyet indpomіdnі podomіzhnі zasob poprodіvі podomlen.

Introducing a higher stage is necessary, if the notification is transmitted from the head of the government to the end.

In order to bring the process of transferring data into circulation, machines were victorious with the same coding of data and tied one by one. For a single presentation of data from the lines of communication, by which information is transmitted, the International Organization for Standardization (English ISO - International Standards Organization) was formed.

ISO is recognized for the development of a model of an international communication protocol, within the framework of which international standards can be developed. For a clear explanation, divide її into sіm rivnіv.

The International Organization for Standardization (ISO) has developed a basic model of open systems interconnection (OSI). This model is the international data transmission standard.

Model revenge sim okremyh rivniv:

Riven 1: physical- bit transfer protocols;

Riven 2: channel- shaping frames, managing access to the middle;

Riven 3: fencing- routing, curation by data streams;

Riven 4: transport- Safeguarding the mutual modality of remote processes;

Riven 5: session- Supporting the dialogue between distant processes;

Riven 6: tribute danikh - interpretation of the danikh that are transmitted;

Riven 7: applied- Koristuvalne management of danim.

The main idea of ​​this model lies in the fact that the skin layer has a specific role in that number and the transport medium. Zavdyaks of this important task of transferring data are divided into okremi easily accessible for a look at the task. Necessary areas for zv'yazku of one equal z more-i lower-stash are called a protocol.

Oskolki koristuvachі require effective management, the system of counting measures is presented as a complex budova, as a coordinator between the heads of koristuvachiv.

With the improvement of the visual deposit, it is possible to introduce an advancing equal model for administrative functions that are included in the applied equal of the coristuvach.

Okremi lines of the base model pass straight down from the dzherel danich (from line 7 to line 1) and straight uphill from the landing line (from line 1 to line 7). Koristuvatsky data are transferred to the lower rіven at once with a heading specific for the rіvnya until the next day, until the remaining rіven is reached.

On the priymalny bots of data, which are needed, they are analyzed and, if necessary, they are transferred to the distance from the turf, until the information is transferred to the koristuvalnitsky applied ryven.

Riven 1Physical.

Physically, electrical, mechanical, functional and procedural parameters for physical communication in systems are determined. The physical connection is indistinguishable from it, operational readiness is the main function of the 1st level. Physical level standards include recommendations V.24 CCITT (CCITT), EIA RS232 and X.21. The ISDN standard (Integrated Services Digital Network) may play the primary role of data transmission functions. As the middle of the transmission of these data, there is a three-wire medium wire (shielded twisted pair), coaxial cable, fiber optic conductor and radio relay line.

Riven 2Channel.

The channel rіven forms data, transferred by the 1st rіvn, ranks "cadres" of the sequence of cadres. On this level, there is an access to the transmission medium, vicarious dekilkom EOM, synchronization, manifestation and correction of pardons.

Riven 3Merezhevy.

Merezheviy rіven vstanovlyuє zv'yazok counting ї merezhі between two subscribers. This is required for the routing functions to require that the router address be present in the packet. Merezheviy rіven is also responsible for ensuring the processing of pardons, multiplexing, and cherishing streams of tribute. The most important standard that can be applied to this level is recommendation X.25 of the CCITT (for a chain of wires with commutation of packets).

Riven 4Transport.

Transportation equalizes the uninterrupted transfer of data between two mutually interacting one-by-one core processes. The quality of transportation, bezmilkovist transfer, independence of counting measures, service of transportation from one day to the other, minimization of charges and addressing of calls guarantee uninterrupted and bezmilkovu transfer of data.

Riven 5session.

The session riven coordinates the reception, transmission and communication of one session. For coordination, it is necessary to control the working parameters, manage the data flows of the intermediate accumulators and dialogic control, which guarantees the transfer of clear data. In addition, the session line will take care of the additional functions of password management, pay for the cost of resource management, dialogue management, synchronization, and voice calling in the session transfer after the failure of pardons on the lines below.

Riven 6 Giving tribute.

The date of submission of data is recognized as the interpretation of data; as well as the preparation of data for the koristuvach of applied rіvnya. On this level, there is a conversion of data from frames, which are used to transfer data to the screen format or the format for other extensions of the cinema system.

Riven 7Applied.

In applied science, it is necessary to give coristuvachas the already revised information. Zim can get into the system and the application software security.

For the transmission of information via communication lines, the data is converted into the lanchy of the offensive one by one battles (double coding for the help of two stations: "0" and "1").

Transmitted alphanumeric characters are given for additional bit combinations. Bit combinations are sorted in the same code table, which can be replaced by 4-, 5-, 6-, 7- or 8-bit codes.

The number of characters represented in the course of the deposit is the number of battles that are distinguished in the code: the code for the number of characters can represent a maximum of 16 values, 5-bit code - 32 values, 6-bit code - 64 values, 7-bit code - 128 values ​​and 8- bit code - 256 alphanumeric characters.

When transferring information between the same counting systems and types of computers, it is necessary to differ, stop the next code:

On the international level, the transmission of symbolic information is based on the help of 7-bit coding, which allows you to encode large and small letters of the English alphabet, as well as other special characters.

National and special signs cannot be detected with the help of a 7-bit code. For the representation of national characters, the most significant 8-bit code is required.

For the correct and, then, again, the transfer of data without mercy, it is necessary to wait for the compliance with the established rules. Please note the transfer protocol.

The protocol for transferring data with advanced information:

Synchronization

Under synchronization, the mechanism of recognizing the cob of the data block of that yogo cycle will be explored.

Initialization

Under the initialization, it is necessary to understand the establishment of a contract between partners, which should be mutually modified.

Blocking

Under blocking, it is necessary to understand the distribution of information that is transmitted to blocks of data of a strictly singing maximum duration (including recognition signs on the cob of the block and the beginning of the end).

Addressing

Addressing ensures the identification of a different vicarious possession of data, so that information is exchanged at the hour of mutual modality.

The manifestation of pardons

Under the appearance of pardons, the installation of battles of parity and, also, the calculation of control battles will be reconsidered.

Block numbering

The streaming numbering of blocks allows you to restore the information that has been transferred or wasted.

Data flow management

Data flow management to serve for rozpodіlu and synchronization of information flows. So, for example, if you don’t spend time in the buffer, I’ll add data, or if you don’t finish it, they’ll be processed in peripheral outbuildings (for example, printers), and you’ll accumulate information and/or drink.

Methods of inspiration

After restarting the process of transmitting data, use the methods of renewal to turn to the right position for retransmission of information.

Allowed access

Rozpodil, the control of such exchanges for access to data is set as a binding point for allowing access (for example, "only transfer" or "only acceptance").

Merezhevy annex and arrange communications

As zasobi kommunikatsiy most often twisted pair, coaxial cable fiber optic lines. When choosing the type of cable, the following indications should be given:

versatility for installation and maintenance,

speed of transmission of information,

Substitution for the size of the transmission line (without additional subsidiaries-repeaters (repeaters)),

safe transmission.

The main problem lies in the one-hour security of the transmission of data, for example, the security of the transmission of data is surrounded by the most possible means of transmission of data, with the necessary security of the transmission of data. Easy expansion and ease of expansion of the cable system can be injected into the її variety /

Twisted couple

The most inexpensive cable connection is the most common cable connection, often referred to as "twisted pair". It allows you to transfer information with speed up to 10 Mbit / s, it is easy to increase, it is easily stolen. The length of the cable cannot exceed 1000 m for a transmission speed of 1 Mb/s. Advantages are low price and problem-free installation. In order to increase the noise immunity of information, it is often necessary to use a shielded twisted pair, tobto. twisted pair, placed in a screen shell, similar to the screen of a coaxial cable. Tse zbіshuє vartіst torsion bet and nablizhaє її tsіnu to tsіni coaxial cable.

coaxial cable

The coaxial cable has an average price, good pereskodny and zastosovuetsya for zv'yazku on large distances (kilka kilometers). The speed of transmission from 1 to 10 Mb/s, and in some cases it can reach 50 Mb/s. The coaxial cable is twisted for basic and broadband transmission of information.

Broadband coaxial cable

Broadband coaxial cable is not susceptible to overshoot, easy to build up, but the price is high. The speed of transmission is 500 Mb/s. When transmitting frequencies to the basic smuz for more than 1.5 km, a repeater is required, or so the titles of a repeater (repeater). Therefore, the total time for the transmission of information increases to 10 km. For counting measurements from the topology of the bus or tree, the coaxial cable is responsible for the mother on the edge of the narrow resistor (terminator).

Ethernet cable

The Ethernet cable is also a coaxial cable with a 50 ohm support. It is also called a thin Ethernet (thick) yellow cable. Vіn vikoristovuє 15-contact standard included. After all, the switch is an expensive alternative to traditional coaxial cables. The maximum available distance without a repeater does not exceed 500 m, and the distance between Ethernet lines is close to 3000 m.

Cheapernet cable

A cheap, low-cost Ethernet cable is a Cheapernet cable, or, often referred to as, thin Ethernet. This is also a 50-ohm coaxial cable for the speed of data transmission at ten million bits / s.

When connecting segments of the Searegnet cable, you will also need repeaters. The number of measurements with Cheapernet-cable may be small and the minimum amount of damage when growing. Z'ednannya merezhnya boards carried out for the help of small-sized bayonet roses, which are widely vicorous (CP-50). Additional screening is not needed. The cable is connected to the PC for additional triplets (T-connectors).

The distance between two workstations without repeaters can be a maximum of 300 m, and the distance between two working stations on a Cheapernet cable is about 1000 m.

Federal Agency for Education

OMSK INSTITUTE

RUSSIAN STATE UNIVERSITY OF TRADE AND ECONOMY

Department "Mathematics and Informatics"

Control robot

On the course "Informatics"

On the topic: “The main ambush

local counting measures "

Option number 25

Introduction……………………………………………………………………………...2

1. Understanding the LAN………………………………………………………………………..3

2. Basic model OSI (OpenSystemInterconnection)…………………………….5

3. LAN architecture………………………………………………………………...8

3.1. Tipi merez…………………………………………………………………...8

3.2. Topologies of enumeration measures…………………………………………….11

3.3. Merezhevі pristroї ta zasobi kommunіkatsiy………………………………………………………………………15

3.3.1.See twisted cables……………………………………........15

3.3.2. Measured map…………………………………………………………….16

3.3.3.Rozgaluzhuvach (HUB)…………………………………………………..17

3.3.4.Repeater……………………………………………………………......17

3.4. Tipi encourage merezh methods of information transfer……………..18

4. Rules for the installation of the cable part of the LAN………………………………………………………………………………………………19

References…………………………………………………………………26

Addendum……………………………………………………………………………27

Today, the world has over 130 million computers and over 80% of them are connected to various information and counting networks from small local networks in offices to global Internet-type networks. The omnipotent of the tendency to the countnanni comp'yuterev at the Merezhi is ominated to the low important reasons, such a yak is the gear of the transpondments of іnformasyni, the shvid-formati іnformatyu miz bristles, the departure of the gantry (fax, e-mail is not in the same way) Mіstsya, feasibility of mittevgo otrimannya be-like information from be-like points of the earth's backwoods, as well as the exchange of information between computers of different companies of virobniks, which are used for different software security.

Such great potentiality, as it carries in itself an accountable measure and that new potential pidyom, which, with the knowledge of the information complex, and also significantly accelerated the manufacturing process, do not give us the right not to accept before the development and not to stop in practice.

To that is not at the same time, the principle of Virishhennya Pannnya Chodo Organiza ITT (INFORMATIC-ONE-FORMENTED MASE) on the BAZ, ISTOSISTOMS, SUSKOSICAS INSOLIVENS INSOLIVEN THE SURSTENTS. new technical and software solutions.


1. Understanding LOM.

What is the local counting of the mesh (LAN)? Under the LAN, it is possible to connect a number of computer workspaces (working stations) to a single transmission channel. For counting the number of measurements, we took away the possibility of a one-hour listing of programs and data bases of the kіlkom koristuvachs.

The concept of a local counting network - LAN (English LAN - Lokal Area Network) is brought to the geographically separated (territorially or randomly) hardware and software implementations, for some small computer systems, one after another, for additional help of communication. Zavdyaki such a connection can be combined with other stations, connected to the station LOM.

Scrap metal plays an even greater role in the manufacturing practice. For the help of LOM, the system will be combined with personal computers, roztashovani on rich remote working areas, like vikoristovuyut spilno podladnannya, software store that information. The working space of spivrobitniks ceases to be isolated and unites into a single system. Let's take a look at the advantages won by the common association of personal computers as an internal calculation measure.

Podіl resources.

Podіl resursіv allows you to save resources economically, for example, using peripheral attachments, such as laser attachments to others, from other working stations.

Podіl danih.

Podіl dannyh naє mozhlivіst vozmozhlivіst access і adminіnnya databases z іnіh іnperіynyh working mіsts, yakі trebubuyut іnformatsії.

Submitted program contributions.

Podіl program zabіv, we hope the possibility of a one-hour centralization win, earlier than the installation of program zabіv.

Podіl resources of the processor.

If you add the resources of the processor, it is possible to count the number of pressures for processing data with other systems that enter the system. The possibility is given to those who do not have resources “tossed” in the meantime, only through a special processor, available on the skin working station.

Loans for rich coristuvachіv mode .

Rooted on a rich coristuvachіv power system to spriyat one-hour recovery of centralized applied software, previously installed and keranіh, for example, as a coristuvach system pracciuє z іnshim zavdannya, then in-line robotication is put on the background.

Usi LOM is used in one standard adopted for computer networks - in the standard of Open Systems Interconnection (OSI) - vzaimodisti vіdkrih systems.

Topology of the zirka type.

The concept of topology at a glance came from the area of ​​great EOM, in which the main machine takes and processes all data from peripheral outbuildings as an active data processing unit. This principle is established in data transmission systems, for example, by RELCOM electronic mail. All information between two peripheral working areas is entered through the central high school of the counting line.

fig.1 Topology like a mirror

The capacity of the building is determined by the calculation of the pressure of the node and is guaranteed for the skin working station. Kolіzіy (zіtknen) don't blame them.

It's easy to sew cables, the shards of a skin working station are connected with a knot. Witrate the laying of cables high, especially if the central high school is geographically spread over the center of the topology.

With expanded counting lines, it is impossible to know the cable connection earlier than the cable connection: before a new working place, it is necessary to lay a large cable from the center of the line.

The topology at a glance is the most visible of the most common topological counting lines, the data transmission between the working stations passes through the central high school (with good productivity) along the next few lines, which are only used by these working stations. The frequency of powering transmission from one station to another is not high, but it can be reached in other topologies.

The productivity of the counting measure is ahead of us to lie in the tightness of the central file server. Vіn can be a thin piece of counting measure. At the time of exit from the operation of the central node, the robot of all structures is destroyed.

The central control unit - the file server can implement an optimal mechanism to protect against unauthorized access to information. The whole counting line can be turned around from the її center.

Kiltsev topology.

With the ring topology, the working stations are connected one by one behind the stake, that is. work station 1 with work station 2, work station 3

2. Kiltsev topology

with a working station 4 thinly. The rest of the working station is connected with the first. The communication link is fading at the ring.

Laying cables from one working station to another can be foldable and expensive, especially as geographically working stations are spread far away from the country (for example, near the line).

The messages are regularly circulated through the stake. The working station is navigating to the last kіltsevu address information, forwarding the request from the ring. The reassurance is even more effective, so that more reassurance can be sent "on the road" via the cable system one by one. It’s even easier to get a call on all stations. The frequency of transmission increases in proportion to the number of working stations, which are included in the calculation.

The main problem with the ring topology is that the skin working station is guilty of taking an active part in the transmission of information, and at the same time, if one of them wants to paralyze the entire network. Faults in cable connections are easily localized.

The connection of a new working station will require a short-line closure of the line, the oscillators under the hour of the installation of the ring may be rozimknene. There are no shards for the length of the counting line, shards of it, zreshtoy, are counted exclusively between the two working stations.

With a bus topology, the middle of the transfer is in the form of a communication path, accessible day to all working stations, which all can be connected. All working stations can contact without interruption from any working station that is in the area.

fig.3 Bus topology

Working stations be, if, without interrupting the work of all counting measures, you can be connected to it. The function of calculating the number of deposits is to become a working station.

In a standard situation for an Ethernet busbar, a thin cable or a Cheapernet cable with a tripe connector is often used. Vimknennya that is especially connected to such a measure of the expansion of the bus, which causes disruption of the circulating flow of information and the system freezes.

Wood-like structure of the LOM.

Instructed by the topologies of counting the ring, star and tire, practical zastosovuєtsya and combined, for example, wood-like structure. It is important to look at the combinations of the best-guessed topologies of the counting lines. The basis of the tree of counting lines is roztashovuєtsya at the point (root), from which the communication lines of information (gіlki tree) are taken.

The counting of the fences with a tree-like structure can be stuck there, where it is impossible to stop the basic fence structures in a clean look.

fig.4 Wood-like structure

3 .3. Merezhevі pristroї ta zasobi kommunіkatsiy.

How to make communications most often twisted pair, coaxial cable, fiber optic lines. When choosing the type of cable, the following indications should be given:

· versatility for installation and maintenance,

· speed of transmission of information,

· substitution for the size of the transmission line without additional subsidiaries-repeaters (repeaters),

· safe transmission.

The main problem lies in the one-hour security of the transmission of data, for example, the security of the transmission of data is surrounded by the most possible means of transmission of data, with the necessary security of the transmission of data. Easy extension and simplicity of expansion of the cable system add to its versatility.

3.3.1. See twisted cables.

Twisted couple.

The most inexpensive cable connection is the most common cable connection, often referred to as "twisted pair". It allows you to transfer information with a speed of up to 10 Mb/s, it is easy to increase, the prote is not protected from the crosscode. The length of the cable cannot exceed 1000 m for a transmission speed of 1 Mb/s. Advantages are low price and ease of installation. In order to increase the noise immunity of information, it is often necessary to use a shielded twisted pair, tobto. twisted pair, placed in a screen shell, similar to the screen of a coaxial cable. Tse zbіshuє vartіst torsion bet and nablizhaє її tsіnu to tsіni coaxial cable.

Ethernet cable.

The Ethernet cable is also a coaxial cable with a 50 ohm support. It is also called thin Ethernet (thick), yellow cable or 10BaseT5. Vіn vikoristovuє 15-contact standard included. After all, switching vins is an expensive alternative to traditional coaxial cables. The maximum available distance without a repeater does not exceed 500 m, and the distance between Ethernet lines is close to 3000 m.

Cheapernet cable.

Cheaper, lower Ethernet cable is a Cheapernet cable or, as it is often called, thin Ethernet or 10BaseT2. This is also a 50-ohm coaxial cable with a speed of ten million bits per second.

When connecting segments of the Searegnet cable, you will also need repeaters. The number of measurements with Cheapernet-cable may be small and the minimum amount of damage when growing. Z'ednannya merzhevy boards carried out for the help of small-sized bayonet roses, which are widely vicorous (CP-50). Additional screening is not needed. The cable is connected to the PC for additional triplets (T-connectors).

The distance between two workstations without repeaters can be a maximum of 300 m, and the distance between two working stations on a Cheapernet cable is about 1000 m.

Fiber optic lines.

The most expensive are optical conductors, which are also called fiberglass cables. The wide range of information from them reaches a few billion bits per second. Permissible distance over 50 km. Zovnishhnіy vpliv pereshkod practically vіdsutnіy. At the moment, the best way to get a scrap for scrap. The stench will stop there, deviating the electromagnetic fields of the crossed code, or the transmission of information on a large scale without repeated repetition is necessary. The stench is driven by protipidushyuchimi authorities, so that the technology of wiring in fiber optic cables is even more foldable. Optotransporters unite in JIBC for the help of a mirror-like network.

The tie adapter board acts as a physical interface, or is connected between the computer and the tie cable. Payments are inserted at special slots (extension slots) of all computers and servers. In order to secure the physical connection between the computer and the truss, to the appropriate socket or port, pay (after it is installed) connect the tether cable. Purpose of the twill adapter:

Preparation of data, which should be taken from the computer, before transmission by a cable;

Data transfer to another computer;

Data flow management between computer and cable system;

The tethered adapter board accepts data from the tethered cable and converts it to a form that is understood by the computer's CPU.


The tether adapter board is made up of the hardware part and the programs that are stored in the ROM (permanent memory device). These programs implement the functions of logical link control and access control to the middle channel layer of the OSI model.

Rozgaluzhuvach to serve as the central node in the merezhakh from the topology "zirka".

Under the hour of transmission by an interconnected cable, the electric signal is progressively weaker (extinguishes). І, the floorings appear, that the computer stops receiving it. To prevent the signal from being created, a repeater is installed, which reinforces (introduces) the weakening of the signal and transmits it further along the cable. Set up repeaters in meshes from the “bus” topology.


3.4. Tipi encourage merezh methods of transmission.

Local Token Ring merging.

This standard has been distributed by IBM. As the transmission medium is not screened or shielded twisted pair (UPT or SPT) or fiber optic. Transmission speed 4 Mb/s or 16 Mb/s. As a method of managing the access of stations to the transmission medium, the method - marker ring (Token Ring) is victorious. The main provisions of the method:

Outbuildings are connected to the border topology of the ring;

All attachments, connected to the border, can transmit data, having less than allowed to transmit (marker);

At some point in time, only one station in the city may be right.

There are three main types of packages in IBM Token Ring:

Control/data package (Data/Command Frame);

Marker (Token);

Skidanny package (Abort).

Package Management/Data. For the help of such a package, the transmission of data or commands is carried out by a robotic network.

Marker. The station can start data transfer only after retrieving such a packet. In one quarter, there may be only one marker i, obviously, only the station with the right to transfer data.

Drop package. The power of such a package is called pinning any kind of gear.

At the edge you can connect computers with topology around the circle.

Local Ethernet network.

The specification for Ethernet, for example, seventy years ago, was propagated by the Xerox Corporation. Recently, Digital Equipment Corporation (DEC) and Intel Corporation have joined the project. In 1982, the specification for Ethernet version 2.0 was published. Based on Ethernet and IEEE 802.3 standard. The details between them are insignificant.

The main ambush robots.

On the logical level of Ethernet, the bus topology is established:

Mustache extensions, connections to the fence, equal rights, tobto. whether or not the station can start the transmission at some point in the hour (as the transmission center is free);

Data that is transmitted by one station is available to all stations of the border.

10BaseT

In 1990, the IEEE issued the 802.3 specification for enabling twisted pair Ethernet networks. 10 BaseT (10 - transmission speed 10 Mbit \ s., Base - high-width, T - twisted pair) - Ethernet network, so for connecting computers, call the vicorist unshielded twisted pair (UTP). More networks of this type will be like stars, but the signal transmission system will have a bus, like other Ethernet configurations. Ring the rozgaluzhuvach merezhі 10BaseT to act like a rich port repeater. The leather computer is connected to another end of the cable, connected with a wire, and the other two pairs of wires: one for reception, the other for transmission.

The maximum length of a 10BaseT segment is 100 m. The minimum length of a cable is 2.5 m. A 10BaseT LOM can serve up to 1024 computers.

To encourage merezhі 10BaseT stop:

Z'ednuvachi RJ - 45 on cable ends.

The distance from the working station to the rozgaluzhuvach is no more than 100 m-code.

10Base2

Applies to the IEEE 802.3 specification, this topology is called 10Base2 (10 - transmission speed 10 Mbit / s, Base - high-volume transmission, 2 - transmission to the distance, which is approximately two-width over 100 m (actually, the distance is 185 m).

This type of fencing is oriented to a thin coaxial cable, or thin Ethernet, with a maximum segment length of 185 m. The minimum cable length is 0.5 m. , - 30 pieces.

Components of the "thin ethernet" cable:

BNC barrel - conectori (zadnuvachі);

BNC T - conectory;

BNC - terminators.

Merezі on a thin Ethrnet, sound the bus topology. The IEEE standards for thin Ethernet do not pass a transceiver cable between a T-connector and a switcher. Natomist T - the connector can be placed directly on the plate of the mesh adapter.

BNC barrel - connector, connecting segments to the cable, allowing you to increase the cable length. However, it is necessary to call them to a minimum, shards of stench will degrade the clarity of the signal.

Merezha on a thin Ethernet is an economical way to implement a network for small businesses for work groups. Wiring in such meshes, the cable is not expensive, easy to install, easy to configure. Merezha on thin Ethernet can support up to 30 nodes (computers and printers) per segment.

Merezha on a thin Ethernet can be made up of a maximum of five cable segments, connected by two repeaters, and even up to three segments, with which work stations can be connected. In this way, two segments are reserved for repeaters, which are called interrepeater links. This configuration is called the rule 5 - 4 - 3.

10Base5.

Depending on the IEEE specification, this topology is called 10Base5 (10 - transmission speed 10 Mbit / s, Base - high-voltage transmission, 5 - segments of 500 meters (5 times of 100 meters)). The second name is standard Ethrnet.

On a thin coaxial cable (those Ethrnet) sound the bus topology. Ethrnet can support up to 100 nodes (working stations, repeaters only) per backbone segment. The backbone, or the backbone segment - the head cable, to which the transceivers connect with working stations and repeaters connected to them. A segment of a thin Ethernet can be up to 500 meters long for a total length of 2500 meters. The tolerances for thin Ethernet are higher, lower for thin Ethernet.

Cable system components:

Transivery. Transiveries, securely communicating between the computer and the head cable LOM, driven from the "vampire's tooth", connected from the cable.

Transceiver cables. Transiver cable (output cable) rear cable from the tether adapter board.

DIX is a connector, and AUI is a connector. This connector is loosened on the cable of the transiver.

Barrel - connectors and terminators.

A network on a thin Ethernet can be composed of a maximum of five backbone segments connected by repeaters (for the IEEE 802.3 specification), and up to three segments can be connected to computers. When calculating the total life of the "twist Ethernet" cable, the length of the transceiver cable is not insured, so it is only the length of the segment to be insured to the "twist Ethernet" cable. The minimum distance between dry connections is 2.5 meters. Qiu vіdstan not to enter the cable of the transiver. Tovstiy Ethernet buv rozbroleny for pobudovi LOM in the framework of the great vіddіlu liv all budіvlі.

Ring at the great strings with the help of thin Ethernet. Tovsty Ethernet is good as a backbone, and for segments that need to be installed, thin Ethernet is installed. You singly remember that Ethernet can have a large core and can transmit signals of a larger width, lower thin Ethernet. The transceiver is connected with the "Ethernet" cable, AUI - connector to the transceiver cable, turn on the repeater. Segments of "thin Ethernet", which are connected, connect with the repeater, and computers are already connected to them.

10BaseFL.

10BaseFL (10 - transmission speed 10 Mbit / s, Base - high-frequency transmission, FL - fiber optic cable) to the Ethernet network, which computer and repeater are interconnected by a fiber optic cable.

The main reason for the popularity of 10BaseFL is the ability to lay a cable between repeaters on a large stand (for example, between telephones). The maximum length of a 10BaseFL segment is 2000 meters.


8-pin modular sockets (modular jack) are used for connecting cables. Installed on the cables for the help of special pliers with 8-pin RJ-45 sockets.

Fig.5 Modular socket Rice. 6 8-pin RJ-45 sockets

When exchanging data between two outhouses, one of the outbuildings may be connected with the transfer of the other one. The twisting of pairs (cross-over) is realized in the middle of one of the extensions under the hour when the cable is connected to the nest. The functions of porting concentrators and switches allow changing the type of wiring of conductors in nests (MDI-X or Normal). Some computer adapters don't allow you to change the port's port type and it will be set to either MDI or Uplink.

Figures 7 and 8 show options for connecting ports with a straight and twisted (cross-over) cable.

Cable sticks are responsible for the safety of at least 750 cycles of closing-opening.


The patch cable category may match the cable category for a horizontal system.

· Patch-cables of a faulty mother with a rich conductor for ensuring sufficient flexibility.

Cable laying

1. In order to avoid the shaving of the conductors, the tightness is not to blame for overshooting 110N.

2. The radius of the twist is not to be blamed for any smaller than 4 diameter cable for horizontal wiring.

3. Avoid cable crushing, the reasons for which may be:

Twisting of cables pіd hour of installation;

Careless installation of cables;

Overhead cable laying at the channel;

Cable characteristics: diameter 0.2", RG-58A/U 50 Ohm;

Acceptable roses: BNC;

Maximum segment length: 185 m;

Minimum distance between nodes: 0.5 m;

Maximum number of nodes per segment: 30

Cable specifications are given in Table 1.

Table 1. Cable specifications 10BASE2 (ThinNet) RG 58 A/U and RG 58 C/U

Table 2. Electrical specifications of cables of category 3, 4 and 5

Cold Opir: 50 Ohm

Maximum segment length: 500 meters

Minimum distance between nodes: 2.5 m

Maximum number of nodes per segment: 100

AUI cables are twisted for connecting AUI ports from backbones to a common coaxial cable. The maximum length of the cable is 50 meters.

Table 3. AUI cable specifications

Visnovok

Which robot had a look at the main warehouses of the LAN. Today, the development and promotion of ITT is one of the most important and most important tasks in the gallery of information technologies. Increasingly, the need for operational information is increasing, and the traffic of all equals is constantly growing. New transmission technologies are being introduced to ITT. In the middle of the rest of the results, it is possible to designate the possibility of transmission for additional power transmission lines, moreover, this method allows you to increase the speed, and the reliability of the transmission. Merezhev technologies are already developing rapidly, so the stench is beginning to be seen in the okrema information galuz. Vcheni predict that the closest access to the center of the galaxy will be more effective than other transmission facilities (television, radio, others, phone too). A computer will come to replace the “old” technologies, and there will be connections to some global flow of information, maybe the Internet, and from this stream you will be able to take away information whether it is in any way. If you want to be sure that everything will be the same, shards of merezhev technologies, as computer science itself is a young science, and everything is young - it’s not overbearing.

List of literature:

1. N. Malikh. Local measures for chatkivtsiv: Pdruchnik. - M.: INFRA-M, 2000.

2. N. Olifer, V. Olifer. Basic technologies of local merezh. Assistant. - M.: Dialogue - МІФІ, 1996.

3. Computer systems. Primary course / Per. from English - M: Vidavnichiy viddil "Russian Redaktsiya" TOV "ChannelTradingLtd.", 1997.

4. Berry Nance. Computer systems: Prov. from English - M: Skhidna book company, 1996.


addendum

Option 5. .

Option 5.

Table 5

Zvorotna vіdomіst z obіku

dietary products

Product name Alone in the world surplus Werewolf surplus
Paraffia Vitrata

It's easy to send your harn to the robot to the basics. Vikoristovy form, raztastovanu below

Students, graduate students, young adults, like victorious base of knowledge in their trained robots, will be your best friend.

Placed on http://www.allbest.ru/

1. INTRODUCTION

The meta-experience of vocational practice for the profile of the specialty was based on the consolidated, lost that systematization of knowledge on the basis of the activities of the company BAT "RadioZavod" for the direct "Management in technical systems". During the period of practical training, a plan was made for the theoretical and practical training of the student in full obsya.

For the period from 1 linden to 29 lindens, I looked at and stepped forward: the principles of inducing local counting lines; the structure of the robot LOM; vvchennya merezhevyh protocols; basics of administration

2. LOCAL HIV AND LUV METERAGES

2.1 Topologies of local meshes

Pіd LAN (eng. LAN - Lokal Area Network) is connected to a single connection of a number of computer workspaces (working stations) to a single data transmission channel.

Under the topology of the enumeration of the mesh, the configuration of the graph is understood, the vertices of which are given by the computer of the mesh, and the edges - physical links between them. Computers that are connected to a link are often called stations or nodes of a link. Logical links are the transmission routes between the nodes of the merezhy and are established by the way of the appropriate mood of the communication system.

The choice of topology of electrical connections directly incorporates a lot of characteristics of the mesh. For example, the presence of backup links promotes the superiority of the network and allows balancing the burden of other channels. The simplicity of the arrival of new knots, the power of such topologies, is easy to expand the mesh. Economical mirroring often leads to a choice of topologies, which is characterized by a minimal total length of the line connection.

Povnozv'yazna topology (Fig. 2.1, a) vіdpovіdaє merezhі, in a kozhen computer mirezhі po'yazanіy z usima іnshimi. Regardless of logical simplicity, this option seems cumbersome and ineffective. Indeed, the skin computer at the merezhі is to blame for the mother of the great number of communication ports, sufficient for communication with the skin computer from the other computers of the merezhі. For skin betting, computers may have seen an electrical connection. Renovations of topology are rare.

Komіrkov's topology emerges from a new link with a path to reach any possible links (Fig. 2.1, b). In a medium with a middle topology, those computers communicate without intermediary, between which there is an intensive exchange of data, and exchange of data between computers that do not have direct links, transit transmissions through intermediate universities.

The hot bus is an even wider topology for local meshes. For this type of computer, the computers are connected to one coaxial cable. The information that is being transmitted may be expanded in the offensive direction. Zastosuvannya zagalnoy bus reduces wiring varity, unifies the connection of various modules, ensures the possibility of mittevy wide-range connection to all stations of the line. In this rank, the main advantages of such a scheme are the cheapness and simplicity of wiring the cable for applications. The most serious shortfall of the central bus falls into a її low pressure: be it a defect in the cable, or else I will paralyze the entire mesh. In the case of the smaller half of the main bus, the productivity is not high, because with this method of connection at a skin moment, more than one computer can transmit data to the media. Therefore, the capacity of the channel is to be divided between the usual nodes of the network.

Topology of the star (Fig. 2.1, d). In this case, the skin computer is connected by a cable to the sleeping annex, which is called a concentrator, which is located in the center of the fence. The function of the concentrator includes information directly transferred by the computer to one of the other computers in the network. The main problem of the topology is that if there are any inaccuracies with the cable, it will cost more than that computer, to which the cable is connected, and if the concentrator is not right, you can lead the whole mess out of harmony. To a small topology, the type of zirka should have more versatility of the treadmill installation. In addition, the possibility of increasing the number of hubs in the border is surrounded by the number of ports of the concentrator. Sometimes there will be a sense of being a merger with a variety of kіlkoh concentrators, which are ієrarchically connected among themselves with links of the zirka type (Fig. 2.1, e).

In chains with a ring configuration (Fig. 2.1, e), data is transmitted along the ring from one computer to another, as a rule, in one directly. How the computer recognizes data as “its own”, copies it to the internal buffer. At the border with the ring topology, it is necessary to have special entrances, so that at the time of the exit from the fret, or the inclusion of the station, without interrupting the communication channel between the other stations. Kіltse є duzhe zruchnu configuration for arranging zvorotny zv'yazku - dani, zrobivsh povny turnover, turn to vuzla-dzherel. Therefore, the whole university can control the process of delivering data to the addressee. Often, the power of the ring is victorious for testing the linkage of the border, and for the sake of the knot, which is not correct.

Figure 2.1 Typical mesh topology

2.2 Transmission medium

The communication line (figure 2.2) is folded in a deep depression from the physical medium, which transmits electrical information signals, data transmission equipment and industrial equipment.

Figure 2.2 Warehouse line bundling

Physical medium transmission of data can be a cable, so that a set of wires, insulating and protective sheaths and lucky roses, and infuse the earth's atmosphere into space, with which the electromagnetic winds expand. Fallen in the middle of the transmission of data lines, the call is sent to:

Dartovі (povіtryаnі) lines zvyazku are darts without any insulating or shielding braid, laying between stovpami and hanging from the window. Behind such lines, telephone or telegraph signals are traditionally transmitted, and for the availability of other possibilities, lines victorious and transmission of computer data.

Cable lines must be completed with a folding structure. The cable is made up of conductors, which have ball insulation: electrical, electromagnetic, mechanical. In addition, the cable can be equipped with roses, which allow you to quickly win the access to different possessions. There are three main types of cables installed in computer sheds: cables based on twisted pairs of copper wires, coaxial cables with a copper core, and also fiber-optic cables.

The radio channels of the terrestrial and satellite links are established for additional transmission and reception of the radio signal. There are a large number of different types of radio channels, which are considered as a frequency range, which are victorious, and the distance of the channel.

To the main characteristics of the line connection lie:

· Amplitude-frequency characteristic;

· smuha pass;

· Gassannya;

· zavadostіykіst;

· Cross-pointing to the near end of the line;

· throughput capacity;

· Reliability of data transfer;

· Pitoma vartist.

Officials who add to the physical practice of the measure:

1) Compatibility of computers connected to the yard.

2) Equivalence of merezhny possession (adapters, transiveries, roses toshcho).

3) The integrity of the cable mesh.

4) Exchange the cable, pov'yazane from the extinguished signal, which will rise again.

2.3 Tipi local merezh

Іsnuє kіlka vіdіv kom'yuternykh merezh:

· Global dimensions,

· Regional borders,

· Miska Merezhi.

For the speed of transmission of information, computer networks are shared on:

Low speed (up to 10 Mb/s),

Medium speed (up to 100 Mb/s),

· High-speed (over 100 Mbit/s);

The term baud is widely used to define the speed of the transmission in the measure. Baud is a unit of signal transmission speed, which is measured by the number of discrete transitions or pods per second. As a skin tone, one bit, equivalent baud, bit/sec.

At a glance, the organization of intercompany modalities, links are divided on a peer-to-peer network (Peer-to-Peer Network) and a visible server (Dedicated Server Network).

Peer-to-peer merezhi. All computers of a peer-to-peer network are equal. Be-yakoy koristuvach merezhі can take away access to data that is saved on any computer. The advantage of peer-to-peer networks lies in the fact that there is no need to copy all the files that are copied to the server once a dekilkom is sent to the server. In principle, be it a koristuvach of the merezhі, it is possible to win all the data that are saved on other computers of the merezhі, that attachment, connected to them. The main shortfall in the work of a peer-to-peer network is used for a significant increase in the time of the development of applied tasks. Why is it due to the fact that the leather computer measures all the inputs that go along the side of others.

At the same time, the server has one of the computers with the function of saving data, recognized for selection by all working stations, managing the interaction between working stations and a number of service functions. Interactions between working stations in a merezhі sound through the server. The logical organization of such a network can be represented by a clear topology. The role of the central add-on server. Perevagi merezhi іz seen by the server: nadіyna system zahistu; high swidkodiya; number of working stations; simplicity of keruvannya. Nedolіki merezhі: - high varіst through seeing one computer under the server; staleness shvidkodії and nadіynostі merezhi vіd server; less gnuchkіst in povіvnіnі z peer-to-peer mesh.

Modem call. The biggest extensions and connections in Russia are the way to connect to the Internet - modem calls to a variety of telephone lines.

A modem is connected to the computer - an attachment for receiving and transmitting data that connects with a voice telephone line. If you need to install a call, for an additional modem, you need to dial a phone number, for which you need to confirm another modem, install it from an Internet provider. Between modems, the data transfer is established.

The main advantage of a modem connection is її breadth and low variability. If a telephone line is available, and a modem call is available, there is no need to organize a special channel. Pochatkov's price of connection to a modem connection provider is not high. However, the modem connection has a lot of shortcomings, a significant part of which is connected with the zhalugidny camp of the main mass of Russian telephone lines. Zagalnovіdoma problem modem zv'yazku - low speed. Theoretically, modern modems can secure the transmission of data with speed up to 56 Kb/s directly from the provider to the provider and up to 40 Kb/s - from the provider to the provider.

Technologyethernet

Ethernet is the most widely used local network standard today. If it seems to be Ethernet, let it sound like you know about the options for technology. Vuzhchemu sensi Ethernet - cemerezhevy standard, foundations for the experimental Ethernet Network.

Ethernet standards designate the transmission of electrical signals on the physical layer, the frame format and protocols for managing access to the medium - on the OSI channel model.

Fallow according to the type of physical medium standard IEEE 802.3 may be different modifications - l0Base-5, l0Base-2, l0Base-T, l0Base-FL, l0Base-FB.

In Ethernet networks, there is a method for accessing the data transmission medium, ranks by the method of collective access with recognition of the carrier and the detection of collisions (carrier-sense-multiply-access with collision detection, CSMA / CD).

This method is zastosovuetsya exclusively at the borders of the logical chain bus. All computers of such a network can have direct access to the main bus, so there can be a vikoristan for transmission between two nodes of the network. At the same time, all the computers of the merezhі may be able to negainally (to fix the blockage of the rozpovsyudzhennya signal on the physical medium) to take data, as if it were a kind of computer to transmit to the overhead bus.

All data that is transmitted through the barrier is placed at the frame of the song structure and is protected by the unique address of the recognition station. Then the frame is transmitted by cable. All stations connected to the cable can recognize the fact of transmission of the frame, and that station, as it knows the address in the headers of the frame, writes it in its internal buffer, processes the deletion of data and sends the frame-forward to the cable. The address of the station-dzherela is also included in the output frame, so that the station-owner knows who needs to send a message.

With the described approach, a situation is possible, if two stations try to transmit a frame of data over a halo cable at the same time. To change the state of the situation, immediately before the frame is edited, the transmitting station analyzes the fault on the new electrical signals in order to detect that the data frame is no longer transmitted over the cable to the other station. If it is known that it is not carrying (carrier-sense, CS), then the station will transmit its own frame until the completion of someone else's transmission, and then we will be forced to retransmit it again.

In order to correctly process the collision, all stations simultaneously watch for signals that are blamed on the cable. Just as the signals that are transmitted and guarded, suspended, then the collision detection (CD) is fixed.

Token Ring is a technology of local enumeration (LAN) ring with token access.

Token Ring technology is a folding technology, lower Ethernet. Vaughn may be the power of the spirit. At the Token Ring measure, the procedure for controlling the work of the measure is assigned, like a victorious link of a ring-like structure - messages the frame must be rotated to the station - the right-of-way. In some cases, pardons have been detected in robots and merezhi are used automatically, for example, a marker can be reintroduced.

At the edge of Token Ring, the ring is made up of wires to the cable, which connects the landline stations. In this rank, the skin station is tied up with its front and forward station and can exchange money without intermediary with them. To ensure the access of stations to the physical medium, a circulating frame of a special format is used on the ring, which is recognized as a marker.

Having removed the marker, the station analyzes it for the presence of these transmissions in it, ensuring it is passed through to the next station. The station, as a maє data for transmission, when the marker is removed, it will be removed from the ring, which gives the right to access the physical medium and transfer its data. Then the station will see the back frame of the data in the installed format sequentially by bits. The instructions are given to pass along the ring of zavzhdi in one straight line from one station to the other. The frame can be assigned to the address of the dzherel.

All stations of the ring rebroadcast the frame as a repeater. If a frame passes through a recognition station, then, after recognizing its address, the station copies the frame to its internal buffer and inserts the frame of the acceptance sign. The station, which saw the frame of data at the ring, with the return of the data received confirmation, received this frame from the ring and transmits a new marker to the border to ensure that other stations of the ring transmit data.

2.4 Shvidkіsnі fiber optic strands

Due to the fact that the fiber optic cable victorious light (photon) replaces the electrics, there may be all the problems attached to the mid cable, so it is like an electromagnetic crossover, a crossover crossover (transitional switch) and the need for grounding is established. Also, it is safe to move in the midst of the secrecy of the data that are transmitted, the shards do not change the electromagnetic vibration, and it is practically impossible to connect without destroying the integrity.

Nedolіki fiber optics in the main pov'yazanі z vartistyu yogo laying and exploitation, yakі zvichay richly vishchi, nіzh for the middle medium of data transmission.

Today, fiber optics is positioned as a high-capacity mesh technology, and practically all protocols of the channel level are victorious in these and other forms. Axis of action from them:

Fast Ethernet (100BaseFX);

Gigabit Ethernet (1000BaseFX);

Fiber Distributed Data Interface (FDDI);

asynchronous transfer mode;

This method provides the most security for today, which gives a good lead for the development of data transmission technologies from fiber optics. The throughput of a building can reach the order of Terabit (1000 gigabit) per second. If compared with other methods of transmission, then the order of magnitude of Tbit / s is simply unattainable.

2.5 Dartless fencing technologies

Dart-free technologies - a subclass of information technologies, serve to transfer information between two or more points, without requiring a connection between them by wires. For transmission, you can use infrared imaging, radio, optical and laser imaging.

In today's time, there are anonymous wireless technologies, most of which are used by scammers behind their marketing names, such as Wi-Fi, WiMAX, Bluetooth. Skin technology has many characteristics, which determine the area of ​​application.

WiFi. Call the Wi-Fi scheme to measure at least one access point and at least one client. It is also possible to connect two clients as a point-to-point connection, if the access point is not victorious, and the clients call for the help of merging adapters “directly”. The access point transmits its security identifier (SSID) for additional special signaling packets with a speed of 0.1 Mbps per 100 ms. To that 0.1 Mbit/s is the smallest transmission speed for Wi-Fi. Knowing the SSID of the cell, the client can determine whether it is possible to connect to the access point. If two access points with identical SSIDs get into the zone, the receiver can choose between them to represent the data equal to the signal.

WiMAX is a telecommunications technology, developed using the method of universal wireless communication on a wide range of outbuildings.

The infamous WiMAX-looking bridges are composed of the main components: base and subscriber stations, as well as the possession, as a connection between the base stations and the Internet.

For the connection of the base station with the subscriber's station, a high-frequency radio frequency range of 1.5 to 11 GHz is used. In ideal minds, the speed of data exchange can reach 70 Mbit / s, with which it is not necessary to ensure direct visibility between the base station and the receiver. Between the base stations, stations are installed (line of sight), which have a frequency range of 10 to 66 GHz, the speed of data exchange can reach 140 Mb/s. In this case, we accept, one base station is connected to the provider's network with several classical wired networks.

Bluetooth is a technology for transmitting a low-impact radio signal, developed to replace the essential cable connections of office equipment with a wide range of portable devices (mobile phones, digital cameras, programmers, etc.).

Vicorist technology is a small device with a small radius, either directly connected to attachments, or connected through a free port or a PC card. Adapters work with a radius of up to 10 m.

Attachments, which follow the Bluetooth standard, operate in the 2.4 GHz ISM band (Industrial, Scientific, Medical - industrial, scientific and medical range) and transmit data wirelessly up to 720 Kb/s. Such indications are attainable with a variable transmission intensity of 1 MW and the setting of a frequency switching mechanism that avoids interference.

3. NETWORK PROTOCOLS

3.1 MAC addresses

MAC-addresses (Media Access Control - keruvannya access to the medium) - the same unique identifier, which is assigned to the skin unit of the possession of a computer merezh.

In wide networks (such as Ethernet-based networks), MAC addresses allow the skin node of the link to be uniquely identified and delivered to that node only. In this way, MAC addresses form the basis of the network on the channel level, like the protocols of the higher level. To convert the MAC-address to the address of the merged layer and back, special protocols are installed (for example, ARP and RARP in TCP/IP mergers).

MAC address structure

· The first bit of the MAC address of the host is called the I/G (wide-command) bit. In the Gerel address, the vin is called the Gerel route indicator (Source Route Indicator).

· Another bit determines the way the address is recognized

The three most significant byte addresses are called Burned In Address (BIA) or Organizationally Unique Identifier (OUI)

· For the uniqueness of the youngest three bytes of the address, the virobnik itself is given.

Malyunok 3.1 MAC address structure

3.2 OSI model

Since the protocol is acceptable, adopted by two mutually compatible objects, in this case, two computers that work in the same way, we do not see it, but it is standard. But in practice, when implementing the measure, the standard protocols are called for. Tse can be firm, national or international standards.

On the cob of the 80s, low international organizations for standardization - ISO, ITU-T and others - developed the model, which played a significant role in the development of the merezh. This model is called the ISO/OSI model.

The Open System Interconnection (OSI) model determines the differences in the interdependence of systems in packet switching networks, giving them standard names and instructions, so that the functions can change skins.

In the OSI model (figure 3.2), the features of intermodality are subdivided into different levels: applied, representative, session, transport, border, channel and physical. Leather rіven maє on the right with the sing aspect of the mutual modality of the outbuildings.

Malyunok 3.2 OSI Model

The physical level takes data packets from the main channel level and transforms them into optical or electric signals, which are 0 and 1 binary stream. Qi signals are overpowered through the transmission medium to the primary node. The mechanical and electrical/optical powers of the transmission medium are determined physically and include: cable type and sockets, pin assignment at sockets, signal coding scheme for values ​​0 and 1.

Physical Layer Protocols: IRDA, USB, EIA RS-232, RS-485, Ethernet (including 10BASE-T, 10BASE-T, 10BASE-T, 100BASE-T, 1000BASE-, 802.11Wi-Fi, DSL, ISDN, IEEE 802.15 , firewire.

The channel peer ensures the transmission of data packets, such as protocols in the upper rows, to the destination node, the address of which also specifies the protocol of the upper row. One of the tasks of the channel level is rechecking the availability of the transmission medium. Another task of the channel level is the implementation of mechanisms for the manifestation and correction of pardons.

The IEEE 802.x specification divides the channel layer into two layers: Logical Link Control (LLC) and Media Access Control (MAC). LLC provides services to the treadmill, and MAC control regulates access to the physical medium.

Protocols: ATM, Fiber Distributed Data Interface (FDDI), IEEE 802.11 Wireless LAN, Link Access Procedures, Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP) (obsolete), Unidirectional Link Detection (UDLD), x .25.

Merezhevy Riven of Appointments for the Designation of the Way of Transmission. Vіdpovіdaє for translation of logical addresses and names in physical, designation of the shortest routes, commutation and routing, failures in the merezhі.

Example: IP/IPv4/IPv6 (Internet Protocol), IPX (Internetwork Packet Exchange, cross-border exchange protocol), X.25 (often this protocol is implemented less than equal to 2) CLNP (cross-border protocol without networking), IPsec (Internet Protocol Security), ICMP (Internet Control Message Protocol), RIP (Routing Information Protocol), ARP (Address Resolution Protocol).

Transportation appointments for the delivery of tribute without pardon, the cost of duplication in your sequence, as the stench was transferred. It doesn’t matter if the data is transmitted, the stars and the cudi, so that the mechanism of transmission is given. Blocks of these wines are divided into fragments (UDP-datagram, TCP-segment), the expansion of which is to be found in the protocol, shortly combined one, and divided into long ones.

Stock: ATP (AppleTalk Transaction Protocol), FCP (Fiber Channel Protocol), NBF (NetBIOS Frames Protocol), NCP (NetWare Core Protocol), SPX (Sequenced Packet Exchange), TCP (Transmission Control Protocol), UDP (User Datagram Protocol) .

The session time of the model is valid for maintaining the connection session, allowing the programs to interact with each other for a three-hour period. The date for the creation/ended session, the exchange of information, the synchronization of the date, the assignment of the right to transfer data and the support of the session during the period of inactivity of the addendum.

Stock: ISO-SP (OSI Session Layer Protocol (X.225, ISO 8327)), L2F (Layer 2 Forwarding Protocol), NetBIOS (Network Basic Input Output System), PPTP (Point-to-Point Tunneling Protocol), RPC ( Remote Procedure Call Protocol), SMPP (Short Message Peer-to-Peer), ZIP (Zone Information Protocol), SDP (Sockets Direct Protocol).

Representative salary may be right with the form of presentation of information that is transmitted as necessary, without changing when you change it. Rivne vyavlennya - Uzgodzhuy vyavlennya (syntax) of data in the interplay of two applied processes: transformation of data from the original format in the internal. On the other hand, encryption and decryption of data can be made, so that the secrecy of data exchange is ensured for all application services.

Applied riven - it's really just a set of various protocols, for the help of some kind of resourceful measures, to limit access to resources, such as files, printers or Web-side hypertexts, and also organize a cooperative work, for example, for an additional protocol of electronic mail.

Stock: HTTP, POP3, SMTP, FTP, XMPP, OSCAR, Modbus, SIP, TELNET.

The IPX protocol for datagram transmission destinations in non-targeted systems, ensures communication between NetWare servers and end stations. IPX packets can be distributed widely.

The SPX protocol is a protocol for the subsequent exchange of packets. Tse protocol of transport equal to z'ednannyam. Pratsyuє over tethered protocol IPX. Before the correction of notification between the working stations, a day is established. On a par with the SPX protocol, the reliability (superiority) of transmission increases sharply. In case of incorrect transmission of a packet, a re-transmission is consummated.

Протокол NetBEUI внаслідок своєї примітивності вимагає найменше ресурсів і забезпечує найвищу швидкість роботи, але через ряд властивих йому недоліків, таких як неможливість маршрутизації та сильна зашумленість у великій мережі, NetBEUI можна ефективно використовувати тільки в невеликих локальних мережах (IBM розробила протокол NetBEUI для локальних мереж, it is close to 20 - 200 working stations).

TCP protocol is installed, located on the transport layer of the TCP / IP stack, between the IP protocol and the power addendum. The IP protocol is concerned with transferring datagrams across a network, not guaranteeing delivery, integrity, order of arrival of information and readiness to receive data, all tasks are set by the TCP protocol.

SMTP is a common protocol for transferring electronic mail in TCP/IP networks. The SMTP robot works without interruption on the server of the otrimuvacha. Supporting functions: setting up a login, authentication, data transfer. In this hour, the SMTP protocol is the standard for e-mails and servers.

POP3 (Mail Delivery Protocol, version 3) is retrieved by the mail client to retrieve email notifications from the server. Start playing with the SMTP protocol. Mail notifications are received by the mail server and stored there, docks on the client's workstation will not run the POP3 program. This program installs a connection with the server and takes away the call notification.

IMAP is an application layer protocol for accessing electronic mail. Similar to POP3, serve for work with input sheets, protect the security of additional functions, allow searching for a keyword without saving it to the local memory.

SMB/CIFS - application layer protocol for remote access to files, printers and other network resources, as well as for cross-process communication.

HTTP - "Hypertext Transfer Protocol", an application-level data transfer protocol. HTTP is widely used all over the world for extracting information from websites.

HTTPS is an extension to the HTTP protocol that supports encryption. Vіn zabezpechuє zahist types of attacks, scho based on eavesdropping merezhny z'ednannya.

FTP - protocol for transferring files from computer networks. FTP allows you to connect to FTP servers, browse through directories and grab files from server or server. The FTP protocol comes before the protocols of the application layer and the transfer of data to the TCP transport protocol.

4. ROUTING BASICS

4.1 Merezhev possession

Merezhevі cards - tse controllers, which are connected to the expansion slot of the motherboard of the computer, are recognized for transmitting signals to the measure and receiving signals from the measure.

Concentrators (Hub) - tse central extension of the cable system chi merezhі physical topology "star", yakі for otrimannі package one zі svoїkh portіv forwarding them from all others. As a result, a merging with a logical structure of a chain tire comes out.

Repeaters (Repeater) - an extension of the line, which will help and re-form the form of the input analog signal of the line to another segment. I repeat the electric line for the connection of two segments. Repeaters do not recognize any of the addresses, and therefore cannot win for changing traffic.

Switches (Switch) - keranovіnі software zaspechennym pristroї kabelї ї ї ї, scho schouyut mezhezhіy trafіkі for rakhunok scho sho parіzuєєєєєєєєєєєєєєє єєєвня the address of yogo oberzhuvаchа і іdpovіdno prаєdєno єіlki іomu.

Routers (Routers) are standard extensions that work on the border line and allow forwarding and routing packets from one line to another, as well as filtering wide messages.

4.2 Routing

link network topology routing

Routing - the process of assigning information to the route in the link links.

Routes can be set administratively (static routes), or calculated for additional routing algorithms, based on information about the topology and the network, taken for additional routing protocols (dynamic routes).

Routing table - an electronic table or data base, which is saved on routers, which describes the type of addresses recognized by that interfaces, which are used to send a data packet to the next router.

The routing table should be searched for: the address of the destination or destination node; recognition mask; gateway, which indicates the address of the router in the order, on which it is necessary to forward the packet, which is direct to the specified destination address; metric - a numerical indicator that sets the priority of the route. The smaller the number, the shorter the route (intuitively it seems like a walk).

Static routing - type of routing, for which routes are specified in the view when configuring the router. All routing is carried out without the participation of any routing protocols.

Dynamic routing -- if the entries in the table are automatically updated with the help of one or more routing protocols.

IP-addresses - a unique array of node addresses in a computer array, inspired by the IP protocol. Addresses are made up of two parts - the number of the line and the number of the node in the line

Automatic distribution. With this method, the skin computer on a permanent basis sees quite a valid IP-address from the range of the administrator.

Dynamic rozpodіl. This method is analogous to the automatic distribution, except that the addresses are seen by the computer not so in the post-code, but in the sing-song term.

Figure 4.1 Routing in TCP/IP networks

DNS is a computerized system for collecting information about domains. Most often it is used to remove the IP address on the host name (I will add a computer or I will add it), to remove information about the routing of the mail, which will serve the nodes for protocols at the domain.

ARP is a low-level protocol, which is used in computer networks, assignments for assigning a link-level address to a given link-level address.

Vuzol, which needs to map an IP address to a local address, forms an ARP request, inserts it into the frame of the link layer protocol, pointing to a new IP address, and sends the request broadly. All nodes of the local network will ARP request and resolve the IP address specified there with the control. At the same time, the node forms an ARP query, in which case it specifies its IP address and its local address, and it is directed already, so that ARP will ask the proxy to specify its local address.

The address is changed by way of a search in the table. This table, called the ARP-table, is saved from memory and to remove the rows of the skin node of the mesh. Two stations have IP and Ethernet addresses. If it is necessary to convert an IP address to an Ethernet address, then the entry with the same IP address is searched.

Figure 4.2. ARP table

The ARP table is necessary because IP addresses and Ethernet addresses are chosen independently, and there is no algorithm for converting one into the other. IP-addresses are selected by the manager of the network based on the position of the machine in the Internet network. If the machine is moved to another part of the internet, then the IP addresses can be changed. Ethernet addresses are selected by the selector of the network interface property from the address space seen for the new licensed address. If the machine has a merging adapter board replaced, the Ethernet address will also be changed.

5. VISNOVOK

During the period of passing the professional practice for the profile of the specialty, the following was looked at:

1) principle encourage LOM;

2) factors, which are added to the manufacturing process;

3) dimensional OSI model;

Placed on Allbest.ru

Similar documents

    The main types of topology of counting, surveying, analysis, evaluation. Visnovok about the work of merezh with different topology (lanzug, modern-style, commercial, combined). Advantages and shortcomings of topologies that contribute to the productivity of the enterprise.

    thesis work, donations 02.03.2009

    Zagalni ambush of the organization of local measures, their typology and technology inspire. Development of the project by combining two counting measures, equalizing changes. Choice of a media converter, radio-relay control, routing and patching of a router.

    graduation work, donation 18.03.2015

    Characteristics of the main mechanisms of association of measures. The main functions of the repeater. Physical structurization of the EOM. Rules for Correct Segmentation of Fast Ethernet Networks. Features of using 100Base-T in local networks.

    abstract, additions 30.01.2012

    Theoretical foundations of the organization of local computer networks: designation of LZ, topology, protocols and protocols for exchanging data, linking working stations and EOM; software. Merezhev otochennya; Identification of the computer behind an additional IP address.

    course work, donations 05/15/2014

    Warehouse of local counting measure, її main elements and їхнє recognition. The role of cables in pobudovі local zv'yazkіv counting merezha, perevagi їх vikoristannya. Variations and configurations of cables, their constructive features and fittings.

    thesis work, donations 06/08/2009

    Purpose of the commutator, tasks, functions, technical characteristics. Perevagi that nedolіki in porіvnіnі z router. Fundamentals of the technology of organization of cable systems of merezh and architecture of local counting merezh. OSI reference model.

    insight from practice, additions 06/14/2010

    Vivchennya local merezh. Peculiarities of different types of topological local merezh: tire, star, ring. OSI reference model. The essence of the structural approach to the creation of structured information systems. Transfer of information from the Merezha. Packet addressing.

    abstract, additions 12/17/2010

    Exploration of the variant of integration of local counting measures MІET and student class MІET, which pleases the offending parties. Analysis of dotsilinosti realizatsii zv'yazku LOM MІET and Studmistechka MІET for an additional radio channel. A look at the technologies of the possession of radio measurements.

    diploma work, donation 10.09.2010

    Classification of telecommunication measures. Channel schemes based on telephone lines. Different non-switched meshes. Appearance of light threads. Problems of rozpodіlenogo pripriєmstva. The role of that type of global merezh. A variant of the consolidation of local merezh.

    presentation, donation 20.10.2014

    Classification of the measure and methods of switching. See the link and the modes of robotic transmission and reconciliation. Unification and standardization of protocols. Reference model of interconnection between critical systems. Features of the preparation of data. Interaction of information systems.

Good day to the readers of the blog, today I want to tell you about the local Cisco network, in simple words, so I often change the nutrition related to this topic. I have written about them in one article, and the information for future engineers will be correct.

Cisco Lifecycle

Lifecycle, English language is translated like an hour of work, or the life of your decision, it includes six stages:

  • Preparing > at this stage, encourage local measures to be taken, investing in a viable economic investment for the whole project
  • Planning > Evaluation of readiness to support the proposed solution, for example, what is fahivtsi, who needs to work out what integrator
  • Design > At this stage, the creation of a maximum report project, in which all the wants and needs of the business with technical assistance are described
  • Provadzhennya > well, here it dawned on me that those who designed, it is necessary to implement
  • Robot > good operation and security of uninterrupted work
  • Optimization > search for solutions or technologies, for which it is possible to improve the work of local networks.

What is the all-world computer network

After that, as we have sorted out the cycle of life and the divisions of the borders, it is necessary to know the signs, as I describe it.

Merezha computer(Computer NetWork) - the totality of computers and other attachments connected by communication lines and exchanged information among themselves according to the rules - the protocol. The protocol plays an even more important role;

Below is a general scheme, as if for the help of the Internet everything will be united in one goal, I guess that the Internet can be described with a simple description, the whole merezha, so that a bunch of local merezhes are united into one great merezha. Like a bachite for a little one, you allow offices to communicate with their central offices, mobile koristuvachs to work outside or at home, becoming mobile. I think you have now realized that such an all-world computer network.

Physical components and measures

Let's explore some of the components of the local dimension. Yake the manager stood in front of the engineers, what are they doing measures, so that from the operational memory I will attach A, the ball was transferred to the operational memory of the annex B. They gave for the account of the supplements, which are worked out for the singing protocols, the information stays and hopes to be coristuvacha. The scheme is like this:

  • The card is inserted into the computer
  • Switch > manage your own line to your other router
  • The router > can either change the router's lanyard, or the required switch may need to change the route, and then the packets are processed by the computer with the host and are sent back as information.

How to bachite a local network (LAN), even more logical and simple.

As if to marvel at the average statistical measure of business, it looks like this. The root switch, the core of the merezhі, to the new connection of the switch of another equal, as it is fixed, I described in the article How to set the cisco switch on the 3rd equal. The entire network can be segmented by VLANs, є Cisco DHCP server or on Windows, it doesn’t matter, send all traffic that goes beyond the local network, go to the router, and go further to the Internet, static Cisco routing. Apply the patching of the Cisco router already leading.

How to pour coristuvatsky programs on the mesh

Let's take a look, see how the traffic is present in the city and how to stink on it.

  • Package programs > butts can be both ftp and tftp protocols, interfacing between computers and no direct messaging of people. Here smuga is missing, obviously, important, but does not play a key role.

  • Interactive programs > tse offensive type of traffic > There is already є іnteraktiv mizh koristuvachem and computers. A simple butt - the same browser or downloads to databases. So, as a courteous ocular, the hour of the system's reaction is important for a new one, but not playing the most important role, as it were, obviously, no more than a long time. A simple butt came to the work of a person, but for a long time they got nasty and stepped on his foot, that one got wet :) hvilina, And after two wines there will be gundosity, that everything is nasty pracyuє, and from the same wines, having sprung up, having drunk, that ours played football with the English, then be it a zatrimka, there will be no attack on the new viklikati fiercely, wines for an hour ochіkuvannya talk about yesterday's football.

  • Programs in real time > let's look at how busy the communication channels are and here the connection between people and people. Butt can be VOIP and Video traffic, sound is more priority over video. It’s even more critical after an hour of delay, messengers can serve as a butt, on ICQ kshtalt, de traffic is minimal, but a person can take away yoga mittevo.

  • P2P traffic > all peer-to-peer networks (Peer-to-Peer), with a simple butt, they can be torrented 🙂 for operators in the linkage of the link, like clogged channels, but still not the blame for one simple reason that the tightness of the links in the linkage is allowed process the current needs of supporters and business. Before speech, Skype, so itself works for the p2p protocol.

Characteristics of local merezh

When prompted by the local Cisco network, that and not only її, it is necessary to secure a low level:

  • Shvidkist
  • Vartist
  • Bezpeka
  • Availability
  • Scale
  • Topology

Models

We have already explained the main characteristics, now let's figure out how the models should be studied. First topology, yaku guessed, called

  • Bus topology > with this model, wait for a network, one full data transmission bus comes out, and all participants (attachments) receive a signal that nothing can be predicted 🙂 I told you about the hub. The topology is even more unsafe, as it could easily take away the data that is not recognized for you, plus the opening of the central bus, leading to the complete impracticality of the local network. We began to think that it was still possible to grow a solution and guess.

  • Ring topology > transmit signals to the call. Three pluses are less staining on cables, especially for optics. One point of view.

As a result of the struggle for stability to strength, they extended the axis of such a design, FDDI underpinned the Kielce topology. Here the signals are transmitted at the opposite straight lines. Vykoristovuetsya operators zv'yazku.

  • All data is transmitted through the central vuzol, where the point of reference is critical, but in today's minds, everything is duplicated, beyond the clustering. І when shaving one of the line transmissions, the lines continued to be practicable, it was necessary to reach the equals with the lower models to induce a measure.

The axis is a further development and more stable, lower mirror-like topology, ale like a legacy and more expensive. Navіt yakscho to move the core, its segments of the local lines pracyuvatimut, and check if the core is lifted.

If you are going to be a corporate measure, you are to blame for the good to think over everything and know all the weak points, so that, if possible, you will try or zadublyuvat them.

There may be another option, leather with leather, it is completely resistant to wear, but the expensive one is not real. The butt can be used for a telephone call (not a style one), it is called a modern commercial topology.

Prodovzhuєmo raszbiratsya in pobudovі local ї merezі and razglyany like darts vykoryvayutsya for tsgogo zavdannya.

Merezhnі droti and sockets

Twisted couple

If you want to work on local strings, you need to choose some darts for which you will win. In today's offices, most of the connections for the local area use Ethernet technology, where the signal is transmitted over the so-called twisted pair (TP-Twisted Pair) that consists of several middle twists one by one (for changing the transition) pairs of wires. The leather administrator is guilty of the nobility of the sequence, embossing this dart, to make a new patch cord.

If there is a computer cable, most often it is a non-shielded CAT5 cable, and the CAT5e version is most often perfected. Cables of similar category allow transmitting a signal with a speed of 100 Mb/s with less than two pairs (half) of darts, and 1000 Mb/s with a variation of all four pairs.

For connecting to extensions (routers, commutators, tie cards), 8-pin modular connectors are installed on the ends of the twisted bet, RJ-45 everywhere (though the correct name is 8P8C).

Keep in mind that a great twisted couple is not approved for outdoor activities. Temperature drops, influencing moisture and other natural factors, can lead to gradual collapse of insulation and a decrease in functional capacities, which, perhaps, will lead to the exit of the segment of the border from the fret. In the middle mesh cable is visible on a fresh surface from 3 to 8 years, moreover, the quality of the mesh is more likely to fall back before the cable exits the operation. For tapping on a hardwire, it is necessary to tap a special twisted pair for hardwired wiring.

Pobudova local fencing, which transmits multiple cables for interconnecting computers at the fencing, it is possible to connect them directly to the switches or routers to roses on the fencing cards of the PC, and also the other option is to switch to the fuse box. In this way, one end of the cable is plugged into the port of the switch, and in the right way, then the patch panel and from it into the switch, and the other with the internal contacts of the socket, at the outer rose, you can connect the computer or the device outbuildings.

Why can you tell me to tweak the patch panel in our local area, it's easier to build it directly into the switcher, I'll point the pluses.

On a small animal of representations, the view of the patch panel is from the front and back. Like a leather port of numbering and you can sign the number of the socket with some kind of connection, which allows you to draw a map of the grid, and look for the socket you need to borrow a couple of mittevs from you, to see that the yakby socket would lead directly to the switcher, it’s elementary to fly with a signature and then use a probe to find out.

Another thing is that the patch panel is fixed and all the cables that go into it from the back, fasten with ties, that you transfer, that you don’t tamper with the connection between the socket and the patch panel, and we have a yakbi wired directly into the switch, then bula b the ability to destroy the link with the socket for the rahunok of the fluffy sound of the drota, for example.

Merezhnі sockets can be put as if they were built into the wall, and so they are mounted, for example, in a box. Zastosuvannya sockets replace cables, what to wash, give a more aesthetic look to your work space. So the rosettes themselves can be manually twisted as reference points of various segments in the line. For example, you can install a switch or a router near the corridor, and then install the cables to the sockets, located at all necessary premises. In this rank, you take away the sprinkling of points, spread out in different parts of the apartment, to which you can be, if you like, connect not only a computer, but also be a small annex, for example, add-on switches for expanding your home or office space.

One more trick, which you may need when you have a cable connection, you can use it to connect two twisted pairs with already crimped RJ-45 roses. For example, you have a pair of wires 3 meters, and you need 5 meters for connecting a working space, you can wire one for two small boxes.

Also, for connecting up to one cable to two computers without switching the switch, you can switch the wires. But again, I’ll remind you that in this period the maximum speed of data exchange will be 100 Mbit / s.

How to deal with local mergers with a lot of different components and nuances, and knowledge of all warehouses, the guarantee of success and the presence of problems with the system administrator.

This is one of the first conductors, who victorious for the creation of strings. Take away the central conductor, the ball of the insulator in the copper or aluminum weave and PVC insulation. The maximum speed of data transmission is 10 Mbit. The cable is very thin to the electromagnetic guidance. At once, the Poshkojennya is renovated in the shared (Trinibna Pike I Retelna Izolyatsiya), the Ale to be in the pizl tsovo is the dilian prazu, the sponge of the Elektromagnikhi hwille, the rospyujas, to the co -codes, to the co -codes.


In Denmark, the coaxial cable is mainly used as a conductor for the signal of satellite dishes and other antennas. At local fencing, a cable with a soft support of 50 ohms is installed, and the transmission of a TV signal is 75 ohms, stink between them. In modern computer systems, the use of a coaxial cable, it sounds, is not true, and in the article, nothing can be seen.

For example, I have a provider in Moscow via a coaxial cable that gives me internet and TV, how to start my router, and if there is, I already take the internet via rj-45 to the computer.

Dali be

© 2022 androidas.ru - All about Android