Understanding the corporate system and merezhі. The concept of a corporate information system. The results of the KIS visit

Golovna / Korisne PZ

Corporate Information System (KIS)– the totality of information systems other than the production of enterprises, united by a comprehensive documentary process, such that the skin of the systems takes part of the management of the decision, and all systems at once ensure the functionality of the cost of the enterprise up to standard ISO90.

Historically, the power to corporate information systems has been low. Wimogi qi so:

Systematic;

Complexity;

Modularity;

Vіdkritіst;

adaptability;

arrogance;

Bezpeka;

Scale;

mobility;

Simplicity at vivchenni;

Pіdtrymka vprovadzhennya that suprovodzhennya from the side of the retailer.

Let's take a look at our report.

In today's minds, creativity cannot develop without a highly efficient management system, which is based on the most modern information technologies. Postіyno zmіnyuyutsya vimogi market analysis, velicheznі flows Informácie NAUKOVO-tehnіchnogo, tehnologіchnogo i marketing nature vimagayut od staff pіdpriєmstva scho vіdpovіdaє for strategіyu that tactic rozvitku visokotehnologіchnogo pіdpriєmstva shvidkostі that tochnostі priynyatih rіshen, spryamovanih on otrimannya maximum pributku for mіnіmalnih vitrat. Optimization of vitrates, increasing the reactivity of virobnitstva in a similar way to growing and growing, they can slow down in the minds of the strong market competition can not be based only on smart visnovkas and intuition to find found spivrobitniks. Necessary universal control over the use of business centers in business, folded mathematical methods of analysis, forecasting and planning, based on the appearance of a large number of parameters and criteria in that line of the collection system, accumulation and processing of information. Extensive ways of solving the problems caused by the unbearable growth of the managerial apparatus, which, with the best organization, cannot give a positive result. Go to modern technologies, reorganization of virobnitstva scho is impossible to pass and such a key aspect as management. There may be more than one way here - the creation of KIS, which shows the lowest zhorstky vimog.

КІС, persh for everything, may support the support of complexity and systemicity. It is the responsibility of all the equal management of the corporation to be slandered by the establishment of branches, subsidiaries, service centers and representatives, to the workshop, the business of that specific working area and the manufacturer. The whole process of compilation from a glance of informatics is an uninterrupted process of generation, processing, changing, saving and expanding information. The skin is a working place - whether it is a working place of a picker on a conveyor, an accountant, a manager, a businessman, a marketing specialist or a technologist - it's a higher education institution that generates new information. All the same, the knots are connected with each other by streams of information, subjected to the sight of documents, reminders, punishments, and stingy. In this manner, the business, which is functioning, can be imagined in a visually informative and logical model, which is formed from nodes and links between them. Such a model is to blame for all aspects of business activity, it is guilty but logically grounded and directed to revealing the mechanisms to reach the main goal in the minds of the market - the maximum profit, which transfers to the system. It is only possible to achieve the most effective result of the task on the basis of the exact appearance of the maximum possible primed multiplier of parameters and the possibility of rich-criteria polyvariant analysis, optimization and forecasting - that is the complexity of the system.


Information in such a model may differ in character and may be strictly structured on the skin node in the skin sweat. Nodes and flows can be mentally grouped in a subsystem, which hangs one more important thing to KIS - modularity. This is also important from the point of view of the implementation of the system, the shards allow for parallelism, ease and, obviously, speed up the process of installation, training of personnel and the launch of the system in professional exploitation. In addition, since the system does not create a specific variability, but buys into the market of ready-made systems, modularity allows you to turn on the supply of components, as they do not fit into the infological model of a specific enterprise, otherwise you can do without them on the cob stage, if you allow it.

Oskіlki zhodna real system, to guarantee the yakshcho to be a special shutter, it is not possible to bout vichene (not able to tangit it) in the process in the process of the Upovlensni, and the same, through those, to the function, they reached its components. The attacking primordial power is vodkritist. Tsya vimoga nabuvaє osoblivoї vazhlivostі, Yakscho vrahuvati scho automation not vicherpuyutsya lishe upravlіnnyam, ale i ohoplyuє takі zavdannya, yak konstruktorske proektuvannya that suprovіd, tehnologіchnі Process, vnutrіshnіy that zovnіshnіy dokumentoobіg, phone reception іz zovnіshnіmi іnformatsіynimi systems (napriklad, Іnternet) , security systems, etc.

Be a pіdprimism of the closed spacious, and the consistent drip of the driving, the vimaga, the gnchko of the reacti on the Rinkov situation, the bouty of the structure of the structure of the sisty of the nomenclaturism of the School, In addition, in the minds of the transitional economy, legislation can be tireless and dynamic. Great corporations, before that, can only be exterritorial subsidiaries that are located in the zone of jurisdiction of other regions or large economic zones. Tse means that KIS is to blame for the mother of power adaptability, so that the law-making, the mother of different interfaces, and the practice of different currencies at once. Not maє maє vіstu vіstyu adaptivіnі system doomed duzhe netrivalі іsnuvannya, protyag іy hardly vodavsya recoup vitrati on її vikoristannya. Bazhano, in order to create the system for the development of the system is small and for the development of tools, for the help of some kind of software and the most qualified coristuvant business, they could independently create the necessary components, as if they were organically introduced into the system.

If KIS is operated in industrial mode, it becomes an indispensable component of a functional enterprise, building up the entire process of virobniztva and the leader of great battles at the time of an emergency sound. To that, one of the most important could before such a system is the supremacy of the functioning, which transfers the uninterrupted functioning of the system as a whole to inspire in the minds of a partial departure from the harmony of the other elements due to the reasons for non-transferring that.

It is superbly important for any large-scale system that can take revenge on a large amount of information, may be safe. Vimoga security includes a few aspects:

Zakhist danih vіd vtrati. Qia can be implemented mainly on the organizational, hardware and system levels. Applied system, such as, for example, automated control systems, is not obligatory guilty of revenge backup that remembrance of the data. The number of nutrition is less dependent on the level of the operating environment.

Preservation of integrity and imperfection of data. The application system is responsible for managing changes in mutually dependent documents and for managing versions and generations of datasets.

Prevention of unauthorized access to data in the middle of the system. Qi zavdannya vyrishyuyutsya complex like organizational visits, and only on the level of operational and applied systems. Zokrema, applied components are responsible for the mother of the administration, which allow to restrict access to data and functional capabilities of the system depending on the status of the coristuvach, as well as to monitor the delinquency of the system.

Preventing unauthorized access to these calls. Virishennya tsієї part of the problem lies mainly on the hardware and operational middle of the functioning of KIS and requires low administrative and organizational inputs.

Pidpromism, and it is possible to get funny in the last elaboration, a male tendency to the zrustannie, the dwarf fіrma that firm, the process of the Ekp in the process of the automatic ribs, the zbizhagovygov, the zbizhuhovnya of the veil, In addition, for companies such as holdings and large corporations, it is to blame for the ability to win the very technology of management as on the level of the head enterprise, so on the level, be it, to build small firms to enter before the new one. Such a pіdkhіd vysuvaє vymogu scaling.

At the first stage, the development of the enterprise could increase the productivity and resources of the system, which could lead to the transition to a more productive software and hardware platform. So that such a transition would not cause a cardinal slack in the management process and unrealistic capital investments in the supply of more difficult applied components, it was necessary to increase mobility.

Simplicity in education is important, which includes not only the visibility of an intuitively sensible program interface, but also the visibility of reports and well-structured documentation, the ability to train staff in special courses, and given system already in operation.

Razrobnik's support. The reason for understanding includes the number of low possibilities, such as the adoption of new versions software Bezkoshtovno, he was a bunny of the bunny, the abdica of the methodically methodically, consumers, a consumer of the roser of the products of the product, the can of the cinnamon, the rosor, the rosor, is to be carried out. Naturally, to secure such support for the coristuvachevy is a less serious company, which is steadily working on the software product market and can get a clear perspective on the future.

Support In the process of exploitation of folding software and hardware complexes, there may be situations that require the prompt delivery of qualified personnel to a retailer or a representative of the house. The support includes a way of fakhivtsya on the object of the replacement for the recovery of the last emergency situations, technical training on the object of the replacer, methodical and practical help, if necessary, to make changes to the system, so as not to be afraid of the nature of the radical restructuring of the new. It is also necessary to install new releases of software, obtained from the retailer free of charge by the forces, supported by the retailer of the accompanying organization, or by the retailer itself.

Summary: КІС may be advised to help:

Complexity and consistency;

modularity;

Vіdkritostі;

Hopefulness;

Bezpeki;

Scale;

mobility;

Simplicity in mastering;

Pidtrimka from the side of the retailer;

Accompanying a retailer who is a representative.

At its core, an applied system, which is an automated control system, hangs a number of vimog to the middle, in which it functions. The middle of the functioning of the application system is the operating system, the operating systems on the workstations, the data base management system, and the low auxiliary subsystems that provide the security functions, archiving, etc. As a rule, a list of options for a specific set of system software can be found in the documentation for a specific application system.

Entry

Already on the cob of the 60s, a hypothesis was made about those that the amount of information needed to be collected, processed and delivered from the needs of the world, "grows even less in proportion to the square of the industrial potential." The analysis confirms that in the advanced and technically advanced countries such growth can be reached approximately in the step of 1.7-2.0. It is not necessary to raise to a substantial extent the significance of the activity connected with the virility, the transmission and the processing of information.

According to UNESCO, more than half of the procesed population of the rozvinenikh krai directly and indirectly take part in the process of generating and distributing information. Three wire halls of the information sector of the industrial manufacturing industry (calculating technology, industrial electronics and communications) play the same role for these lands at once, as industrialization played an important role at the stage of the industrialization.

In other words, light sleepiness is approaching such a world of fallowness of its foundation as a function informational measures, as it is possible to compare with the fallow of the types of systems for the provision of electricity. Tse krim of obvious gains may be a turnaround. Vіdmova merezі zv'yazku mоzhe naslіdki scho vershіyut slіdіkі accidents energosistemі. In connection with this, the problem of ensuring the reliability of corporate measures and the protection of information comes to the fore.

Understanding the corporate dimension

The epithet "corporate" is often used to characterize the products of enumeration systems. All types of elements of an enumeration system, such as concentrators and routers to servers and operating systems, can be named corporate. mesh adapters seldom receive such an honor. This characteristic also zastosovuetsya to database management systems. Among fakhіvtsіv i virobnikіv іsnuyut raznі vіznі tlumachennya tsgogo termіnі (like і be-yakоgo іnshoy), іоdі buvaє important izozumіti why virobnik calls іє іtіє corporatіon, and products of competitors - nі. Intuitively, behind the "corporate" example, the image of something great, straining, productive, and nadiy appears. Tim is not less, I want my mother to have a hard ground under my feet, and put it for him. As a tired sign of corporatism, that yoga can be installed universally, like equipment, and to software products, zocrema and data bases. The presence of these signs is guaranteed garnu robot products from corporate companies. These signs are closely related to the specifics of corporate merezh, so for a clear formulation, it is necessary to understand the specifics of corporate merezh to corporate data bases. A.S. Samardak. Corporate information systems. - Vladivostok, 2003. P.12.

Father, what are corporate measures? In the English literature, this type of merging is most often called "enterprise-wide networks" (literally, merging to the scale of enterprise), and in our country, another term for foreign trespassing has taken root - corporate merezhes, which, in our opinion, is more common in the essence of such merzhy. The term "corporate" in one side shows the size of the measure, the small corporation - it's big, big business. On the other hand, this term carries in itself a sense of association, that is a corporate measure - a whole, which, as a result of the association, is, as a rule, a variety of measures. In addition, the spirit of corporatism is the spirit of unity, unity, and in this sense corporate measures - the whole, in some heterogeneous components to live with a happy fortune.

The emergence of corporate partnerships is a good illustration of the philosophical postulate about the transition from quantity to quality. When uniting the borders of the great enterprise, they may have grown up in different places and lands, at the same border, a lot of characteristics of the combined border often overturn the critical critical threshold, as a new beginning begins. For whom, the number of correspondent computers and computers can be numbered in the thousands, the number of servers - to exceed the number of hundreds, the number of records in the database - a few million, and the number of links between them can be such that the number of global connections is required. In addition, an indispensable attribute of such a collapsible and large-scale measure is heterogeneity - it is impossible to satisfy the need for thousands of coristuvachs for the help of the same type of elements and homogeneous structures. Corporate systems will have different types of computers - from mainframes to personal computers, 3-5 types of operating systems, a dozen different communications protocols, a database of DBMS and a lot of other add-ons. The perevischennya kіlkіsnimi zmіnami deyakoї critical masi gave rise to a new quality - a corporate measure.

The term "corporatism" is used to describe the type of a merezh іz belonging to one enterprise, and a great one at that. This sign is not the main one, but simply reflects the fact that a large-scale, heterogeneous and well-integrated network is most likely to be the result of business success when combining its own networks into a single information system. To that, as a measure can be more important than specialness, and if one corporation does not belong, then everything can be called corporate. A.S. Samardak. Corporate information systems. - Vladivostok, 2003. P.15.

The concept of "corporatism" of the product includes a few aspects, among the most important ones:

Scaling, so that the building is nevertheless well practiced in a great range of different characteristics of the land,

Consistency with other products, so that the building can be used in a collapsible heterogeneous medium in plug-and-play mode. Mets A.A., Taldenkov A.M., Borisova T.V. Theory and practice to encourage corporate partnerships with Internet/Intranet technologies applied to the Ministry of the Russian Federation - http://www.ict.edu.ru/vconf/index.php

I can look at the corporate network as a folding system, which is made up of a number of mutually compatible balls. At the heart of the pyramid, which represents a corporate measure, lies a sphere of computers - centers for collecting and processing information, that transport system that ensures the transfer of information packets between computers.

Above the transport system, a ball of mesh operating systems is working, which organizes the work of supplements in computers, and through the transport system, the resources of your computer are in the bedroom.

Various additions are worked on the operating system, but through the special role of database management systems, which take the main corporate information from the ordered look and perform basic operations over it, the entire class of system programs is seen as a large corporate ball.

corporate merezha computer information

On the following rіvnі pratsyuyut sistemnі servіsi, SSMSC, koristuyuchis database, yak іnstrument for Poshuk potrіbnoї Informácie Sered mіlyonіv i mіlyardіv bytes scho zberіgayutsya on disks nadayut kіntsevim koristuvacham qiu іnformatsіyu in zruchnіy for of acceptance rіshennya formі and takozh vikonuyut deyakі zagalnі for of companies usіh tipіv information processing procedures. To these services lie the WorldWideWeb service, the electronic mail system, the collective robotic system, and a lot of others.

І, nareshti, the top line of the corporate measure to represent special software systems, yakі vykonuyut zavdannya, specific for this business this type. The butts of such systems can be automation systems for a bank, organization of accounting, automated design, management technological processes etc. Kіntseva meta corporate merezhi vtilena in the application programs of the upper level, but for їhnої successful work it is absolutely necessary that the subsystems of other versions clearly demonstrate their functions. Mets A.A., Taldenkov A.M., Borisova T.V. Theory and practice to encourage corporate partnerships with Internet/Intranet technologies applied to the Ministry of the Russian Federation - http://www.ict.edu.ru/vconf/index.php

Strategic decisions, as a rule, add to the seemingly merezhі as a whole, zachіpayuchi kіlka sharіv vіrіmіdі "piramidi", hocha kobekusutsya only one specific ball or other subsystem of the ball. Such a mutual injection of products and the solution is necessary to obov'yazkovo vrakhovuvat when planning a technical policy for the development of a measure, otherwise it can be closed with the need for terminology and non-transferred replacement, for example, mesh technology, Through those that the new application program is aware of the lack of bandwidth for its traffic.

ALL-RUSSIAN FINANCIAL AND ECONOMIC STATEMENT

INSTITUTE

DEPARTMENT OF AUTOMATED PROCESSING OF ECONOMIC INFORMATION

COURSE ROBOT

from the discipline "Informatics"

on the topic "Corporate network Intranet"

Moscow - 2010

Entry…………………………………………………………………………...3

1. Theoretical part………………………………………………………………5

1.1. Understanding the essence of corporate intranet networks……………………….5

1.2.Intranet: simple, simple scheme and function……………………….6

1.3. See the intranet network…………………………………………………………..10

2. Practical part…………………………………………………………….14

Conclusion………………………………………………………………………….23

List of victorious literature………………………………………………24

Entry

The theme of the coursework is “Corporate Intranet Networking”. Tsya topic is still relevant, the shards of today's corporate counting measures (CBC) have become wide-width. In this hour, the stench wins in scientific and illuminating purposes, in business, in financial and economic activities, in the implementation of common scientific and technical programs.

Corporate counting (Intranet) - ce mere only on a equal company, defiance of software development, based on the TCP / IP Internet protocol. In other words, Intranet is a version of the Internet on a equal company, an adaptation of existing technologies created for the Internet, hundreds of private local (LAN) and global (WAN) organizations.

In today's highly competitive market, access to new information is becoming the most important component of business success. To this extent, the intranet can at once be the most promising medium for the implementation of corporate supplements.

Great Zrostannnya of corporate marshes, pus the time for the hour (in 2000 p. Can vicoristovuvat up to 4 million server KVS), explain the ї ї navigable vicoristani ilformatzi, spvidami to the dannies software security for robots on the Internet.

The method of the course work is the study of the main characteristics of corporate intranet networks.

Robots have the following tasks:

    It is clear that the essence of the corporate Intranet is clear.

    Vyvchaєtsya software security tsієї merezhі.

    Rozglyadyatsya mezheve obladnannya.

    Relying on the help of the MS Excel spreadsheet processor is an economical task.

For the course work, the following software was provided:

    operating system Windows XP;

    text editor MS Word;

    spreadsheet processor MS Excel.

Vikonan robot for EOM help with the following characteristics:

    Intel Celeron CPU 253 GHz;

    504 MB RAM;

    Video adapter Intel 82945G Express Chipset Family;

    DVD-ROM TSST corp DVD-ROM SH-D162C;

    Disk attachment SAMSUNG HD 080 HJ;

    Merezheva board Intel PROH000 PL Network Connection;

    LCD Monitor Acer 17”;

    Keyboard;

    Manipulator "Misha".

In the course of writing the course work, the main references were such teaching aids as: Accounting systems, measures and telecommunications: Assistant for universities. Broido V.L.

1.1. Understanding the essence of corporate merezhIntranet

Corporate measures - measures to the scale of enterprise, corporation. Oskіlki zazvychiy vikoristovuyut komunikatsiyni possibilitsiy Internet, teritorialnoe rozmіshchennya do not play their role. Corporate merezhi are brought to a special variety of local merezhes, which can mean the territory of okhoplennya. At the same time, stinks are actively developing and are often called intranet networks.

The term "Intranet" appeared notably recently and became more and more popular in the lexicon, at the same time as the word "Internet" sounded richer to the computer.

In a narrow sense, Intranet is an internal corporate tool for exchanging information with the enhancement of such standard Internet technologies as Web servers, TCP / IP and HTML. For these components, the company can function as a single group, consolidate information and increase the productivity of work.

Intranet (intramerezha) - not private internal company or intercompany computer network, which can expand the possibility of being irradiated in the Internet technology, which can access to the Internet network, but is protected from sources to its own sources You can designate as a system of saving, transferring, processing and access to inter-company and internal-company information with the help of local networks and Internet

The standard Internet environment allows interoperability between various tools and provides easy and manual access to corporate resources, such as data bases, for additional CGI scripting.

Together with the help of an easy layout for my layout, HTML hypertext is graphic inserts, the middle of the Intranet, which is configured, you can create everything for a little money.

Other protocols with the TCP / IP stack, with the Intranet can be used by all the company's spyware. On top of that, the stagnation of already implemented technologies allows companies to lose significant capital investment in the equipment and security of the cable system. For example, in order to be able to capture corporate information without intermediary on your floor system, everything that is needed to be done is to add client drivers for TCP / IP, web browsers and other tools of the Internet.

Intranet can be the mother of direct connection from the Internet. In some cases, the channel for access to the Internet has a lot of problems, especially if it is necessary to deal with confidential information. For more options, however, connecting to the Internet increases the value of the Intranet, but it does not allow access to Internet resources directly from the Intranet Web-sides.

1.2. Intranet: yoga equal, simple scheme and function.

Intranet is a technology for managing corporate communications, and in the same way, it is control over the Internet, which is a technology for global communications.

In the implementation of communications, three equals are seen: hardware, software and information. From a glance of the hardware and software equal communications - the organization of the overhead channel, the transmission of information without delay, the organization of the collection of information and effective access to it. The plan for the technical implementation of these Intranet lines has little effect on the Internet. There are also local and global networks; the programs themselves: Internet navigators, Web-servers, e-mail, teleconferences and navigation and software makers. The main authority of Intranet is in the informational level of communications.

From the informational point of view of communication - tse search and transfer of knowledge. Here you can see at least three equals:

1. Universal language presentation of corporate knowledge - this is the description of the language, as it is not tied to specific subject areas of the organization's activity. Yogo vikoristannya resleduє virishennya kіlkoh zavdan:

    ensuring the unification of knowledge;

    ensuring the unambiguity of clouding the knowledge of us rivniv;

    zvedennya protsessіv obrobki іnformatsії up to simple procedures that allow їkhnyu automation (navigation, searching for information, organization of zv'yazkіv mizh danimi).

2. Models and manifestations. This rіven signifies the specific specifics of the subject matter of business activity. Tsey rіven vіrishuє so zavdannya, like:

    ensuring a single statement of the activity of the organization by the recruitment of volunteers: single system to understand the purpose of action and principles of their achievement, the single principles of behavior and motivation, the single system of approaches, standards, classifiers, normatives;

    ensuring the interpretation of the first data;

    safe navigation around the world information space organizations.

3. Factual knowledge - all specific subject knowledge, which are facts, verbal terms. Such facts are the first data and can be found in documents, data bases, mailings and new information.

All three equals establish corporate knowledge and change the context of corporate communications.

Іnformatsiyny rіven іnbіlsh suttєvіy for keruvannya. With all the hardware and software equal communications, they are such that they will be safe. Information security can be the mother of a different basic technology for transferring and collecting information (paper documents). Intranet technology has transformed paper documents on electronic sides and files; doshka goloshen - at the Web server; notes and telephone calls - before e-mail notification; newspaper news - at the announcement of teleconferences. Intranet has made corporate communications more sophisticated, faster and more intensive, and access to information has become faster and easier. With all the change of corporate information, the principle has not changed, even though the changes have been made on all three levels of representation of corporate knowledge.

The simplest Intranet scheme can be shown in this order (Fig. 1.1):

Figure 1.1 The simplest Intranet diagram

As obviously a little thing, the creation is saved and localized and connected to the Internet. It's a new vuzol, which is called a firewall (in the English literature firewall). Firewall - all computer installed on new special software that allows:

    Identification of any kind of entrance coristuvacha z tim, schob fence or allow you access.

    Rozpodіl mizh koristuvachami access rights.

    Audit and protocol of entry, tobto. a record, who, if ever, entering to the inner border.

    cryptography, etc. Encryption of secret information.

    Screening, tobto. the possibility of one-way transmission.

The axis can look like a corporate Web-side in the same Internet Explorer - no internal information, no call available (Small 1.2):

Figure 1.2 Corporate Web Site

Crimean browser information can be stored in specially developed programs, which are used in the Intranet environment, if necessary.

All this information can be reviewed and redacted in any place, in any computer, independently in the operating system, and there is no lively difference, which is created out in the next room or in another earthly culture.

Intranet can be used for various functions in the middle of the organization:

1. A tool for making decisions - Intranet takes all the information in the organization.

2. A tool for organizing training - a quick analysis of business processes, possibilities and goals.

3. An ideal communication tool - Intranet ensures the integration of all the corporation's products.

4. Spivpratsi tool - information about technologies, services for clients, technical procedures, delay, advance, food advice, what is often set, etc.

5. Expert's tool - direct communication with experts.

6. The only tool for wine walkers is the possibility of interactive collection of any information that is recognized for bagataria winery.

7. A tool to control that thorough virobnicheskoy cycle - visual identification of processes that occur in the middle of the organization: favor, resource volatility, mutual support.

8. Partner's tool - the ability to exchange information with partners.

9. Tool for marketing - creation of target marketing in the middle of the Web, customer satisfaction and service in the process of sale and service.

1.3. See the intranet

The intranet can be divided into 3 classes:

1. Small intranets.

The components of the Intranet may be vindicated just as it is, just like the organizations that beat them. In many ways, the Intranet merging seems to be a side child of other projects, and it develops from the bottom of the hill, and not the beast down. Often, an okremy spіvrobіtnik chi pіdrozdіl uѕvіdomlyuyut nebhіdnіyut іn simple іnformіnії іnformatsiї yuzah organіzії ta, to reach tsієї meti, rozrobljaє your vlasnu system. Call the costs for this project are not seen, more, navit not recognized officially. Such systems are created on the basis of already obvious possession of that inexpensive software.

In some cases, there may be only one possible solution. Web servers don't need a lot of computing resources, so this option can be quite practical, until the moment when Intranet is significantly growing in size or traffic becomes more intense. Tim is not less, less than other managers will be vikonuvat computer, de installed web server, tim stably appear Intranet.

Small spaces often serve less to access from a PC to a single small file server and to each other or the host computer. It is not necessary to pay for the cost of merging for TCP / IP protocols, the cost of additional charges for cable laying, the merging, otherwise, it is not necessary.

TCP/IP, which has become widely available for the last hour due to the growing popularity of the Intranet, solves another problem with the Intranet. All that is needed to access the Intranet Web server is to recognize the internal IP addresses and enter into the operating system the necessary information about various attachments, such as name servers, routers and mail servers.

2. Merezhі intranets of the middle class.

For the creation of more folding Intranet nets, more bags are needed, less small nets. A configuration of this type is the best confirmation of the viability of the concept of a larger, more expensive Intranet. One of the configuration details of the average size of the Intranet for the younger class is the version of the seen Web server.

Zavdyaki zastosuvannu vidіlenogo Intranet server becomes significantly more accessible, and with it, the problems typical for Intranet on the basis of a desktop PC are avoided. The server was seen more quickly, and the vin was not known, as the computer was not seen, so it could be re-vantaged.

The vision server can function simultaneously as a Web server and as an e-mail server. The generally accepted practice of combining various functions of the Internet and Intranet is less for the system, since the computer can have enough resources for its support. In addition, a Web server can be installed on a computer that already has other functions, such as a NetWare file server or Windows NT Advanced Server. For the obviousness of sufficient computational effort, the building's file server turns into the performance of other server functions.

Systems of this type provide additional benefits for the stability of electrical life, regular backups and monitoring of the system. The computer is neobov'yazkovo can be a file server. If the system is capable of transcendental numbness, then it can win as a Web server, accepting that the company's docks do not show up in the possibility of installing a computer for this particular computer.

3. Senior level intranet

Although the implementation of an Intranet measure of the senior class is possible only for the minds of serious finance, this model can be called ideal for great organizations. The configuration of this type of vision is the Web server, which works on the maximum possible speed, the building makes the Intranet available to the public. This server may be similar to others, which are already in the same company. Play the visions of a high-end Web server with a Pentium processor system with a clock speed of 166 MHz. Systems of this type can provide one-hour services to larger, more basic systems, and stinks of efficient data handling with collapsible data types, such as Java applets, Apple's QuickTime video clips, and database search engines.

A high-end Intranet measure can provide access to the Internet and, most notably, commercial Web server software, retard the sight of a mail server with SMTP security and secure the client's TCP/IP protocol. Connections from the Internet can be different, from ISDN channels at 128 Kb/s to frame relay and T-1 channels at 1.5 Mb/s.

There is one more possibility - tse remote access. Vіn mozhe buti organizations on telephone lines through a firewall in such a configuration, schob nadіlenі vіdpovіdnimi povnovazhennja koristuvаchі could otrimati access to Intranet from the Internet. The specific strategy for remote access depends not only on the technologies that you need, but also on the corporate culture of your company.

2. PRACTICAL PART

2.1. Zagalny characteristic zavdannya.

Take a look at this task:

The organization maintains a journal of the distribution of the surplus tax from the salaries of workers at the distribution of supplies. See the details presented in Tables 1. Whom does this rule.

Usі vіdrahuvannya nadayutsya zgіdno z table fig. Only the practitioners of the main work area, the reshta of the practitioners pay a tribute from the total sum.

    Prompt tables for lowering data (Table 1-3)

    Organize intertabular links for automatic completion of the graph for the journal rozrahunka income tax physical features(PDFO) (Table 3): “Name of the child”, “PDFO”.

    Adjust the recheck in the field “Type of work area” for the value that should be entered when prompted for a pardon.

    Calculate the monthly amount of the tax paid by the practitioner (per month).

    Calculate the total amount of PDFO for skin care.

    Calculate the total amount that the organization is resured, PDFO for a month.

    Encourage the histogram for the data of the star table

Table 1 List of subsidiaries of organizations

Table 2 Rates of tax and taxes

table 3

Pick up date

personnel number

PIB Spivrobitnik

Subscription code

Name of the letter

Got a patch

Type of job site

Number of children

Pilgi for disability

Ivanov S. M

basically

Vorobyova V. S.,

Accounting

not basic

Sidorov V. S.,

basically

Vasiliev. V. I,

basically

Emelianov V. I,

basically

Petrov P. U.

basically

Semenova I. pro,

Accounting

basically

Somova V.S.,

basically

Pechkina S. I,

not basic

Yashin S. N.

basically

Ivanov S. M

basically

Vorobyova V. S.,

Accounting

not basic

Sidorov V. S.,

basically

Vasiliev. V. I,

basically

Emelianov V. I,

basically

Petrov P. U.

basically

Semenova I. pro,

Accounting

basically

Somova V.S.,

basically

Pechkina S. I,

not basic

Yashin S. N.

basically

2.2. Description of the problem solving algorithm.

    Launch MS Excel Spreadsheet

    We create a book in the name of "PDFO"

    Arkush 1 is renamed into arkush with the name “Pidrozdili” (right-click on the arkush label and select the item “Rename”).

    On archway 1, starting from the middle A1, we enter the output values ​​from the table “List of subsidies of the organization” (Fig. 2.1).

Rice. 2.1 Restashing of the table "List of employees of the organization" on the working archway "Pіdrozdili" MS Excel

    Arkush 2 is renamed into a sheet with the name "Bets".

    On archway 2, starting from middle A1, we enter the final values ​​from the table “Pay and tax rates” (Fig. 2.2).

Rice. 2.2 Calculation of the table "Rates of tax and taxes" on the working chart "Rates" of MS Excel

    Sheet 3 is changed to arkush under the name "Journal of Rozrahunka".

    At arkush 3, starting from the middle A1, we enter the daily values ​​from the table “Journal of the income tax on income from physical services” (Fig. 2.3).

Rice. 2.3 Calculation of the table "Journal of the tax return from physical examinations" on the working sheet "Journal of the tax" MS Excel

We organize intertabular links for automatic completion of the graph for the journal of the taxpayer’s tax return from physical features: “Name of the letter”, “PDFO”.

    Let's go to the sheet "Rozrakhunka Journal"

    At the middles of E2, we introduce the formula:

LOOKUP(D2;Drops!$A$2:$A$6;Drops!$B$2:$B$6)

    Skopiyuєmo її in the middle from E3 to E21.

The result takes a step forward (Fig. 2.4):

Rice. 2.4 Cross-table link (key parameter - subprogram code)

12. At the middles J2 we introduce the following formula:

YKSHO(G2="basic";(F2-(400 + YKSHO (H3>0;H3*300;0) + YKSHO (I2 = "invalid"; 400;0))) *13%;F2*13%)

    Copy in the middle from J3 to J21.

Acceptable (Fig. 2.5):

Rice. 2.5 Intertable link

For re-verification of the introduction, we vikonuєmo takі dії.

    At the middle N2 and N3, we introduce "mainly" "not principally".

    We can see the middle ones from G2 to G21.

    On the toolbar, select "Daniel", then "Change" (Mal. 2.6).

Rice. 2.6 Dialogue window of reverification

    Choose a value.

    Go to the tab "Information about pardon".

    Viber value (Mal. 2.7):

Rice. 2.7 Dialogue window of reverification

    Confirm the data "OK".

In order to allocate the total amount of the PDFO for the skin practitioner, the payment and the total amount of the PDFO organization for the month, it is necessary to create a table based on the data in the completed tables “Journal of the tax on income from physical assets”.

    Arkush 4 has been changed to "Started table".

    On the toolbar, select the "Data" menu, then "Started table".

    Significantly offensive range: "Journal of the Rozrakhun"!$A$1:$J$21 (Mal. 2.8).

Rice. 2.8 Dialogue window Maistry tables and diagrams

    Select "Reference sheet" and press the "Layout" button (Sketch 2.9).

Rice. 2.9 Maistre Layout of Tables and Diagrams

    Let's click "OK" and "Done" (Fig. 2.10).

Rice. 2.10 The table for the updates has been added

    In order to induce the histogram behind the data of the star table, put the cursor at the link of the star table behind the data and on the "Diagram" toolbar, select the type of diagrams "Histogram" and on the green arc there will be a histogram behind the star table "PDFO for the stars" (Fig. 1) .

Rice. 2.11 Graphical presentation of the results in the linked table

Visnovok

Intranet is a corporate network, based on Internet technology, which transmits traffic to the TCP / IP protocol and allows access from a computer to data hosted on a server. The great advantage of Intranet is building up the security of cooperation between spivrobitniks within the framework of the organization, winning over the automation of business management, creating dynamic and productive teams.

The main feature in the Intranet is the ability to create a small amount of money, and then build it up as needed. Intranet, implemented with the help of a desktop PC, which serves 10 to 20 customers, can be converted to a working system, which can serve thousands of customers. In addition, Intranet is one of the few corporate computer systems, so it is not necessary to buy it once again.

Development of the company's Intranet gives the opportunity to create a base of collective theoretical and practical knowledge - the knowledge base.

List of victorious literature

    Broido V.L. Obchislyuvalnye sistemy, merezhі and telekommunikatsii: Podruchnik dlya vuziv. 2nd view. - St. Petersburg: Peter, 2006.

    Filinova O. Y. Information technologies in advertising. Heading guide - M.: KUDITS-OBRAZ, 2006.

    Informatics: Methodical presentations on how to develop coursework for independent work of 2nd year students (the first course of education). - M.: Vuzovsky pdruchnik, 2006.

    intranet technology. Intranet-merezhі, scho otrimuyut vsі... pіd hour vikoristannya data bases. Advances. Corporate merezha Intranet- a miracle platform for publishing information...

  1. Protection of information in heterogeneous merezha

    Abstract >> Informatics

    The family has no competition. Information security in intranet AT intranet-systems for organizing and securing information ... for inter-enterprise) part corporate merezhі, not for corporate merezhі like this (independently...

  2. Current economic theories

    Course work >> Economics

    Integration in the coming rank: corporate merezhі (intranet); merezhі business partnership (extranet); global merezhі(for example, the Internet). Leather...

  3. Merezheva economy

    Lecture >> Economics

    Victory of various informational merezha. For equal integration merezhі classified into: Corporate merezhі (Intranet) Merezhi business partnership...

Intro. From the history of mesh technologies. 3

Understanding "Corporate Merazhi". Their main functions. 7

Technologies that are being developed every hour of the creation of corporate merezhs. fourteen

The structure of the corporate merezhі. Hardware security. 17

Methodology of the creation of corporate measures. 24

Visnovok. 33

List of victorian literature. 34

Intro.

From the history of mesh technologies.

The history and terminology of corporate partnerships is closely related to the history of the birth of the Internet and the World Wide Web. It doesn’t matter how the first technologies appeared, which brought to the creation of modern corporate (domestic), territorial and global networks.

The Internet was born in the 60s as a project of the US Department of Defense. The role of the computer was growing, calling for life to consume as a subdivision of information between different houses and local borders, and to support the global practicality of the system for an hour out of the operation of the other components. The Internet is based on a set of protocols, which allow different divisions of power to transmit information one to one independently; For example, one university of the border, for reasons of inaccessibility, information is available to the final point of recognition through other universities, as it were in the workplace. The protocol is broken down by the name Internetworking Protocol (IP). (Te same stands for the acronym TCP/IP.)

From that hour, the IP protocol became widely accepted by the Ukrainian authorities as a way to generate publicly accessible information. Shards of impersonal projects in these departments were victorious at various neighboring groups in universities throughout the country, and the method of exchanging information between heterogeneous networks turned out to be even more effective, and the protocol was carried out between departments. Yogo began to be victorious and in the former NATO institutes and universities in Europe. Today, the IP protocol, also, and the Internet is a global light standard.

For example, in the 1970s, a new problem arose before the Internet. The back of the information was either electronic sheets or just data files. For the transmission of them, different protocols were vibrated. Now, there are a number of files in a new type, which sound like they are united under the name of multimedia, which avenges images and sounds, so it is hyperpositive, which allows short-haired people to move like in the middle of one document, so between different documents, so that they can avenge information.

In 1989, the Laboratory of Physics of Elementary Parts of the European Center for Nuclear Research (CERN) successfully launched a new project, which was to create a standard for transferring this kind of information via the Internet. The main components of this standard were the format of multimedia files, hypertext files, and a protocol for extracting such files as they are. The file format was named HyperText Markup Language (HTML). Vіn buv is a simpler version of the standard Standard General Markup Language (SGML). The Request Service Protocol is called HyperText Transfer Protocol (HTTP). In general, it looks like this: the server, on which the program works, which serves the HTTP protocol (HTTP demon), sends HTML files to the Internet clients. These two standards laid the foundation for a fundamentally new type of access to computer information. Standard multimedia files can now be not only taken away for filing, but also used and displayed as part of another document. The shards of the file should be hyper-positive on other documents, which can be transferred to other computers, while the information can be easily reached by pressing the mouse button. It is important to know the folding nature of the information to the distribution of the system. Multimedia files in this technology are traditionally called sides. The page is also called information, as the client's machine is sent to the skin request. The reason for this is that the document sounds like it is made up of a bunch of eight parts, tied together by hyperlinks. Such a strife allows the coristuvachevi to virishuvati himself, like the very part of the wines you want to fight in front of you, allowing you to spare the hour and change the traffic. The software product, which is a vikoristovuy without intermediary koristuvach, is called a browser (like the word browse - graze) or a navigator. The greater number of them allows you to automatically select and display the first side, on which placement is sent to the documents, to which the most coristuvach is most likely. This page is called the home page (home), access to it will sound like a button. The skin of a non-trivial document is sounded with a special side, similar to the section "Zmist" at the book. From it, start to write the document, so it is often called the home side. To that, in a flash under the home side, there is a real index, an entry point of information of a singing mind. Call the name itself to enter the designated distribution, for example, the Home Page of the Microsoft company. On the other hand, the skin document may be available from a variety of other documents. The entire expanse of documents that are shared one-on-one on the Internet is called the World Wide Web (web acronyms WWW or W3). The system of documents has been completely expanded, and the author cannot find the ability to send all messages to his document, which is available on the Internet. The server, which gives access to these parties, can register everyone who reads such a document, but not quiet, who asks for something new. The situation is reversible for other products that exist in the world. In rich neighboring regions, there are periodically seen indexes of articles on a certain topic, it is impossible to read all those who read that other document. Immediately, we know quietly who read (mav access) to the document, but we don’t know who relied on the new one. tsіkava singularity I believe that for such technology it becomes impossible to follow all the information available through the WWW. The information is presented and known without interruption, due to the presence of any central administration. However, it doesn’t varto lakatisya, they themselves are seen in the world of crafted products. We don’t try to pick up old newspapers, as if it’s fresh today, moreover, it’s susilla at the same time.

Client software products that handle and render HTML files are called browsers. The first of the graphical browsers was called Mosaic, and the first one was broken at the University of Illinois. A lot of modern browsers are based on this product. Prote, due to the standardization of protocols and formats, it is possible to win any kind of complex software product. Revisiting systems are used by most of the main client systems, building support for intellectual vision. Here you can name MS/Windows, Macintosh, X-Window systems and OS/2. And so the system is reviewing the quiet OS, de vikna not vikoristovuyutsya - stench display text fragments of documents on the screen, which access is denied.

Availability of review systems on such different platforms can be of great importance. Operational media on the author's machine, servers and clients do not stay one type of one. Any client can take access and look through documents created from HTML wiki and according to the standards, and transmitted through the HTTP-server independently, depending on which operating environment the stench was created or the calls were made. HTML also supports the development of forms and functions of the link. Tse means that the interface of the coristuvacha and at the time of request, and at the time of retrieval of data, allows you to go beyond the borders on the principle of "speak and click".

A lot of stations, including Amdahl, wrote interfaces for interfacing HTML forms and old add-ons, creating a universal interface for the rest of the core. This gives you the ability to write client-server programs without thinking about coding on the client's side. As a matter of fact, programs are already being announced, in which clients are looked at as a review system. As an example, you can bring the WOW interface of the Oracle Corporation, which replaces Oracle Forms and Oracle Reports. Although the technology is still young, it will already change the situation in the information management room of the flooring, on the other hand, the choice of the conductors and microprocessors has changed the world of computers. Vaughn allows you to rework the functions on other modules and ask programs, bringing us to a new level of integration, which is more like business-functions of robotic enterprises.

Informational adventurousness is the curse of our hour. Technologies, as they were created, in order to ease this problem, made it even harder. It’s not surprising: varto marvel at the totality of smіttєvih koshikiv (primary or electronic) of an ordinary spіvrobіtnik, which can be right for information. So don't take it to the point of respect, buy an inevitable advertising "smite" in the mail, most of the information is sent to such a spivrobitnik just "on the wrong side" that you need to get out. Add to this "non-chasing" information, as soon as you need it for everything, but if you don't - and the axis is the main one for you. Spivrobitnik svidshe saves half of the information for everything, like "you might need it" and all the information, like, singsongly, you need in the future. If there is a need in nii vinikne, you will have to deal with a cumbersome, filthy structured archive of personal information, and at that stage you can vindicate additional folds through those that are saved from files of different formats on different carriers. The appearance of photocopiers aggravated the situation with information, "as you can quickly need it," even more. The number of copies of the deputy is changing, only getting bigger. E-mail made the problem worse. Today, the "publicator" of information can create his own special list of distributions and, for the help of one team, manage a practically unlimited number of copies "on that vipadok" that stench can be needed. Deyakі z such rozpovsjuvachіv іnformatsії razumіyut, scho їх lists are not good enough, but instead of correcting them, they put on the cob povodomlennya badge approximately such zmіstu: "I don't want you to chirp ... poyshchidіtse povestі". The sheet is all the same stuffed with a mailed screenshot, and the addressee will have to spend an hour to get to know him that yogo misery. Direct protilezhnist іnformatsiї "as you can stand in good luck" - "own" information, or information, on yaku є drink. Vіd kom'yuterіv і mеrеzh chekіd podpomogi u roboі s їїїїїїї їїї їїїїї її їії їмії ії, alе scho scho zім not cope. Previously, there were two main methods for delivering timely information.

During the victory of the first їх, the information was distributed between the addenda and systems. In order to take access to it, it was necessary to coristuvachevit it, and then we would gradually win the impersonal folding procedures for access. If access is denied, the skin program will open its interface. Having stumbled upon such difficulties, the coristuvachi were simply inspired by taking away their own information. The stench of the building would have mastered access to one or two programs, but on the other hand it didn’t work anymore.

In order to solve this problem, on various undertakings they tried to accumulate all the distributed information on one main system. As a result, the coristuvach eliminated a single access method and a single interface. However, the shards in the same period all the needs of the business were processed centrally, and the systems grew and became more complex. More than ten years have passed, and many of them still have not received information through the high varity and introduction of that support. There were other problems here. The foldability of such unified systems made their modification more difficult. To improve discrete data of transaction processes by expanding the tools for managing such systems. For the rest of the ten years of tribute, with what we can rightly, they have become richly folded, which complicates the process of information support. Changes in the nature of information needs and those, which are important in these galleries, are given changes, gave rise to large, centrally keratinized systems, which make it easier to drink on a equal footing.

Web-technology promotes new information before the delivery of information "to the best". Shards won't support authorization and publication of shared information, as well as cherishing it, new technology does not lead to such folding, like old centralized systems. Documents are folded, edited and published without interruption by the authors, they do not have to ask programmers to create new forms for the introduction of data and programs for creating calls. Being able to look at the right with new systems, you can take a look at the information from the rozpodіlenih dzherelta systems for the help of a simple unified interface, without any need for any notification about the server, to which faults you really deny access. These are simple technological changes to create a revolution in information infrastructures and radically change the work of our organizations.

The main authority of technology - those that manage the flow of information are in the hands of not a creator, but a calm one. As a coristuvach may be able to easily look at the information in the world of necessity, it will no longer happen to be overpowered to the new "on the verge", as it will be necessary. The process of publishing can now be independent in the form of automatic dissemination of information. It is necessary to use forms, sounds, standards, planning streaks, tools for promoting sales, initial materials, graphics and other documents, so that we can score our smittєva koshiki. Schob system zapratsyuvala, needed, as it is said higher, like a new information infrastructure, and a new pidkhid, a new culture. As creators of information, we are guilty of learning to publish, not rozpovsudzhuyuchi, like coristuvach - show more in the capacity of the goodness of their information inquiries, actively and effectively reject the information.

Understanding "Corporate Merazhi". Their main functions.

First, speak about private (corporate) companies, it is necessary to determine what these words mean. In the rest of the hour, the wording became wider and more fashionable, which began to take on a sense. Our corporate network has a system that ensures the transfer of information between different programs that are victorious in the corporate system. Vykhodyachi z tsgogo abstract designation, peacefully different approach to the creation of such systems and try to remind the understanding of the corporate dimension with a concrete zmist. At the same time, it is important that the measure can be as universal as possible, so as to allow the integration of already essential and possible additions from the minimum possible vitrates and exchanges.

Corporate border, sound, є territorially divided, tobto. united offices, added those other structures that are on a significant distance one kind of one. Often the nodes of the corporate network are roztashovannymi in different places, which in other countries. The principles behind which there will be such a merezha local lines navit okhoplyuє kіlka budіvel. The main responsibility lies in the fact that territorially divided vicor lines are distributed in sufficient quantities (on this year - tens and hundreds of kilobits per second, sometimes up to 2 Mbit / s.) to rent a line. Although, when the local barriers are connected, the main wires fall on the purchase of property and laying of the cable, then in the territorial divisions, the most important element of the vartost is the rent for the majority of the channels, which increases the number of such transmissions and the greater the cost. Tse obmezhennya є important, and when designing a corporate measure, we should take care of all entries to minimize the impact of data that are transferred. In another case, the corporate border is not guilty of making a deposit on those that, in the same way, the programs themselves process the information that is transferred to them.

Under the appendices, we here understand how system software is secure - data bases, mail systems, enumeration resources, file service, and otherwise - so and sobe, with such pratsyuє kіtsevy koristuvach. The main tasks of the corporate network are the interdependence of system supplements, distributed at different universities, and access to them in the distant koristuvachiv.

The first problem, how to be brought to the forefront of the organization of corporate measures is the organization of communication channels. Even though in the boundaries of the place it is possible to reserve for renting lines, including those of high-growing ones, then when moving to geographically distant nodes, the variability of the order of canals becomes simply astronomical, and the quality and supremacy of them often appear even low. Natural variations of the problem and the choice of the main global measures. In this situation, it is sufficient to secure the channels from the offices to the nearest nodes in the border. The task of delivering information between universities is a global measure at their own vineyards. Navіt with a small joint in the boundaries of one place, the next mother on the verge of the possibility of a further expansion and exploitation of technology, summing up with the essential global dimensions.

Often the first, and then the only such mesh, the thought about the yak falls on the thought, the Internet appears. Vykoristannya Internet at corporate networks Falsely from the rozv'yazuvanih zavdan Internet can be seen from different levels. For the final koristuvach, we have the all-world system of providing information and postal services. The rise of new technologies for access to information, which is combined with the concepts of the World Wide Web, with the cheap and readily available global system of computer communication, the Internet, has actually generated a new collection of mass information, which is often called simply Net - Merezha. The one who connects to the whole system, takes it just like a mechanism that gives access to the singing services. The implementation of this mechanism seems to be absolutely meaningless.

When using the Internet, as the basis for a corporate measure, the transfer of data is called for by a cicava river. It appears, Merezha is like and not є. The very same Internet is an intermediary. To look inside the Internet, we prefer that information pass through anonymous absolutely independent and large non-commercial hubs, connected through various channels and data transmission networks. Burkhlive growth of services, which are hoped for on the Internet, to bring to the point of vanishing connections and channels, which sharply reduce the speed and reliability of information transmission. For whom the postmasters of the Internet services do not bear any responsibility for the functioning of the network, and the communication channels develop very unevenly and in the main there, de vvazhaє we will need to invest money. Obviously, there are no regular guarantees for the reliability of the robot, data transmission speed and reachability of your computers. For those who have critical needs and guarantees, the hour of delivery of information, the Internet is far from the best solution. On the other hand, the Internet is tied to one protocol - IP. Tse good, if we are koristuєmos standard programs, which is practiced according to the protocol. Using the Internet for any other systems seems to be quite difficult and expensive. Just because you need to secure the access of mobile correspondents to your private property - the Internet is also not the best solution.

It used to be, it’s not the fault of the great problems here - the post-employees of the Internet services can be creaked, taken laptop computer with a modem, call and practise. Prote postalnik, let's say, in Novosibirsk, there are no daily goiters and yazan in front of you, as you have connected to the Internet near Moscow. I don’t take pennies for the services of the vins of you, and you won’t get access to the border, obviously. Otherwise, you need to put a valid agreement with him, which is hardly reasonable, as if you stumbled at the double-day work, or call from Novosibirsk to Moscow.

Another problem of the Internet, which is discussed during the rest of the hour, is security. As we are talking about a private network, it seems natural to protect information from someone else's glance. The lack of transferability of the highways in information between the anonymous independent nodes of the Internet does not only raise the risk that the operator of the network, which is not in the world, can save your data to disk (technically, the price is not so complicated), but it is impossible to calculate the cost. Zasobi ciphering the problem is less often, the shards of zastosovnі are more important to the post, transferring the files only occasionally. The solution is that it is possible to encrypt information in real time from a convenient security (for example, with a non-intermediate robot from a remote data base or a file server), inaccessible and expensive. The other aspect of the problem of security is yet another reason for the decentralization of the Internet - there is no one who could gain access to the resources of your private network. If the system is open, if everything is successful, then maybe you can try to eat at your office and gain access to data or programs. Yes, of course, save the zakhist (for them, the name Firewall is adopted - Russian, more precisely German "firewall" - the opposite wall). Prote vvazhat їх panacea not varto - guess about viruses and antivirus programs. If you could be a Zakhist, you could be evil, but it paid off for the evil. It is also necessary to indicate that it is possible to connect the system to the Internet without being able to use it, and without interfering with the measure. Vіdomi vіpadki unauthorized access to the management of the nodes of the network, or simply use the peculiarities of the Internet architecture to disrupt access to that other server. Also, recommending the Internet as a basis for systems that require reliability and security is not possible. Connecting to the Internet within the framework of a corporate merezhі maє sense, as you need access to that majestic information space, which is called Merezheya.

A corporate network is a complex system that includes thousands of the most versatile components: computers of various types, ranging from desktops to mainframes, system software, software, network adapters, hubs, switches and routers, cable system. Main zavdannya systemic іntegratorіv i admіnіstratorіv polyagaє in fact dwellers gromіzdka i tsya Duzhe road system yaknaykrasche copes of obrobkoyu potokіv Informácie scho tsirkulyuyut mіzh spіvrobіtnikami pіdpriєmstva i granted a permission priymati їm svoєchasnі that ratsіonalnі rіshennya scho zabezpechuyut vizhivannya pіdpriєmstva in zhorstkіy konkurentnіy borotbі. Shards of life do not stand at home, those changes in corporate information, the intensity of flows and processing are constantly changing. Remaining butt sharp change Technologies for automated processing of corporate information in all areas of the world - due to the unprecedented growth in the popularity of the Internet in the rest of the 2nd - 3rd years. Change, the cause of which has become the Internet, rich in facets. The WWW hypertext service has changed the way people present information, choosing popular sights on their sides - text, graphics and sound. Internet transport is inexpensive and accessible to practically all enterprises (and through telephone networks to single coristuvachs) - having eased the task of establishing a territorial corporate border, immediately hanging on the foreground the task of stealing corporate data when transmitting it through the most populated world to a publicly accessible measure. .

Technologies that are stagnant in corporate companies.

Before that, as a basis for the methodology and encouragement of corporate measures, it is necessary to give later analysis technologies, yakі can win at corporate merezhakh.

Modern transmission technologies can be classified according to transmission methods. In the wild, one can see three main methods of transferring data:

switching channels;

commutation alert;

packet switching.

All other methods of interaction are their evolutionary development. For example, in order to reveal the technology of transmission at the sight of a tree, then the switch of packets will be divided into switching of frames and switching of the middle ones. Let's guess that the packet switching technology was developed over 30 years ago to reduce the overhead wires and increase the productivity of the basic data transmission systems. The first packet switching technologies - X.25 and IP were designed to improve the ability to work with channels of poor quality communication. With reduced bandwidth, it became possible to change for transmission such a protocol as HDLC, which knows its place in Frame Relay networks. The achievement of greater productivity and technical flexibility served as a post-shipment development of SMDS technology, the possibility of which was later expanded by the standardization of ATM. One of the parameters, behind which it is possible to carry out the matching of technologies, is the guarantee of the delivery of information. So, X.25 and ATM technologies guarantee reliable delivery of packets (remaining behind the SSCOP protocol), and Frame Relay and SMDS work in the mode if delivery is not guaranteed. Further, technology can guarantee that data should be taken into account in the order of administration. In another turn, order is to be blamed on the side that accepts. Merezhi s switching packets can be oriented to the front of the installation, or simply transfer data to the measure. At the first moment, they can tremble as if they were constant, so they can be virtual, that they communicate. Important parameters are the presence of data flow control mechanisms, traffic management systems, mechanisms for detecting and preventing overwhelm, etc.

Pairing of technologies can be carried out according to such criteria as the efficiency of the addressing scheme or the methods of routing. For example, addressing, which is victorious, can be oriented to geographic distribution (telephone numbering plan), to victoria in distributions, or to hardware security. So, the IP protocol is the most logical address, which is composed of 32 bits, which is assigned to the dimensions and sub-divisions. An E.164 addressing scheme can be a template for a geographic distribution scheme, and a MAC address can be a template for a hardware address. The X.25 technology uses the Logical Channel Number (LCN), and the virtual connection that is switched in this technology zastosovuets X.121 addressing scheme. In Frame Relay technology, one channel can have a few virtual channels, each virtual channel is assigned a DLCI identifier (Data-Link Connection Identifier). This identifier is specified in the skin frame that is being transmitted. DLCI is less of a local value; Otherwise, it seems that the virtual channel can be identified by one number in the virtual channel, and in the case of a different one. Switching virtual half-widths of the technology are spiraling to the E.164 numbering scheme. A unique VCI/VPI identifiers are entered at the headers of the ATM centers, which change the hour of the passage of the centers through the intermediary switching systems. Switching virtual circuits of ATM technology can override the E.164 or AESA addressing scheme.

The routing of packets in a measure can be static or dynamic, or be a standardized mechanism for singing technology, or act as a technical basis. Examples of standardized solutions can be OSPF dynamic routing protocols or RIP for IP protocol. STOSOVNO TECHNOLOGIES ATM Forum ATM having defined the protocol for routing requests to the installation of switching virtual circuits PNNI, a specific feature of some kind of information about the quality of service.

An ideal option for a private network would be to set up channels to link only on quiet sites, where it is necessary, and transfer through them any network protocols, which can be controlled by software programs. At first glance, turning to renting a line connection, develop technologies and induce data transfer measures that allow you to organize in the middle of them channels, which is blamed only on the required hour and on the required area. Such channels are called virtual. It is natural to call the system, which uses remote resources for additional virtual channels, a virtual network. Today, two main technologies of virtual networks are being developed - networks with switching channels and networks with switching packets. Before the first ones, there is a large telephone network, ISDN and other, more exotic technologies. Merezhі z switching packets presented by technology X.25, Frame Relay and - the rest of the hour - ATM. It's still early to talk about ATM's choice in territorial divisions. Other types of virtual (at different occasions) measures are widely used in case of corporate information systems.

Merezhі z switching kanalіv to secure the subscriber kіlka kanіlіv zv'yazku z fixed throughput zdatnіstі zdatnі kozhno podklyuchennya. We are well aware of the telephone line giving one call between subscribers. If it is necessary to increase the number of available resources, it is necessary to install additional telephone numbers, which are even more expensive. Forget about the low quality of the call, then the reduction of the number of channels and the great hour of the installation of the day do not allow victorious telephone calls as the basis of a corporate network. For the connection of okremikh in the distance coristuvachіv tse dosing handy and often the only available method.

Another example of a virtual network with channel switching is ISDN (digital network with service integration). ISDN secure digital channels(64 kb/s), which can be transmitted as a voice, and data. The basic ISDN (Basic Rate Interface) connection includes two such channels and an additional control channel with a speed of 16 kbps (such a combination is designated as 2B + D). It is possible to increase the number of channels - up to 30 (Primary Rate Interface, 30B + D), however, it is possible to increase the cost of equipment and channels for communication. In addition, there is a proportional increase in spending on rent and vikoristannya merezhi. In general, exchanges for the number of one-hourly available resources that are superimposed by ISDN lead to the fact that this type of call is easily viable mainly as an alternative to telephone networks. Systems with no great kіlkistyu ISDN nodes can also be used as the main protocol of a network. Least of the mother in the country, scho access to ISDN in our country is still sooner than blame, lower rule.

An alternative to a line with switching of channels and a line with switching of packets. When vikoristanny packet switching one channel zv'yazku vikoristovuєtsya in the mode of rozpodіl hour rich koristuvachami - about the same, like in the Internet. Prote, on the vіdmіnu type of Internet, dekozhen the packet is routable okremі, mеrіzhі packet switching before the transfer of information must be established between the end resources. After the system is set to "remember" the route (virtual channel), which is the responsibility of transmitting information between subscribers and remembering it, the docks do not take away the signal about opening the call. For additions, which are used in packet switching, virtual channels look like a variable line of communication - with a small difference, that their throughput building and jamming, that should be brought in, changed in the amount of time.

Classic technology of packet switching є X.25. At the same time, it is customary to wrinkle at these words nіs i say: "it's expensive, povіlno, outdated and fashionable." In fact, today there is practically no use of X.25, as it is more than 128 kb/s. The X.25 protocol includes an effort to correct pardons, ensuring safe delivery of information on filthy lines, and it is widely used there, when there are no other channels of communication. In our country, they are everywhere. Obviously, you have to pay for arrogance - to this particular type shvidkodієyu posladnannya merezhі that poіvnjano great - ale peredbachuvannymi - zatrimka expansion of information. At that very hour, X.25 is a universal protocol that allows you to transfer mayzhe be-yak_tipi data. "Natural" for X.25 is the robot's add-ons, like the twisted stack of OSI protocols. Before them, there are systems that support the X.400 (e-mail) and FTAM (file exchange) standards, as well as others. The available codes allow the implementation of the OSI protocols for interfacing with Unix systems. Another standard possibility for X.25 communication is to communicate via a primary asynchronous COM port. Figuratively, seemingly, the X.25 cable is connected, connecting to the serial port, denouncing it to other resources. Thus, in practice, whether a program that allows access to a new one via a COM port, can be easily integrated into an X.25 measure. How to apply such add-ons, you can also guess terminal access to remote host computers, for example Unix machines, and interfacing Unix computers one by one (cu, uucp), systems based on Lotus Notes, e-mail cc: Mail and MS Mail too. For LAN integration at nodes that can connect to X.25, use the packing method ("encapsulation") of packets in information from local boundaries of X.25 packets. the side of the possessor. Descriptions in RFC 1356 are respected as the standard encapsulation mechanism. Win allows different protocols of local networks (IP, IPX but also) to be transmitted one hour in one virtual day. This mechanism (or the older implementation of RFC 877, which only allows IP transmission) implementations is practical for all modern routers. It is also based on methods for transferring X.25 and other communication protocols, the SNA code, which is featured in the IBM mainframe, as well as a number of private protocols in various com- panies. In this manner, X.25 measures will promote a universal transport mechanism for transferring information among practical additions. With different types of traffic, they are transmitted over one communication channel, they don’t know anything about each other. When LAN is connected via X.25, it is possible to isolate one type of one or more fragments of a corporate network, to sing like a vicarious line to the same lines. This makes it easier to solve the problems of security and access separation, which are inevitably blamed on folding information structures. In addition, in case of rich fluctuations in the fall, it is necessary to overcome folding routing mechanisms, shifting the task to the X line. 25. Today in the world there are dozens of global chains X.25 of infamous koristuvannya, their universities are practically in all great business, industrial and administrative centers. In Russia, the services of X.25 are promoted by Sprint Merezha, Infotel, Rospak, Rosnet, Sovam Teleport and other postal workers. Krim ob'ednannya vydnannya vіddlenikh vozlіv v merezha X.25 vzhdbachenі vіdbacheni vіdnannya vіdnannya vіdlіnіh vuzlіv v merezha X.25 zavzhdnannya vіdnannya vіdnannya vіdnannyh vuzlіv vuzlіv X.25 vzhdbachenі vіdbacheni аbоbі access іnіtsіvі koristuvachіv. In order to connect to any X.25 resource, a mother computer with an asynchronous serial port and a modem is sufficient. If you don’t blame problems with authorization of access to geographically distant nodes - first, as far as X.25, you can centralize and put an agreement, for example, with the company Sprint Merezha or as a partner, you can serve as a service of any Sprintnet node - thousands of places all over the world, including over a hundred on the territory of the large SRSR. In another way, there is a protocol for interfacing between different measures (X.75), which allows insurance to pay for food. In this way, as your connection resource is up to X.25, you can take access to the new node of your employer, as well as through the nodes of other links, so that it is practically a point of light. From the point of view of the security of the transfer of information, the X.25 measures are given a very low capacity. Nasampered, zavdyaki of the very structure of the merezha, the versatility of the interchange of information in the merezhi X.25 appears to be great, to serve as an indecent zakhist. The problem of unauthorized access can be effectively dealt with by itself. If so, be it - to instill a little bit of zavgodno small - the risk of a round of information seems to be unacceptable, then, obviously, it is necessary to achieve encryption, in addition to that in real time. Today, it is possible to encrypt, created especially for X.25 and allow processing on high speeds - up to 64 kb/s. The companies Racal, Cylink, Siemens have such ownership. Є th vіtchiznіnі rozrobki, scho created under the auspices of FAPSI. Shortage of technology X.25 is a number of principles of obmezheniya for swidkistyu. The first is due to the very possibility of correction and renewal. Tsі zasobi vyklikayut obscurations of transmission of information and vimagayut vіd equipment X.25 great calculus strain and productivity, in the aftermath of which it simply "does not reach" for shvidkiy lines zv'yazku. If you want to know that you can have two megabit ports, you can really secure it from the port 250 - 300 kb/s. On the other side, for modern swedish lines, make sure to correct X. 25 are transcendental and for their vagueness, the settling is often idle. Another feature that confuses X.25 as a common feature is the LAN protocol encapsulation features (for example, IP and IPX). For other equal minds, the links of the local X.25 merging are shown, fallow in the parameters in the merging, at 15-40 cm more, lower than the other HDLC on the seen line. Moreover, if the line is connected, then it is more productive to waste. Again, to the right, with obvious overkill: LAN protocols may be subject to corrections and corrections (TCP, SPX), while X.25 variance may be more robust again, consuming swidth.

Itself on tsikh pіdstavakh merezі X.25 goloshuyutsya more and more old. Ale first, let's talk about those that be-yak technology is old-fashioned, should mean - for some zastosuvan that in some minds. On the lines, the link of low quality of the line X.25 is as effective as possible to give a significant win for the price of customs, equal to the vision lines. From the other side, you need to open up the connection on the security line - old age X.25 is necessary - and the same investment in the X.25 equipment will not be lost, the current features include the possibility of transition to Frame Relay technology.

Merezhi Frame Relay

Frame Relay technology has appeared as a success, which allows realizing the transfer of packet switching on wireless communication lines. The main feature of Frame Relay merging is X.25 in that stench correction of pardons between merging nodes is enabled. The manager of the information flow relies on the end of the world and the software security of the coristuvachs. Zvichayno, tse vimagaє vikoristannya dosit yakіsnih kanalіv zvyazku. It is important that for successful work with Frame Relay the possibility of a pardon at the channel may be higher 10-6 - 10-7, then. a trio more than one big bit of a kilka milliononiv. Yakіst, scho zabezpechuetsya sizable analog lines, sound one - three orders of magnitude lower. Another aspect of the Frame Relay network is those that today are practical for all implementations of the mechanisms of constant virtual connections (PVC). Tse means that by connecting to the Frame Relay port, you are responsible for the remote access to some remote resources. The principle of packet switching is that there are no independent virtual connections in one channel, the connection is over here, you cannot select the address of any subscriber of the network. All available resources are assigned when the port is set. In this way, on the basis of Frame Relay technology, it is necessary to manually create closed virtual networks, which are used for the transmission of other protocols, which require routing. "Closedness" of a virtual network means that it is not available for other wires that work with the same Frame Relay network. For example, in the United States, Frame Relay networks are widely used as a support for Robotic Internet. However, your private network can override Frame Relay virtual channels on the same lines as Inernet traffic - and be completely isolated. Like X.25, Frame Relay is a versatile transmission medium that is practical for any add-ons. The main area of ​​Frame Relay stagnation today is the association of remote LANs. In this case, the correction of pardons and updating of information is less likely to occur on the level of transport protocols LAN - TCP, SPX only. Spend on LAN traffic encapsulation in Frame Relay do not exceed two or three hundred. Frame Relay's LAN protocol encapsulation techniques are described in RFC 1294 and RFC 1490 specifications. RFC 1490 also defines Frame Relay transmission of SNA traffic. The Annex G specification to ANSI T1.617 describes an X.25 twist over Frame Relay. With all the functions of addressing, correction and renewal of X.25 - but only between terminal nodes that implement Annex G. Permanently connected through the Frame Relay network at this point looks like "direct wire", which X.2 traffic is transmitted. The X.25 parameters (packet size and window size) can be set in such a way as to minimize the possible amount of clutter and loss of security when encapsulating LAN protocols. Vіdsutnіst korktsії pardons and folding mechanisms of switching packets, pritamanny X.25, allow you to transfer information via Frame Relay with minimal stuttering. Dodatkovo can include the mechanism of priorization, which allows the mother to guarantee the minimum transmission speed for the virtual channel. Such a possibility allows using Frame Relay to transmit critical information, for example, voice and video in real time. Qia povnyano new opportunity becoming more and more popular and often the main argument when choosing Frame Relay as the basis of a corporate network. Keep in mind that today Frame Relay services are available in our country no more than a dozen of places, at that hour, like X.25 - about two hundred. Keep in mind that with the development of channels, Frame Relay technology will be more and more expanded - we will think about it there, de contagiously use X.25 measures. Unfortunately, there is no single standard that describes the interplay of different Frame Relay services, which is why it is necessary to link up to one service provider. If it is necessary to expand the geography, it is possible to connect at one point to the number of various post-employees - with a large increase in vitrates. It is also necessary to establish private frames of Frame Relay, which are used at the borders of the same place, or vicorous intermediary - as a rule, satellite - video channels. Pobudov's private network based on Frame Relay allows speeding up the number of lines that are rented, and integrating voice and data transmission.

The structure of the corporate merezhі. Hardware security.

When prompted by a territorially divided border, the descriptions of other technologies can be won. For connection to distant coristuvachs, the simplest and most accessible option is a telephone call. There, wherever possible, you can twist ISDN measures. To unite the links in the links, the global transfer links are most often used. Navit there, where it is possible to lay lines (for example, at the borders of one place) using packet switching technologies, you can change the number of necessary communication channels and - what is important - ensure the summation of the system with essential global measures. Corporate connection to the Internet is true, as you need access to essential services. Vikoristovuvati Internet as the medium of transmission of data varto only then, if other methods are inaccessible and financial mirkuvannya override the power of confidence and security. If you will win the Internet as much as dzherelo іnformatsії, rather speed up the technology "dial-on-demand", then. in this way connection, if the connection with the Internet node is installed only with your initiative and for the required hour. This drastically reduces the risk of unauthorized penetration in the area of ​​the call. The simplest way to secure such a connection is to dial out to the Internet node via a telephone line or, possibly, via ISDN. The second, more advanced way to secure the call is to win the line and X.25 protocol, or - much better - Frame Relay. In this case, the router from your side is guilty of buti lashing so that you can see the virtual charge for the day's duration of the day and re-install it just once, if the data is from your side. Widely expanded ways to connect for help PPP or HDLC do not give such a possibility. If you want to send your information to the Internet - for example, install the WWW or FTP server, the request is irrelevant. І here slid as vikoristovuvat exchange of access with additional Firewall, and as much as possible to isolate the Internet server from other resources. We make decisionsє using a single point of connection to the Internet for all territorially separated borders, nodes that are connected to each other with one of the additional virtual channels X.25 chi Frame Relay. For some people, access from the Internet is possible to a single node, while others in other nodes can dine on the Internet for help asking for a drink.

To transfer data to the middle of the corporate network, it is necessary to use virtual channels of the packet switching network. The main advantages of such an approach - versatility, flexibility, safety - were examined in detail later. As a virtual network in case of a corporate information system, it can be played as X.25, as well as Frame Relay. The choice between them is determined by the quality of the communication channels, the availability of services at the points of connection and - not in the rest of the city - by financial services. At the same time, the screens with the same Frame Relay for the inter-connection are shown at the top of the line at the same time, at the bottom for the X.25 tie-down. On the other hand, the greater the speed of transmission of information and the ability to simultaneously transmit data and voice can be virishal arguments for the greed of Frame Relay. On the quiet lines of the corporate network, where the lines are available for rent, the shortest is the Frame Relay technology. And here it is possible to combine local networks and connect to the Internet, and to choose quiet add-ons, like sounding X.25. In addition, according to the measure, a telephone call can be made between the nodes. For Frame Relay, it is easier to switch digital channels to the link, to run on physical lines or voice frequency channels. Garni results gives zastosuvannya Motorola 326x SDC modems, which may have a unique ability to correct and compress data in synchronous mode. Zavdyaki tsommu vdaєtsya - at the cost of making small zatrimok - significantly increase the quality of the channel's communication and reach the effective speed of up to 80 kb / s and even more. On physical lines of small length, short-range modems can also be used to ensure high speed. However, it is necessary here high quality lines, shards of short-range modems and any correction of pardons do not support. Widely available short-range RAD modems, as well as PairGain, which allows you to reach the speed of 2 Mbit / s on the physical lines of the plant for about 10 km. In order to connect to a remote communication network to a corporate network, you can connect X.25 network access nodes, as well as power communication nodes. In the rest of the fall, it is necessary to see the necessary quantity phone numbers(or ISDN channels), which can be too expensive. If it is necessary to secure the connection of a large number of koristuvachs at once, then the cheapest option can be to connect to the access of X.25, connect to the middle of the city.

Corporate merezha - ts dosit collapsible structure, scho vikoristovu є raznі type vyazka, komunіkatsіynі protocols and ways of connecting resources. With a look of clarity, encourage such a keratinity of the merezhі to focus on the same type of possession of one vineyard. However, practice shows that the post-employees, how to propagate the most effective solutions for all tasks, that they do not blame, do not try. Working on a fence is the result of a compromise - either a homogeneous system, non-optimal from the point of view of the price and possibilities, or more complicated in the installation and management of the production of different varieties. Let us take a closer look and inspire a number of leading pickers and ladies and recommendations for their selection.

All possessions of the transfer of data can be mentally divided into two great classes -

1. Peripheral, as vikoristovuetsya for connection to the borders

2. backbone or backbone, which implements the main functions of the network (switching channels, routing only).

There are no clear intermediary types - some of the annexes themselves can be victorious in different capacities or combine those other functions. It should be noted that before the main ownership, there are advances in terms of reliability, productivity, number of ports and further expansion.

Peripheral possession is a necessary component of any corporate entity. The functions of backbone hubs can take on a global transfer measure, to which resources are connected. As a rule, the backbone nodes at the corporate warehouse are less likely to be at the entrances, if there are rented communication channels or there are power access nodes. Peripheral possession of corporate boundaries from the point of view of the functions that are being developed can also be divided into two classes.

First, there are routers that serve to connect homogeneous LANs (say, IP or IPX) via global transmission networks. At the borders that win over IP or IPX as the main protocol - zokrema, in the same Internet - routers win over as a backbone, which ensures the connection of various channels and protocols. Routers can be used as stand-alone add-ons, as well as software tools based on computers and special communication adapters.

Another type of peripheral ownership is widely used - gateways, which are implemented in combination with add-ons that are used in different types of networks. Corporate merged networks mostly use OSI gateways that secure local merging with X.25 resources and SNA gateways that secure connectivity to IBM merging. The fully functional gateway is the head of the software and hardware complex, the oskilki is responsible for providing the necessary software interface for additional software. Cisco Systems Routers Among the most common routers, perhaps, are the products of the company Cisco Systems, which implement a wide range of features and protocols, which are often interchanged between local networks. The Cisco setup supports a variety of connection methods, including X.25, Frame Relay and ISDN, which allow you to connect to multiple systems. In addition, among the families of Cisco routers there are miracle servers with remote access to local networks, and in some configurations, the functions of gateways are often implemented (those that are called Protocol Translation in Cisco terms).

The main scope of zastosuvannya routers in Cisco - foldable, scho vykoristovuyut as the main protocol IP or, more likely, IPX. Zocrema, owned by Cisco, is widely used at the backbones of the Internet. If your corporate network is recognized by us as a front for connecting remote LANs and will require IP or IPX collapsible routing over various communication channels and data transfer networks, then having Cisco will be the better choice. Some of the work with Frame Relay and X.25 implemented in Cisco routers is no longer obligatory, which is the necessary networking of local networks for access to them. If you want to build your system on the basis of a packet switching network, then Cisco routers can work in it only as a daily peripheral control, and a lot of routing functions appear when you apply, and the price, obviously, is too high. The most popular in corporate networks are Cisco 2509, Cisco 2511 access servers and new Cisco 2520 series extensions. Motorola ISG Ownership Among the features recognized for X.25 and Frame Relay robots, the greatest interest may be in products operated by a group of information systems of Motorola Corporation (Motorola ISG). At the top of mainline outbuildings that are victorious at global data transmission lines (Northern Telecom, Sprint, Alcatel and others), Motorola's building can be operated independently, without a special center of management of the line. The set of opportunities that are important for winning in corporate environments is richer in Motorola's possession. Particularly noteworthy are the differences in hardware and software upgrades, which allow you to easily attach to specific minds. All Motorola ISG products can work as X.25/Frame Relay switches, rich protocol access devices (PAD, FRAD, SLIP, PPP or so), support Annex G (X.25 over Frame Relay), secure SNA (SDLC/ QLLC/ RFC1490). Installation of Motorola ISG can be divided into three groups, which are divided by a set of hardware features and the scope of installation.

First group, recognized for robotic yak peripheral buildings warehouse Vanguard series. It includes Vanguard 100 serial access nodes (2-3 ports) and Vanguard 200 (6 ports), as well as Vanguard 300/305 routers (1-3 serial ports and Ethetrnet/Token Ring port) and Vanguard 310 ISDN routers. Routers Vanguard, in addition to a set of communications capabilities, includes the transmission of IP protocols, IPX and Appletalk over X.25, Frame Relay and PPP. Naturally, with the help of any support necessary for a modern router, a gentleman's dial - RIP and OSPF protocols, filtering and access facilitation, and a combination of these.

The upcoming Motorola ISG product line includes the Multimedia Peripheral Router (MPRouter) 6520 and 6560 add-ons, which are mainly designed for performance and expansion. The basic configuration 6520 and 6560 have five or three consecutive ports and an Ethernet port, while the 6560 has all high-speed ports (up to 2 Mb/s), and the 6520 has three ports that can be up to 80 kb/s. MPRouter supports all communication protocols and routing capabilities available for Motorola ISG products. The main feature of MPRouter is the possibility of installing various auxiliary boards, which reflects the word Multimedia in its name. Є last port, Ethernet/Token Ring port, ISDN, Ethernet hub. The most famous feature of MPRouter is Voice over Frame Relay. For this, special payments are installed in it, which allow the connection of high-quality telephone or fax machines, as well as analog (E&M) and digital (E1, T1) automatic telephone exchanges. The number of voice channels that are serviced at one hour can reach two or more than a dozen. In this way, MPRouter can instantly win as an integration to voice and data, router and X.25/Frame Relay.

The third group of Motorola ISG products is the backbone of the global business. The cost of expansion of the extension of the 6500plus family, which can be made possible by the capacity and availability of reservations and features for the creation of hard switching nodes and access. They include different sets of processor modules and input-output modules that allow you to select highly productive nodes that can be from 6 to 54 ports. In corporate networks, such extensions can be used to encourage folding systems with a large number of resources that are connected.

Tsіkavo to carry out a pairing of Cisco and Motorola routers. It can be said that routing is the first for Cisco, and communication protocols are only a call, but Motorola gives the main respect communication opportunities, Looking at the routing as one more implemented for the help of these possibilities. Zagalom zasobi routing produktsiї Motorola bіdnіshі, nіzh at Cisco, prote suffice for connecting terminal nodes to the Internet or corporate networks.

The productivity of Motorola's products for other equal minds, perhaps, is higher, moreover, at a lower price. So Vanguard 300, with a similar set of capabilities, appears to be about the second time cheaper, and the closest analogue of the Cisco 2501.

Solutions Eicon Technology

In rich ways, as a peripheral corporate entity, the solutions of the Canadian company Eicon Technology have been successfully developed. The basis of the Eicon solution is the EiconCard universal communication adapter, which supports a wide range of protocols - X.25, Frame Relay, SDLC, HDLC, PPP, ISDN. This adapter is installed in one of the computers of the local network, which becomes the communication server. This computer can also be used for other jobs. It's worth it that EiconCard can use the hard processor and the memory and implement the processing of the network protocols without tying up the communication server. Eicon software that allows you to be on the basis of EiconCard as gateways, as well as routers, work under the management of almost all operating systems on the Intel platform. Here we look at the names of them.

The Eicon solution family for Unix includes IP Connect routers, X.25 Connect and SNA Connect gateways. All products can be installed on a computer, which works under SCO Unix or Unixware. IP Connect allows you to transmit IP traffic over X.25, Frame Relay, PPP or HDLC, and other common technologies such as Cisco and Motorola. The scope of delivery includes Firewall, data compression and SNMP management. The main area of ​​IP Connect stasis is the connection of servers to the program of Internet servers based on Unix to the transmission of data. Naturally, the same computer can be used as a router for an office, in a way that is installed. The Eicon router's host is a substitute for "purely hardware" extensions. First of all, the ease of installation is that vikoristannya. From the point of view of the EiconCard operating system, the installed IP Connect looks like another tethered card. Tse robit nalashtuvannya that administruvannya IP Connect to do with a simple right for the skin, hto splkuvavsya s Unix. In another way, without connecting the server to the data transfer network, it allows you to change the office LAN and secure the same point of connection to the Internet or to the corporate network without installing additional fencing boards and routers. Thirdly, such a "server-oriented" solution is more flexible and expandable, lower traditional routers. There are other advantages that come with the combination of IP Connect with other Eicon products.

X.25 Connect is a gateway that secures interoperability between local area software and X.25 resources. This product allows you to connect Unix and DOS/Windows and OS/2 workstations to remote email systems, databases and other systems. Needless to say, it means that Eicon gateways today may be the only product extension on our market that implements the OSI stack and allows connecting to X.400 and FTAM add-ons. In addition, X.25 Connect allows you to connect remote connections to a Unix machine and terminal add-ons at stations of a local network, as well as organize interconnection of remote Unix computers through X.25. With the help of X.25 Connect standard Unix capability, it is possible to implement a transformation of the protocols, so. broadcast access to Unix via Telnet to X.25 wiki and navpacki. It is possible to connect a remote X.25 cable, which can use SLIP or PPP to a local network, perhaps, to the Internet. In principle, similar to the ability to translate protocols available in Cisco routers with IOS Enterprise software, the solution seems to be more expensive than Eicon and Unix products, at the same time.

One more amazing product is SNA Connect. This is the gateway for connection to IBM mainframe and AS/400. As a rule, it works together with the software of the server - 5250 and 3270 terminal emulators and APPC interfaces - also Eicon. Analogues have looked at more solutions to use other operating systems - Netware, OS / 2, Windows NT and Navit DOS. Particularly varto guess Interconnect Server for Netware, which will gradually increase the capacity due to the remote control and administration of the client authorization system. It includes two products - Interconnect Router, which allows you to route IP, IPX and Appletalk and, in our opinion, the most advanced solutions for connecting Novell Netware, and Interconnect Gateway, which secures, secures, secures, connects to SNA. Another product of Eicon, applications for work in the Novell Netware environment is WAN Services for Netware. Tse nabrіr zabіv, yakі allow you to win by Netware programs in X.25 and ISDN networks. Using Netware Connect at the same time allows remote hosts to connect to local networks via X.25 or ISDN, as well as secure exit from local X.25 networks. The first option is to ship WAN Services for Netware all at once from Novell's Multiprotocol Router 3.0. Their product is called Packet Blaster Advantage. Packet Blaster ISDN is also available, which works not with EiconCard, but with ISDN adapters, which are also available with Eicon. Whenever possible, connection options are BRI (2B+D), 4BRI (8B+D) and PRI (30B+D). For Windows NT applications, WAN Services for NT is recognized. Enable IP Router, enable NT add-ons to X.25, support Microsoft SNA Server, and enable remote access via X.25 to the local network for the Remote Access Server. To connect a Windows NT server to an ISDN network, you can also use the Eicon ISDN adapter at once from the ISDN Services for Netware software.

Methodology to encourage corporate measures.

Now, having resurrected and rebuilt the main technologies, so that we can build a retailer, let's move on to basic nutrition and the methods that are victorious in the design and development of measures.

Wimogi until the end.

Fahіvtsі, who are engaged in the expansion of counting merezh, that merezhevі administrators zavzhd pragvat to ensure the safety of the three main vimog, which hang to the edge, and itself:

scale;

productivity;

curing.

Good scalability is necessary so that without special efforts it is possible to change the number of coristuvachs that are used in the scale, so it is applied software security. The high productivity of the measure is necessary for normal work more current programs. I, nareshti, it is necessary to finish the line easily with kerovan, so that it can be changed to meet the needs of the organization, which is constantly changing. In addition, it is possible to introduce a new stage in the development of merging technologies - the stage of creating highly productive corporate mergings.

Uniqueness of new program contributions This technology facilitates the development of corporate merezh. Central resources, new classes of programs, INNSHI of the principles of the pile, the serpent of the Kilkiye characteristics of the INformation Stream, the zbizhosti is one -time brown -shaped the dugout platforms - all the facts of the factor of the factor of the factor of the pivot. At the same time, there is a large number of technological and architectural solutions on the market, and choose the most suitable of them - to finish the order more smoothly.

In today's minds, for the correct design of the measure, її rozrobki and services fahіvtsі owe the following insurance:

o Change of organizational structure.

During the implementation of the project, there was no trace of "separation" of facsimiles from the software and facsimiles. Under the hour of the creation of a measure and all the systems, a single team is needed for fakhivtsiv of a different profile;

o Whispers of new software.

It is necessary to be familiar with the new software at an early stage of the development of the enterprise in order to be able to make the necessary corrections in the work that are planned before the finalization;

o Follow-up of other decisions.

It is necessary to evaluate the different architectural solutions and their possible impact on the work of the future line;

o Verification of measure.

It is necessary to carry out testing of all the lines or parts at the early stages of development. For whom you can create a prototype of the measure, which will allow you to evaluate the correctness of the decisions taken. So it is possible to save the appearance of a different kind of "big places" and to signify the stability and sizable productivity of different architectures;

o Select protocols.

In order to correctly select the configuration of the measure, it is necessary to evaluate the feasibility of different protocols. It is important to note that as a merezhevі operation, akі optimize the work of one program or a software package, they can affect the productivity of others;

o Choice of physical dressing.

Choosing the place of installation of servers, the need, first for everything, signify the location of the servers. What can you move? Will there be up to one computer connected to them? What will be the best access to the global network?

o Calculation of the critical hour.

It is necessary to determine the hour of the permissible reaction of the skin program and the possible period of maximum stress. It is important to understand how random situations can affect the practicality of the measure, that means that a reserve is needed for organizing uninterrupted work of business;

o Analysis of options.

It is important to analyze the different options for software security in the Merezha. The centralized collection and processing of information often creates additional pressure in the center of the region, and calculation can vimagati poslennya local merezh robochih groups.

Today, there is no ready-made, adjusted universal methodology, for which it is possible to automatically carry out the entire complex of entries from the development of that corporate measure. We are in front of tse pov'yazano z scho, scho not іsnuє dvoh absolutely identical organizations. Zocrema skin organization is characterized by a unique style of ceramics, a hierarchy, a culture of management. Well, if you lie, that the tie will inevitably break the structure of the organization, you can boldly say that there are no two identical ties.

Merezha architecture

The first step is to develop corporate measures, it is necessary to first consider the architecture, the functional and logical organization and the protection of the basic telecommunication infrastructure. The architecture of the mesh is resolutely optimised, helping to assess the possibility of investing in new technologies and application programs, serve as a backlog for the future growth, designate a choice of mesh technologies, help to eliminate superfluous stains, displaying incorrect links between the mesh components, and significantly reduce The architecture of the yard is laid in the basis of the technical task on the yard that is being created. It should be noted that the architecture of the yard is being considered in accordance with the project of the yard, which, for example, does not indicate the exact principle scheme merezhi does not regulate the placement of merging components. The architecture of the link, for example, determines which parts of the link will be based on Frame Relay, ATM, ISDN or other technologies. The Merezhevy project is responsible for exacting specific instructions and ratings of parameters, for example, the required capacity, the actual width of the smog, the bandwidth, more precisely, the distribution of the channels, the connection is thin.

Three aspects, three logical warehouses are seen in the architecture of the city:

encourage principles,

merging templates

and technical positions.

Principles will be victorious when planning measures and making decisions. Principles - price set simple instructions, in a sufficient degree of detail, they describe all the nurturing and exploitation of the measures that are being developed, stretching for a trivial period of an hour. As a rule, the basis for the formation of principles is corporate goals and basic methods of conducting business organizations.

Principles to secure the first link between the corporate strategy and the development of border technologies. The stench is to serve as a distribution of technical positions and framing templates. When building a technical plant on a fence, the principles of prompting a fence architecture are laid out at a branch, which determines the main lines of a fence. The technical position can be considered as a whole description, which determines the choice between competing alternative fencing technologies. The technical position specifies the parameters of the selected technology and gives a description of the device taken, method, protocol, service, hopefully, etc. For example, when choosing a technology for local services, it is necessary to take into account the speed, quality, quality of service and other benefits. The development of technical positions will require a deep knowledge of lace technologies and a respectful view of the organization. The number of technical positions is determined by the given level of detail, the complexity of the measure and the scale of the organization. The architecture of the merezhi can be described by such technical positions:

Merezhev transport protocols.

What kind of transport protocols can win the transmission of information?

Routing at the Merezha.

What kind of routing protocol is to be played between routers and ATM switches?

Service level.

What is the scope for the choice of the quality of service for a day?

Addressing in IP and addressing domains.

What addressing scheme is responsible for wicking for merezhі, including registering addresses, pdmerezhi, masks pіdmerezhі, redirection etc.?

Switching at local networks.

What kind of switching strategy can be used in local networks?

Combination of switching and routing.

De i yak owe vikoristovuvatysya switching and routing; How can the stench be united?

Organization of the Mishkoi measure.

By what rank can the division of business be called, let's say, in one place?

Organization of a global network.

What kind of rank of business administration can be connected through the global network?

Remote access service.

How can coristuvachi vіddelenih vіddіlen mаyut access to the enterprise?

Merezhevі templates - tse nabіr models merezhevyh structures, shcho vdbivat links between the components of the merezhі. For example, for the singing architecture of the border, a set of templates is created, in order to "reveal" the topology of the border of the great division, or the global border, or to show the distribution of protocols for peers. Merezhev templates illustrate the merezhnu infrastructure, as described by a complete set of technical positions. Moreover, in a well-thought-out mesh architecture, mesh patterns at the level of detail can be as close as possible to the technical positions. In fact, mezhezhі templates - tse description functional diagram merezha, may be specific to the cordon, you can name the following basic merging templates: for the global merezha, for the local merezha, for the central office, for the great division of the organization, for the division. You can also expand other templates for the business of the merezhi, which may have some special features.

Describing the methodological basis of foundations on the basis of a specific situation, looking at the principles of motivating corporate measures in their totality, analyzing the functional and logical structure, developing a set of framing templates and technical positions. Different implementations of corporate merezh can include all other components to your warehouse. At the corporate level, the merging is made up of different bonds, connected by ties. The stench can be global (WAN) or local (MAN). Vіddіlennya can be great, middle and small. A great deal can be a center for processing and collecting information. There is a central office, from which the management of the corporation is carried out. You can add different service items to the small ones (warehouse, mains, too). Small vіddіlennya є vіddalenimi. Strategic recognition of the distant service - expansion of the service technical support closer to sleep. Communication with clients, which significantly contributes to the income of the corporation, will be more productive, as all specialists will deny access to corporate data at some point in time.

At the first stage, the corporate structure is described, the functional structure is transferred. The number of warehouses and the status of the office and the vіddіlen are determined. There is a need for arranging the fluffy private line, or a choice of a service provider is carried out, which is a building satisfaction that is hanging. The development of the functional structure is carried out with the improvement of the financial capabilities of the organization, long-term plans for development, the number of active coristuvachіv merezhі, working programs, the necessary quality of service. At the basis of the development lies the functional structure of the enterprise itself.

At another stage, the logical structure of the corporate merezhі is determined. The logical structures are modified by one or the other by the choice of technology (ATM, Frame Relay, Ethernet...) central lane corporations. Let's take a look at the logical structures, prompted to improve the switching of the middle and switching personnel. Vybіr mizh tsimi two ways of transfer zdіysnyuєtsya, depending on the need for a guaranteed quality of service. There may be other criteria.

The transmission line of data may be supported by two main powers.

o Ability to connect a large number of low-width workstations to a small number of high-width high-width servers.

o Acceptable promptness on request of clients.

The ideal highway is to blame for the mother's high arrogance of data transmission and the development of the control system. Under the control system, there is a trace of intelligence, for example, the possibility of configuring the main line with the improvement of the necessary medical features and the improvement of the superiority on such a level, so that even some of the parts of the network will go out of tune, the servers become unavailable. Listed as a way to designate, imovirno, a sprinkling of technologies and the remaining choice of one of them is left for the organization. It is necessary to swear, what is more important - variability, speed, scale and quality of service.

The logical structure with switching is averagely stagnant at the borders with multimedia traffic in real time (conducted videoconferencing and voice transmission). With whom, it is important to seriously evaluate how much such a road is needed for a merezha (from the other side, to wind up expensive merezha for an hour without a good time to please the deacons of vimogi). As a matter of fact, it is necessary to take as a basis the logical structure of the chain with the switching of personnel. A logical hierarchy of switching, which will fit two equal OSI models, can be represented in a three-way scheme:

The bottom row serves to connect local Ethernet networks,

The middle tier is either a local ATM tier, or a MAN tier, or a WAN backbone tie.

The upper row of the hierarchy structure is responsible for routing.

The logical structure allows you to display all possible routes to connect between the okremnye businessmen of the corporate network

Main line on the basis of commutation of middle stations

With the choice of switching technologies for the backbone of the middle of all Ethernet switches of the working group level, the high-performance ATM switches will be used. Working on another level of the OSI reference model, the switches transmit 53-byte fixed-length frames to the Ethernet frame replacement. Such a concept may help to ensure that the Ethernet switch of the same workgroup is responsible for the mother of the outgoing ATM port with the function of segmentation and folding (SAR), which transforms the Ethernet frames of the changed domain into the ATM fixed carrier to the ATM carrier before transferring to the ATM carrier.

For global networks, ATM base switches are built to provide calls to distant regions. Also, working on a different OSI model, the switches in the WAN merger can override T1/E1 channels (1.544/2.0Mbps), T3 channels (45Mbps) or SONET OC-3 channels (155Mbps). To secure a small connection, you can open a MAN chain for the help of ATM technology. That ATM backbone itself can be used to communicate between telephone exchanges. In the future, within the framework of the telephone model, the client / server of the station can be replaced by voice servers of the local network. In this case, the ability to guarantee the quality of service in ATM networks becomes even more important for organizing communication with client personal computers.

Routing

As it was designated, routing is the third and most significant rank in the hierarchy structure of the border. Routing, which works on the third level of the OSI reference model, is chosen for organizing calls sessions, to which lie:

o Sessions of communication between outbuildings, spreading in different virtual meshes (when the skin meshes sound like a fixed IP-room);

o Call sessions to go through the global / local

One of the strategies to encourage corporate fencing is at the installed commutators on the lower levels of the central fencing. Then local networks are connected by routers. Routers are needed in order to divide the IP-merezh of a large organization into anonymous IP-divisions. This is necessary for the intimidation of the "wide-combed vibe" associated with the operation of such protocols, like ARP. In order to stream the expansion of non-baggage traffic through the barrier, all working stations and servers must be split into virtual barriers. In this way, routing manages the interplay between outbuildings that lie down to different virtual local borders.

Such a network is composed of routers or routing servers (logical core), backbone networks based on ATM switches and a large number of Ethernet switches deployed on the periphery. For some special reasons, for example, there are video servers that connect directly to the ATM backbone, all working areas of that server are connected to Ethernet switches. Such a measure will allow localization of internal traffic in the middle of working groups and avoid pumping such traffic through ATM backbone switches or routers. Connecting Ethernet switches is connected to ATM switches, sound the order from that same branch. Decide if you may need a few ATM switches to ensure that you have enough ports to connect all of the Ethernet switches. As a rule, I have a 155Mbps connection over a multimode fiber optic cable.

The routers are separated from the backbone ATM switches, the oscillators and routers must be blamed for the routes of the main sessions. This prompted to rob the routing of neobov'yazkovaya. It should be deposited according to the type of session, the connection and according to the type of traffic in the border. Routing sled namagatsya unikati pіd hour transmission vіdeoіinformatsії y hrі, oskolki vin can make nebazhanі zatriki. Routing is not needed for communication between outbuildings, roztashovanim in one virtual yard, you can still smell the stench at different booths on the territory of the great enterprise.

Krіm order navіt at situatsії, if router potrіbnі for holding Pevnyi seansіv zv'yazku, rozmіschennya marshrutizatorіv ostoron magіstralnih komutatorіv ATM dozvolyaє mіnіmіzuvati number perehodіv marshrutizatsії (pid transition marshrutizatsії rozumієtsya dіlyanka MEREZHI od koristuvacha to pershit router abo od one router to іnshogo). Tse allows you not only to reduce the blockage, but also to change the focus on routers. Routing has developed a wide breadth as a technology for linking local networks to the global environment. The router provides various services, insurance for bugatory control of the transmission channel. Here you can see the addressing scheme (on the border line), how to lie in the same way as the addresses of the front line are formed, as well as the transformation of one frame format of the control line into another.

Routers make decisions about where to send data packets, what to find, what information to find in them, about the addresses of the border line. This information is retrieved, analyzed and set up using a different routing table, which allows you to determine which port is next to send the next packet. Then, from the address of the link layer, the addresses of the link layer are distinguished, if the packet is to be sent to the segment of such a link, like Ethernet or Token Ring.

Packet processing cream routers simultaneously update the routing table that determines the destination of the skin packet. Routers create and maintain tables in dynamic mode. As a result, routers can automatically respond to network changes, for example, to vanishing or downlink channels.

Appointment of the route - do not forget the order. In a corporate network, ATM switches are supposed to function in much the same way as routers: the exchange of information may be dependent on the network topology, available routes, and transfer rates. The ATM switch needs all this information to select the best route for a particular call session to initiate kіntsevy koristuvachs. Until then, the route will not be separated by any decision about the route, which will pass the logical order after the formation of the request for the first step.

The ATM switch may choose new routes, in which case the links to the call are unavailable for any reason. With any ATM switcher, you can be sure of the reliability of the network on the level of routers. In order to create a link with high economic efficiency, it is necessary to transfer the routing functions to the periphery of the link and ensure the switching of traffic in the її backbone. ATM is a single mesh technology, as building security.

For the choice of technology, it is necessary to have the following requirements:

What does the technology provide for adequate service quality?

Can you guarantee the quality of service?

How many merzha?

What is the possible choice of the topology of the mesh?

What are the cost-effective services that rely on merezhey?

How effective is the management system?

Vіdpovіdі qі nutrition signify vibіr. Ale, in principle, on different plots of land, you can win different technologies. For example, as soon as okremі dіlyanki vmagayutki multimedia traffic in real time or speed 45 Mbit / s, then ATM is installed in them. If you need to use a network of services to enable dialog processing of requests, which does not allow such blockages, then it is necessary to win Frame Relay, as such services are available in this geographic area (or else you can get to the Internet).

So, a large enterprise can connect with a network through ATM, at that hour, as a branch, they communicate with that network via Frame Relay.

Under the hour of the corporative merging and the choice of merging technology with the help of software and hardware security, the next step is to ensure the cost/productivity. It's important to check high speed in the form of cheap technologies. From the other side, bezgluzdno vykoristovuvaty the most advanced technologies for the simplest jobs. Slid correctly combine different technologies for achieving maximum efficiency.

When choosing a technology, ensure the type of cable system and the required equipment; the summіsnіst іz іz already installed іn іlіdnannya (significant minimіzаtsії vitrat can be reached, as far as the new system can be turned on already installed іnіstіvnannya.

Vzagali, you can see two ways of pobudov vysokoshvidkіsnoї local ї merezhі: evolyutsіy and revolutionary.

The first path is based on the expanded good old technologies of personnel relaying. It is possible to increase the local code within the framework of such an approach for the modernization of the network infrastructure, the addition of new communication channels and the change in the method of packet transmission (what is broken into Ethernet, what is being communicated). Zvichina Ethernet merging a double bandwidth, so that the traffic of all the carriers of the network supersedes one by one, claiming the entire bandwidth of the network segment. Ethernet, which communicates, has seen routes, which is the reason why short-rangers have access to a real bandwidth of 10 Mbit / s.

Revolutionary way to transfer to new technologies, for example, ATM for local networks.

The rich practice of encouraging local fencing has shown that the main meals are serviced. It is self-employed that it is possible to successfully implement the measure (for example, with such programs, like videoconferencing, which know more and more zastosuvannya in the world).

Visnovok.

Mati chi mother vlasnu merezh zvyazku - tse "special right" skin organization. However, it’s worth it to the order of the day to build a corporate (domcho) measure, it’s necessary to carry out a deep, universal follow-up of the organization itself, the tasks that are being violated, to fold the scheme of document management in this organization and even on a technological basis, proceed to the choice of technology. One of the applications for stimulating corporate cooperation is the Galactika system.

List of victorious literature:

1. M. Shestakov "Principles for encouraging corporate transfers" - "Computerra", No. 256, 1997.

2. Kosarev, Eryomin "Computer systems and measures", Financial statistics, 1999.

3. Olifer W. R., Olifer M. D. “Computer Merezhі: principles, technologies, protocols”, St. Petersburg, 1999.

4. Materials for the website rusdoc.df.ru

Lecture number 1.

The concept of measure. Corporate information systems. Structure and recognition of KIS. Characteristics. We can help organize KIS. Process. Bagatorivneva organization KIS.

The concept of measure. What is merezha |

Like you see, first Computers (PC) were assigned to the execution of mathematical tasks. However, it soon became obvious that the main area of ​​their zastosuvannya can be the processing of information, for which personal computers can no longer work offline, but are due to interfacing with other PCs, dzherels and storage of information. The result of which was і informational in enumeration h eti ( I Sun);

Merezha (network)- two (or more) computers and connected to them, connected by means of a connection.

server tse:

Ø Component of the enterprise operating system that gives clients access to border resources. For the cutaneous type of resources, the Merezha can only have one or a few servers. Most often, the server and files, others, databases, remote access are stopped.

Ø A computer that downloads the server program and allocates its resources for the common use of the mill.

Merezha on the basis of the server (server-based network) - mezhu, de funktsії kom'yuter_v diferentіyovanі on funktії servіvіv i kliєntіv. Became the standard for merezh, yakі serve over 10 koristuvachiv.

Peer-to-peer network - I mean, I don't see any servers in that hierarchy of computers. All computers are respected equally. Sound the skin of the computer to play the role of the server, and the client.


Client (client) - be it a computer or a program that connects to the services of another computer or program. For example, Windows 2000 Professional is an Active Directory client. This term is also used for software security, which allows the computer or software to create a connection. For example, to connect a Windows 95 computer to Active Directory on a Windows 2000 computer, you must install an Active Directory client for Windows 95 on the first computer.

Merezha is folded from:

Ø hardware (servers, workstations, cables, printers, etc.)

Ø Protection of data and resources from unauthorized access;

Ø Type of dovіdok about information and program resources;

Ø Automation of programming and subdivision of processing - in parallel with the completion of the PC billing office.

Delivery hour- Statistically average hour from the moment of transmission of notification in the measure until the moment of cancellation of notification by the addressee.

Mere productivity- Overall productivity of the main computers (servers). For whom, the productivity of the head computers (servers) means the nominal productivity of the processors.

Variety of data processing- it is formed from the arrangement of coins, which are victorious for the introduction, transfer, collection and collection of data. On the basis of prices variability of data processing, as a deposit in the form of an obligatory number of resources in the calculation measure (amount of data, processing hour), as well as in the mode of transfer and processing of data.

Characteristics of the deposit in terms of structural and functional organization of the land, the main ones:

Ø Topology (structure) of KIS (PC warehouse, structure of basic SPD and terminal barrier),

Ø Data transfer method for the base measure,

Ø Ways to establish a connection between mutual coristuvacs,

Ø Select routes for data transmission.

Ø Navantazhennya, which is created by coristuvaches.

Topology - physical structure and organization of the measure. The most extensive topologies are:

Ø highway,

Ø wood,

depends on the number of active coristuvachiv and the intensity of interdependence of coristuvachiv from the mesh. The remaining parameter is characterized by the number of data to be entered - PC, which is to be produced in one hour, and the resource requirement of the main machines for processing these data.

We can help organize KIS.

The KIS organization is responsible for the following main actions:

1) Criticism - the possibility of including additional head computers (servers), terminals, PCs, hubs and a line connection without changing the technical and software features of the operating components,

2) Gnuchkist - the ability to work with any head computers (servers) with PC terminals different types, the admissibility of changing the type of PC and the line connection,

3) arrogance - savings in manufacturing when changing the structure as a result of the departure from the fret of the PC, knotting that line link,

4) Efficiency - ensuring the necessary quality of service for the coristuvachs for the minimum amount of money,

5) Bezpeka - software or hardware-software protect the timing in another way

Appointments are implemented on the basis of the modular principle of organizing process management in a company according to a bagatory scheme, the basis of which is to understand the process, equal management, interface and protocol.

Process.

The function of KIS is presented in terms of processes.

process- Tse dynamic object that implements the purpose of directing the act of processing data. Processes are divided into two classes:

Ø Applied

Ø System

Application process - vykonannya applied chi detailed program of the operating system of the PC, and navit functioning of the PC, i.e. koristuvach that works on the PC.

system process - vykonannya program (algorithm) that implements an additional function, related to the security of applied processes. For example, activation of a PC to a terminal for an applied process, organization of communication between processes. The process model is shown in Figure 1.2.

The process is generated by the program, either by coristing and tying with data, which need to be called like a weekend, and it is formed by the process for coristing. The introduction of data necessary for the process, that the introduction of data is vibrated in the form reminder - sequence of data, which may have completed the meaning of the word. Introduction to the process ports. Ports are shared on entryі holidays.

In this manner, the process is the object of the procurement of ports, through the yakі vin vzaєmodіє z іnshimi protsessі merezhi.

Mutual processes are brought up to the exchange of notifications that are transmitted by channels that create the barriers (Fig. 1.3).

The interval of an hour, the stretch of which mutual processes are called session (session). KIS has a single form of mutual processes – exchange of information. At the PC, that accounting complexes of mutual processes are provided with access to the data that are important for them, the memory that is important for them is the exchange of signals.

The difference is due to the territorial division of processes at KIS, and also, for the physical success of the components in the network, there are communication channels, which ensure the transmission of support, but not a few signals.

Bagatorivneva organization of the measure.

The transmission center of the merezhі may be the mother of physical nature and be a collection of wire-optical fiber, radio relay, tropospheric, satellite lines (channels) communication. The skin of the systems of merezhі has a deuce of processes. Processes, rozpodіlenі for different systems, vzaєmodіyut through the middle way exchange podomlennyami.

For the security of viability, reliability, flexibility, efficiency and security, the process control measures are organized according to a bagatory scheme (Fig. 1.4). Vіdkritа system іntegratsіya (further - OSI O pen S system I ntegration) describes the model, which represents a global understanding of the meaning of the merging components. The OSI model sounds like it's scheduled every hour for planning a new set of merging protocols.

At the table 1.1 pidhide representations, which zastosovuetsya under different OSI model. The process of creating mesh communications is divided into sim stages.

Table 1.1

In the skin of the systems, the rectifiers have software and hardware modules that implement the main functions of data processing and transmission.

Modules are divided by lines 1…7. Riven 1 lower, riven 7 - upper. The module of equal N is physically interdependent only with the modules of susіdnіkh equals N+1 and N-1. Equal 1 module interacts with the transmission medium, which can be seen as object equal 0 (zero). Applied processes are accepted up to the upper level of the hierarchy, in this level up to level 7. Physically, the connection between the processes is ensured by the middle. Interaction of applied processes with the transfer of the middle is organized with the help of six intermediate levels of management 1 ... 6, as it is looked at, starting from the bottom.

Riven 1 - physical - implements channel control of the call, which is made before connecting to the connection to the call channel, and the formation of signals that represent the data that are transmitted. Through the presence of a change in the transfer of data, a delay is introduced and the reliability of the transfer is reduced: pardon 10-4.

Riven 2 - channel / zvyazku danikh- be safe original transfer data through a physical channel, less organization on a equal basis 1. Immovable data creation 10-8.

Riven 3 - fencing - secure data transmission through the basic transmission link (BTS). The management of the treadmill on the same line is based on the choice of the route for the transmission of data lines, which are called by the nodes of the treadmill.

Levels 1...3 organize the basic SPD between coristuvachi merezhi.

Riven 4 - transport - implement the procedures for obtaining correspondence between the hosts and personal computers) with the basic SPD. On the other hand, it is possible to build different systems from a network, and they will organize themselves transport service for the exchange of data between merezhya and systems of merezhі.

Riven 5 - session - organize sessions of communication for the period of mutual processes. On the same line for the requests of the processes are created spoil for reception and transmission, notifications and meetings are organized - logical channels

Riven 6 - Appearance - zdіysnyuє translation of different mov, data formats and codes for interoperability of different types of PCs equipped with specific OS and practice in different codes between themselves and PCs and terminals of different types. Mutual processes are organized on the basis of standard forms of submission of tasks and data sets. Presentation equalization procedures to interpret the standard notifications of one hundred and one specific systems - PC and terminal. This creates the possibility of vzaєmodії odnієї programs from different types of PC.

Riven 7 - applied (additional) - creations only for vikonannya song function data processing without adjusting the structure of the link, the type of communication channels, methods of choosing routes, etc. This ensures the reliability and flexibility of the system.

The number of rіvnіv and rozpodіl functions between them istotno vplyvayut on the foldability of the PC software, which enters the measure, that on the efficiency of the measure. The semi-rival model was examined (reference model of intermodality of critical systems - EMBOS), which is called architecture of critical systems, adopted as a standard by the International Organization for Standardization (ISO) and won as a basis for the development of KIS and ITT as a whole.

To help in mastering the subject, we will introduce words-pastes, the first symbols of which are combined with equal names in this order:

People (People)

Seem (Here)

Need

Data

Processing (All people, let's say, demand the processing of data.)

Qiu key phrase is easy to remember and won't help the administrator of the local area to recognize his vidpovidalnist.

Literature

«Information processes in computer networks. Protocols, standards, interfaces, models ... ”- M: KUDITS-OBRAZ, 1999, Peredmova. Intro, Chapter 1, Stor. 3-12;

«Information processes in computer networks. Protocols, standards, interfaces, models ... ”- M: KUDITS-OBRAZ, 1999, Chapter 7, Stor. 72-75

Sportac M and in. “Highly productive measures. Encyclopedia of Koristuvach”, Per. from English - K: "DiaSoft" publishing house, 1998, Chapter 29, Store. 388-406

Heywood Drew "Inner Light"Windows NT server4" Prov. from English - K .: Vidavnitstvo "Dia-Soft", 1997, Chapter 9, Stor. 240-242; Addendum A, Stor. 488-489

© 2022 androidas.ru - All about Android