See the merging technologies of local merging. Technologies of computer networks Merezhev technologies in short

Golovna / Corisna information

Today's fences and fences technologies keep people in any little corners of the world and provide them with access to the greatest luxury in the world - human intercourse. People without pereshkod join and play with friends, like they perebuvayut in other parts of the world.

Come, what you see, become familiar with all the lands of the world in a few seconds. Skin can connect to the Internet and publish your portion of information.

Merezhev Information Technologies: Root Vindication

In the other half of the last century, the human civilization formed two of the most important scientific and technical rooms - computers, and close to the fourth century, insults in the rooms developed independently, and within the framework of such a telecom computer. Prote in the last quarter of the 20th century as a result of the evolution of the interpenetration of these two galleys of human knowledge and viniclo those, which we call the term "merezheva technology", which is the subtitle of the common concept "information technology".

As a result, a new technological revolution appeared in the world. Likewise, as far as ten years before it, the surface of the land was covered with a mesh of Swedish highways, for example, in the past century, all regions, towns and villages, enterprises of that organization, as well as individual mainline dwellings appeared to be associated with "information". At the same time, stinks have become elements of various means of transferring data between computers, in which other technologies for transferring information have been implemented.

Merezha technology: understanding and understanding

Merezheva technology is sufficient for a deyakoї tsіlіsny set of rules for submitting and transmitting information, which are implemented by the so-called “standard protocols”, as well as hardware and program contributions, which includes interchangeable adapters with drivers, FOCL cables, various connectors (pins).

"Sufficiency" of this complex of costs means a minimization for the preservation of the opportunity for practical measures. It is the mother's responsibility to improve the potential, for example, for the arrangement in the middle of the world, which requires the stosuvannya of protocols in different equals, as well as special communicators, which they call “routers”. After a thorough merging becomes nadіnіshoy and shvidshoy, at the cost of the appearance of nadbuds over the main tiring technology, which becomes the basis.

The term "measurement technology" is most often used in the above-described narrow meaning, but most of the wines are expanded to be interpreted as whether there is a set of faculties and rules to induce a merezh of the singing type, for example "local technology" computer mesh".

The prototype of merging technology

The first prototype of a computer measure, and even more self-measurement, became in the 60-80s. of the past century rich-terminal systems. Indicative of the richness of the monitor and keyboard, which are spread out on the great lines in the great EOM and connect with them for additional telephone modems or other channels, the terminals went out of the IVC and rose in the middle of the house.

In this case, the operator of the EOM itself on the IVC, all the koristuvach_terminals were deprived of the ability to enter from the keyboard their own task and poster for їх vikonannyam on the monitor, zdіysnyuyuuuuuuuof the operation of managing the tasks. Such systems, which implement algorithms within an hour, and batch processing, were called systems of distant administration.

Global Measures

After rich terminal systems like the 60s. XX Art. The first type of network was created - global computer network (GCS). They connected supercomputers, which were used in single copies and took unique data and software, with great EOMs, which were found in them on a distance of up to 1,000,000 kilometers, for the help of telephone networks and modems. Tsya merezheva technology was tested earlier in bagatotherminal systems.

First DKZ in 1969. became ARPANET, which worked at the US Department of Defense and combined different types of computers with different operating systems. The stinks were equipped with additional modules for the implementation of communications overhead for all computers that are included in the measure. The very foundations of merging technologies were developed on the basis of them, so that the dossiers can be established.

The first example of convergence of computer and telecommunication systems

The GKS got connected at the recesses of the line with the old and global lines - telephone lines, so it was too expensive to lay new lines of great length. Therefore, there were many years in them that analog telephone channels were victorious for transmission at a given hour, less than one call. Digital data was transmitted over them with a very low speed (tens of kb/s), and the possibilities were limited by the transfer of data files and electronic mail.

Having declined telephone lines, DCZ did not take their main technology, based on the principle of switching channels, if the skin pair of subscribers for the entire hour of the session, the call was seen on a channel with constant air traffic. New computer networking technologies, based on the principles of packet switching, were victorious at the GKS, while looking at small portions of packets with a constant speed, they are seen in the measure, which is not switched, and are accepted by the addressees in the package for the address codes, in the headings .

The fronts of the local meshes

Appearing like a 70s rock. XX Art. BIS brought to the creation of a mini-EOM with a low variety and rich functional possibilities. The stench began to really compete with the great EOMs.

The mini-EOM of the PDP-11 family gained wide popularity. They began to install them in everything, to build even small-scale developments for the management of technical processes and other technological installations, as well as for the management of enterprises for the management of office tasks.

Vinikla concept of distribution of all computer resources, although all mini-EOMs still worked autonomously.

Appearance of LAN-merezh

Until the mid 80s. XX Art. It was introduced the technology of combining mini-EOM at the enterprise, based on the switching of data packets, like that at the DKZ.

The stinks have changed the pobudovu of a single enterprise, the title of a local (LAN - merezha), on a trivial task. For її svelennya it is necessary to buy just a few adapters for using LAN-technology, for example, Ethernet, a standard cable system, install on її cables connectors (pins) and zadnati adapters with a mini-EOM and among themselves for the help of these cables. Dali, one OS was installed on the EOM server, it is recognized for the organization of the LAN - merezhi. After all, the pracsyuvati began to work, and the onset of the new skin mini-EOM did not call out everyday problems.

The invisibility of the appearance of the Internet

Although the appearance of a mini-EOM allowed the distribution of computer resources equally by the territories of enterprises, then the appearance of the cob of the 90s. The PC zoomed in on their steps to appear on the back of the skin working area, whether it was a rozumovo practitioner, such as in individual human lives.

Notably cheapness and high reliability of robots and PCs gave a hard mail development of the LAN-merezh, and then they brought it to the end of the global computer network - the Internet, which swept all the corners of the world today.

The expansion of the Internet is growing by 7-10%. Vіn є core, scho zv'yazuє raznі local and global merezі pridpriєmstv that stanovl vsomu svіtі one z one.

As at the first stage, data files and information of electronic mail were mainly transmitted via the Internet, but today it is more important than ever access to distributions of information resources and electronic archives, to commercial and non-commercial information services of the region. It is practical for the archives to have free access to all the knowledge and activities of people - in the form of new directives from science to weather forecasts.

Main merging technologies LAN merging

In addition, they see basic technologies, which may have a basis for any specific measure. Like a butt, you can use such LAN technologies as Ethernet (1980), Token Ring (1985) and FDDI (end of the 80s).

For example, 90s rock. the leader of LAN-merezh technology has introduced Ethernet technology, which combined the classic yoga version with up to 10 Mbit/s, as well as fast ethernet(up to 100 Mb/s) and Gigabit Ethernet (up to 1000 Mb/s). All Ethernet-technologies can be close to the principles of operation, which can simplify the service and communication on the basis of the LAN-merezh.

At that very period of the kernel, practically all computer operating systems, their retailers, began to implement several functions, to implement more advanced information technologies. They appeared to develop specialized communication OS similar to IOS company Cisco Systems.

How GKS-technologies were developed

The technologies of corticosteroids on analog telephone channels through the great rіveny of their creations were challenged by folding algorithms for the control and renewal of data. The buttstock is the X.25 technology of rozrobki on the cob of the 70s. XX Art. Bigger modern technologies – frame relay, ISDN, ATM.

ISDN is an abbreviation that means "digital service integration network", allowing remote videoconferencing. Remote access is ensured by the installation of ISDN adapters in the PC, which can be used in many ways for modems. Є special software that allows popular operating systems and browsers to use ISDN. Ale dorozhnecha obladnannya and the need to lay special lines zv'yazku galmuє razvitok tsієї tekhnologii.

Technologies of global mergers progressed at the same time telephone lines. After the advent of digital telephony, Plesiochronous Digital Hierarchy (PDH) technology was expanded, which increases the speed of up to 140 Mbit / s and wins for the establishment of government networks.

New technology Synchronous Digital Hierarchy (SDH) like the 80s. XX Art. expanded the throughput of digital telephone channels up to 10 Gb/s, and Dense Wave Division Multiplexing (DWDM) technology - up to hundreds of Gb/s and up to a few Tb/s.

Internet technologies

Merezhevy based on a custom movable hypertext (or HTML-movie) - special tags, which represent a set of attributes (tags) in order, as they are forwarded by retailers of Internet sites on the skin side. Sounds like a language to this particular type do not go about text or graphic documents (photographs, pictures), which are already “entangled” with the Internet, be found in the memory of your PC and look through texts, or go about the so-called web pages that are looked at through browser programs.

Internet site distributors create them on HTML-movie (it was created at once by an impersonal work that technology works, it is recognized as “layout of sites”) at the look of the totality of web sites, and the site managers are placed on the Internet server on the minds of the servers of the hosts 'yati (The so-called "hosting"). The stench of the colony works on the Internet, serving the needs of coristuvachs at the sight of the interests of their web sites.

PC browsers, having removed access to a specific server through the server of their Internet provider, the address of which is located in the name of the requested Internet site, will remove access to this site. Further, analyzing the HTML tags of the skin side, looking at each other, browsers form the image on the monitor screen in the way it was intended by the retailer of the site - with custom headings, colors for the font and background, different inserts for viewing photos, diagrams, pictures, etc. . P. .

In order to grow up like a power local merezha, it is necessary to understand such an understanding, like mesh technology.

Merezhev technology consists of two components: merezhev protocols and equipment that ensures the operation of these protocols. Protocol with their own hands, a set of “rules”, with the help of such computers, which are in the merezhі, can connect with each other, and exchange information. For the help of mesh technologies, we have the Internet, and a local connection between computers that are in your home. Sche mesh technologies name basic, but also I’ll name one more harn - mezhezhiv architecture.

Merezhev architecture determines the parameters of the measure in the measure, about the need for a mother, there is little notice, so that they can get together at the annex of the local fence:

1) Speed ​​of transmission. It shows how much information, how it sounds in bits, can be transmitted through the border in a song hour.

2) Format of merging frames. The information that is transmitted through the border is based on looking at the "frames" - packets of information. Merezhevі frames in different merezhevyh technologies may have different formats and packages of information that are transmitted.

3) Signal coding type. Significantly, by some rank for the help of electrical impulses, the information is encoded in the measure.

4) Transmission medium. Tse material (sound the cable), through which the flow of information passes - this itself, as it appears on the screen of our monitors.

5) Topology of the mesh. This is the scheme of the mesh, in which there are “ribs”, which are the cable and the “tops” - computers, to which cables can stretch. Three main types of merging schemes have been expanded: ring, tire and star.

6)Method of access to the transmission medium. There are three methods of access to the middle medium: the determination method, the vipadkovy access method and the priority transfer. The widest determination method, in addition to a special algorithm, the hour of transmission of the transmission medium is divided between the majority of computers and that of the medium. In case of a separate method of access to a merezhі, computers are stunned at the access of a merezhі. This method may be low nedolіkіv. One of such shortcomings is the loss of part of the information that is transmitted through the closed packets of information in the border. Priority Access ensure the maximum possible communication of information to the installed priority station.

Set of parameters to choosemesh technology.

In this hour, the merezh technology is widely expanded IEEE802.3/Ethernet. Wide-width won nabula, we'll forgive the zavdyaki and inexpensive technologies. It is also popular for the fact that the service of such meshes is simpler. The topology of the Ethernet network will sound like “stars”, like “tires”. The medium of transmission in such arrangements is as thin as it is coaxial cables, as well as twisted pairs and fiber optic cables. The length of the ethernet line sounds from 100 to 2000 meters. The speed of transmission in such networks is close to 10 mb/s. At Ethernet networks, the CSMA/CD access method must be switched on, so that decentralized, variable methods of access to the network are enabled.

Use also high-quality options Ethernet: IEEE802.3u/Fast Ethernet and IEEE802.3z/Gigabit Ethernet, Which ensures the speed of data transmission up to 100 Mb/s and up to 1000 Mb/s in general. In these chains, it’s like the middle of the transmission optical fiber, or screened twisted couple.

It is also less wide, but with the help of the same technology, which are ubiquitous.

Merezhna technology IEEE802.5/Token Ring it is characteristic that all vertices or nodes (computers) in such a measure are combined in the ring, the marker method for accessing the measure, supports screened and unscreened twisted pair, as well as optical fiber how to convey the middle. The speed of Token-Ring is up to 16 Mb/s. Maximum number vuzlіv, scho for such a kіltsi, become 260, and the length of all the lines can reach 4000 meters.

Read the following materials on the topic:

Local merezha IEEE802.4/ArcNet especially tim, scho n_y transfer of data vikoristovuєtsya method of access with additional transfer renovating. Tsya merezha is one of the oldest and earlier popular in the world. Such popularity is swayed by the arrogance and cheapness of the measure. In our time, such a mesh technology is less expanded, but the speed of such a measure is low - about 2.5 mb/s. As and most of the other wires in the quality of the transmitting medium vicorist screened and non-screened twisted pairs and fiber optic cables, they can make up to 6000 meters long wire and include up to 255 subscribers.

Merezhev architecture FDDI (Fiber Distributed Data Interface), based on IEEE802.4/ArcNet and may be very popular through its high arrogance. This mesh technology includes two fiber optic rings, up to 100 km. With whom so bezpechuetsya high speed transfers in a single connection – close to 100 mb/s. Sensation of the creation of two fiber-optical rings for those who can pass the way from the reserve with one of the rings. In this way, the chance of wasting information that is being transmitted is reduced. Such a network can have up to 500 subscribers, which is also an advantage over other network technologies.

Material from PIE.

Modern mesh technologies have adopted a new technical revolution. The creation of a single network of computers is given the same significance as the life of Swedish highways in sixty years. That computer network is called "information superhighway". Supporting the vigo, as if bringing merezh to all the coristuvachi, Microsoft talk about information "at the fingertips".

HIGH-SCREEN DATA TRANSMISSION CHANNELS

For transmission, high-speed X.25 and ISDN channels can be used. ISDN (Integrated Services Digital Network - Digital network with integration of services) allows representatives of different countries to organize video conferences and discuss problems that need to be addressed without expensive charges. To implement remote access to the computer, insert digital communication adapters, and the most common adapter for ISDN is a richer, lower modem. Broken special software that allows Windows 95 and її Internet browser practice with ISDN. It can be found and viewed free of charge on the World Wide Web server at http://www.microsoft.com. During the hour in Rosіi, Budіvniktvo Zagalnonenty Digital Digital Digital Merezhі z Vyivati ​​for the Cordon, Yaka Zakasya Nadavati Lvodzіyniya ISDN Ta Tone to Force Distania Access to Kіntsemi Korhuvachivs to Local Merezh's rydpromnocysts, so that - 128 Kb/s. Unfortunately, the implementation of ISDN is fraught with a great number of difficulties, and the need to build special lines is necessary.

LOCAL METERS

A computer that connects to a network is called a work station (Workstation), a computer that provides its resources - a server, a computer that can access resources, that can be fully exploited - a client. Dekіlka kom'yuterіv, roztashovanіh in one place or functionally vykonuyat the same type of work: accounting or planning form, registration of products, what to find, etc., connect one to one and combine in working group so that the stench could use different resources together: programs, documents, printers, fax, etc. The working group is organized in such a way that the computers that come before it have all the resources necessary for normal work. As a rule, in a working group, which includes more than 10 - 15 computers, they include a vision server - to download a hard computer, on which all directories and special software for managing access to all or any part of it are downloaded. Groups of servers unite at the domain. Koristuvach domain can be registered in the same working station in the same domain and gain access to all resources. Ring all printers at the server links, which are coherently connected, connected to the servers to each other. At a glance, the organization of interoperability of computers, links are divided into peer-to-peer (Peer-to-Peer Network) and with a visible server (Dedicated Server Network). In a peer-to-peer network, the skin computer plays an equal role. However, the increase in the number of computers in the merezhі and the increase in the obligation of the data that are being sent, to bring it to the point that the throughput of the building of the merezhi becomes a big mess. Windows 95 is guaranteed to us in front of peer-to-peer networks, support for the robotic computer as a client of other networks. Windows 95, like Windows for Workgroups, can override Merger Server functionality. Safeguarded by the confusion with old MS-DOS and Windows 3.g. The new operating system allows you to: split multiple disks, printers, fax-pay, organize peer-to-peer local billing networks (LAN); win back access and transfer office computer to the server that calls; trim 16-bit intermediary drivers DOS. The administrator of the fence can set the overall design of the decking system, determine which operations will be available for the fence and control the configuration of the decking system. Merezha, spread over a relatively small territory, is called local (LAN - Local Area Network). In the rest of the world, the complexity of the LOM structure is considered to be a combination of heterogeneous meshes, which unite different computer platforms. Possibility of holding videoconferences and using multimedia vimogi to software security measure. Modern servers can save large binary objects (BLOB) that can store text, graphics, audio and video files. Zocrema, if you need to take a look at the data base of the given personnel through the border, then the BLOB technology will allow you to transfer not only personal data: nickname, name, according to the father, river of the people, and the portrait in digital form. Two technologies of the server swipe tower Two technologies of the sever server are distinguished: the file server technology and the client-server architecture. The first model has a file server, on which more programs are stored. Vimoga koristuvacha youmu is being overpowered required program that data. The processing of information is collected at the working station. In systems with a client-server architecture, the exchange of data is between the client-adapter (front-end) and the server-addition (back-end). Saving data and processing is carried out on a hard server, which also controls access to resources and data. The working station takes less than the result of the request. Retailers of programs for processing information should be called vicorist tsyu technology. The choice of the great collaborative programs has led to the development of a rich, modern architecture with data placement on a data base server (DB). Mustache to go to the data base through the addendum server, de stink unite. The speedy number of downloads to the database changes the license fee for the DBMS. Desktop management interface (DMI) To simplify the installation, protection and administrative management of measures for the support of a unified set of application programming interfaces API and features remote care, Microsoft, IBM, Novell, DEC, HP, Sun and Synoptics have developed the DMI (Desktop Management Interface) standard. The standard for transmitting the possibility of remote updating of programs recorded in ROM, managing groups and other clients. Conversion to the standard to speed up the variability of exploitation local mesh for the speedy work of the state and the improvement of the efficiency of yoga work.

GLOBAL METERS

A local border can be a part of a global border, as if gaining more and more recognition from the whole world. The development of sobіv masovoї іnformatsії і kommunіkatsіy spriyaє dnannyu people, yakі live on raznyh continents, vіdpovіdno to їхніхіхіхіїв. Ninі promyslovno-razvinenі krai attach great respect to the creation of a single informational medium. The creation of an informational superhighway to make it easier for the future aggregation of people, as if to have shared interests, but to change at different little corners of the earth's backwoods. The prototype of such a superhighway can be the Internet, which provides services to millions of coristuvachiv in the whole world.

TECHNOLOGIES THAT ARE WINNING ON THE INTERNET AND INTRANET

In Denmark, the hour is one of the prioritnikh directly Roboty Fіrm, Shahko is a program for slaughter, є іntigruvannya Local Merozі ідприствиства іntranet (Intranet), in Yakiy Vіdbuvyuyu, the main robot of the company, Global Mezhoye, in order, the Schos_drobtnikhtniki P_dpromnia, could easily be able to determine their document in the format of HTML (HyperText Markup Language) and refer to other documents. The organization of virtual corporate merezhs, which are based on the Internet, allows you to buy all the branches of post-employees and assistants, without creating an independent mesh infrastructure. Integration of corporate Intranet and global networks is based on the same type of methods of collecting and submitting information. The computer's file system was inspired by the hierarchical principle, which transfers the tree-like structure of data storage. Web servers The Internet may use a hypertext scheme for presenting data that transfers documents to other documents, which may have explanations of various terms, illustrations, audio files and video clips. The standard for such documents is HTML. The text-to-speech technology software is being developed - translation of the text in the voice prompt. With the remaining fates, Microsoft propagated low new technical solutions, which would ensure the work of the Internet hacker. Jointly with Intel Corporation Microsoft is developing a new protocol that will improve the way audio and video information is transmitted over the Internet. Protocol based on the ITL and Internet Engineering Task Force (IETF) specifications will include the following protocols: T.120 for document conferences, H.323 for audio and videoconferencing, RTP/RTCP and RSVP for Internet teleconferencing control. Significantly, a number of telephone companies of the Bell Group (RBOC) filed a protest with the Federal Telecommunications Commission (FCC) against the use of audio technology on the Internet.

Significance of the Internet.

It became obvious what the sphere has information technologies The innovation process is taking place at an unbelievably high pace. "Yakby since 1971, the car industry developed so quickly, like microprocessor technology, then the car today vzhe rushing bi zі shvidkіstyu 480 yew. km/year and saving 1 liter of paliva at 335 yew. km probіgu" - so figuratively commended the pace of scientific and technological progress at two leading industrial companies of the United States fakhivtsі company "Intel", a world leader in the field of microelectronics tempi, with some stretch of the last three years, a transnational network of the Internet is being formed. new way human intercourse, which can be called horizontal. Prior to this, there was a combination of that broad information. Basically, vertical: the author writes a book - read and read. The radio and TV broadcasts are transmitted - by the lookers, and the listeners hear and marvel. Newspaper other news - prepayers to read. Zvorotniy zvorotniy zv'azok mayzhe bov vіdsutnіy, wanting the need for her bula vignatkovo temple. About tse check the sheets in the newspaper, applications and reviews on the radio and television station, etc. The exchange of information between the readers of a particular book, the listeners of a particular program, is practically unimaginable. The Internet provides a wide range of information for a practically unfettered stake of the survivors, and the stench can easily be included in the discussion. Give the Internet a unique opportunity for vertical information communication: between the government and the people, zvorotny zv'azku the rest of the first. Behind the wide promotion of the Internet, our life does not have a single organization, All-world merezh as a phenomenon develops independently, the engine of the Internet is all people. The main idea of ​​the Internet is the expansion of information and the establishment of links between people. The most effective way of arranging racial, religious and ideological barriers between people, countries, peoples. The Internet is one of the most important democratic access to the technological process. With the appearance of information, it becomes a potential bait for a large number of people. All global communications connected with the telegraph, telephone, radio, television stations and computer technology, they are integrated into a single entity - the Internet. Mova go about the mechanism of expanding information, uniting people of those їх vzaєmodії independently in the country, timchasovyh, sovereign and rich other cordons.

History of the Internet in Russia

The history of the Russian Internet is resurrected from the beginning of the 80s, if the Kurchatov Institute was the first in our country, having cut off access to light networks. The Internet in Russia, like in the whole world, the Daedalus is becoming more an element of the life of the society, it is clear that the Daedalus is more similar to the society. At once to the Internet you can spend 300-400 yew. computers in Russia and SND, and their number is constantly growing. For the friendly minds of the Russian audience, it can appear significantly larger, for example, German. Russia already has more variety of Internet services. Acts (services of novelties, for example) have already been mastered and may not be compromised by the American ones. The best-served Web-servers of Russia can already boast of hundreds of thousands of post-readers. It’s indecently torn, for example, from a business paper press. And if the Internet and TV audiences are evenly matched, then the success in rich vipadkah can be seen first. The Russian audience of the Internet, so do not take into account the amount of that absolute equal income, for other parameters it is practically not considered the American one. Typical koristuvach Web-services are considered to be active in the social and economic sphere of the population, smart to the point of new opportunities for the development of specialty and business, and also positively projected to the reforms that are being carried out in Russia. At the development of the Russian Internet, in a flash, I repeat the stages of the development of the light chain. In the last two years we created a streamer up to maybe 2500 new servers. Go to Yahoo, one of the most popular directories on the Internet. In different regions (country regions), on the contrary, the skin point has a number - the number of messages. And you change, as if looking at a Russian division. The speed of growth is close to the best showings in the world, even though it is streamed by the singing world with problems of communication and traffic schedules in the vacancies of the Internet. If you talk about the riven of the informational backlog of the Russian Internet, then wine, obviously, will be significant. The Internet is a business card of the country. The Russian Internet is guilty of uniting all Russian koristuvachiv, but saving and rozpovsyudzhuvach our culture and our language. It is necessary to increase the comfort of the informational space, in which we live one of the warehouses of the wild level of human life. To the main problems of Russian coristuvachiv, we can bring us forward: a. presence of a single standard, (which, perhaps, if you don’t do it, the docks of Russia will not become a proving world power in the region computer technology), on the coding of Cyrillic symbols, to make the programs crazy. As a result, tі, hto rozpovsyudzhuє in the Internet text information Russian my duty to represent її in decal codes, as a rule, three or more, for the main operating systems: MS Windows, UNIX (KOI-8, OS / 2, MacOS), which means an increase in labor costs for the preparation of documents. In a different way, a koristuvach, having gained access to information, cannot speed it up. b. the presence of Russia, the distribution of telecommunications systems and the low quality of telecommunications services. The rate of access to the Internet via switched telephone lines with a speed of 14400-28800 bps in Moscow is on average 3-5 dollars per year. In the United States - 1 dollar per year and less (with an inconspicuous rate). A high-quality enterprise, which allows vicoristovuvat all the potential of the Internet to the Russian coristuvachev cost dozens, and sometimes hundreds of times more expensive, lower than the American wheel.

The work of the program on the Internet

Programs that work on the Internet will be based on Java technology, as it includes Java programming language, virtual machine Java and Web Browser Java programs. Mova Java is best suited for working with HTML sides. Vіn allows you not to be surrounded by a simple browsing of Web-sides, but allows you to organize interaction between interactive programs with koristuvach. Technological extension of Java - Java DataBase Connectivity (JDBC), recognized for intramerge, allows Java add-on to be transferred directly to the server, which can be transferred from the local merge. The concept of Cascade Style Sheets (CSS) has been expanded, which defines the styles that are used when developing HTML pages, parts of them and other elements. It can be found at http//www.w3org/pub/WWW/TR/WD-style. ActiveX ActiveX technology is the next step in OLE development, it is recognized for creating interactive programs for the Internet and internal solutions. She supports programs on move Java and OLE components. ActiveX is based on COM (Component Object Model) and allows the administrators of the parties to create documents and create sound and video effects. Key ActiveX controls provide Windows-based software functionality to interact with the Web. The Distributed Component Object (DCOM) model allows distributors to create add-on components that interact one by one over the Internet. ActiveX with an integrated module (plug-in) is included in Internet Explorer 3.0. Encoding characters on the Internet To encode Cyrillic characters on the Internet, it is important to encode the encoding: KOІ8 (KOI8) - encoded mainly on computers with UNIX OS, but not supported by Windows. To solve this problem, it is recommended to install additional KOI fonts and special keyboard drivers such as Cyrwin. СР-1251 - zastosovuetsya Microsoft on Windows, nabula wide-spread on PC IBM-mad computers. СР-866 - zastosovuєtsya more importantly on computers running MS-DOS. ISO-8859-5 - enforced for UNIX crazy systems. On most servers, you know the first two codings. The problem of using Cyrillic on the Internet is explained by the fact that Russian letters are coded in operational UNIX systems that Windows don't run. The problems that are blamed when coding on KOI8 are reportedly reviewed on the WWW-side at the address: http://www.nagural.ru/~ache/koi8.html.

ELECTRONIC MAIL

The association of computers in the merezh allowed organizing documents in a new way, both in small firms and in great organizations. Vіdpala need drukuvati on paper documents, over yak pratsyuє kolektiv koristuvachіv. For help software the staff of the correspondents can jointly fold documents, presentations and transfer data bases by electronic mail to other participants in the project, so they can send them to the same house or to another place, for additional editing. Pochergovu rozsilannya allows you to specify the order of passing through the review between the participants of the project after further addition that editing. Such a method of collective work on a document saves a significant part of the working hour, which does not require an hour to spend on special writing. sleeping room. Today's acceptance is impossible to manifest without a full vindication of data and arbitrariness of the guaranteed protection of information. Protocols that are victorious by electronic mail electronic notification Simple Mail Transfer Protocol, SMPT and I will accept Post Office Protocol, POP. BRIDGING OF OPERATING SYSTEMS Microsoft has made Windows the most suitable platform for telecommunications and access to the Internet. Windows 95 to revenge the great number of drivers mesh cards those tools, recognized for keruvannya by a fence. The single interface of the coristuvach is practically not to be found in the type of mesh, which is supported. Before working with different measures, it is necessary that the operating system supports their protocols, so that. a set of rules (mova splkuvannya kom'yuterіv), scho vykoristovuyutsya pіd hі prіdachі information. Merezhevy protocol defines routing methods, addressing methods, and so on. Windows 95 may support extended network operating systems: Windows NT Advanced Server by Microsoft, Novell NetWare, LAN Manager, LAN Manager for UNIX, LANServer by IBM, 3+Open and 3+Share by 3Com, VINES by Banyan, Pathworks by Digital The operating system allows the storage of heterogeneous mergers and the secure support of a significant part of 32-bit popular merging protocols: TCP / IP, IPX / SPX and NetBEUI and drivers ND1S 2.x, 3.x or ODI TCP / IP protocol (Transmission Control Protocol / Internet Protocol) works for an hour with global Internet-type and Microsoft-type networks The IPX protocol gives you the ability to connect to NetWare file servers. different types: PPP (Poinl-to-Point Protocol) Serial Line Internet Protocol, NRN (NetWare Remote Node) and new twill protocol Point-to-Point Tunneling Protocol (PPTP), broken up by Microsoft together with 3Com. The protocol allows the creation of virtual private networks (VPN) over lines that are switched, and the transfer of encrypted networks over the Internet. PPTR wins when organizing a "tunnel" for an hour of communication in the distant koristuvachiv with your own corporate measures over the Internet. Vіdpadaє nebhіdnіst y soshcha-pії pridpriєmstvam vlasnoї globalі іnfrastrukturі, schob niknutu іnformatsії. Guaranteed protection of information is ensured by well-recommended and distorted methods of authentication and encryption, introduced into the Windows NT Remote Access Service. Nedolіk Windows 95 believes in the fact that the server, what it communicates with, under the care of the operating system, it installs only one day at a time. To ensure greater productivity and flexibility as a server for remote access, it is recommended to turn on Windows NT, as it ensures up to 256 one-hour calls and parallel routing.

Topic 4 Merezhev and Technologies

Be-yake enterprise - ce sukupnіst vzaєmodіyuchikh elementіv (pіdrozdіlіv), kozhen іz yakіh mаte mаte іѕ structure. The elements are related to each other functionally, tobto. stinks vikonuyut okremі vidi robit within the framework of a single business process, as well as information, exchanging documents, facsimile notifications, letters and orders. In addition, these elements interact with external systems, and this interaction can be both informational and functional. In this rank, the process of functioning of various businesses has a more complicated bagatorial system with connected links, not only between the ararchical equals of the businesses themselves, but also with the credit system, the system of sovereign tax-bearing services, key partners

The complexity of the system is aggravated by the fact that it is roared in significant territories, with a large number of participants, which belong to various departments, which is indicated by the peculiarities of their informational interaction.

For such minds, the priority tasks are: the organization of effective interaction between all participants in the business for the help of victories, counting and telecommunication benefits, which establish the technology of processing information at enterprises and organizations.

Merezhna technology- Supplement of software, hardware, and organizational facilities that secure communications and account for the number of PC resources connected to the enterprise.

Merezhna technology effective tool business, so as to provide managers with the necessary service for the collective improvement of the tasks set, in order to achieve a greater level of success, to secure access to them from a distance, to organize a single information space for all business participants.

In the development of a single information space, the organization of the merging technology is guided by the following directives:

Integration of various hardware and software complexes in all business participants. At the initial stage, the development of the data transmission system of the information manager in interdependence was connected to the information servers in the four terminals of the coristuvach with the transmission of data via switching or video channels and telephone lines. Today there is a need for joint ventures one type of one local counting measure participants in the business through the Shvidkish channels of communication.



The creation of a subsystem of electronic document management, which includes not only transmission electronic documents from one to the other, and the automation of their processing (shape, saving, technology of collective document processing) and the creation of a manual graphic medium.

Selection of highly productive technical and software tools, development of supplements on the basis of implementation modern technology"Client-server".

Ensuring the security of data during the processing and transmission of information in the process of implementing a business business.

Modern merzhe technologies continue that of vinyl like the 1970s. The trend towards the development of distributed processing of data The first stage in the development of such methods of processing information became rich machine systems, like a collection of counting machines of different productivity, connected to the system for an additional channel link. The main stage of the development of technologies for the processing of data has become the number of measures of various equals - local and large-scale, as it has become the basis for the organization of the merging technology for the promotion of management tasks at enterprises and in organizations.

In a wild look, there is a system of interconnected and divided PCs, oriented on a collective choice of hardware, software and information resources.

Information resources of the city are a database of global and individual zastosuvannya, focused on tasks that are found in the measure.

Hardware resources fold computers of various types, arrange territorial communication systems, communication equipment and services, and measures of one and the same equal or different equal.

Software resources are a set of programs for planning, organizing and developing collective access of coristuvachs to deep sea resources, automating the processes of processing information, dynamic distribution and re-distribution of deep sea resources with the method of increasing efficiency and reliability of satisfying the core.

Appointment of calculation measures:

Secure the right one swedish access koristuvachіv up to the resources of the merezhі and organize the collective exploitation of these resources;

Ensure the possibility of prompt transfer of information to any country for the timely collection of data for the adoption of administrative decisions.

Counting measures allow you to automate the management of other organizations, businesses, regions. MOGLYAVIST RUSSIANSIKI IN RELIABLE INFORMATION OF VERSEVIY ONNAYAYA INFORMATIONS, Zagalnunostostysti Qiqih Dones, and software of the program TA APAPERIKIY FROM TRUCKING TO TAYS OUTLICH ONINIST FUNCHYONUVENNEY - ALL CENTER DOZVOLOGE ІNFORMATSIONE SERVICEVAVYANDY CORRIVOVACHIVA TA RІZKO PIVOBERS EXPENTIONNIKE TECHNIKI.

The list of counting merezh nadaє such feasibility:

Organize a parallel processing of data from the dekilkom of the PC;

Create rozpodіlenі databases, like in the memory of different computers;

Specialize okremі computers for the effective rendition of the singing classes of the task;

Automate the exchange of information and programs between other computers and wireframes;

To reserve the calculation of the strain and the transfer of data on the way out of the fret of the few resources in the measure with the method of the normal renewal of the normal work of the measure;

Re-calculate the number of tensions between coristuvachami merezhi zalezhno due to changes in their needs and foldability of roses;

Operate the robot in different modes: dialog, batch mode "request-request", modes of collection, transfer and exchange of information.

In this rank, you can vіdznachiti scho osoblivіstyu vikoristannya obchislyuvalnih trammel Je not tіlki nablizhennya aparatno zasobіv bezposeredno to mіsts viniknennya that vikoristannya Informácie, ale th podіl funktsіy obrobki that upravlіnnya on okremі skladovі of metoyu efektivnosti rozpodіlu mіzh dekіlkoma personal komp'yuterami and takozh zabezpechennya nadіynogo access koristuvachіv. up to calculus information resources that organization of collective exploitation of these resources. With this, up to the counting lines, sings of vimogi hang:

1. Productivity calculation measures are estimated from different positions:

Hour of reaction of the counting measure, under any understanding, the hour between the moment of vindication will be quenched by that moment of withdrawal of the vіdpovіdі. The hour of reaction is to lie down in the presence of various factors, such as service and steps of the interest of the company, or okremikh її segments, etc.

Throughput capacity counting measure depends on the amount of information that is transmitted through the mesh or segment per hour. The throughput of the building of the measure is characterized, as it is a quick calculation of the measure, it can be used to transmit information.

LOM segment- a) a group of outbuildings (for example, PCs, servers, printers, etc.) 6) LOM yard, built-in to other yards by repeater, concentrator, bridge and router. All stations of the segment support the same protocol for access to the transmission medium and share the same total bandwidth.

2. arrogance work and counting measures are characterized by such characteristics:

- vіdmovostіykіst all її components. To improve the reliability of the robotic equipment, call vicorist dubbing, if with the help of one of the elements of the functioning of the measure, you will be safer;

Security of information security and defense of її in the wake of the day;

Security of data, which is protected by the protection of information from unauthorized access, which is implemented by a way of winning specialized hardware and software.

3. Keratinism- the ability to control the station of the census of the calculation of the measure, to reveal and solve the problems that are to be blamed for the work, to analyze and plan the work of the measure.

4. Expandability characterizes the possibility of adding new cements and nodes to the number of measures, the possibility of physical expansion without an overall decrease in productivity.

5. transparency enumeration of the lines transferring the attachment of the features of the line in the kіntsevogo koristuvach in such a way, so that the fahіvets instantly turn up to the resources of the merezhі, like to the greatest local resources of the personal computer, on which pracciuє.

6. Integration means the possibility of being connected to the calculation of the number of different types of possession, PZ in different varieties.

As practice shows, for the expansion of the possibilities of data processing, the best resource utilization and the increase in the reliability of the functioning of IT in general, the variability of processing information in the counting measures is not less, lower for the second time, and lower for the computer data processing.

The largest width was taken by three main types of counting measures - local, corporate, and world.

Merezhev technologies

Merezheva technology - the benefits of typing standard protocols and software and hardware tools that are implemented, sufficient for stimulating counting.

Protocol- tse set of rules and favors, initially, as at the border, I will add money to be exchanged.

Today, such intermediary technologies are dominant: Ethernet, Token Ring, FDDI, ATM.

Ethernet technology

Ethernet technology was created by XEROX in 1973. The basic principle underlying Ethernet is a single access method to the data transmission medium (multiple access method).

Logical topology Ethernet networks zavzhdy tyre, at vyazku z tsim data are transmitted to all universities of the merezh. Skin vuzol to sue the skin transfer and recognize the recognition of your data at the address of your lace adapter. For skins, an hour is less than one vuzol, you can make a successful transmission; This is what is called the Ethernet standard.

The world is growing more and more interested in the importance of transmitting data at the same time. If this is the case, two transmissions enter the conflict, filling the bus with informational messages. Such is the behavior of the house under the term "collision", so that the conflict is blamed.

The skin transmission system, having revealed the collision, negligently takes over the data, and hesitates to correct the situation.

If you want more numbers, which are blamed on typical Ethernet networks, are allowed by a stretch of microseconds and they are naturally cleared up, but the main shortfall is essentially the fact that the more traffic the network has, the more the number, the less the product can fall , so the yard is clogged with traffic.

Traffic- Potіk povіdomlen at the merezhі transfers of data.

Token Ring Technology

Token Ring technology was developed by IBM in 1984. The technology of Token Ring victorious calls for another way of access. The logical dimension of Token Ring has a ring topology. Special notice, like a token (Token) - this is a special three-byte packet, which is constantly circulating along the logical circle in one straight line. If the marker passes through the vuzol, ready to transfer the data to the measure, the marker is buried, it arrives to the new data, the sign of the transfer, and then we transfer the notification again in the ring. I inform you that you will continue your "prior" along the ring, the docks will not reach the place of recognition. Until the notice is accepted, it is impossible to resend the data. This method of access is known as the transfer of a token. Vіn including kolіzії аnd enough periods of ochіkuvannya yak Ethernet.

FDDI technology

FDDI (Fiber Distributed Data Interface) technology - fiber optic data distribution interface - is the first technology of local networks, which has a fiber optic cable as a transmission medium. FDDI technology is rich in why it is based on Token Ring technology, developing those fundamental ideas. The FDDI network will be based on two fiber-optic links, which will serve as the main and backup routes for data transmission between the nodes of the network. The presence of two quarters is the main way to increase the stability in the FDDI and universities, if you want to speed up the promotion of the potential of the superiority of the fault, but the connection to both clusters.

In the normal mode, the work of the data is to pass through all the nodes and all the substation to the cable, only the primary circuit, the secondary circuit this mode do not vikoristovuєtsya. What does it matter to be of any mind, if a part of the primary ring is impossible to transmit data (for example, by shaving the cable of the top of the knot) the primary ring unites with the second one, re-establishing a single ring.

Rings in FDDI links are seen as a common medium for data transmission, and a link to it has a special access method that is closer to the Token Ring access method. The difference lies in the fact that the hour of the token's deletion in the FDDI measure is not a constant value, like in Token Ring. It will fall due to the interest rate of the ring - with a small amount of interest, it will increase, and with a large increase in interest, it can change to zero for asynchronous traffic. It is important that for synchronous traffic the hour of the marker's morning is filled with a fixed value.

ATM technology

ATM (Asynchronous Transfer Mode - asynchronous transfer mode) - the most current merezhnaya technology. It is divided into transfers of movies, data and videos with additional high-speed, oriented installation of the protocol with switching of the middle lines.

On top of other technologies, ATM traffic is divided into 53-byte middles (cells). Zastosuvannya structures of data of the appointed rozmіru to rob the fringe traffic more easily vanquishing kіlkіsno, transferring takerovanim. ATM prompted the transmission of information over a fiber optic cable with different mirror-like topologies.

Merezhev technologies - understand that you see. Classification and features of the category "Merezhev technologies" 2017, 2018.

  • - Merezhev technologies for transferring information.

    Modern transmission systems - the total number of measures. The totality of all subscribers of the counting line is called the subscriber line. Set up a connection and transfer to establish a transfer line (Fig. 2.1). - endowment of these subscribers... .


  • -

    In this hour of May, there is a wide appearance on the domestic market of computers and software for neuropackages and neurocomputers, which are used to complete financial tasks. These banks are such great financial organizations, which are already neuron... .


  • - Merezhev tekhnologii”

    The gallery of computer technologies in the last two decades did not, singly, more actively develop directly, lower the development of that development of numbering, which laid the foundation for the so-called mesh technologies. Sposterіgavsya all tsі rocs gurgling ... .


  • - Neural network technologies

    The knowledge base accumulates in the process of creation and operation of the expert system. The peculiarity of the information technology of expert systems is the inconsistency of these two warehouses. Scheme of accumulation and recovery of knowledge in the course of system operation.


  • - information technology

    To the most important computer blockages, the network is arranged, so that they provide a single information space for rich coristuvachs. The association of computers at the border allows you to combine high-capacity disks, printers, the main ... .


  • - Neural network technologies in financial and economic activity

    At the warehouse of technologies of the intellectual level, there is no room for analytical information technologies that belong to the class of neural networks. Algorithms are laid at the basis of neural networks, which can build up to self-learning on butts, like stench ... .


  • - Neural network technologies

    Neuroscience technologies are a complex of information technologies based on a cluster of piecewise neural networks. Pieces of neural networks are software and hardware implementations of the system, inspired by the principle of organization that ... .


  • © 2022 androidas.ru - All about Android