Local computers. Presentation from informatics "local and global computers"

Zharoznizhuvalny for children is recognized as a pediatrician. Allegedly, there are situations of inconvenient help for feverish women, if the children are in need of giving innocently. Todi dad take on the versatility and constipation of fever-lowering drugs. How can you give children a breast? How can you beat the temperature of older children? What are the best ones?

Technology. 10 class Rozdil "Information Technologies"
LOM: singing, viznachennya ponder
Administration LOM
Hardware warehouses LOM
LOM topology
Peer-to-peer and two-rank LOM
Automated work tasks in LOM
Corporate LOM
Merezhі vіddіlu, fathoms of the campus and corporate fringes
Telecommunications for communication from distant CROWBAR
Apply a global call to the distant CROWBAR

Technology. 10 class Rozdil "Information Technologies"
Approximately 20 years ago, set them up and unplug computers from the fancy
for special information processing.
The emergence of computer frizzy
allowed to speed up the exchange
information
Local framing
koristuvachami and more
effectively vikoristovuvati
computer technology
File Server
Zmist

Technology. 10 class Rozdil "Information Technologies"
Local numbered hem(LAN) - chain,
one computer on a small
territory - in the middle of one attachment, on top,
wake-ups or groups of compact wake-ups.
Territorially, it can be extended up to 1-2 km.
For the name "local hem" vikoristovoyt
the English term LAN - Local Area Network
LAN
A local hedge allows the socially victorious use of the resources of computers,
as for the Danish moment of plugging in to the net.
Zmist

Technology. 10 class Rozdil "Information Technologies"
Great LOM control system administrator... Winning accessibility steps
resources, which provide passwords for access to resources, the rights of koristuvachiv.
Administrator
A group of sportsmen who work over one
Coristuvachi LOM
Nalashtuvannya
(policy
fathoms)
a project within the framework of LOM, called
working groups.
In one LOM there can be a group of small groups.
All participants can have legal rights
access to home resources.
The sufficiency of accepting the basis and interchange of the rights of the participants in the net is called the policy of the net.
Keruvannya with hedgehogs (it can be a spike in a hedge) - administering hedgehogs.
Person, yaka keruє organizing robots participants in LOM - system administrator
Zmist

Technology. 10 class Rozdil "Information Technologies"
In order to transfer to the local hedge, the skin computer, to enter before her, is guilty of the mother:
I will use a card (mesh adapter);
lace cable;
the operating system, which I will adapt
to a robot in a pattern (for example, Windows, Linux too).
Merezhev_ pictures and cut-through cables - the main part
hollow possession.
Knitting adapter preset - transfer of knitting
signals from the cable. SPRIME COMMAND ADAPTER
data from a low-level operating system,
Merezhevi
picture
information in one of the standard formats and transmission
її in the hem through the connection to the adapter cable.
Zmist

Technology. 10 class Rozdil "Information Technologies"
At local hedges through short roads
high-quality lines. That is given to the temple the swiftness of the exchange of data - order
100 Mb / s. When the LOM line is prompted, the call will be re-laid and
cables (on great walls near global fences, the stench is often economically unavailable):
CABLES
coaxial cable,
line connection
the pair is twisted,
fiber optic cable.
Twisted steam
Tovsty
coaxial
Thin
coaxial
Fiber optic
Мідні electrical cables
(most extended)
The cable is stored from the conductor, ball in the screen and
Isolation. The cable should also enter the warehouse with roses for
Warehouse for cable: provider,
Shari Ekran, Isolation
connection to a stitching possession.
Rose for connecting to a stitch
possession. Numbering at roses
Zmist

Technology. 10 class Rozdil "Information Technologies"
Table "Characteristics of cable lines"
Link type
Shvidkist,
Mbps
Speed
Vita pair of wires
10-100
low
Coaxial cable
to 10
temple
Telephone line
zalny koristuvannya - PSTN
Fiber optic cable
(fiber optic lines)
connection - VOLZ)
1-2
10-200
low
absolute
Nosii
information
Zminny
electric strum
lower frequencies i
waveforms
Svitlovy promin
(modulations),
let go
laser
She is a provid
A pair of insulated twisted darts
(screened or non-screened)
Isolovana midna vein, ekranovana
metal wrapped around
Double-core dots of subscriber
line and heavy-duty telephone cables
Porous nunny guides (svitlovodi), pokrit
in the middle with a loud speech
Zmist

Technology. 10 class Rozdil "Information Technologies"
Computers, scho to enter the LOM, can be done in different ways -
topologies.
Merezheva topology is a chain of links in a computer grid, tobto. type of education
line call. There are 4 main topologies:
Topology "Point-to-Point" - simplest.
For such organizing of the hedge, it is stored for 2 computers,
without pre-connected one to one.
The popularity of such an organization is simplicity and
very cheap.
There is a lack of such organization - even so
This rank is possible for all 2 computers.
Zmist

Technology. 10 class Rozdil "Information Technologies"
For such organization of the hedge to be built
from a number of computers,
leather fittings to sleeping pads
tire transmissions.
The rollers of the bus have a coaxial cable.
Golovny nedolik: I'll shave off an hour
shine all vuzli fathom vrachayut tinkles.
If you need to connect more than one university
at the edge, then for an hour editing robots
the ring will also be consumed
Zmist

Technology. 10 class Rozdil "Information Technologies"
Such a hedge is stored from a number of computers,
leather from any connections to the cable, closed in the ring. The signal is transmitted on the clock
one straight and go through the computer to
computer. The computer, which has taken out the signal from
a solid car, if you can
distance by day. Tse vidbuvaatsya, leave the signal
do not go to the computer, which is addressed to.
Nedolik - yakshho hocha b 1 computer can be changed
pratsyuvati, pinning pratsyuvati all the framing, that hour
signal transmission before the required vehicle is cleaned
get better in porous with sieve
ways of connecting computers to fancy
Zmist

Technology. 10 class Rozdil "Information Technologies"
Where to store from a number of computers, leather from any connections
to the very central annex. Such pristіy
changed the name to HUB. The head part of the topology chain -
when the HUB goes out of the way, the universities receive calls.
The main route is the possibility of switching
new universities are not
digesting the robot
higher education institutions Through the most important
overwhelming type of hedgehog
in front of them, as well as through
very low
sobivarosti, taka
organizing the hemispheres є
nyposhiren_shoyu.
- HUB
Zmist

Technology. 10 class Rozdil "Information Technologies"
If more than 10 computers are connected to the local mesh, the mesh can be
to appear inadequately productive.
For increased productivity
doyaki computers see
for saving files
software programs.
Server
HUB
Server
These computers are called servers, and
local fingering - based on the server.
Zmist

Technology. 10 class Rozdil "Information Technologies"
For the nature of the function, there are 2 types of hems:
Peer-to-peer hedgehogs are small
Merezhі with video servers (two-ranked)
local hedge, in which mustache
middle and great hedgehogs, in some parts
computers є
Visible functions of station service
functionally equal.
deposited on the server (LAN with a file server).
Let me turn on until
15 stations
Most servers are characterized by types
vikoristovuvanih at some fancy services (servers).
Zmist

Technology. 10 class Rozdil "Information Technologies"
Central topology and file server for new working groups.
One central server is also victorious for all fences.
File
server
Zmist

Technology. 10 class Rozdil "Information Technologies"
Peripheral attachments to the server can also be connected to the server:
printers and copiers, modems, scanners, faxes, plotters too.
At firms, enterprises of the
specialization on the basis of personal
computers (work stations)
have a special automated workstation
- Automated robotics.
Falsely from category
spetsialista, scho pratsyu for the PC,
on new vstanovlyuyut special.
programmatically secure.
For example, it’s easier to organize
misce of a manager, accountant,
Kerіvnik.
Grid Printer
Zmist

Technology. 10 class Rozdil "Information Technologies"
Corporate layout scheme
Corporate fingering - the whole telecomunication
at the Single Information Space of the Structural
children of that company office. The term "corporate" means
"Merezha of the Great Enterprise". Most often corporate hemispheres are distributed among the territorially distributed ones (one-to-one).
Head of corporate design: interaction of system programs,
access to them from distant koristuvachiv.
Corporate hemlines allow organizing:
Single electronic document management
archived documents
remote access to files, attachments
druku to servers with data bases
voice transmission, video conferencing
Corporate hem
(telecomunіkatsіyne middledovische)
automatic collection of given video surveillance systems
centralization access to the Internet
granting access to global fancy tributes,
to financial trading and information systems
Zmist

Technology. 10 class Rozdil "Information Technologies"
Changes in possibilities to forgive internal
processes of the company, which give the enterprise
over competitors, but itself:
simplicity of the company;
the insight of the robotic company;
operational control of the activity of all services and
structural podrozdiliv;
shvidka that quick reaction to calls
internal changes;
access to all information resources
enterprises at the real hour;
operational call;
economy of households on international links
Zmist

Technology. 10 class Rozdil "Information Technologies"
Falsely on the scale of the enterprise, on the basis of business development
tasks to develop the number of pieces of paper, pieces of the campus and corporate pieces.
Merezhі vіddіlіv - tse nemezhі, as vikoristoyutsya at times by a small group
spіvrobіtnikіv, who practice in one view
enterprises. Tsі pratsіvniki virіshuyut
deyakі zagalny zavdannya lead
accounting oblik to deal with
marketing. Widdil can narahovuvati to
Applying the scale to the scale
(for the hedgehog of a robotic group)
100-150 workers.
Head meta meta viddilu - subl local resources (supplements, data, laser
printer and modem). Name the number of files on May 1-2 servers, no more than 30 files
and do not follow the picture. In the case of these hedgehogs, there is a greater amount of traffic from the industry.
Not great number koristuvachіv allow storing in the net of peer-to-peer netting OS,
for example, Windows.
Zmist

Merezha campus
the edge of the industrial sector at the border
budivli (or one territory in
kilka km2).
Name in English. campus - student mistechko.
Earlier often on the territory of the studio. their miscellaneous
need. I’ll name the infection because I don’t bother you, but
Poznachayut fantasies of any enterprises and organizations).
Merchandise services include interconnection mіzh
framing viddiliv, access to foreign databases
enterprises, access to foreign fax servers,
visokoshvidk_snym modems and printers.
In the result, the spyvrobatniki of the skin viddilu
access to files and resources
hedgehog ін. відділів. Merezhy campuses
(Gateway)
secure access to corporate databases
Square, on some types of computers stink
shake up.
Butt to the campus
Philia 2
Zmist

Technology. 10 class Rozdil "Information Technologies"
Corporate heirlooms are called more
the scale of the enterprise
(the most advanced translation of the English term
"Enterprise-wide networks).
Such little ones can be used to connect a lot of computers on all territories
enterprises. Can be folded
crochet and good luck,
region.
The number of koristuvachіv and computers
you can see in thousands,
servers - hundreds.
Butt of a corporate hem
(Measure the scale of the enterprise)
Through vіdstanі mіzh hemmezhami
okremikh territories to be brought
Vikoristovuvati global calls.
Zmist

Technology. 10 class Rozdil "Information Technologies"
For data on local hems
that okremikh computers at corporate
the least amount of money used for the development of telecommunications for: telephone channels,
radio channels, satellite communication.
Organization of local adjoining fences
optimal for communication between 2-30 times
station, if a solution is needed in the region
headquarters of corporate telephony,
conference call, transit traffic
real hour abo high
intensity.
The butt of a corporate hedgehog, yak vikoristovє
satellite call
(Also called "local supputnikov fusion")
Merezha may be motivated by topologies
"zirka", zmishana.
Such fences have a resource of throughput
hello, as you can quickly
distributed between distant stations.
Zmist

Technology. 10
technologies "
Technology.
10 class
class. Rozdil
Rozdil "Information
"Information technologies"
LOM enterprises, seen great cities,
to unite at one corporate edge on the basis of
global communication lines:
1. Ob'dnannya official hem from vikorystannyam
mouthless possession
2. About'єdnannya local
the enterprise in
corporate netting on
basic rental
TV channels
3. Vikoristannya when prompted by corporate
Internet enterprises
transport center transmission
INTRANET
(dodatkovo
vivchi)
Zmist

Presentation on the topic "Local computers" from informatics powerpoint format... In the course of presentations for schoolchildren of 10-11 grades, we will discuss the hardware and software for securing local computers. The author of the presentation: Makarova Ayini Oleksandrivni, student of the 10th grade.

Fragments from the presentation

Local framing one set of computers and allows the criminals to spillover the resources of computers, and navigate those connected to the edge of peripheral attachments (printers, disks, modems and others).

  • Peer-to-peer local mesh with line bus topology
  • Peer-to-peer local grid with topology
  • Local server-based fingering
  • Segments of the local hedge, behind the additional router

Apparatus and software for securing provincial and non-mouthful frizzy

  • At the local wire fences, the connection of computers can also be used for an additional cable. Cables are connected up to knitted adapters Ethernet type, which can ensure the transmission of data over the local network 10 Mb / s, 100 Mb / s or 1000 Mb / s.
  • To connect to a local network of portable computers, it is often the case to connect without a mouth, if the transfer of data is needed for additional electromagnetic needs. In mouthless local fences, the central fenestration is attached to the access point. Droplets The type of Wi-Fi can protect the transmission speed of data up to 54 Mb / s, the protection can be stored from the number of connected computers and from the access point.

Often, before the start of the main presentations, the reader is motivated by the vitrahati enough for an hour for a joke of the presentation of the presentation: select frames, backgrounds, colors too. The whole contest of clicks, please, together prepare solutions for light presentations, if you want to use templates for your robot.

Why dictation sit in the middle of them? Yak dictuvati, and also to whom if? And the smut - now? Our statute is assigned to the types and options of dictations and dictations.

The idea of ​​a baby is a situation that is familiar to a skin schoolboy. Only to be led by children around the situation in a reasonable way. For some, it’s awkward to go to the gazebo and it’s okay to navigate. Їm befitting the respect of the people who are sick to their individual. The stench miraculously reflects on the power supply of the reader, it doesn’t seem to be the knowledge of the subject. Інші see discomfort that is not great hvilyuvannya, it is easy to cope with it without outside help. And the dekhto, feeling his apology, sees the rottenness and zhakh. The stench of ruining, wandering in the words і, zreshtoyu, gett-purely oblivious to the material. What is it, how can a child see if she wants to see a baby?

Fingering computer - System of interconnecting computers, designed for transmission, collection and processing of information.

Dedicated computers, roztashovanyh on small town one kind of one, name local hedgehog ... Koristuvachi may have a special access to the resources of computers, as well as may be victorious to the periphery of annexes.

  • A local hedge, in which force is equal, is called peer-to-peer .
  • As there are 10 or more computers, the increase in the productivity of the computers is specially visualized for the selection of the singing part of the information. Such computers are called servers , and the local hem is server-based mesh . What computers are called work stations abo clientele .

??? Yaka is a local hem

at office number 41?

topology .

  • The simplest option for connecting computers, if the cable is last connected to all computers and peripheral attachments, be called line bus .

The scheme of the connection of computers from the local hedge is called topology .

  • It is necessary to go to the skin computer from one central university (hub), such a variant is called zirkoyu .

The scheme of the connection of computers from the local hedge is called topology .

  • If even a large number of computers (more than 100) are connected to the net, for greater productivity, the server should be connected to ring behind the additional fiber optic cable. K_ltseviy cable supplied to a high-performance concentrator. Until now, the commutators of the second segments in the fancy are connected.

??? Yaka topology at the office № 41?

subscriber's name

razdilnik

server name

Servants of the Computers

Teleconference - exchange of information about singing topics among koristuvachi. Teleconferencing allows you to spread all over the place of your visit one hour in the middle of the middle of the bag. The skin conference is assigned to the theme.

Conference address and attachment: fido7.multimedia

Robot with files on file archive servers (review of catalogs and files, copying, viewing and updating of files). Vikoristovutsya yak rules for exchanging programs (adopted by ftp and http protocols).

Servants of the Computers

IRC (Internet Relay Chat) - Interactive performance in real time: exchange of events, typing from the keyboard between keystones, exchange of sound messages, exchange of video.

ICQ ( Internet pager) - Bilateral exchange of text information in real time.

Internet telephony - the possibility of opening a voice mail, as well as sharing a video, by text messages, files.

Internet radio - service, as it allows to listen to radio stations, as to lead the movement in the framing.

Internet TV tower - A service that allows you to receive TV channels.

Online shops - service, if you allow kupuvati, do not go outside the house. Payment is accepted either by means of a payment, or through virtual banks.

Local and global computers of the MBOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img2.jpg "alt =" (! LANG :(! LANG: MOU ZOSH №6 m. Reutov Kur'янова Ольга Олексіївна!}

MOU ZOSH No. 6 m. Reutiv Kur'yanova Olga Oleksiyivna

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img4.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна!}

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Appointed LZ Exchange of files between coristuvachami of heights Effectively vikorystannya of out-of-the-box resources: more space of disk memory, printer, scanner, software for thinner. MOU ZOSH No. 6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img6.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна!}

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: View local hedge Peer-to-peer Computers are equal. There are no more than 10 computers Merezh based on a server One computer is specially visible for the collection of files and software programs MOU ZOSH №6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img8.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна!}

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksivna Author: Zagalna scheme The connection of computers from the local hedge is called the topology of the hedge All the hedge will be based on 3 basic topologies: bus line

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img10.jpg "alt =" (! LANG :(! LANG: MOU ZOSH №6 m. Reutov Kur'янова Ольга Олексіївна!}

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Kilce Signals are transmitted along a circle in one straight line and pass through a skin computer. Perevagi: Incomplete: The cable is not a good one, and the termator is not needed.

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img12.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна!}

Municipal educational establishment ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Information about computer fences Regional fences - to unite computers in the boundaries of one region (place, country, continent). Corporate hedge - to combine computers of the same organization in rural areas and places that seize them from unauthorized access (for example, MicroSoft Network). Global computer netting- common lot of local, regional and corporate fences and including hundreds of millions of computers (INTERNET). Internet (at the crossbar from the English - with the hemlines) is a gigantic all-round computer of the hemline. Її priznachennya - make sure anyone has permanent access to any information. MOU ZOSH No. 6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img14.jpg "alt =" (! LANG :(! LANG: MOU ZOSH №6 m. Reutov Kur'янова Ольга Олексіївна Автор: IPv6- нова версія про. .." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна thumbnail" src="http://uslide.ru/images/19/25470/389/img17.jpg" alt="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Post-connection Asynchronous access via telephone line (ADSL) - temporality transmission of information (512 kbit / s), and the frequency of installation and hour of robotics. Russia has such a way of leaving only to develop. Synchronous access to the visible channel - the channel is visible, the insurance of the robotic speed (from 64 kbit / s to the number of Mb / s). For a private koristuvach in Russia, the road is happy. Connecting through a local border of a booth or a district is not a vimag of high vitrats, but you can go to the information exchange, so you can jump. For perevischennya ts'go obsyagu (traffic) - additional payment. MOU ZOSH No. 6 m. Reutov

Presentation on the topic "Local computer of a fancy" is designated for vicarious students at the training of computer disciplines by students of 1 and 2 courses. The presentation includes an understanding of local computer fences, classification, description of hardware and software security of local computer fences, modes of access to fences.

Zavantazhiti:

Front view:

To speed up the front view of the presentations, close your Google record and go to the next: https://accounts.google.com

Signatures before slides:

Local Computer Fingering

Computers of the netting for the exchange of information and information spіlnogo vicoristannya resources (printer, modem, disk memory too).

A local grid of common computers is installed in one primitive (new class, office, etc.), in one booth, or some buddies, which are close to being installed. Call the computers for a local mesh of no more than one kilometer. In the case of an increase in the number of victors, there is a special possession.

Local hedges for the way of interaction between computers are subdivided into: peer-to-peer; as seen by the server. Local framing

Peer-to-peer local net The peer-to-peer local net of all computers is equal. Outbuildings You can be connected to any computer in a net.

Aligned with a visible server The structure of a seam with a visible server

Server (in English. Server - service attachment) is a computer, which is used to generate resources between koristuvachami. Server installed tighter processor, the operative disk memory is large, the main part is saved software security that given heirloom, which can speed up all the coriander heels.

As a workstation, you want to become more productive computers with a smaller disk and operative memory.

Client-server technology is implemented in the fences from the vision server. The server is installed on the server PZ: server operating system; WEB-server (intranet organization); proxy server (securing robots with the Internet of workstations); file server (secure access to files) just. On the net from the server

At the workstation, a client program will be installed to secure: an operating system for workstations; kliєntska part of the applied PZ too. On the net from the server

The most widespread are such methods for connecting computers: a bus (as a rule, it is used for peer-to-peer fingering); zirka (vikoristovutsya for any local fancy). Apparatus for securing the hem

Components of a local mesh For organizing a local mesh, it is necessary to install a circuit board in the leather PC and install all computers for an additional special cable.

Some of the components required to connect the computers are already installed on the system board, and the board is not required. There is also a socket for the cable.

Components of local mesh Coaxial cable - transmission speed 10 Mbps. Vita steam - transmission rate up to 100 Mb / s.

Components of a local mesh of the Concentrator (HUB or Switch) - serve to connect computers to a mesh. The hub can be different from the number of connection ports (change from 8 to 32).

Components of local fences The indigenous knowledge of the net in the framing at the victorian HUB is due to the rapidity of the new payment. For Switch, the flexibility of a computer bet is to start a fast payment in pairs (groups).

Program for securing a net For organizing a local net, it is necessary: assign a unique IP address to the skin computer in the working group, and also set the address of the host mask (in some cases, the explicit IP address and address of the host mask may not be set).

The program for securing the hemispheres Tse vikno vikoristovuyutsya for the installation of the name of the computer and the Roboche group

The program for securing the pattern of Dani is victorious to set up an explicit IP address and parameters of the mask.

It’s worthwhile to be victorious to establish the level of access to local resources of the computer.

Local resource. Barred access to the resources of the computer. To secure the availability, it is necessary to install the transfer pump at the position of the Zagalny resource. A home resource. Allowing vikoristovuvati computer resources (disk memory and peripheral attachments - a printer, a modem) for those who use them. For the whole it is necessary to allow Vidkriti special access to the folder. At the same time, it is necessary to provide sufficient access. Access to resources

Moderate access to the resources of the framing Tilka reading Allowing the filing and copying of files and folders. Outside access Allowing all operations on files and folders (transfer, see, redaguvati, change too). Access, which is set up with a password. Tsey mode will be granted access rights for different categories, for example, if you do not read any more access.


1 slide

Local and global computers of the MBOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img2.jpg "alt =" (! LANG :(! LANG: MOU ZOSH №6 m. Reutov Kur'янова Ольга Олексіївна Автор: Види мереж Локальні Г.. ." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

3 slide

MOU ZOSH No. 6 m. Reutiv Kur'yanova Olga Oleksiyivna

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img4.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна Автор: Призначення ЛЗ Обмін фа..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

5 slide

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Appointed LZ Exchange of files between coristuvachami of heights Effectively vikorystannya of out-of-the-box resources: more space of disk memory, printer, scanner, software for thinner. MOU ZOSH No. 6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img6.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна Автор: Види локальних мереж Про..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

7 slide

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: View local hedge Peer-to-peer Computers are equal. There are no more than 10 computers Merezh based on a server One computer is specially visible for the collection of files and software programs MOU ZOSH №6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img8.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutov Kur'янова Ольга Олексіївна Автор: Загальна схема з'єднання..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

9 slide

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: The general scheme of connecting computers from local hedges is called a topology of a hedge.

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img10.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна Автор: Кільце Сигнали передаю..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

11 slide

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Kilce Signals are transmitted along a circle in one straight line and pass through a skin computer. Perevagi: Incomplete: The cable is not a good one, and the termator is not needed.

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img12.jpg "alt =" (! LANG: MOU ZOSH №6 M. Reutov Kur'янова Ольга Олексіївна Автор: Об'єднання комп'ютерних..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

13 slide

Municipal educational establishment ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Information about computer fences Regional fences - to unite computers in the boundaries of one region (place, country, continent). Corporate hedge - to combine computers of the same organization in rural areas and places that seize them from unauthorized access (for example, MicroSoft Network). A global computer of a net is a common one, a lot of local, regional and corporate ones, including hundreds of millions of computers (INTERNET). Internet (at the crossbar from the English - with the hemlines) is a gigantic all-round computer of the hemline. Її priznachennya - make sure anyone has permanent access to any information. MOU ZOSH No. 6 m. Reutov

Thumbnail "src =" http://uslide.ru/images/19/25470/389/img14.jpg "alt =" (! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна Автор: IPv6- !} New version about ... "title =" (! LANG :(! LANG: MOU ZOSH №6 m. Reutiv Kur'янова Ольга Олексіївна thumbnail" src="http://uslide.ru/images/19/25470/389/img17.jpg" alt="MOU ZOSH No. 6 m. Reutov Kur'янова Ольга Олексіївна Автор: Постійне підключення..." title="MOU ZOSH No. 6 m. Reutiv Kur'янова Ольга Олексіївна!}

18 slide

MOU ZOSH №6 m. Reutov Kur'yanova Olga Oleksiyivna Author: Permanently connected Asynchronous access via telephone line (ADSL) - the speed of information transmission (512 kb / s), and the only part of the robot is available. Russia has such a way of leaving only to develop. Synchronous access to the visible channel - the channel is visible, the insurance of the robotic speed (from 64 kbit / s to the number of Mb / s). For a private koristuvach in Russia, the road is happy. Connecting through a local border of a booth or a district is not a vimag of high vitrats, but you can go to the information exchange, so you can jump. For perevischennya ts'go obsyagu (traffic) - additional payment. MOU ZOSH No. 6 m. Reutov

Computers of a framing - a connection of computers to exchange information and a special registration of resources (printer, modem, disk memory is too small.).

  • Computers of a framing - a connection of computers to exchange information and a special registration of resources (printer, modem, disk memory is too small.).
Local framing
  • A local grid of common computers is installed in one primitive (new class, office, etc.), in one booth, or some buddies, which are close to being installed.
  • Call the computers for a local mesh of no more than one kilometer. In the case of an increase in the number of victors, there is a special possession.
Local framing
  • Local patterns for the way of interaction between computers are subdivided into:
  • peer-to-peer;
  • as seen by the server.
Peer-to-peer local mesh
  • In the peer-to-peer local grid, all computers are equal. The headquarters attachments can be connected to any computer at the fencing.
Merezha with a vid_lenie server
  • The structure of the framing from the seen by the server
Merezha with a vid_lenie server
  • Server (in English. Server - service attachment) is a computer, which is used to generate resources between koristuvachami.
  • The installation server has a tough processor, a large operative disk memory, the main part of the software security is taken care of, which can be used to speed up all the hard work.
Merezha with a vid_lenie server
  • As a workstation, you want to become more productive computers with a smaller disk and operative memory.
  • Client-server technology is implemented in the fences from the vision server.
  • On the server, the server software will be installed with the following security:
  • server operating system;
  • WEB-server (intranet organization);
  • proxy server (securing robots with the Internet of workstations);
  • file server (secure access to files) just.
  • At the work station
  • stand up to the client PZ:
  • operating system for work stations;
  • kliєntska part of the applied PZ too.
  • On the net from the server
  • The most advanced methods for connecting computers:
  • bus (call vikoristovutsya for peer-to-peer fingering);
  • zirka (vikoristovutsya for any local fancy).
  • Apparatus for securing the hem
Type z'єdnannya - "tire"
  • The cable runs from one computer to the other, connecting computers and peripheral attachments
Z'єднання type - "zirka"
  • An external cable from one central university must be connected to the skin computer.
  • Local components
  • For organizing local fences, it is necessary to install a skin PC board and use all computers for an additional special cable.
  • Local components
  • Some of the components required to connect the computers are already installed on the system board, and the board is not required.
  • There are a lot of sockets for mesh cable retouching on the back of the system unit.
Cables
  • Local components
  • Coaxial cable - transmission speed up to 10 Mb / s.
  • Vita steam - transmission rate up to 100 Mb / s.
  • Local components
  • Retail for cables
  • for coaxial cable
  • for a twisted bet
  • Local components
  • Concentrators (HUB or Switch) - serve for connecting computers to the hedgehog.
  • The hub can be different from the number of connection ports (change from 8 to 32).
  • Local components
  • There is a great deal of customization in the fancywork at the victorian HUB.
  • For Switch, the flexibility of being a computer bet is to start a fast payment in pairs (groups).
  • Netting software
  • For robots in a local mesh, special software is required to secure it.
  • Have operating system Windows
  • also є all the necessary installation of a framing.
  • Netting software
  • For organizing local hedge it is necessary:
  • the visibility of the Robocho Group;
  • assign a unique IP address to the skin computer in the working group, and also set the address of the host mask (in some cases, the explicit IP address and address of the host mask may not be set).
  • Netting software
  • Tse vіkno
  • victorious
  • imeni of the computer
  • that Robochoi group
  • Netting software
  • Dani vikna vikoristovuyutsya for the establishment
  • explicit IP address and parameters in the mask
  • Tse vіkno
  • victorious
  • equal access
  • to local computer resources
  • Local resource. Barred access to the resources of the computer. To ensure the availability of local resources, it is necessary to install a transfer at the location of the Home resource.
  • A home resource. Allowing vikoristovuvati computer resources (disk memory and peripheral attachments - a printer, a modem) for those who use them. For all, it is necessary to allow Vidkrittya outside access to the folder. At the same time, it is necessary to provide sufficient access.
  • Access to resources
  • Access to resources
  • Tіlki chitannya
  • Allowing the files and folders to be copied or copied.
  • External access
  • Allowing koristuvachams to visually display all operations on files, folders (transfer, vidalyati, redaguvati, change too).
  • Password-based access
  • The whole regime is given the right to access, for example, depriving the reader of any additional access.
Get ready for the project - please, dyakuyu!
Read also
Yak vstanoviti bezkostovny antivirus avast Yak vstanoviti bezkostovny antivirus avast Yak clear comp'ютер від вірусів самостійно Yak clear the computer from viruses independently Yak will clean up the computer'ютер від вірусів I will clean the computer from viruses