Vibir of the topology of local zirka fences. Yak vibrate topology

Zharoznizhuvalny for children is recognized as a pediatrician. Allegedly, there are situations of inconvenient help for feverish women, if the children are in need of giving innocently. Todi dad take on the versatility and constipation of fever-lowering drugs. How can you give children a breast? How can you beat the temperature of older children? What are the best ones?

From the topology of the numbered hedge, the configuration of the graph appears, the vertices of which are displayed by the computers of the hedge (only one of the settings), and the edges - the physical link behind them.

The vibration of the topology of the electrical links is often added to the rich characteristics of the hedgehog. The simplicity of admitting new universities, which is in charge of the topology, is easy to expand the fringe. Economical world is often to produce a choice of topologies, which is characterized by a minimum total amount of linear sound.

Discernible deyakі, navіdіshі topology:

Fig. 3 Facing topologies

Zagalny bus є with an even wider topology for local hems. In the whole range of computers, up to one coaxial cable is connected behind the "mounting ABO" circuit. The information that can be transmitted can be extended to the offending side. The stagnation of the foreign bus reduces the rate of carrying out, the unification of the connection of the young modules, the possibility of the wide-mouthed wide-handed furrowing to all the stations of the hedge is unavailable. Such a rank, the main passages of such a scheme є the cheapness and simplicity of the cable routing for the attachments. The most serious shortcoming of the out-of-the-box tire of the pole in the low hopes: be it a defect in the cable, or because of the number of roses, it will increase the paralleling of the entire edge. Unfortunately, the defect of the coaxial rose is not. It’s not very productive, but with such a method of plugging in at the skin moment, it’s less than one computer can transmit data to the net. Therefore, the bandwidth of the channel depends on the length of the network through the nodes of the mesh.

Kіlce (Fig. 3, b). In hems with a ring configuration, the data are transferred from one computer to another, as a rule, in one straight line. As a computer, the computer is able to read the data yak "svoi", win copies from the internal buffer. In a circle with a ring topology, it is necessary to live special calls, so that at every turn, if a station is connected, the channel is not interrupted by the connection between the other stations. Kіlce є I’ll make another manual configuration for organizing the ringing sound - given, having made a new turn, turn to the university-dzherela. This university can control the delivery of these to the addressee. Often, the power of the child is victorious to test the connection of the university, which is not correct. For the whole, special tests are provided in the custom.

Zirka (Fig. 3, c). In general, the skin computer is connected with a cable to the outside attachment, which is called a concentrator, which is located in the center of the mesh. The function of the concentrator is to enter directly the information transmitted by the computer to one of all the computers of the net. The head crossing of the topology in front of the foreign bus is a sign of greater reliability. If inappropriateness with the cable will be deprived of a computer, up to which cable is supplied, or if the disparity of the concentrator can keep the whole net in tune. In addition, the hub can play the role of an intellectual filter of information, which can be found from universities, and if necessary, block the fencing by the administrator of the transmission.
Until the topology of the type of star is not available, it is possible to establish a part of the framing installation through the need for a concentrator. In addition, the possibility of increasing the number of universities near the fence is surrounded by a number of ports of the concentrator. Inodi є sense, I will be able to use the links of several concentrators, and be organized according to the zirk type. Nini ієrarchіchna zirka the most widespread type of topology of links, both local and global links.

The office needs high-quality local hedge, some of the simple knitting due to the non-standard possession and the lower the quality of the service, which can be brought to high production. In connection with client server systems, the productivity of the net does not matter. Besides the trading floor, it is necessary to establish accounting, the office of the director of the warehouse, so it is necessary to keep the laptop of the administrator of the system.

A local net with a topology of a star, added with a point of 802.11b mouthless access.

Topology (configuration) - the whole way of connecting computers to the bottom. The type of topology is the type of security, theft, the productivity and the reliability of the operation of workstations, for which it takes an hour to get to the file server.

Understanding the topology is widely recognized for the hour of opening the hem. One of the steps to the classification of the topology of LOM is the vision of two main classes of topology: wide and last.

Wide PC topologies transmit signals that can be retrieved from PCs. Prior to such topologies, there is a topology: zagalna bus, tree, zirka.

In the last topologies, information is transferred to only one PC. The attachments of such topologies є: dovilna (dovilne PC), ring, lance.

When choosing the optimal topology, there are three main targets:

Safeguarding alternative routing and maximizing the transmission of tributes;

vibration of the optimal route of transmission of data blocks;

To provide a suitable hour for the necessary throughput capacity.

When choosing a specific type of hem, it is important to determine the topology. The main lath topologies are: bus (line) topology, zirkopodibna, kil'tseva and tree-like.

For example, the configuration of the ArcNet hedge will be victorious one hour and the line, and the mirror-like topology. Token Ring interfaces are physically visible like a star, but logically, packets are transmitted in a ring. The transmission of data in an Ethernet mesh is carried out over a line bus, so all stations send a signal one hour.

See the topology

There are five basic topologies (Fig. 3.1): the external bus (Bus); ring (Ring); star (Star); tree-like (Tree); porous (Mesh).

Small. 3.1. Topology types

Zagalna tire

Zagalnaya bus is a whole type of a layered topology, in a working station for rosting one cable, which is called a segment. Topology of the external bus (Fig. 3.2) transmission of one cable to which all computers are connected.

At different topology of the Zagalna bus, the cable is used in all stations according to:

Small. 3.2. Topology Zagalna bus

1. When transmitting packets of given leather computers, the address of the particular computer is LOM, transmitting it to the mesh cable as electric signals.

2. The packet from the viewer of the electrical signals is transmitted over the "bus" in both directions to all computers of the net.

3. However, the information received only the addresses that are indicated in the header of the packet. So, since at the moment of an hour in the netting you can transfer only one PC, then the productivity of the CROWBAR can be kept from the number of PCs connected to the bus. It’s more, it’s more tribute, it’s better to clean up the gear, and it’s lower than the productivity of the net. However, it is not possible to indicate the direct availability of the throughput capacity of the netting from the PC, so it can also be infused with:

· Characteristics of hardware protection for PC fencing;

· The frequency with which to transmit to the PC;

· Type of high-quality hemmed dodatk_v;

· The type of the cable and the appearance of the PC at the hedgehog.

"Bus" is a passive topology. This means that computers are deprived of "hearing" the data, that they are transmitted as they go, or do not change them from the source to the winner. To that, even if one of the computers will go out of the way, it will not be possible to be recognized on the robot of all the fences.

4. The data from the view of the electrical signals are extended along all the lines from one cable end to the last one, and the cable can be seen and taken over, so that the transmission of these computers is not allowed.

5. To detect the display of electrical signals, the terminator (T) is installed on the skin end of the cable, and the signals passed through the "tire"

6. If there is a PC signal (for example, 180 m for a thin coaxial cable), a weakening of the electrical signal can be prevented in the bus segment, which can lead to the loss of the transmitted data packet. At the end of the day, the outgoing segment is divided into two, having set up a pre-pristine between them - a repeater (repeating), which, if possible, accepts a signal in front of him, as it is necessary to receive a signal.

Correctly spaced out on additional hems, repeatable allow you to add up to regular hectares, for servicing, and appear between suspected computers. A memory slid, but all the ends of the hemming cable are to blame until it is connected: to a PC, a terminator or a repeatable one.

Cutting the hemline cable, or from one of the first ends, to produce the function of the hem. Merezha "pada". The very PCs will become overwhelmed by their former days, but they can only interact with each other. If LOM is based on a server, more software and information resources are stored on the server, then PCs want to become old-fashioned, but for practical robots and little extra.

The bus topology is victorious in Ethernet framing, protesting for hours on end.

The attachments for the topology are used for the 10Base-5 bus (connecting the PC with a coaxial cable) and 10Base-2 (connecting the PC with a thin coaxial cable).

Kilce

Kilce - the topology of the LOM, in which the skin station is set up with two stations, which are set up (Fig. 3.3). The data is transmitted from one working station to the other in one direction (circle). Kozhen PK pratsyuє yak repeating, retransmitting to the offensive PK, tobto. data, transmitted from one computer to the last yak on the e-mail. As long as the computer will deny the data that is assigned to the computer, it will be passed along the distance, and the stink will not be transmitted. The main problem with the topology of polygons is that the skin work station is responsible for taking an active part in the overwhelmed information, and at every turn of the world I would like to have one of them, all the thread is paralleled. Connecting a new workstation to a short-line short-line display, because at the hour of the rise of the day. Topology Kiltse can be transferred to an hour, depending on the number of workstations.

Small. 3.3. Topology Kilce

Pure Kil'tsev topology is victorious. The nature of the Kil'tsev topology is a transport role in the scheme of the access method. The first step is a logical route, and the packet will be sent from one station to the other, so there will be more. For Token Ring grids, the cable plug from the central hub is called MAU (Multiple Access Unit). MAU has an internal ring, which will disconnect all connections to the new station, and pick up as an alternative route, if the cable is interrupted from the same working station. If the cable of the workstation has been brought to MAU, I just accept the extension of the ring: signals to come to the workstation, and then turn back at the inner ring.

Zirka

Zirka is a chain of LOM topology (Fig. 3.4), in every working station connected to the central university (for example, to the concentrator), which will install, adapt and open the connections between the working stations. The challenge of such a topology is the possibility of a simple employment of an unjust university. However, it’s wrong to the central university, all the way out of the way.

Small. 3.4. Topology Zirka

At the same time, a skin computer is connected through a special mesh adapter with a cable to the attachment, which is connected. If necessary, it is possible to add a knot of the hem from the topology of the Zirka at once, with which the configuration of the hem can be used. At the skin point of distribution, it is necessary to choose special items for accessibility.

Applied zirkopodіbnoy topology є topology Ethernet with a cable type Віта pair 10BASE-T, the center of Zirka ring up є Hub.

Zirkopodibna topology will protect the user from cutting the cable. As the cable of the robotic station will be shielded, it will not be used before the operation of the entire segment of the mesh. Vona allows you to easily diagnose connection problems, fragments of a skin working station, a power cable segment, connections to a hub. For diagnostics, it is enough to know how to cut the cable, but lead to the station, but not really. Reshta mezhi prodovzhu normally pratsyuvati.

However, the mirror-like topology is very short. First, you'll need a lot of cable. In a different way, the concentrators are to reach the road. Thirdly, cable hubs are of great importance for cable servicing. However, in most cases, such a topology has an inexpensive twisted pair cable. For some people, you can use a variety of telephone cables. In addition, for diagnostics and testing, you can see all the cable kits in one minute.

Ratio characteristics of the basic hemmed topologies are presented in table. 3.1.

Table 3.1. Corresponding characteristics of basic grid topologies

Topology

Perevagi

Incomplete

Economy of vitrate to cable;

Inexpensive that is awkward in victorian middle gear;

Simplicity and reliability;

Easy expansion

With a significant amount of traffic, the traffic throughput will change;

Important localization of problems;

Vyhіd from the fret of any segment to the cable to plug the robot into all the fences

"Kilce"

Usi PC may have access to it;

The number of coristas is not associated with productivity

Drive from the fret of one PC to drive from the fret all the framing;

Locate problems very importantly;

The change of the configuration of the hemispheres

"Zirka"

It is easy to carry out the installation of the hem and modify the hem, adding a new PC;

Centralization control and management;

Out of the fret of one PC or one segment of the cable does not fit into the robot of all the framing

Vyhіd from the fret or to connect the life of the concentrator (commutator) to bring the whole line from the fret; great vitrata cable

Computers and components of the local hedge can be integrated in different ways. Vikoristovuvanna scheme of the physical rosetting of hemstitch components is called topology (Topology). The topology of the mesh is based on a geometric figure, established by the lines of communication between computers, or physical rostashuvannya one to one computers, tied between themselves. The topology of the hedge can be one of the indicators of the relative and classifications of the various computers.

There are three basic topologies to induce local fences:

- Zirka (Star);

- Kilce (Ring);

- Bus (Bus).

At the bottom of the topology, all computers are connected with a central computer, or else (hub - center). Effort for the tribute to come to the central university, which I will win without a mediation. The topology has no direct connections between the computers. The transmission of all information is displayed through the hub (central computer). The Yak Hub can be a special pristіy - a concentrator, and a large port repeater (repeater - repeater). The main function of the reporter is to redirect the tribute to one of the ports, secretly redirect them to the other port.

The organization of the pattern from the topology of the "star" is simple and effective. If you shave one of the cables, when the computer is connected to the hub, it is connected between the other computers, which are switched on for the whole circuit, it will be lost. As long as the central computer itself is intact, the transmission of these data between computers of such a net will be uncomfortable.

Perevagi zirkopodibnoy topology:

- Destruction of information in one place, except for the central university, does not overwhelm the robots and local fences;

- when connected to a large number of computers, there is no decrease in productivity;

- bezopeka informatsiya bezbechutsya high level, computer fragments do not rymyut other people's tributes.

Shortcomings of the mirror-like topology:

- Great vitrata of the z'єnuvalny cable;

- Breakdown of the central university to make all frizzy unproductive;

- Naschuvannya fingers are tied with great financial vitrats.

In topology of the type "circle", there are points from the bottom, tobto. The fathom is closed in the inner circle.

At the hedge, prompted by the ring topology, the data is transmitted in one direction from one computer "Kiltsya" to the other. The computer does not transmit information, the docks do not accept a special marker.

Crossings of the Kil'tsevo topology:

- when a large number of computers are connected, there will be a slight decrease in productivity.

Incomplete circular topology:

- The destruction of the process in one mission is to bring all the local fences up to the robots;

- Safe information is not taken care of on an even higher level: a tribute given by one computer to a small one, you can easily be transferred from a computer in a net, since it doesn’t smell like it, you can break the confidentiality

The topology of the "bus" is used for transmission of data, one overhead channel is connected (most often on the basis of a coaxial cable), up to which all computers of the local mesh can be connected.

A robot in a mesh with a topological bus will be on the offensive. If one of the computers in the local grid with a bus topology directed to the data, the stench is transmitted by the cable in both directions and is accepted without any blame by the computers, albeit just the one to whom the stench was given. The data in the netting with the topology of the "bus" can be done in any straightforward manner at once. On the prototype tires of the tire, special plugs are installed - terminators.

Tire topology passes:

- The ease of growing the hem;

- Not much more than just the privilege of ownership.

Incomplete bus topology:

- Destruction of the failure in one scene to make all local fences to the point of irrelevantness;

- when connected to a large number of computers to the same bus, the increase in productivity decreases;

- bezpeka informatsii take care not on a high level

Having looked at the topology of the local fences, I turned the topology-star. Through the crossroads of the tsієї topology. The topology of the lecture is easy to understand. Zirka is the price of best practices for Russia and Europe topology. Zirka maє central unit - hub (switch). The concept of the topology of the hedge in the viewer came from the region of the great EOM, in which the head machine will remove all the data from the peripheral attachments as an active university for the processing of the data. The whole principle is fixed in the transmission systems of tribute, for example, in the electronic netting of RelCom. All information between two peripheral workmanship passes through the central university of the numbered hedge.

The structure of the topology of LOM at the viglyad "zirka"

The access to the building of the visa begins with the enumeration of the university and is guaranteed for the dermal work station. The cable is easy to finish, the fragments of the skin working station are connected with the university. Vitrati laying of cables in high places, especially since the central university is geographically expanded over the center of the topology.

With the expansion of the calculus fences, it is impossible to get the victorian earlier than the victorian cable tie: before the new workmanship, it is necessary to lay an additional cable from the center of the fencing.

The topology of the viewer is the best in terms of the topology of the numerical framing, the transfer of data between the work stations to pass through the central university (with good productivity) along the lines of the lines, so that the work is done by the workstations. The frequency of power transmission from one station to the other is not easily accessible in other topologies.

The central university of management is a server that implements the optimal mechanism to secure against unauthorized access to information. All numbered fences can be keruvatis from the center. Ale є: the central component of going out of the way is the whole framing. And as soon as one computer is out of tune (or a cable that is connected to a hub (switch)), the computer can’t transfer or receive data as it is. On іnshі computers, through the fringe, the zbіy does not fit.

It is easy to send your garnu robot to the base of knowledge. Vicorize the shape below

Students, postgraduates, young people, who are victorious to develop the knowledge base for their own newcomers and robots, you will be as old as ever.

Posted on http://www.allbest.ru/

Entry

Nini nastav vik computerization. Computers stand to navigate the best companies.

The exchange of information is essential for the povnotsinnoy robot. For the whole project of local fences.

Well, is it permissible for a local hem?

1. Exchange of information between the members of the hedgehog. (Documents, vikonanі robotsі studentsіv, program toscho)

The sheer speed of this fancy pattern absolutely allows you to wonder about the music and hear the music from a remote computer, not rewrite them on a hard disk, but talk about the transfer of documents. Alle in the process, robots can vikoristovuvat programs, which may make a great debate. If you want to know about it, then 1 gigabyte of money can be rewritten for ten khvili.

2. It is possible to use a printer, CD-RW / DVD / DVD-RW.

3. Spilne vikorystannya channel access to the Internet.

There are no options, on the right, if the channel has access to the Internet to reach a wide one, if you see a line or ADSL, then with one-hour access there is a great number of people in the current fall of the video stream.

4. Multiplatform

With the help of LOM, you can connect computers of any type (For example: PC and Macintosh) and any operating systems. (Windows, Unix, OS / 2, MacOS).

1.Vibration of topology and layout

1.1 Budova frizzy

It would be a good idea to lay down some of the physical and logical concept of finding computers at the edge.

We have: 3 auditoriums with computers (logically - the lowest level, some students);

1 group of computers in wikladachs, one at a time in the skin auditorium and 4 in the office (middle level).

2 servers: Internet-server and file-server (stink to enter the group of victories - for quick administration).

(wake up scheme at dodatku No. 1)

1.2 Vibration of the topology of the hedge.

There are several types of topologies:

Shinni (mono channel)

The bus topology, which can be implemented with a cable, can be laid from one computer to the last lancet near the viewer, which will make a garland on the new yalintsy. All signals that can be transmitted by a computer in a line, go along the bus in both directions to all other computers. Two ends of the bus are guilty of being "closed" behind the additional electrical supports, to zero out the springs, to come to the end of the day, so that the signals did not appear and did not go to the ringing straight. The main shortcoming of the tire topology of the field is that, similar to the garland of yalinka, the cable defect in any place of construction is to extend the border into two parts, which does not fit between itself. Most of the hedge, impelled on coaxial cables, like from the Ethernet hedge, to decorate the bus architecture.

Кільцеві

The topology of the circle is functional, equivalent to the tire, as it can be done with one another; in such a rank, the signals are transmitted from one computer to the other, collapsing on a stake. However, a communal circle is just a logical abstraction, and not a physical construction. In fact, it’s a grid, but at the same time, a special concentrator realizes the logical way by overriding the input signal only through the advancing low port (instead of transmissions through all ports, as if the concentrator is stuck in the topology). The skin computer, having removed the input signal, processed it (which is necessary) and sent it back to the hub of the transmission of the offensive work station near the fence. Apparently to the given principle of robotics, the system that transmits the signal to the border is also guilty of seeing it in order to make it happen. Merezhi, designed according to the topology of the "ring", can be used for different types of cable. For example, Token Ring headers can twist a pair, while FDDI hedge realizes the topology of the "ring" behind the addition of fiber-optic cables.

Tree-like

The price of a change is made from two tires.

Zirkopodibnі

Topology "zirka" vikoristovuє okremiy cable of a skin computer, laying out of a central annex, called a hub (hub) and a concentrator. Concentrator for transmitting signals, which can be used for any port, for all ports; the results have signals that can be accessed by one university, within reach of their computers. Measuring on the basis of the "zirka" is more style to the cost, not the hem on the basis of the tire architecture, and only the least amount of the cable can be used without the need for that computer, to any kind of accessories, and not the whole amount. There are a large number of heels that can be used to wire a twisted pair cable, mounted behind a star topology, for example, 10 BaseT Ethernet.

Zmіshanі

A chain of different types of similar topologies.

Now we need a lot, as the topology will be in our net. Vrahoyuchi, for us there are only a few classes, a teacher's netting, connected to the Internet, then our netting from the topology will be connected to the small - tree-like glimpse.

The victorious topology itself is reversed, so we need to combine a few small segments into one global grid.

Victorian routing is not true. DNS - servers, domains, gateways, etc. vikoristovuvatis not be. Tse to forgive our fringes і trochs to diminish її patronage:

if the gateway is victorious, or to the domain, there may be a problem - if it is broken, the entire segment will be consumed.

(The topology diagram is astonished at the supplement number 2.)

2. Vibir of warehouse stock

2.1 Leading cables

Є 3 main types of hedge carriers with a lot of options, from the vibration cable, lay the type of hedge cards of the commutator, as we will be able to pick up at his own hedge (call view from the add-on number 3).

2.1.1 Twisted Pair

In the last hour, the most wide-spreading hedge carrier on the structure of a heavy-duty telephone cable, and eight mid-length veins intertwined one by one and a good isolation from polyvinylchloride. I will provide high flexibility for up to 100 megabytes. Buvaє Unsecured that Ekranovana the steam is twisted. For sale at large computers firms.

Vita steam is not very strong up to electro-magnetic guidance, it is especially screened. During the laying of non-screened twists, bets close to the electric shield, and at the same time, along the lines of a high tension, it was assumed that the robot was relatively stable on the speed of 80 megabytes per second. The cable is superbly easy to repair, (it doesn’t matter for those who do not fit the standards for updating the product) and to increase the cost of the extra izolenka and knife. It’s possible to navigate the numbers of children who have been renewed by such a rank of razriviv, the netting on the twists is very stable, I want the sound to quickly fall.

2.1.1а Merezha per 1000 megabytes (Gigabit Lan)

Besides, in the stitches, which are based on the twisting of a pair, it is possible to vikoristovuvati non-standard guides allow you to correct new characteristics and power of the fenestration.

1000 Mb On a 10/100 megabyte basis, in which there are only 4 guides from 8, with a large amount of information, all 8 guides are on the basis of the information provided by the promiscuous card operator. The transmission speed is close to 80-100 megabytes per second, you can change significantly the transmission streams of hard drives (40-60 megabytes / sec). Unimportant for those who also get 10 times as fast for an extra 100 megabyte, vicoristovuvati gigabyte hedge of trochas is important through a lot of large commutators and hedgehogs cards.

So it’s very necessary with a victorian gigabyte hedge, the pair was twisted strictly according to the standards without strong distortions, and so it’s inadmissible to vikoristovuvat twist-solder for increasing the similar hedge.

2.1.2 Coaxial cable

One of the first guides, who were vicarists, were used for laying the hem. Have a central conductor, a ball of an insulator in a wrapped and plastic insulation, one ball of an insulator, more or less. The maximum transmission speed is 10 megabytes. Win to reach strong schillies to electro-magnetic guidance. It is important to have a repair job, soldering and isolation is required, but if a new design has been updated, it is generally unstable. In the zone of the connected device there is a display of electromagnetics, which can be expanded in a coaxial cable, so that a signal can be produced to be transmitted. With a single pass of a coaxial cable in front of a twisted pair, the distance is more than 600-700 meters, data can be transferred to the yak. However, the victorious twisted bets of alternative providers, for example, the P-296 cable, will allow the connection to become 10 megabytes at a speed of up to 500 meters.

In this hour, the coaxial cable is mainly used as a conductor for the signal of satellite carriers and antennas. At the computer's framing, the coaxial cable is tied, it is not correct.

2.1.3 Optic Fiber

One, for example, a small number of light-emitters, kindly stolen by a plastic isolation. There is overwhelming speed of transmissions, the cable is absolutely not strong until re-code. Become both systems, with one optical fiber, can be up to 2 kilometers. However, the cable is extremely expensive, and for robots it requires more special possession (Merezhevikart, Concentrator, etc.), but not cheap. Fiber optic is not suitable for repairs, once a new fiber has been installed it has to be rebuilt.

Mabut, obviously, is optimal for all the characteristics of that vartistu for the victorian at our hedge є twisted steam.

Її partiality 9 rub. per meter.

(Marvel at Dodatku №4 about the way of editing)

2.2 Offshore switch

Hub - (Hub) if the card is powered by a data packet, the Hub simply continues to receive a signal so that you can receive a single card, if you accept the card, which is addressed to the data packet. Obviously, from one-hour robots there are a lot of corystiffs and the sheer speed drops rapidly. In the last hour, more companies just got a license for concentrators and switched to a license for more efficient Switch switches.

Switch - (Switch) to the view from the Hub, an analysis of the sound and sound has been sent, and the information package has been sent to prevent the computers from being lost, so that the channels become invalid. Squeaky, more beautiful than the victorious Switch, so, as it is, it’s nabagato shvidshe, especially in the hemlines with a great number of koristuvachіv. The name Switch is practically not called the Hub.

(Dodatok # 3)

2.2.1.1 What kind of vibrati commutator?

In the current hour, there are simple models and types of cutout switches, their price and functions are still developing.

2.2.1.2 Robot speed

The commutator can be used for 10 or 100 megabytes of total storage capacity.

10 megabytes of commutators at a time cost close to $ 15 -20 $, but you don't want to be sparing, but a very cheap 10 megabyte commutator. Shvidkostі 10 megabytes is generally enough for small texts, but it is not at all suitable for active exchange of significant (a few gigabytes) information reports, especially in the great local hedge. In addition, it is required to be able to use 10 megabytes (close to 1.2 megabytes per second), but the theoretical speed is maximal, in reality the given data will go into the speed of close to 6-8 megabytes, on most of the same sizes.

It is obvious to that є the need for registration of 100 megabytes of possession.

2.2.1.3 Number of ports

The initial indicator characterizes the number of computers that can be connected to such a hub. The parameter is also rich in the value of Switch.

Our vibir has fallen on the switches with 16 ports: 15 computers + 1 "driver-router".

2.2.1.4 Print Server Print

It’s even corny, but don’t expect a necessary function, as the truth is far from all commutators. There is a pre-existing switch on the switch, as a rule, LPT is prior to USB rose, if you plug in the printer to the pink, it will become available to all members of the LOM. At the same time, the printer does not lie down like a computer.

We do not need this function, because printers are on vchitelskih computers.

2.2.1.5 Appointment of additional hedge providers

These are the so-called hybrid commutators that can be connected to the same BNC roses (coaxial cable or fiber optic). They are susceptible to pererakhovani vische folding, with vicorian coaxial and fiber-optic, couuvati hybrid commutators are not varied. Until then, the price of a lot of money for zvychayni.

Ethernet switch SwitchHub 16port 10 / 100MBps

Yakіsnі and cheap to accept 100 megabytes, it stinks to reach a compact, not vimagayut any adjustments that cost between $ 35-45, the stench is optimal for awakening LOM.

2.2.3 Common 2 komutatori

In a large number of modern switches / concentrators, there is a special Uplink rose (Win often connects to the first port of the concentrator) into a new one, you can simply plug in an extraordinary standard crimp mesh cable and that's it.

Yaksho Uplink is also a port of business. Todi you need to know the twisted pair crossover. A crossover cable can be used to carry 2 or more switches, either of the same ports.

3. Vibir of accessory computers

Singingly, at once it means that my idea is that students' computers and victories may be the same. I think there is little emphasis on the singularity of the student’s performance. Until then, it’s so simple to go to the middle configuration of the computer, which will tell you to them, they are quiet, and they are.

At a number of reports, descriptions of the working stations of readers and students.

3.1 Do you need "video" and "sound"?

Computer є, mabut, at the dermal third. Over the last 10 years, a great stribok has been built in the productivity of the completing.

It infects a lot of new programs that hang great vimogs to computers. ALE є ONE ALE - tse, in the main, іgri or serioznі programs, how to work with 2D and 3D graphics (video-, photo- and cartoon-2D and 3D editors).

Merezha, scho rozroblyatsya, such nourishment will not be engaged. Zvychayno, PhotoShop and Compass students vivchayut, but they do not have such great vimogs.

Otzhe, robimo visnovok:

We do not need the required sound and video pictures;

You can be sparing by buying a motherboard with sound and video.

3.2 Motherboard

As a result of what has been said and from the possibilities of modern modernization, I have taken the EPOX 5EGA + motherboard as a basis.

Technical characteristics:

Chipset:

Північний міст: 915G

Pіvdenny mіst: ICH6R

· Processor: Pentium 4, Celeron, Hyper Threading support.

Memory: dual-channel DDR 400/333/266 - 4 roses, up to 4GB.

Expansion slots: 4x PCI, 2x PCI Express 1x, PCI Express 16x

Disk pidsystem: UDMA ATA 100/66, 2x UDMA ATA133, 4x Serial ATA, support RAID0, RAID1, RAID0 + 1

Integrated solutions:

Video card: Intel GMA900

· Grid adapter: Marvell 88e8001 1GB.

Rose: 2x Com, LPT, VGA, MIDI, PS / 2 keyboard, PS / 2 misha, S / P DIF (input / output), RJ45, 8x USB 2.0 / 1.1, sound - line input, multiple channel outputs microphone

Form factor: ATX

· Price: $ 137

I have a chance to pay for the price, some won’s, on my thought, є average rate / quality.

The board will adapt PCI slots, just a little at a time (up to 4!). I won’t add PCI Express 1x slots, so I’ll be clueless for the modernization.

At qiu "mother" is prompted to finish the bad video card Intel GMA 900. There are one of the remaining chips. Plus, if you are displaying video, you can always install PCI Express 16x video (it’s corny - there are some AGP picture fragments in the future). It means that the card is ready for DX9.0.

The complete set of the payment price is complete again: instructions (including Russian), disk with drivers, loops, 2 adapters for Molex-SATA, 2 SATA cables, PCI-bar with small COM and MIDI ports. Until then, in the box there is a wicker (2 crossings and 2 extra nozzles), a set of radiators for power capacitors and a thermoelement for adjusting the temperature of the component, so you can tell you, in the middle of the computer - PZ on the disk.

Tsya plata maє dvі obvious shortcomings:

1) the price is determined;

2) unauthorized roasting of the memory - it is roztashovannya close to the edge, so you can speed up the change / installation, some of it can be found on the CD-ROM.

3.3 Processor

Take advantage of the world of material economy, and besides, there will not be a lot of work on these computers, which will require great resources, I have gone through the process of Intel Celeron D.

Technical characteristics:

· Core: Prescott. Distribution - 3 bit.

Rose: LGA775, Socket 478.

· Frequency characteristics: clock frequency - 2.26 - 2.93 GHz. The system bus frequency is 533 MHz.

Thermoelectric characteristics: the maximum core temperature is 67 degrees, the pressure of the rose is 73 - 84 W, the core pressure is 1.3 - 1.4 V.

· Kesh: the cache of the first level - 16 kb dani, 12000 microinstructions. The cache of another level is 256 KB. Bus L1-L2 size 256 bit.

· Numeric conveyors: conveyor with 31 stages. Three conveyor blocks ALU, two conveyor blocks FPU, two blocks of addressing.

· Dodatkovі set commands: SSE, SSE2, SSE3, MMX.

Features: customization of Execute Disable Bit technology (only for LGA775 platforms)

· Price: 90 $

The whole processor can be called a Pentium. So yak, in Perche, in the new duzhe sutta, in 4 times, the size of the cache of another level is changed (instead of 1024Mb - 256Mb). In other words, the system bus frequency will become not 800, but less than 533 MHz. Nareshty, the core of these processors has been released with the addition of Hyper-Threading technology, but also quickening the display of high-flow updates.

"Vuzke shyka" in the view of a lower cache and a lower frequency of the system bus suttuously flank the productivity of Intel Celeron D models.

In such a rank, we will accept a cheap cob processor.

When our mother's pay is victorious, we have the option of modernization.

3.4 Hard disk

For my dummy, 80GB is enough for robotic research stations, and 120GB for users.

For the sake of it, I chose the reasonably cheap SATA HDD.

Specifications

Formatted Umnist, GB

Spindle speed, rpm

Ob'єm cache-memory, Mb

The next hour of the poke, ms

Idling noise, dB

Noise for an hour

Working temperature, ° С

Number of plates

Number of heads

Features

Minimal noise in cleaning mode.

I dont ring and dim it.

Male loading.

The tests showed the average for the shvidkodієyu result.

In the mode, the noise of the head does not disturb the significant noise.

The noise in the mode is not great.

Dzvona is mute, vibration is insignificant.

Pomirne loading.

3.5 RAM, drive, FDD, living unit, keyboard and misha

I will not need to describe the parts of the system unit of the report.

RAM - random access memory.

Rationale DDR and DDR2 - no sense, a lot of interconnection of motherboard possibilities.

It is worthwhile to install on our system no more than 512MB without a gap, or more - maybe. Firma is a virobnik that is less priced (for us, the main factor).

Price approx. 60 $

Privid - attachment for reading CDs.

In the early hours of the day, there was a lot of storage for DVD technologies, and before that, the number of inexpensive CD and DVD drives was sold for about $ 5-10.

Visnovok - a purchase of DVD-ROM (close to $ 40) for "students" and DVD-RW and DVD-ROM (at once close to $ 120) for "readers".

FDD - pristіy reading floppy disks.

It used to be unproductive, but often a part of a computer.

Affiliation close to $ 10

The living unit is a chain that gives electricity to the entire system unit.

At the same time, from the block of living (in the kit), buildings are on sale, but not to call us.

Computers can be supplied to the electric power supply, for those less than 350W do not go.

The price is close to $ 25-35.

The keyboard of that Misha is not a part of a computer.

The famous viewer and "additional functions" do not target us, our vibir is the cheapest one that we can’t accept.

All at once $ 10-15.

3.6 Monitor

Here, my maєmo zrobiti vibir: price - quality. Tobto. What monitor to buy: RK chi EPT?

RK is a new technology. Vona bezpechnіsha for the eyes, vimagає menshoї kіlkostі vitrati electricians. Ale is dear to us. Some of the found LCD monitors (17 inches) cost close to 8500 rubles.

ELT is cheaper. Until then, the stench may be more readily available in graphics (if we don't need the price, it's all a plus). Part: the work of the teacher - 250 $, the work of the student - 150 $.

With such a rank, I will recognize the party of computers:

Computer for a work reader - $ 811

Computer for a student's work - $ 608

3.7 Internet Server and File Server

A detailed description of the "zaliza" of cich machines (on my dummy) is not required, that is why productivity is important here.

Internet server - a computer that controls access to the Internet.

It is necessary for the distribution and interconnection of access to the Internet, the provision of "traffic" traffic, additional traffic from viruses and hackers from the Internet.

Naymenuvannya

Mat. Pay

Processor

Operational memory

2x DDR 512Mb Kingston

Maxtor 40Gb UATA

Living block (housing)

LG 15 ”Studioworks 505E

Keyboard + Misha

File server - a computer, signs for obtaining information.

The file server of the vicon has the following functions: collecting donations, archiving donations, transferring donations, authorizing access to donations, control over saving and changing files.

Naymenuvannya

Mat. Pay

Gigabyte GA-8i915P-G / i915P / s775

Processor

Intel Pentium4 -3200E / 1Mb 800FSB BOX

Operational memory

2x DDR 512Mb Kingston

Seagate 300GB SATA

Living block (housing)

LG 15 ”Studioworks 505E

Keyboard + Misha

4. Nalashtuvannya hem

For the connection of computers, we will use the TCP / IP protocol. The price is necessary for the application of short addressing programs when transmitting information.

4.1 View IP address

The tinctures of all the auditoriums will be practically the same - the awareness will be deprived of the IP address of the segment and the name of the group.

NasamPed - also IP addresses:

Anatomy IP address

Before the registration at the vyvchennya, the organization is guilty of assigning the base IP-address.

IP addresses are used to characterize patterns, not computers!

Nasamper, the main reason for failure is that the IP address is not recognized on the computer. IP addresses and designations for faucet interfaces on computers.

And why stand for tsim?

For a given moment, there is a lot of computers in the IP-fenestration (maybe not much) of computers in the IP-fenestration may have only one fancy-work interface (і may, as we have inherited, one IP address). Computers (and add-ons) can use mother-of-the-box (which is not a lot) of fancy interfaces - and leather interface to your IP address.

So, attachment with 6 working interfaces (for example, a router) will have 6 IP address - one per skin border, from which there is no information.

Unimportant on the price, more people will accept the addresses of the machines, if there are no IP addresses. Just remember, the form of the IP-address and the specific attachment on the computer is simplified. There is only one interface (which is not much) attached to the Internet, and so there is only one IP address.

IP-addresses yak "four numbers divided by dots"

In the stream (IPv4) implementation of the IP address, the IP address is stored in 4 (8-byte) bytes - win is 32 bits of available information. Tse bring to numbers, like reach great (navit if it is written in the submitted tens of numbers). For convenience (and for organizational reasons), the IP-addresses are assigned to be recorded at the viewer of the numbers, separated by dots. IP addresses

The butt - 4 (tens) number of divided (.) Points.

Oscillations of skin numbers - tens of bytes (8 bits), skin values ​​can be numbered from a range from 0 to 255 (total 256 unique values, including zero).

In addition, a part of the IP-address of the computer is used for the border, in which there is a given computer, the "beats" IP addresses, which have been lost, start without the need for a computer (mesh interface)

IP addresses are subdivided into 5 classes. Quite a class of start-ups of mastsi pіdmerezhі.

The mask is divided into 32 bits of addresses into 2 parts. One part is the name of the address and the net (one). Іnsha part - the name of the address and the interface of the net (zero).

Axis is a list of masks of the first three classes of hedgehogs (at the arches, spread over bits):

Klas A - 255.0.0.0

(1111 1111.0000 0000.0000 0000.0000 0000)

Klas B - 255.255.0.0

(1111 1111.1111 1111.0000 0000.0000 0000)

Klas C - 255.255.255.0

(1111 1111.1111 1111.1111 1111.0000 0000)

Three masks can be seen that class A may have few segments, a little bit the address of computers in the skin segment. Class C has a lot of segments, few - an address.

For the skin class, it may be deprived of the same IP addresses:

Class A: 0.0.0.0 - 127.0.0.0

Class B: 128.0.0.0 - 191.255.0.0

Class C: 192.0.0.0 - 223.255.255.0

If one of the zero bits changes to one (for example, 1111 1111.1100 0000.0000 0000.0000 0000). So we will accept it from one decal.

If you are confronted with the address given to the interface, you cannot "change" (1111 0101.1100 ... - you will not be able to do it).

In this rank:

Clasie D&E (clasi multicast): 224.0.0.0 - 225.255.255.255

Here is a short list of available face masks:

interface

(p_dmerezh)

Reserved IP-addresses for vikorystannya in local (not connected to the Internet, so that NIKOLI will not be in the INTERNET netting) are as follows:

One hemstitch class A 10.0.0.0

16 hemstitch class B 172.16.0.0 - 172.31.0.0

256 hemline class C 192.168.0.0 - 192.168.255.0

Moreover, it is not possible to pick up the address of the machine for the addressing of the machine, but the address of the skin is not possible. In addition, the addresses are the addresses of the hedge and the wide-ranging addresses.

The addresses of the net are all addresses, in which the host addresses are all 0 (in the vimag of the address of the net), broadly - apparently, all 1 (the list is displayed when the information is sent to all members of the segment).

4.2 IP address settings

For our hedgehogs docilely victoriously in class C, the number of computers in the segments is small.

Two of our auditoriums ob'ednani at the reception hall (office No. 30), and the third - an okreme (office No. 36), a framing of vchitelsky cars is also an okremiy segment. Address:

Auditoria # 1: IP: 192.168.130.1 - 192.168.130.254

Mask: 255.255.255.0

Auditorium # 2: IP: 192.168.230.1 - 192.168.230.254

Mask: 255.255.255.0

Auditorium # 3: IP: 192.168.36.1 - 192.168.36.254

Mask: 255.255.255.0

"Vchiteli": IP: 192.168.1.1 - 192.168.1.254

Mask: 255.255.255.0

The file server is included before the viewers, the address is 192.168.1.254.

And the Internet server has two interfaces - one to the "Vchiteli" fence, which is to the Internet, and its address is 192.168.1.253 and the address with a mask, as seen by the Internet provider.

The adjustment of the file server is not required for the blame of the installation of the necessary programs to "display" resources for the fancy.

In addition, the skin care is a very good group for the quickness of the hair. Before that, call the groups and work stations the spy workers will come up with for themselves, I know for good health.

4.3 Setting up the Internet server

For this, the robots have violated Windows 2000, which is why the operating system has been redesigned.

The adjustment for the stitching interface, which can be used by the reader, will be as follows:

IP: 192.168.1.253

Mask: 255.255.255.0

Setting up for the interface of a provider connected to the Internet, we cannot describe it.

To set up Internet servers, we chose the UserGate program.

Povnyy posibnik from vikoristannya and nalashtuvannya UserGate at addon # 5.

mesh computer server file

4.4 File Server Settings

For the whole server, we have seen Windows XP. Qia system є the best for the file server.

Setting up a hemline interface:

IP: 192.168.1.254

Mask: 255.255.255.0

For the sake of simplicity, we set up and administer the file servers, we made the folders open for access: folders with information are not for students - they are not for students - they are scammed, they are just opened for reading. If you do not have one display folder for general access without a password - a folder for students and їх robots.

For robots in a hem, it is necessary to use programs to speed up the process.

The axis of the actions from them (victorious according to the possibility of the remaining version of the program):

1. Dr. Web (revenge against antivirus)

2. Anti-virus and Anti-hacker (firewall) of Kaspersky

3. Panda Antivirus (revenge antivirus and firewall)

Anti-virus tse - the programs will be able to detect viruses on the computer, as well as see, block and remove them. Set you be-yaki to vibir.

Raju vikoristovuvati set of programs - "Lan Tricks". All programs run at the same time (in LanScope є):

1. LanSafety is a program that allows you to fence in victorious resources.

2. LanScope is a program that is very handy for scanning a pattern.

3. LanSend - a program that allows you to supervise the presence of others.

4. LanShutDown - a program that allows vimikati computers in a pattern without a vikorstannya server programs.

Є Another tsikava collection of the KillSoft program:

1. KillCopy - pre-edited information according to the pattern. Duzhe Zruchna program - allows you to zavanazhuvati files in parts (so that when you cut the link, a part of the file is obfuscated from you to the whole working station).

2. KillWatcher - allows you to view your "views" and, if necessary, to turn on from your resources. You can install the maximum number of one-hour connections to your car.

Acttive Ports - the program will be correct for administrators. A small, albeit superficially corny tool, as it displays all TCP / IP and UDP ports. Likewise, I will tell you, what kind of supplement, what kind of port is vikoristovuє. In addition, it will be good for Trojan horse detection and remote administration programs. Sorry, only for NT / 2k / 2000 / XP

DownLoad Master - One of the best download managers. Vidminny interface, extra comfort for a clerk, Russian commerce, functionless functionality and absolute safety. Allowing the permissive customization of the uploading of files via the Internet via HTTP, HTTPS and FTP protocols.

RAdmin - a program for viewing a computer. Korisna at vikoristanna teachers control students.

DU Meter is a small and simple program for displaying traffic on your computer, which looks like it’s about changing the stated norms.

List of Victory Literature

1.www.sinetic.ru

2. SoftDoc.ru - “I Will Become a Local Fringe”, Anton Lunnikov.

3. Course of lectures in the discipline "Elements of the theory of information transmission".

4. Course of lectures on the subject "Merezhi".

5.forum.ru-board.com

Posted on Allbest.ru

More documents

    Organizational-staff structure of the office center. Vibir and obruntuvannya architectures of the pattern. Server configuration service. Vibir of the grid topology. Vstanovlenya and the adjustment of Active Directory, DNS and file server under Windows Server 2012 R2 keruvans.

    robot course, additions 10.04.2017

    Vibration and economical arrangement of the topology of the hedge. Partnership for renting channels with an Internet provider. Vibir and rosrahunok of active and passive possession. The scale of the hedge according to the parameters of the corystuvachi, traffic, physical size of the hedge.

    robot course, additions 01/05/2013

    Scheme of information streams from server servers. Vibir of topology and method of access of corporate hedge. Vibir switches, IP telephones and video phones, work stations, additional server software security, festoon protocols. Model of the GPSS system.

    robot course, additions 05.24.2013

    Development of a schematic diagram of a local numbered grid for an enterprise, which includes a local server. Viznachennya kofіtsієnta navantazhennya, total traffic of the hedge. Vibir types of physical medium for connecting computers up to standard parameters.

    control of the robot, additions 05.08.2011

    Breakdown of the structural diagram of the computer framing. Layout of the topology of the grid, setting up the servers. Principles of rozpodilu IP-address. Rozrakhunok underworld catching up to the signal. Modeling traffic flows at the hedgehog. Merezhev's protocols, their specialties.

    course robot, additions 12/23/2015

    Analysis of quick solutions to induce the hedgehog. Nalashtuvannya and the establishment of pre-existing programs Comparison of software router platforms. Vstanovlenya DHCP and DNS servers. Vibir of the installation installation. Active Directory setting.

    robot diploma, additions 03.24.2015

    Vibir and obruntuvannya architecture of the local numbered framing of the sanctuary, install the SOS Ubuntu Server. Description of the physical circuit of the telecomunication possession of the framing, which can be designed. Nalashtuvannya server, computers and software protection of the hem.

    robot course, additions 06/12/2014

    Vibir servers and computers for operating systems. Rozrahunok of a hemstitch ustatkuvannya. Inspection of the dangers of danger for the hedge and the options for the zapobigannya. Analysis of the market for dressing up yaky fancy accessories for minimal vitrates.

    course robot, additions 07/11/2012

    Vibration of the topology of the grid and the layout of the main parameters. The vibration of the possession of transmissions of data, as well as the servers and servers of the client machines, the development of the third party. Connected to the netting, scho din, at 532 meters. Z'єdnannya with the Internet, the principle is that stage.

    robot course, additions 12/05/2013

    Ob'dnannya komp'yuterіv at the bottom of the numbered edge. Merezha, prompted by the server urahuvannyam. Apparently that short description of the complementary virobes. Efficiency and productivity of all fancy. Vikoristannya topology "zirka". Zakhist koristuvachiv.

There are no problems, as it is necessary to work with the choice of topology, so that the best way to go to the given situation. Table 2.2 can help you to set the correct vibration.

Table 2.2

Officials needed when choosing a topology

Topology

Perevagi

Incomplete

Economy of vitrate to cable. Roughly inexpensive and awkward in the middle of the transmission. Simplicity. Hope. Easy to expand

With significant information exchange, which is transmitted, the throughput of the building will change. Locate problems very importantly. Vikhіd from the fret to the cable zupinyaє to the robot bagatokh koristuvachіv

All computers can access. The number of corystuvachiv does not need a little bit of something significant in addition to productivity

Go out from the fret of one computer to accelerate the robot to all the fences. Locate problems very importantly. The change of the configuration of the hemisphere

Easily modify the hem, adding new computers. Centralization control and management. Going out of the fret of one computer doesn’t add to the quality of the netting

View from the fret of the central university to show from the fret the entire line

To fix the wired material, it is possible to resolve tasks.

Independent insurance company, before the warehouse, which includes the president, administrator, administrator and 5 agents, set up a border. The company has borrowed half of the small budget. It will remain an hour to try to grow up the clientele and work hard against the growing robots, plan to take two more agents to the state.

Kozhen sp_vrobitnik of the company is a computer. It is also necessary to exchange information about it, to be informed about it, or for the help of floppy disks. All agents are busy on the right, deprived of their clients, and information about these clients is of the suvoro confidentiality. A laser printer of eight years old is located at the office administrator. Skin agent is a power matrix printer.

One hour, from the installation of the hem, a high-speed laser printer was installed.

You have been entrusted with establishing the border of a small company. To forgive the revision of the factory, give an indication on the next meal.

1. What type of fences would you like to establish a company?

Peer-to-peer ______

Server Based ______

2. How should the topology go to the situation?

Kilce ______

Zirka ______

Zirka-bus ______

Zirka-kilce ______

Mozhlive r_shennya

There is no unambiguous revision of the tsyogo zavdannya. You can choose the one you want and you shouldn't have any recommendations.

1. Based on the server.

Zdavalosya b, as in the company of all 8 persons, in the form of a peer-to-peer one. Ale we already see that the company is starting to grow. Besides, part of the information is confidential. For this reason: more beautifully, set up a net on the basis of the server, as you will need the ability to grow a company and centralize the money, so as a peer-to-peer net through a row or two, you can see some potential.

2. One is correct in the form of mute. On the current day, the most popular topologies are "zirka-bus" and "bus".

The first thing to be built up is a bit of a splinter at once it’s simpler to see the problem and reconfigure it.

You can vibrate and fit with the topology of the "bus" - it’s cheaper and simpler in installation, albeit with a lot of irreparably overwhelming, as there is a concentrator in case of administrative and general problems.

The topology of the "circle" is also foldable for such a hem.

Get ready for the project - please, dyakuyu!
Read also
If the apple stops signing up for ios 10 If the apple stops signing up for ios 10 A look at the electronic vag Xiaomi Mi Smart Scale: a stitch behind you A look at the electronic vag Xiaomi Mi Smart Scale: a stitch behind you This is also a YouTube playlist and everything about new This is also a YouTube playlist and everything about new