Methodology and initial stages of designing a local computational boundary (LAN).

Breakdowns

Federal Agency for Information on the Russian Federation

Penza State University

Department of Information Security Systems and Technologies

EXPLANATORY NOTE

before the course project on the topic

"Design of local network of organization"

PDU 2.090105.001 PZ

CSPI discipline

Rozrobiv student.

The project was accepted with assessment__________

Kerivnyk to the project.


Penza 2006 r.

Explanatory note: 28 pp., 2 figures, 4 figures, 3 tables.

LOCAL MERGE, VITA PAIR, 100BASE-TX, SERVER, INFOLOGICAL MODEL, KORISTUVACH, ROUTER

The object of investigation is the development of software.

The purpose of the course project is to develop a project framework for the development of software.

In the process of work, the project of the production limits was broken down, all warehouse measures were described and a thorough assessment of the limits was carried out.


As a result of the final course project, skills were gained in designing the organization's framework.

Enter

1.1 Purposes of the vicoristic measure

1.2 Characteristics of the fence 5 Security information security

in the middle

6 Vartisna assessment


As a result of the final course project, skills were gained in designing the organization's framework.

Visnovok

A local network is a group of several computers connected via cables (such as telephone lines or radio channels) that are connected to transmit information between computers.

The local boundary gives the possibility of sleeping vikoristanya possession.

It is often cheaper to create a local network and install one printer for the entire unit, instead of buying a printer for the skin working area.


The file server of the network allows extensive access to the program.

Possession, programs and data can be summed up in one term: resources. You can note that the main purpose of the local network is access to resources. The local network also has an administrative function.

Enter

It is easier to control the progress of work on projects, even without the absence of stand-alone computers.

During the course of the course project, a model of a local network of organizations was developed that deals with the development of software.

1. Important object of investigation

The object of the design is local telecommunications within the organization.

This measure is responsible for ensuring the transport of information within the organization and ensuring the possibility of interaction with the global

Internet network

.

The organization for which the local network is designed is also the company whose main type of activity is software development.

To accurately formulate the goals of a boundary design, it is necessary to build an information model of the organization, which identifies the flows of information that circulate throughout the organization, the channels through which information moves There is a stage of criticality and sensitivity of information.

The information model identifies the types of information that are available at different nodes of the boundary, dividing it into stages of criticality and sensitivity.

The following markings are displayed on the induced little one to indicate the type and quality of information:

Information about financial activities

Information about market conditions

Product information

Information about material and technical security

Information about the required type of product

program outlines

High sensitivity

Sensitive information

Internal

Vidkrita

α.Sutteva

1.1 Purposes of the vicoristic measure

γ.

Availability of access to the Internet.

Visoka building capacity(100 – 1000 Mbit/s)

High server productivity.

The average productivity of the workstation was determined by development and testing.

High resistance to visible stains of all components of the mesh.

Possibility expanded.


2. The dimensions and structure of the boundary

Similar to the fragmented infological model of organization, it is obvious that the edge that is being designed is small in size, the fragments cover the area surrounded by one surface.

p align="justify"> When designing the structure of the fence, it is necessary to ensure the possibility of its expansion.

An analysis of the possibilities of growing an organization allows us to assume that this margin could be increased by adding a new segment that is on a different level.

The merege is organized using the additional “Zirka” topology (Fig. 2).

With a “mirror” topology, all computers behind the same cable segments are connected to a central component, which is called a hub.

Signals from the computer that transmit go through the hub to all others.

A work station that needs to send data sends it to the hub, which selects the recipient and provides it with information.

At the present time, only one machine at a time can transfer data, if two packets arrive at the hub at the same time, the other messages are not accepted and the senders will need to check the time interval in order to renew the data transfer.

Advantages

The output from one workstation does not interfere with the entire work;

The scale of the measure is good;

A slight sound of malfunctions and breaks at the edge;

High productivity

The power of administration

Nedoliky


The entire organizational dimension is divided into three subdimensions.

The skin of the submergium can be folded into several segments.

Persha Merezha is a group of distributors.

It consists of 20 work stations and servers of a work group.

All hosts in the network are connected to a switch that communicates with the network router.


Another sub-measure is a group of testing.

The structure of this submersion is similar to the front one.

The third subdivision includes the automated workstation of the server, administrators, and server.

This structure of the framework can be expanded.

To do this, it is enough to connect a new network to the router and configure network addresses for it.

After creating the network structure, it is necessary to select the type of cable system that will be installed in the network.

The network will be based on the 100BASE-TX standard.

The network also has a proxy server that connects to the Internet. This server It uses a real IP address, which is used by network hosts to access the global network. The functions that this server configures are limited to processing by e-mail

, replacing the local host address with a real IP address. As a result, it is not characterized by high productivity and its architecture is close to a standard workstation.


This server has been placed under security measures.

If we use only one server and add other functions in addition to the described functions in interaction with the global network, we will not be exposed to new attacks, thus losing all important information This organization is one of the main goals of attacks by criminals.

Based on the described server functions, the following configuration was selected:

Another important component of the network that is being designed is the work stations of the organization's security personnel.

As the company fragments its security program, the productivity of the workstation may remain high.

Basically, a server through which there is interaction between the local network and the Internet network, with an architecture similar to the work stations of the Internet.

Based on these findings, the following components were selected for the workstation:

AMD Athlon™ 64 3200+ Socket-939

Socket-939: nVidia nForce-4 Ultra

2 x DIMM 512MB DDR SDRAM PC3200

Card Reader all-in-1

SATA 80.0GB 7200rpm 8MB

DVD+-R/RW&CD-RW IDE

256Mb PCI-E GeForce 7300GT Case AOpen QF50C: Merezheva card from ZyXEL Card supporting IEEE802.3/IEEE802.3u standards. The card can be used with full duplex, supporting torsion in categories 3, 4, 5. The Wake-On-Lan function is supported. Model: ZyXEL FN312 Computer connection interface: PCI. The center of the program: Midna pair.

Distribution: 1 RJ-45.

Speeds that are supported: 10\100 MB/s. Full duplex mode support: OS support: Microsoft Windows

98/2000/ME/XP Microsoft Windows NT 4.0 Microsoft Windows Workgroup 3.11 Novell NetWare 5.x/4.x Novell NetWare client 32 Linux Redhat 6.x, 7.x

Switch Switch (kerated) D-Link DES-3226S 24-ports 10/100 Mbps DES-3226S is a high-performance, level 2 hardened switch that is ideal for small workgroups. The switch has 24 ports of 10/100 Mbit/s Fast Ethernet and can be additionally equipped with 100BaseFX or Gigabit Ethernet modules necessary for connecting high-speed equipment and providing additional flexibility to the switch.

DES-3226S has 24 ports 10/100 Mbit/s, which supports auto-selecting speed and data transfer mode.

Back Comfo Pro is a new, simpler solution for uninterrupted living for home and corporate clients.


Models with pressure 400, 600 and 800 VA.

For the convenience of users, Back Comfo Pro has 2 additional European sockets.

In addition, there is a standard and USB port for connecting to a computer.

Together with the UPS, the Russified software WinPower2003 is supplied, which allows you to effectively control all the parameters of uninterrupted life.

Tension to maintain: 800 VA (480 W).

Model description: Back Comfo Pro 800. Output signal: approximated sinusoid.

Time to switch to battery: 2-6 ms.

A corporate edge OS can support complex services.

Similar to a moderate OS for workgroups, a moderate OS at the scale of an enterprise is designed to allow workers to share files, applications, and printers, thereby making it possible for a larger number of workers to share data and be more productive. Istyu.

On the other hand, an enterprise-scale operating system will ensure the ability to connect different systems - both workstations and servers.

For example, since the OS runs on an Intel platform, it must support UNIX workstations that run on RISC platforms.

Similarly, server OS that runs on RISC computers can support DOS, Windows and OS/2.

Merezhev OS for an enterprise scale can support a number of protocol stacks (such as TCP/IP, IPX/SPX, NetBIOS, DECnet and OSI), providing easy access to remote resources, manual procedures for managing services, including agents for management systems lenya to the edge.

An important element of the boundary operating system for the scale of the enterprise is the centralization of the advanced data service, which saves data about clients and resources of the boundary.

Such a service, also called a directory service, ensures a single logical login for the user until the end and gives him a manual ability to view all the resources available to him.

The administrator, as part of the centralized research service, eliminates the need to create a list of clients on the personal server, which is repeated, which means saving a large amount of routine work and work cial pardons with the assigned warehouse of koristuvachs and their rights on the skin server.

An important power of the departmental service is its scale, which will ensure the distribution of the database of financial resources and resources.

Such intermediate OS as Banyan Vines, Novell NetWare 4.x, IBM LAN Server, Sun NFS, Microsoft LAN Manager and Windows NT Server can serve as a business operating system, while NetWare 3.x, Personal Ware, Artisoft LANtastic OS More suitable for small work groups.

The criteria for choosing an OS for the scale of the enterprise are the following characteristics:

Various software and hardware host platforms: IBM SNA, DEC NSA, UNIX;

Various transport protocols: TCP/IP, IPX/SPX, NetBIOS, AppleTalk;

Support for various operating systems of end users: DOS, UNIX, OS/2, Mac;

Support for edge-to-edge standards Ethernet, Token Ring, FDDI, ARCnet;

Availability of popular application interfaces and mechanisms for calling remote RPC procedures;

Possibility of interaction with monitoring and network management systems, supporting SNMP network management standards.

The doctors described the criteria and evidence better, and Microsoft Windows NT Server 4.0 was selected for the test.

This operating system has the following characteristics:

Server platforms: computers with Intel, PowerPC, DEC Alpha, MIPS processors. Client platforms: DOS, OS/2, Windows, Windows for Workgroups, Macintosh Organizing a peer-to-peer network is possible with please help Windows NT Workstation and Windows for Workgroups Windows NT Server is a standalone extension server: it supports multitasking, virtual memory and symmetric multiprocessing, as well as application environments DOS, Windows, OS/2, POSIX Dovid What services: domain for managing cloud information of clients ( Windows NT Domain Directory service), advanced name services WINS and DNS Good encouragement full work with NetWare layers: the client part (redirector) for the NetWare server is supplied (versions 3.x and 4.x in 3.x emulation mode, the advanced NDS service is supported starting from version 4.0), installed in look at the gateway on Windows NT Server or as an additional component for Windows NT Workstation; Notification processing service - Microsoft Message Exchange, integrated with others

Windows services

The designed fence consists of three submargins, which unite a number of hosts.

To communicate with a sub-merger, a router is installed that forwards packets from one sub-merger to another.


For effective routing in a network, it is necessary to assign unique IP addresses for all components of the network and build a routing table.

The structure of the address of the measure is presented by Malunku 4.

Small 4. Structure of the address of the boundary. The organization's network is assigned to the address 10.10.0.0, and the network mask is 255.255.0.0. The first subdivision is address 10.10.1.0 and mask 255.255.255.0.
1 127.0.0.0 255.0.0.0 10.10.3.1 3
2 10.10.0.0 255.255.0.0 10.10.3.1
3 10.10.1.0 255.255.255.0 10.10.3.1
4 10.10.1.1 – 10.10.1.21 255.255.255.0 10.10.3.1
5 10.10.2.0 255.255.255.0 10.10.3.1
6 10.10.2.1 – 10.10.2.10 255.255.255.0 10.10.3.1
7 10.10.3.0 255.255.255.0 10.10.3.1
8 10.10.3.1 – 10.10.3.6 255.255.255.0 10.10.3.1

The other support is address 10.10.2.0 and mask 255.255.255.0.


Addresses of the third submersion are 10.10.3.0, submersion mask is 255.255.255.0.

The router is a server that is connected to the submersion 10.10.3.0.

The router is at address 10.10.3.1.

Submersion 10.10.3.0 has a proxy server.

The real IP address of this server, which is used for access to the Internet by local hosts 85.234.44.234.

The routing table is located in table 2.

Relevant addresses

Submersion mask

elements of everyday structures and windows that create channels for the flow of confidential information due to the so-called microphone effect,

telephone, radio, and other drone and drone channels (including mobile communication channels).

Any additional connections with other segments or connections to the Internet will give rise to new problems.

Attacks on the local network through Internet connections in order to deny access to confidential information have become increasingly widespread due to the limited implementation of the information protection system in the TCP/IP protocols. .

Network attacks via the Internet can be classified as follows:

Packet sniffer (sniffer – in this case, filtering in the sense) is an application program that uses a vicoristic edge card that operates in the promiscuous mode (in which mode all packets are captured via physical channels, the edge adapter in sends a supplement for processing) .

IP spoofing (spoof - deception, hoax) - occurs when a hacker who is in the middle of a corporation or poses as an authorized profiteer.

Vidmova in service (Denial of Service - DoS).

A DoS attack breaks a barrier that is inaccessible to the primary controller due to changes in the permissible movements between the functioning of the barrier, the operating system or programs.

Password attacks - try to select the password of a legal merchant to enter the network.

Man-in-the-Middle attacks – direct access to packets that are transmitted to the middle.

Attacks on the level of supplements.

Merezhovaya reconnaissance - collection of information about the survey with the help of secretly available data and programs.

Enchanted by trust in the middle of the border.

Unauthorized access (UNA), which can involve a different type of attack, since most third-party attacks are carried out to deny unauthorized access. Viruses and programs of the Trojan horse type. The network has a discretionary access sharing model. Within the framework of this model for the skin object, it is indicated what type of access can be made to the skin object. Based on these values, an access matrix was generated, as shown in Table 3. PS DBMS IBS AWS ABD Arm Hand.
Set. rev. 2 2 1 2 2 2 2 2 2 2
AWP program 1 2 2 0 2 2 1 0 0 0
DB zrazok. 2 2 2 2 1 1 2 2 0 2
AWS AIB 1 1 0 0 2 2 1 1 0 2
Smitty 1 0 0 0 1 1 1 0 0 0

AIB

DBA

Handling

Roserob.

Inshi.

Table 3. Organization access table.

Condensed shorthand:

AIB – information security administrator

SRK – backup server

AWS - automated work place.

SMR - server for development.

0 – no access

1 – reading room

2 – read/write.

To protect against local attacks from the Internet, the firewall OutPost Firewall 4.0 is used.


This product provides comprehensive protection of membrane components from intrusion and harmful influxes.

6. Vartisna assessment

1 41500 41500 200 8 1600
The final stage of local boundary design is to carry out a varsity assessment of the boundary components.
34 228 7752 Distribution: 1 RJ-45. 3 10902 32706 Merger adapter 3 4530 13590 Printer 1 2507 2507 DBJ 939115

Together:


6 Vartisna assessment

As a result of the assessment, it was established that the amount of expenditure for the construction of the boundary is acceptable, and therefore allows the implementation of this project.

As a result of the completion of this course project, the objectives of the continuous network organization were formulated, the size and structure of the network, cable system were selected, the informational and physical model of the network was developed, as well as the control system analysis of network software features and methods of network administration, and a comprehensive assessment of the local boundaries.


In this manner, the head of the course project at Wikonan is in full agreement.

List of Wikorista Gerels

1. Mali V.A. Design of local TCS. Methodical additions to the completion of the course project.

The local calculation of the measure is not a little clear, but I know it’s not a little rich.

In fact, the skin technology is based on this technology, so it can be confirmed that the skin people have dealt with it anyway. Local measures greatly accelerated the processes of growth, thereby giving a sharp reduction in their further stagnation throughout the earth's culture. All this allows us to predict future growth and developments

similar system

  • transfer of data, right up to the dissemination of scrap on the skin, to the smallest enterprise.
  • Local boundary concept
  • Allows access to programs installed on the server, which allows you to have more space on the installed hard drive.
  • Save space on your hard drive, allowing you to save documents on your host computer.

See the edge

A local computational network can be represented by two models: a peer-to-peer network and a hierarchical one.

The stench is dissolved by the interaction of nodes in a bond.

The peer-to-peer network is based on the equality of all machines, and there is a division between them.

In essence, the user of one computer can deny access to the resources and information of another.

The efficiency of the peer-to-peer model depends on the number of working nodes, and the level of security is unsatisfactory, so it is not necessary to use such measures in a complex management process.

The hierarchical model includes one (or more) main server, where all data is stored and processed, and a number of client nodes.

This type of measure is used more often than the first, due to its superiority in speed, reliability and safety.

  • However, there is a lot of flexibility in the work of such scrap that lies in the server, which can be little respected for the singing minds.
  • Folding technical aids
  • The design of the local computational boundary should be completed through a folding process.
  • It begins with the development of technical resources, which must be carefully thought through, the remaining shortcomings are fraught with future difficulties at the time of delivery and additional financial costs.

The initial design can be carried out with the help of special configurators, which allows you to select the optimal configuration.

Such programs are especially handy because you can edit various values ​​and parameters immediately during operation, as well as add value after the process is completed.

When choosing a method for placing nodes in a connection, it is necessary to remember the main features to local boundaries:

  • Productivity, which is the key to understanding: throughput, reaction time, transmission delay.
  • Crazyness, then. data, connect different types of local calculating measures
  • that software is secure.
  • Security, reliability, etc.
  • the possibility of preventing unauthorized access and permanent data loss.
  • Scalability - the ability to increase the number of workstations without reducing the productivity of the network.

Kerovanosti - the ability to control the main elements of the fence, prevent and eliminate problems.

The clarity of the measure that serves as a single calculating device for traders.

Basic topologies of local computational boundaries: advantages and shortcomings

The topology of the network has physical and physical variations, which significantly influence the main characteristics.

At current enterprises, three types of topologies are mainly used: “Zirka”, “Bus” and “Ring”.

The “Zirka” topology is the most extensive and has a clear advantage over others.

This installation method is highly reliable; If any computer is in good working order (server), it doesn’t matter to the work of others. The “Bus” topology consists of a single main cable with connected computing machines.

Such an organization of local calculation measures protects finances, but is not suitable for accumulating a large number of computers.

The “Ring” topology is characterized by low reliability due to the special arrangement of nodes - the skins of which are connected to two others using additional edge cards.

  • This pair consists of several pairs of conductors coated with insulation and twisted together.
  • The low price and ease of installation are significant advantages to make this cable the most popular for the installation of local connections.
  • A coaxial cable consists of two conductors inserted one into the other.

The local computational boundary from the stagnant coax is no longer so wide - it has been replaced by torsion pair, which is densified in many places around the world.

Optical fiber is a glass thread, suitable for transferring light through the walls.

  • A cable made from this material transmits data on a large stand and is cut with high speed, paired with a twisted pair and a coaxial cable, which is not cheap. Necessary possession
  • Distribution: 1 RJ-45. The measure of the possession of local computational measures includes non-personal elements, which are most often used among the following:
  • Chi hub hub. It combines a number of devices into one segment behind an additional cable.
  • . Vikorist has special processors for the skin port, which process packages in a stronger manner than other ports, for which high productivity is possible.

Router

.

This is a device that makes decisions about distributing packets based on data about the routing table and rules. Modem.

It is widely used in interconnection systems, ensuring secure contacts with other workstations behind additional cable or telephone lines. Kintseve Merezheve Ownership The hardware for the local computing network includes both the server and client parts.

Server - tse

By installing local computational measures, you can fully implement their functions without any special software.

  • Before the software part there is:
  • Merger operating systems on servers, which is the basis of any kind of network.
  • The OS itself controls access to all edge resources, coordinates packet routing, and resolves device conflicts. Such systems have support for the TCP/IP, NetBEUI, IPX/SPX protocols. Autonomous OS, which is supported by the client part.

They are standard operating systems, for example, Windows XP, Windows 7.

Merezhevi services and programs.

qi

software elements

0

Allows you to perform a variety of activities: reviewing remote documentation, printing on a printer, sending postal notifications.

Traditional services HTTP, POP-3, SMTP, FTP and Telnet are the basis of this category and are implemented using additional software.

Nuances of design of local measures

  1. The design of a local computational measure will require careful and leisurely analysis, as well as the consideration of all the subtleties.
  2. It is important to recognize the potential of business growth to increase the scale of the local network.

It is necessary to assemble the project in such a way that the scrap is ready at any time before the connection of a new work station or other device, as well as the modernization of any unit or component.

Equally important is food security.

Cables that become stuck during daily monitoring are likely to be securely protected from unauthorized access, and the mains are located far from potentially unsafe places, where they may be damaged - inadvertently or otherwise dream

The LOM components located outside the space must be firmly grounded and securely secured.

  1. The development of the local computational network is not a laborious process, but with the right approach and identification of the correct type of scrap, it can be performed reliably and stably, ensuring uninterrupted work for the workers.

Course work

Design of scrap at a backlit secondary school

Entry 3

Creation of LOM at school 4

  1. Konstruktorska part 8
  2. 2.1 Vibration and priming technology using LOM 8

2.2 Analysis of the transmission medium 8

2.3 Merger topology 8

As a result of the final course project, skills were gained in designing the organization's framework.

Local computational network - this involves the continuous connection of several computers to a separate transmission channel, which will then provide a large number of resources, such as databases, installations, and programs.

  1. With the help of local monitoring, remote workstations are combined into a single system, which has the following advantages:
  2. Resource subdivision – allows for extensive use of resources, for example, peripheral devices (printers, scanners) and stations that are included before the limit.
  3. Data section - allows you to easily access information that is located on the hard drives of workstations and servers.
  4. The software section will provide support for a wide variety of programs installed on workstations and servers.

A portion of the processor's resources is the ability to reduce the computational effort of processing data by other systems that are part of the process.

The development of the local computational framework is carried out at the former out-of-the-way school. Meta prices of robots technical characteristics

  1. borders, design of hardware and software features, expansion of border assemblies, communication channels, development of the network's implementation.

Creation of CROWBAR near the school Over the past few years, there has been a radical change in the role of personal computers and information technologies in married life. The current period of development of marriage is enhanced by the stage of informatization. Informatization of marriage conveys universal and widespread methods and methods of collection, analysis, processing, transmission, archival preservation

great obligations of information based on

computer technology

  • , as well as various data transmission devices, including telecommunications networks.
  • The concept of modernization of lighting, the project “Informatization of the lighting system” and, it is decided, technical progress should be placed before the modernization of ICT - competent features, the creation of knowledge and time in practical life and for successful socialization in the current world.
  • The process of informatization of the school transmits the latest tasks:
  • development of pedagogical technologies to establish the features of information and communication at all levels of education;
  • vikoristannya Internet for social purposes;

A local network integrates a computer installed in one location (for example, a school computer classroom, which consists of 8-12 computers) or in one booth (for example, a school can be integrated in a local network dozens of computers installed in various subject rooms).

Local area network, LOM (English: Local Area Network, LAN) is a computer network that covers a relatively small territory.

In small local networks, all computers are treated as equals, i.e., users can independently manage the resources of their computer (disks, directories, files) to make them illegally accessible from the network.

Such networks are called peer-to-peer.

To increase the productivity of the local network, as well as to ensure greater reliability when saving information in the network, computers are specifically designed for saving files or programs. Such computers are called servers, and local networks are called networks connected to servers. A typical school local boundary looks like this. Є one point of access to the Internet, to which a secondary router (ADSL or Ethernet) is connected. This is a typical situation when no one knows the password to access the router, and the standard password has been changed.

It would seem that there is a need to “climb” to the router, how does everything work like that? That's how it is, but there may be some unacceptable blame. For example, the number of computers at the school increased (they had another computer science class), and problems began with IP address conflicts at the school. On the other hand, it is unknown what range of IP addresses are reserved on the router for distribution by the DHCP server, and it may turn out that this IP address is simply not enough.. You can, instead of choosing virtual networks, install an additional router and switch and set up different IP addressing (IP addresses from different connections) for computers in the computer science class and computers. This will require additional expenses for the acquisition of a wireless connection and for the setup of routers. Unfortunately, the problem lies below school computers

  1. It is not possible to isolate groups from each other without additional financial contributions (the presence of a ceramic switch in a student. Guilty from the rules).

At the same time, such a floor is not binding.

How can we see the necessity of such a thing at a glance?

boundary security

, then the problem of computer security for readers and administration in the form of encroachment on the part of students can be solved in a different way.

Design part

2.1 Vibration and priming technology using scrap.

The main features of the designed computing network are the provision of secure communication between computers and the ability to transfer files at speeds of up to 100 Mbit/s.

Thus, in order to provide a breaker for all branches, Fast Ethernet technology will be used.

Technologies for scrap.

This robot has Fast Ethernet technology to ensure data transfer speed of 100 Mbit/s.

To create a network with a transparent architecture, it is necessary to place a hub (switch) at the center of the network.

Its main function is to secure communication between computers that are connected to the border.

So, all computers, including the file server, do not communicate directly one to another, but connect to the hub.

This structure is reliable, and the fragments of each work station save time and effort.

The topology of the view is the most common topology of computational lines, since the transmission of data between work stations passes through the central bus (with good productivity) along adjacent lines, so that only these working stations.

The frequency of transmission inputs from one station to another is low and equal to that achieved in other topologies.

2.4 Access method.

Fast Ethernet networks use the CSMA/CD access method.

The basic concept of this method lies in the following:

All stations listen to broadcasts by channel, meaning the channel;

  1. Re-verification of non-bitches;

The beginning of transmission is possible only after a free channel has been identified;

The station monitors its transmission, if a blockage (collision) is detected, the transmission is initiated and the station generates a blockage signal;

The transmission is updated at random intervals, the value of which is determined by a special algorithm, since the channel at this moment appears free; A number of recent transmission tests are interpreted by the station as video measurements. When using the CSMA/CD switch, a collision situation may occur if two or more stations simultaneously select a different channel and begin attempting to transmit data.
Vibration and priming of hardware security measures
3.1 Communication devices
Select the hem adapter.
Merezhevy adapter - tse

peripheral device

  • computer,
  • directly interacts with the data transmission medium, as
  • directly or through other communicative possessions connects him with
  • With other computers, this device is subject to the requirement of reliable communication
  • synchronization of beats, bytes and frames.

TrendNet TE 100-PCIWN edge boards are selected as edge adapters.

Select hub (switch).

The hub (repeat) is the central part of the computer network when implementing the “mirror” topology.

The main function of the hub is to repeat the signals that come from its port.

Again, the electrical characteristics of the signals and their synchronization improve, and for this reason it is possible to increase the capacity of the cable between the most distant nodes.

A multi-port repeater is often called a concentrator or a hub, which reflects the fact that this device implements not only the function of repeating signals, but also concentrates the functions of connecting computers together in one central device.

The sections of cable that connect two computers or two other edge devices are called physical segments, and hubs and repeaters are used to add new physical segments, especially physical structuring. ii measures.

A concentrator is a device in which the total throughput of the input channels is greater than the throughput of the output channel.

Since the input data flows at the concentrator are greater than the output flow, the main task is data concentration.

The concentrator is actively possessed. The hub serves as the center (bus) of a transparent network configuration and ensures connections of network devices. The concentrator for the skin node (PC, printers, access servers, telephones, etc.) may transfer data to the same port.

Commutatori.

Switches and control

The switch should be selected depending on the number of workstations in which there are over 50, to which we can include our category, for which we select the D-Link DES-1024D/E, 24-port Switch 10/10 0Mbps.

3.2 Merezheve ownership

Select cable type.

Today, most computer connections are important as the transmission center of wires and cables.

There are different types of cables that satisfy the needs of different sizes from large to small.

twisted pair:

* unshielded;
about * shielded;

Fiber optic cable, single-mode, multi-mode (fiber

optical).

Today, the widest type of cable and the one most suitable for its characteristics is a twisted pair.

Let's look at her report.

A twisted pair cable is a cable in which a pair of conductors is insulated and twisted with a small number of turns per unit.

The twisting of the darts changes the electrical disturbances of the calls when all signals are distributed along the cable, and the shielded twists of the pairs further increase the level of signal disturbance.

To connect work stations and switches, RJ-45 sockets, 8-pin sockets, the cable of which is compressed with a special shape, are selected.

When the computer is used to exchange information by phone
limits, you need a device that can receive the signal from the telephone
measures to transform it into digital information.
This device

is called a modem (modulator-demodulator). Assigned to the modem, it is necessary to replace the signal coming from the computer (combining zeros and ones) with an electrical signal with a frequency that corresponds to the operating range of the telephone line. There are internal and external modems.

Internal Wikonian modems, as expansion cards, are inserted into a special expansion slot on the computer’s motherboard.

  1. External modem, replaced by internal modem, as seen
  2. I'll build a building next to it
  3. , then.
  4. in an adjacent case and with its own power supply unit, if the internal modem removes the electrical power from the computer power supply unit.
    Advantages
  5. Internal modem Perevagi
  6. All internal models without a fault (in addition to external ones) may be assigned FIFO.
  7. (First Input First Output - first arrivals, first acceptances).

FIFO is a microcircuit that ensures data buffering.

  1. The primary modem, as soon as a byte of data passes through the port, immediately powers up the computer's power supply.
  2. There are indicators on the front panel that help you understand how to operate the modem.
  3. If the modem is frozen, there is no need to restart the computer, just turn off and turn on the modem.

Advantages

  1. A multicard is required due to the inserted FIFO.
  2. Without a FIFO, the modem will work better, but the speed of data transfer will decrease.
  3. The external modem takes up the desktop and the required additional resources for connection.
  4. This creates a song of intangibility.

It occupies the last port of the computer.

An external modem is always more expensive than a similar internal one, because

includes a housing with indicator lights and a living unit.

For our network, we will use an internal ZyXEL Omni 56K modem.

V.90 (PCTel) int PCI.

3.3 Space planning

All diagrams have mental meanings: SV – server.

RS – operating station. K – switch.

Small 1

Scheme of the border on the first version

Small

2

Drawing diagram on another version

Small

3

Scheme of hemorrhage for 3 versions

3.4 Dimensions of cable length

The layout of the underlay cable over the top, necessary for creating a local boundary, is shown in Tables 1,2,3.

The cable is laid along the walls in special boxes.

Table 1. Cable recharge on the first version.

K1-K2 16 meters

K1-K3 14 meters

It’s time for the first version of the cable to be installed at 96 meters.

Table 2. Cable recharge for 2 versions

3.4 Dimensions of cable length

Work station

Table 1. Cable recharge on the first version.

Dovzhina cable

Type RS to K

Reinforcement of the cable between switches:

K4K5 17 meters

Reinforce the cable from the server up to 4 - 1 meter

  1. Zagalna dovzhina cable other on top to become 156 meters.

Table 3. Cable allowance for 3 versions

"Tovstii Ethernet" will become a vikorist in the upcoming rank.

The wire is laid around the perimeter of the premises or existing ones, and 50-ohm terminators are installed at its ends.

Due to its complexity and rigidity, the cable cannot be connected in the middle until a moderate payment is made.

Therefore, “vampires” are installed on the cable at the required locations - special devices that pierce the sheathing of the cable and connect to its braiding and central core.

“Vampire” sits on the cable so tightly that once installed, it is impossible to remove it without a special tool.

Before the “vampire”, a transceiver is connected - a device that serves the mid-card and cable.

  1. I have decided that a cable with 15-pin connectors on both ends is connected to the transceiver - the other end is connected to the AUI (attachment unit interface) connector on the intermediate board.
  2. Remove the outer plastic sheath from the cable by approximately 20 mm.
  3. Be careful not to damage the desired braiding conductor.
  4. Carefully unbraid the braid and spread it to the sides.
  5. Remove the insulation from the central conductor by approximately 5 mm.
  6. Install the central conductor at the pin, which is also supplied with the BNC connector.
  7. Use a vikorist or special tool to firmly press the pin, fixing it into a new conductor, or solder the conductor at the pin.

When soldering, be especially careful and respectful - bad soldering within an hour will cause problems with the work, and it will be important to localize the area.

Insert the central conductor with a new pin near the body of the connector until it clicks.

Clicking means that the stitches have fallen into place in the socket and are fixed there.

Evenly distribute the braided conductors over the surface of the connector, if necessary, trim them until required.

Place a metal sleeve on the rose.

At least two (recommended three) paired RJ-45 sockets are installed on the working area.

The skin is reinforced with a cable of the 5th category and connected to the cable or patch panel installed in a special room - the server room.

To this location, cables from all working places are installed, as well as telephone inputs, lines are visible for connecting to global networks, etc.

At the premises, of course, servers are installed, as well as a PBX office, alarm systems and other communications equipment.

Due to the fact that the cables from all working places are connected to the fire panel, any socket can be used to connect the working place to the breaker, or for telephone, or whatever.

For example, two sockets on the work station were connected to a computer and a printer, and the third was connected to a telephone exchange.

The work process required removing the printer from the work place and installing another phone in its place.

As a rule, the following types of roses occur:

  • S110 - the literal name of the connectors for connecting the cable to the universal cross "110" or switching between the inputs on the cross;
  • RJ-11 and RJ-12 - connectors with six contacts.
  • Be sure to use a foreign telephone first - you can install such a connector on the cords of imported telephones.

Another type is used in telephone sets intended for operation with office mini-PBXs, as well as for connecting cables to ARCnet intermediate cards;

RJ-45 is an eight-pin connector that is used for connecting cables to Ethernet edge cards or for switching on the connection panel.

We connect RJ-45

  1. Depending on what needs to be patched, the different patch cords are assembled: “45-45” (on each side via the RJ-45 connector), “110-45” (on one side S110, on the other side - RJ -45 ) or "110-110".
  2. To install RJ-11, RJ-12 and RJ-45 connectors, special pressed devices are used that vary in the number of knives (6 or 8) and the size of the socket for fixing the connector.
  3. As an example, let’s look at the installation of a category 5 cable on an RJ-45 connector.

Carefully cut the end of the cable.

The end of the cable is equal.

  1. With the pin facing down, insert it into the new cable.

The skin conductor is liable to get caught in its place in the rose and press into the boundary.

  1. Squeeze the rose first, reconnect, so that you have not received mercy from the divorced conductors.

If the wiring is incorrect and corresponds to the contact numbers at the ends of the cable, it is easy to detect with the help of a simple tester, which may be unacceptable - the appearance of “splitted pairs”.

To identify this connection, a basic tester is not enough, as long as the electrical contact between the conductive contacts at the ends of the cable is ensured and everything appears to be normal.

  1. However, such a cable will never be able to ensure normal connection power over a 10-megabit network at a distance of 40-50 meters.
  2. Therefore, you need to be respectful and not rush, especially since you do not have sufficient evidence.
  3. Insert the socket at the socket on the pressing device and press it until it stops between the device.
  4. As a result, the lock on the socket is in its place, and the cable in the socket is unbreakable.
  5. The contact knives of the connector cut into the skin of their conductor, ensuring reliable contact.

In the same way, you can install RJ-11 and RJ-12 connectors using the corresponding tool.

Fiber optic cables are the most promising medium for broadening signals for local networks and telephony, which will provide the highest bandwidth.

At local networks, fiber optic cables are installed to support ATM and FDDI protocols.

Device for removing insulation and pressing the connector

Optical fiber, as its name suggests, transmits signals using additional light pulses.

As a result, conductor lasers, as well as light-emitting diodes, were used.

The optical fiber is divided into one and more modes.

Single-mode fiber is much thinner, its diameter being close to 10 microns.

  1. Therefore, the light pulse passing through the fiber is less likely to escape from its inner surface, which ensures less extinction.

Singular single-mode fiber provides greater range without repeater fatigue.

The theoretical throughput of single-mode fiber is 10 Gbit/s.

Its main disadvantages are high quality and high ease of installation.

  1. Single-mode fiber is important in telephones.

Bagatomode fiber has a larger diameter - 50 or 62.5 microns.

This type of optical fiber is most often found in computer networks.

The greater attenuation in multimode fiber is explained by the higher light dispersion in the fiber, through which the throughput capacity is significantly lower - theoretically it becomes 2.5 Gbit/s.

To connect the optical cable with active devices, special connectors are used.

The widest range of roses is type SC and ST.

Installing connectors on a fiber optic cable is a very complex operation that requires special skills, so it is not possible to do this at home without being a contractor.

6 Vartisna assessment

During the course of the work, a local computing network was broken down, which consists of 38 work stations and 1 server based on Fast Ethernet technology, the most widespread type of network at the moment, with advantages that include ease of setup and low cost of components.

The mirror-like topology that is being developed in the project will ensure the possibility of centralized management of the network, and will ensure the simplicity of finding a node that is in order.

  1. Merezha is inspired by the future development.
  2. Windows Server 2003 R2 is selected as the server operating system.
  3. The necessary amount of moderate equipment has been insured, the price of which is based on the breakdown of the property, and the cost of installation is 66,539 rubles.
  4. A report plan has been prepared, showing all the characteristics of the components to be tested. The design, put on design, zagalom Vikonani. The work contains all the necessary data and procedures for routine monitoring.. List of references Aktorsky, Yu.Ye.
  5. Measures of EOM and telecommunications: the main source of information from Yu.Ye.
  6. Aktorska.
  7. – St. Petersburg: PVIRE KV, 2005. – 223 p.
  8. Archibald, R.D. Management of high-tech programs and projects / – M.: DMK Pres, 2010. – 464 p. Balafanov, E.K.
  9. New information technologies. 30 computer science lessons/E.K. Balafanov, B.B.
  10. Buribayev, A.B.
  11. Dauletkuliv.
  12. – Alma-Ata.: Patriot, 2004. – 220 p. Microsoft course/ - M: Russian edition, 2011 – 960 p.
  13. Zhurin A. Self-teacher of robotics and computers.
  14. MS Windows XP.
  15. Office XP / A. Zhurin.
  16. – M.: Korona – Print, 2009. – 370 p.

Zaika, A. Computer measures / A. Zaika, M.: Olma-Pres, 2006. – 448 p. Zacker Craig.

Planning and support of the third-party infrastructure Microsoft Windows Server 2003/- M: Russian edition, 2005 – 544 p.

Kangin, V.V.

Hardware and software features of control systems / - M: Binom.

Laboratory of knowledge, 2010. – 424 p.

Vantage:

You do not have access to download files from our server.

2.1.

Important object design

The object of the project is the LOM organization, which is engaged in the development of the BAT “Easy-PO” software. The organization is located in a business center and occupies one on top. 2.2.

Purposes of vicoristic measures

SCRAP is used for the following purposes:

A wide range of interconnection elements (supercomputers, printers, etc.);

Possibility of easy access to necessary information;

Reliably saving and reserving data;

Information protection;

Wikoristannya resources

current technologies

(Internet access, electronic document management systems and others).

2.3.

The topology of the view is the most common topology of computational lines, since the transmission of data between work stations passes through the central bus (with good productivity) along adjacent lines, so that only these working stations.

The frequency of transmission requests from one station to another is low and equal to that achieved in other topologies.

Computational productivity is initially dependent on the workload of the central file server.

roboti);:

Openness of the boundary.

LAN satisfies this criterion, that it is feasible without changing technical

software parameters boundaries, connect additional equipment; The flexibility of the border.

If there is a malfunction of either computer or other equipment, the measure continues to function - the CROWBAR shows the same. Value for size The organization occupies a business center, whereby necessary equipment is planned, the place where workers are located, and the place where health workers are located. The structure of the boundary will be determined by these plans TOV "Unix" promotes its services to clients by designing scrap metal of any level of foldability.

The specialists of our company provide the Client with the necessary advice for correct molding, as well as technical specifications.

  • If the office is small, the Client’s needs will be sufficient for the placement plan with the necessary arrangement of border elements.
  • Please send data to the following points: number and location of sockets inspired by
  • technical nuances

robotic measures

transfer of equipment and materials

By extracting the information, the Project section creates a sketch that shows all the cable routes.

  • After this, a cost is formed from the designated quality of ownership, materials and services.
  • Development of the LOM project for great organizations

Work on the design of scrap enterprises is characterized by greater complexity and an integrated approach, taking into account all the specific features of the IT infrastructure.

  • Technical documentation is being developed to include:
  • Development of the sleeping robots of computers, which should be included before the limit.
  • Information about the interaction of devices is formed, the security program that is being victorious is secured.

Preparation for a cable system project The plan will determine the routes for laying cable routes, the location of switching equipment will be determined, and specifications will be formed.

There are three main tasks that face the challenges of designing a scrap organization:

development of the most efficient edge configuration

choice of passive and active edge control

  • data security
  • Passive possession for LOM