Project of a local computer network for an organization.

Golovna

It’s easy to send your money to the robot to the base.

Vikorist the form below Students, postgraduate students, young people, who have a strong knowledge base in their new job, will be even more grateful to you.

Posted on http://www.allbest.ru/

Federal Agency for Information

Russian Federation

Omsk State Institute of Service Faculty of Correspondence (Tourism and Applied Informatics)

DepartmentApplied information science and mathematics

Control robot Disciplines:

Computing systems, boundaries and telecommunications

Subject:

"Design of a local accounting measure of an organization"

Vikonala: student 121-Pz gr.

Ivashchenko Natalia Oleksandrivna

Having verified:

1. Shabalin Andriy Mikhailovich Enter Theoretical basis

bathroom design

local measures

1.1 Essential characteristics of the object being investigated

1.2 External characteristics of vicoristic edge technologies

2. Design of local boundary

2.1 Topology of the edge and edge control

2.2 Equipment for local network computers

2.3 Secured connection of the local network with the Internet network

2.4 Economical spending

Having verified:

Visnovok bibliographic list on Narazi Everyday business and organization cannot do without computing machines.

This is associated with the transition to electronic document management, with machine calculations and saving large amounts of information in

electronic view

.

This work involves consolidating knowledge about computer networks and network management, learning the basics of designing a local network of an organization according to its needs.

Until recently, Internet resources have been widely abused.

1. Theoretical basisand design of local boundary

In one place, or in a complex of adjacent buildings, there are a number of computers, which are responsible for secretly dealing with information, exchanging data or recovering secret data, And the computers are completely integrated into a local network.

A local network is a group of several computers connected via additional cables (either telephone lines or radio channels) that are connected to transmit information between computers. To connect computers to a local network, it is necessary to have the necessary.

security software

The purpose of all connections on a computer can be expressed in two words: shared access (or shared access). In advance, we wish to respect the full access to the data. People who work on one project have to constantly vikorize the data created by their colleagues.

At all local times, people can work on the same project not at any time, but at the same time.

The local boundary gives the possibility of sleeping vikoristanya possession. It is often cheaper to create a local network and install one printer for the entire unit, instead of buying a printer for the skin working area. File server

bathroom design

The barriers allow you to ensure full access to the program. Possession, programs and data can be summed up in one term: resources. from the production of yellow furniture.

The enterprise is famous for its advanced technologies in the production of furniture and the production of new materials.

Vikorist the form below Students, postgraduate students, young people, who have a strong knowledge base in their new job, will be even more grateful to you.

1.2 There is a growing number of universal prefabricated furniture that can be transformed to furnish small rooms.

In recent years, the furniture industry began to produce artistic furniture. In a series of variations, simple in form, furniture is created with increased comfort and aesthetics, from the use of painted facial fittings and elements of artistic decoding. At the same time, due to the increasing production of furniture, special respect is given to its handiness, hygiene, design, and comfort. Particular attention is devoted to optimizing the assortment of furniture based on real market demand, releasing a range of different styles and options, which allows you to complete and renew furniture from 4 to 5 years. Organizational structure Fig. 1 The characteristic characteristics of hemstone technologies. Technology Fast Ethernet- This is part of the IEEE 802.3 standard, which was introduced in 1995. That's more Swedish version

standard Ethernet network, which is similar to the same CSMA/CD access method, but offers significantly higher transmission speed - 100 Mbit/s. Fast Ethernet preserves the same frame format as the classic version of Ethernet. By saving money more earlier versions Ethernet standard means Fast Ethernet special mechanism automatic selection of transmission speed in mode

The scheme for connecting computers using the Fast Ethernet network differs little from the schemes of the 10Base-T specification.

Even if the cable cannot exceed 100 meters, the cable may be clear (not lower than category 5).

It is necessary to note that when 10Base-T is installed, the limit of 100 m of cable is limited only by the cable (more precisely, by losses in the new one) and can be increased (for example, up to 150 m) with If you use the same bright cable, then the 100Base is at a standstill - TX boundary dozhina (100 m) is surrounded by specified hourly exchange rates (interchanges at the last hour of passage) and cannot be increased for every day. Moreover, the standard recommends delimiting the length of the segment, which is more than 90 m, so that there is a reserve of 10%. The main advantage of 10Base-T4 and 100Base-TX equipment lies in the fact that the cables in it are paired with unshielded cables, which can accommodate both pairs.

1.1 Essential characteristics of the object being investigated

Data is exchanged over one transmission pair, one primary pair, and two bidirectional bit pairs with different differential signals. In this case, the cable may be less clear, less 100Base-TX (for example, category 3). The signal transmission system adopted in 100Base-T4 will ensure the same speed of 100 Mbit/s on any of these cables, although the standard recommends using a category 5 cable.

2.1 The installation of a fiber-optic cable in this way allows you to significantly increase the reliability of the network, as well as to ensure electrical connections and increase the secrecy of the information being transmitted.

Maximum dozhina

The cable between the computer and the hub can be up to 400 meters, and the distance depends on the cable strength and the time of connection.

Complies with the standard in which it is necessary to install a fiber optic multimode cable.

The design object is the local computational measure of the organization. This measure is responsible for ensuring the transport of information within the organization and ensuring the possibility of interaction with the global does not comply with all aspects of the work;

· Good scale of the boundary;

· Light sound of malfunctions and breaks at the edge;

· High productivity of the fence (due to proper design);

· The power of administration.

Few topologies:

· The failure of the central hub will result in the unavailability of the network (or a segment of the network) as a whole;

· Laying a boundary often requires more cable, less for most other topologies;

· The end number of workstations at the edge (or segments of the edge) is surrounded by a number of ports at the central hub.

This topology is designed in connection with what is most common. From the point of view of hope there is no the best decisions

Bring the fragments of the output from the central node to the junction of all the lines, and at the same time it is easier to identify the malfunction.

Subscribers in the skin segment will be connected to an external switch (Switch).

1. And the segments will be connected into a single frame by the switch – the central element of the fence. It is necessary to step up the measure of possession: - 8 Merezhevi commutators or switches(Switch) PC.-- devices used for connecting many nodes

2. computer network at the boundaries of one segment. - 1 Merezhevi commutators or switches Serveri

3. (server)- hardware, seen and/or specialized for installing new service software without the direct participation of people. - 5 Merezhevi commutators or switches Printers (including richly functional devices) (Printer)- attach to your friend

4. digital informationOn a hard nose, ring the papier.Go to the terminal devices of the computer.DVB- PC

5. map-DVB 1 PC. This is a computer board designed to receive a signal from a satellite, and then decrypt it. Saputnikova antenna- tse

6. most important componentDVB satellite internet

and satellite TV, it depends on the stability of the Internet connection, and the brilliance and number of satellite TV channels.

Converter -

- a program that can help you convert files from one format to another. The middle of the transfer:(twisted pair), one of the widest cable types available today. It consists of several pairs of copper wires coated with a plastic sheath.

divided into two classes - “Shielded twisted pair” and “Unshielded twisted pair”. The strength of these classes lies in the fact that the twisted pair is shielded and is more protected from external electromagnetic interference.

, it is obvious that there is an additional screen made of copper mesh and/or aluminum foil, which will add extra force to the cable.

transfer 100 m-code (up to 100 Mbit/s).

Table 1. Amount of possession at the edge

Installation of the bathroom

Quantity

Installation of the bathroom

Quantity

Comutatori

Switch

D-Link

(swich1,2,3,4,5,6,7)

map

PC (2 sets)

Suputnikova DVB card< EC-202C20-BB>

TeVii S 470 PCI-E (DVB-S2)

Converter

MultiCo

Layout of the cable system:

For cable management, it is assumed that the average distance between the computers at the branch and the line switch is at least 10 meters, so you will need approximately 850 m of UTP 5e cable.

2. Design of local boundary

To cover the distance from the switches to the central core switch (+ add core), you will need a 350 m UTP 5e cable.

edge local cable internet

The highest cost for UTP 5e cable is 10% (for inputs and gateways during installation) and the distance is approximately 1350 m.

transfer 100 m-code (up to 100 Mbit/s).

This will require 100 rounds of pairing, which will require 200 RJ-45 connectors.

Z urahuvannyam shlyubu – 220.

Table 2. Description of computers (K) Equipment (K)

Characteristic

Price, rub)

Processor case

Miditower Vento Black-Silver ATX 450W (24+4+6pin)

Processor

CPU AMD ATHLON II X4641 (AD641XW) 2.8 GHz/4core/ 4 MB/100 W/5 GT/s Socket FM1 Motherboard

GigaByte GA-A75-D3H rev1.0 (RTL) SocketFM1 2xPCI-E+Dsub+DVI+HDMI+GbLAN SATA RAID ATX 4DDR-III

RAM Corsair Vengeance

DDR-III DIMM 4Gb

HDD 1 Tb SATA 6Gb/s Seagate Barracuda 7200.12

3.5" 7200rpm 32Mb

DVD RAM & DVD±R/RW & CDRW LG GH24NS90

SATA (OEM)

CPU cooler

AMD Cooler (754-AM2/AM3/FM1, Cu+Al+heat pipes)

Cooler for the case

Keyboard

Together: 16347

This set is intended for working with office documents.

Installed cheap and simple components.

Right head:

Office No. 1 General Director (K1)

Office No. 2 Secretary (K2)

Office No. 7 Special room possession (K34, K35, K36, K37, K38, K39, K40)

From the staff:

Office No. 8 Gospodarsky branch (K41, K42, K43, K44, K45, K46)

Office No. 9 Department of personnel (K47, K48, K49, K50, K51)

Office No. 10 Director and staff (K52)

Vikonavich's vault:

Office No. 11 Technical section(K53, K54, K55, K56, K57)

Office No. 12 Veddil Virobnitstva (K58, K59, K60, K61, K62)

Office No. 13 Vice-director (K63)

Table 3. Description of computers (P)

Equipment (P)

The highest cost for UTP 5e cable is 10% (for inputs and gateways during installation) and the distance is approximately 1350 m.

transfer 100 m-code (up to 100 Mbit/s).

This will require 100 rounds of pairing, which will require 200 RJ-45 connectors.

Z urahuvannyam shlyubu – 220.

Miditower INWIN BS652 ATX 600W (24+2x4+6+6/8pin)

Characteristic

CPU AMD FX-8150 (FD8150F) 3.6 GHz/8core/8+8MB/125 W/5200 MHz Socket AM3+

Processor case

GigaByte GA-990FXA-D3 rev1.0/1(RTL) SocketAM3+ 4xPCI-E+GbLAN SATA RAID ATX 4DDR-III

Processor

Crucial Ballistix Elite Motherboard

Video card

3Gb DDR-5 Gigabyte GV-N66TOC-3GD (RTL) DualDVI+HDMI+DP+SLI

HDD 1 Tb SATA 6Gb/s Seagate Barracuda 3.5" 7200 rpm 64Mb

DDR-III DIMM 4Gb

Arctic Cooling Freezer 13 Pro CO (1366/1155/775/754-AM2/AM3, 300-1350+700-2700 rpm, Al+heat pipes)

3.5" 7200rpm 32Mb

Arctic Cooling Arctic F12 PWM CO (4pin, 120x120x25mm, 24.4dB, 400-1350rpm)

21.5" MONITOR LG E2242C-BN (LCD, Wide, 1920x1080, D-Sub)

DVD RAM & DVD±R/RW & CDRW LG GH24NS90

Genius SlimStar i8150 (Cl-ra, USB, FM+Misha, 3kn, Roll, Optical, USB, FM)

Together: 37866

This highly productive configuration will provide maximum speed and ensure work with any type of documents.

This set will be available for the following work places:

Financial branch:

Office No. 4 Financial Director (P1)

Office No. 5 Accounting Department (P2, P3, P4, P5, P6)

Office No. 6 Salary rate (P7, P8, P9, P10, P11)

Commercial branch:

Office No. 7 Commercial director (P12)

Cabinet No. 8 Viddil (P13, P14, P15, P16, P17)

Office No. 9 Marketing Department (P18, P19, P20, P21, P22)

Table 4. Description of additional installation.

, it is obvious that there is an additional screen made of copper mesh and/or aluminum foil, which will add extra force to the cable.

transfer 100 m-code (up to 100 Mbit/s).

Price for 1 piece (rub)

Switch (switch 8)

Quantity Switch 10port (8UTP 10/100/1000Mbps + 2Combo 1000Base-T/SFP)

Switch (swich 1,2,3,4,5,6,7)

Quantity Switch 16 port (16UTP 10/100Mbps)

Server sS7000B/pro2U (SX20H2Mi): Xeon E5-2650/ 16 GB/ 2 x 1 TB SATA RAID

Epson AcuLaser M2400DN (A4, 35 side/xw, 1200dpi, USB2.0/LPT, edged, double-sided)

D-Link

(swich1,2,3,4,5,6,7)

map

PC (2 sets)

Suputnikova DVB card< EC-202C20-BB>10/100Base-TX to 100Base-FX converter (1UTP, 1SC)

2.3 Secure connection of the local network with the Internet network

Theoretical proofedge technologies:

The transition from analogue television to digital has practically increased with the advent of satellite Internet access technology. The current revolution in this country is associated with the European MPEG-2/DVB standard, which organically combines the transmission of digital video, audio information and data. Another important factor is the importance of the IP protocol as a data transmission standard.

Today it can be said that the world has established both the stable standards of digital satellite television and the range of frequencies that are studied, as well as the encoding of signals and

essential functions

Priimalnogo obladnannya.

How to use satellite Internet:

In order to access the Internet from a satellite, in addition to the parabolic antenna, you need a receiver (PCI card or USB device).

Through the Internet provider, we transmit packets of requests to the server, after which the files are transferred to us through a special proxy server or VPN connection, and not over a terrestrial channel, but through a satellite.

(swich1,2,3,4,5,6,7)

For this purpose, we will ask you to first come to a special operations center to ensure that the required file is collected.

After this, the file is transferred to the satellite.

From the satellite, the file “lands” on the plate and is transferred to the computer.

Suputnikova DVB card< EC-202C20-BB>10/100Base-TX to 100Base-FX converter (1UTP, 1SC)

The speed of transmission from a satellite to your dish can be in the hundreds of kilobytes per second, depending on the operation center, and the delays between the transmission of your request and the beginning of the file being sent to you may be lower than that of your provider .

Obladnannya:

1. Saputnikova DVB card

2. Satellite antenna

LANS-7.5 Direct focus parabolic antenna with azimuthal fixed suspension AZ/EL 2.30m F/D=0.375

3.Converter

Provider:

"Raiduga"

2.4 Rate:

Wholesale 4000 MB/month.

transfer 100 m-code (up to 100 Mbit/s).

Subscription fee: 2300 RUB/month.

Additional data traffic: 0.50 RUR/MB.

Input channel bandwidth: 6144 Kbit/s.

Server sS7000B/pro2U (SX20H2Mi): Xeon E5-2650/ 16 GB/ 2 x 1 TB SATA RAID

Quantity Switch 10port (8UTP 10/100/1000Mbps + 2Combo 1000Base-T/SFP)

Quantity Switch 16 port (16UTP 10/100Mbps)

D-Link

(swich1,2,3,4,5,6,7)

map

Output channel bandwidth: 2048 Kbit/s.

Suputnikova DVB card< EC-202C20-BB>10/100Base-TX to 100Base-FX converter (1UTP, 1SC)

Epson AcuLaser M2400DN (A4, 35 side/xw, 1200dpi, USB2.0/LPT, edged, double-sided)

Economical package<5м>Name<99483>

Price per unit<бухта 305м>Computer equipment (K)

Computer equipment (P)

LANS-7.5 Direct-focus parabolic antenna with azimuthal fixed suspension AZ/EL 2.30m F/D=0.375< < 2м > >

Measuring filter Defender ES

2.3 Secured connection of the local network with the Internet network

During the final control work, a local calculation system was designed for the BAT “Furniture World” robot.

2.4 Economical spending

The structure of the organization was broken down, the top plan of offices and departments was designed, the configuration of computers and the selection of boundary equipment was improved, the layout of the cable system was improved. The development of the project has been completed. / 1. Computing systems, networks and telecommunications: chief companion

S. F. Khrapsky.

– Omsk: Omsk State Institute of Service, 2005. – 372 p.

...

Electronic version.

    2. Olifer V.G., Olifer N.A. Computer measurements. Principles, technologies, protocols: A handbook for your friends. 3rd type.- St. Petersburg: Petersburg, 2006

    Posted on Allbest.ru

    Similar documents

    Features of the local computational measure and

    information security

    organization.

    Methods of managing, selecting methods for implementing the policy and control system instead

    by e-mail

    .

    Design of a protected local boundary.

    diploma work, addition 07/01/2011 Purpose of the designed local computing network (LAN). A large number of subscribers of the projected LOM in active booths.

    The transfer of equipment associated with the laying of cables.

    The concept of computer measures, their apparent significance.

    Development of a local computing network of Gigabit Ethernet technology, using configuration block diagrams.

    Select and wire the type of cable system and edge equipment, describe the exchange protocols.

    course work, add 07/15/2012

    Design of a local computing network, which is intended for interaction between bank agents and information exchange. Review of technical parameters and displays, software. Commutation possession, which is vikorist.

    course work, add 01/30/2011

    The main possibilities of local computational measures.

Consume on the Internet.

Analysis

Existing technologies

SCRAP. The design of LOM is more logical.

Vibir poladnannya i mezhnogo PZ.

Rozrakhunok vitrat for the opening of the fence.

Effectiveness and safety measures.

course work, add 03/01/2011

The concepts of local dimensions, their essence, types, meanings, goals, values, dimensions, structures and qualities.

The main plant is the choice of the best possible equipment and software security.

Information security at the border.

Federal Agency for Information on the Russian Federation


Penza State University

Department of Information Security Systems and Technologies

EXPLANATORY NOTE

before the course project on the topic

"Design of local network of organization"

PDU 2.090105.001 PZ


Having verified:

CSPI discipline

Rozrobiv student.

The project was accepted with assessment__________

Kerivnyk to the project.

2.3 Secured connection of the local network with the Internet network


Having verified:

Penza 2006 r.

The purpose of all connections on a computer can be expressed in two words: shared access (or shared access).

We are asking for complete access to the data.

People who work on one project have to constantly vikorize the data created by their colleagues.


At all local times, people can work on the same project not at any time, but at the same time.

The local boundary gives the possibility of sleeping vikoristanya possession.

CSPI discipline

It is often cheaper to create a local network and install one printer for the entire unit, instead of buying a printer for the skin working area. The file server of the network allows extensive access to the program. Possession, programs and data can be summed up in one term: resources.

You can note that the main purpose of the local network is access to resources.

The local network also has an administrative function.

It is easier to control the progress of work on projects, even without the absence of stand-alone computers.

During the course of the course project, a model of a local network of organizations was developed that deals with the development of software.

1. Important object of investigation

The object of the design is local telecommunications within the organization.

This barrier can ensure the transport of information between organizations and ensure the possibility of interaction with the global Internet network.

The organization for which the local network is designed is also the company whose main type of activity is software development.

To accurately formulate the goals of a network design, it is necessary to build an information model of the organization, which identifies the flows of information that circulate throughout the organization, the channels that

information given

The level of criticality and sensitivity of information is moving.

The information model identifies the types of information that are available at different nodes of the boundary, dividing it into stages of criticality and sensitivity.

The following markings are displayed on the induced little one to indicate the type and quality of information:

Information about financial activities

Information about market conditions

Product information

ensuring the availability of information.

centralized storage of information in databases

archive backup copy information

ensuring information security within the organization's TCS

Interaction between the local network of the organization and the global network of the Internet.

Rozrobiv student.

To achieve the set goal, the barrier is responsible for the following characteristics:

Availability of access to the Internet.

High bandwidth (100 – 1000 Mbit/s)

High server productivity.

The average productivity of the workstation was determined by development and testing.

High resistance to visible stains of all components of the mesh.

Possibility expanded.


2. The dimensions and structure of the boundary

Similar to the fragmented infological model of organization, it is obvious that the edge that is being designed is small in size, the fragments cover the area surrounded by one surface.

p align="justify"> When designing the structure of the fence, it is necessary to ensure the possibility of its expansion.

An analysis of the possibilities of growing an organization allows us to assume that this margin could be increased by adding a new segment that is on a different level.

The merege is organized using the additional “Zirka” topology (Fig. 2).

With a “mirror” topology, all computers behind the same cable segments are connected to a central component, which is called a hub.

Signals from the computer that transmit go through the hub to all others.

A work station that needs to send data sends it to the hub, which selects the recipient and provides it with information.

At the present time, only one machine at a time can transfer data, if two packets arrive at the hub at the same time, the other messages are not accepted and the senders will need to check the time interval in order to renew the data transfer.

Advantages

The output from one workstation does not interfere with the entire work;

The scale of the measure is good;

A slight sound of malfunctions and breaks at the edge;

High productivity

The power of administration

Small


3. Physical model of a local boundary.

The entire organizational dimension is divided into three subdimensions.

The skin of the submergium can be folded into several segments.

Persha Merezha is a group of distributors. It consists of 20 work stations and servers of a work group. All hosts in the network are connected to a switch that communicates with the network router.

Another sub-measure is a group of testing.


The structure of this submersion is similar to the front one.

The third subdivision includes the automated workstation of the server, administrators, and server.

This structure of the framework can be expanded.

To do this, it is enough to connect a new network to the router and configure network addresses for it.

After creating the network structure, it is necessary to select the type of cable system that will be installed in the network.

The network will be based on the 100BASE-TX standard.

Disconnect the data routing function from the network.

The network also has a proxy server that connects to the Internet. This server It uses a real IP address, which is used by network hosts to access the global network. The functions that this server configures include processing email and replacing the local host address with a real IP address. As a result, it is not characterized by high productivity and its architecture is close to a standard workstation.

This server has been placed under security measures.


If we have only one server, and place on top of the above-described functions another function that interacts with the global network, then we will be exposed to new attacks, thus averting all

the most important information

organization is one of the main goals of attacks by criminals.

Based on the described server functions, the following configuration was selected:

Another important component of the network that is being designed is the work stations of the organization's security personnel.

As the company fragments its security program, the productivity of the workstation may remain high.

Basically, a server through which there is interaction between the local network and the Internet network, with an architecture similar to the work stations of the Internet.

Based on these findings, the following components were selected for the workstation:

AMD Athlon™ 64 3200+ Socket-939

Socket-939: nVidia nForce-4 Ultra

2 x DIMM 512MB DDR SDRAM PC3200

Card Reader all-in-1 SATA 80.0GB 7200rpm 8MB DVD+-R/RW&CD-RW IDE

256Mb PCI-E GeForce 7300GT

Case AOpen QF50C After selecting warehouse hosts, it is necessary to ensure careful management.: Merezheva card from ZyXEL Card supporting IEEE802.3/IEEE802.3u standards. The card can be used with full duplex, supporting torsion in categories 3, 4, 5. The Wake-On-Lan function is supported. Model: ZyXEL FN312 Computer connection interface: PCI. The center of the program: Midna pair.

Installation of the bathroom

Distribution: 1 RJ-45. Speeds that are supported: 10\100 MB/s. Full duplex mode support: OS support:

Microsoft Windows

98/2000/ME/XP Microsoft Windows NT 4.0 Microsoft Windows Workgroup 3.11 Novell NetWare 5.x/4.x Novell NetWare client 32 Linux Redhat 6.x, 7.x Switch (kerated) D-Link DES-3226S 24-ports 10/100 Mbps DES-3226S is a high-performance, level 2 hardened switch that is ideal for small workgroups. The switch has 24 ports of 10/100 Mbit/s Fast Ethernet and can be additionally equipped with 100BaseFX or Gigabit Ethernet modules necessary for connecting high-speed equipment and providing additional flexibility to the switch. DES-3226S has 24 ports 10/100 Mbit/s, which supports auto-selecting speed and data transfer mode. Additional modules with two optical Fast Ethernet ports, as well as optical and medium Gigabit Ethernet ports, are installed in the free slot located on the front panel of the switch. High-performance modules are used to connect the switch to servers or enterprise backbones. The DES-3226S architecture provides non-blocking switching to the data flow using store-and-forward switching mode. Dimensions and food Power - 100-240VAC, 50/60Hz Power supply - 30-42 Watts (max.) overall dimensions- 441 x 388 x 66 mm 19" - for installation in a closet, height 1.5U, weight 6 kg

Printer HP LaserJet 1018, laser, black and white, A4, 600 x 600 dpi, 12 sides/xv, 2 MB, USB 2.0

Back Comfo Pro is a new, simpler solution for uninterrupted living for home and corporate clients. Models with pressure 400, 600 and 800 VA. For the convenience of users, Back Comfo Pro has 2 additional European sockets.


In addition, there is a standard and USB port for connecting to a computer.

Together with the UPS, the Russified software WinPower2003 is supplied, which allows you to effectively control all the parameters of uninterrupted life. Tension to maintain: 800 VA (480 W).

Model description: Back Comfo Pro 800. Output signal: approximated sinusoid.

Time to switch to battery: 2-6 ms.

Maximum number of output sockets: 4 computer sockets, 2 household sockets.

Battery transition thresholds: 220 W +20% and -30%.

Frequency: 50Hz (

A corporate edge OS can support complex services.

Similar to a moderate OS for workgroups, a moderate OS at the scale of an enterprise is designed to allow workers to share files, applications, and printers, thereby making it possible for a larger number of workers to share data and be more productive. Istyu.

On the other hand, an enterprise-scale operating system will ensure the ability to connect different systems - both workstations and servers.

For example, since the OS runs on an Intel platform, it must support UNIX workstations that run on RISC platforms.

Similarly, server OS that runs on RISC computers can support DOS, Windows and OS/2.

Merezhev OS for an enterprise scale can support a number of protocol stacks (such as TCP/IP, IPX/SPX, NetBIOS, DECnet and OSI), providing easy access to remote resources, manual procedures for managing services, including agents for management systems lenya to the edge.

An important element of the boundary operating system for the scale of the enterprise is the centralization of the advanced data service, which saves data about clients and resources of the boundary.

Such a service, also called a directory service, ensures a single logical login for the user until the end and gives him a manual ability to view all the resources available to him.

The administrator, as part of the centralized research service, eliminates the need to create a list of clients on the personal server, which is repeated, which means saving a large amount of routine work and work cial pardons with the assigned warehouse of koristuvachs and their rights on the skin server.

An important power of the departmental service is its scale, which will ensure the distribution of the database of financial resources and resources.

Such intermediate OS as Banyan Vines, Novell NetWare 4.x, IBM LAN Server, Sun NFS, Microsoft LAN Manager and Windows NT Server can serve as a business operating system, while NetWare 3.x, Personal Ware, Artisoft LANtastic OS More suitable for small work groups.

The criteria for choosing an OS for the scale of the enterprise are the following characteristics:

Various software and hardware host platforms: IBM SNA, DEC NSA, UNIX;

Various transport protocols: TCP/IP, IPX/SPX, NetBIOS, AppleTalk;

Support for various operating systems of end users: DOS, UNIX, OS/2, Mac;

Support for edge-to-edge standards Ethernet, Token Ring, FDDI, ARCnet;

Availability of popular application interfaces and mechanisms for calling remote RPC procedures;

Possibility of interaction with monitoring and network management systems, supporting SNMP network management standards.

The doctors described the criteria and evidence better, and Microsoft Windows NT Server 4.0 was selected for the test.

This operating system has the following characteristics:

Server platforms: computers based on Intel processors, PowerPC, DEC Alpha, MIPS. Client platforms: DOS, OS/2, Windows, Windows for Workgroups, Macintosh Organizing a peer-to-peer network is possible with please help Windows NT Workstation and Windows for Workgroups Windows NT Server is a standalone extension server: it supports multitasking, virtual memory and symmetric multiprocessing, as well as application environments DOS, Windows, OS/2, POSIX Dovid What services: domain for managing cloud information of clients ( Windows NT Domain Directory service), advanced name services WINS and DNS Good encouragement Sleeping practice with NetWare layers: the client part (redirector) for the NetWare server is supplied (versions 3.x and 4.x in 3.x emulation mode, the advanced NDS service is supported starting from version 4.0), installed in the gateway view on Windows NT Server either way ocremic component for Windows NT Workstation; Notification processing service - Microsoft Message Exchange, integrated with others Windows services NT Server.

Encouraged

The designed fence consists of three submargins, which unite a number of hosts.

To communicate with a sub-merger, a router is installed that forwards packets from one sub-merger to another.


For effective routing in a network, it is necessary to assign unique IP addresses for all components of the network and build a routing table.

The structure of the address of the measure is presented by Malunku 4.

Small 4. Structure of the address of the boundary. The organization's network is assigned to the address 10.10.0.0, and the network mask is 255.255.0.0. The first subdivision is address 10.10.1.0 and mask 255.255.255.0.
1 127.0.0.0 255.0.0.0 10.10.3.1 3
2 10.10.0.0 255.255.0.0 10.10.3.1
3 10.10.1.0 255.255.255.0 10.10.3.1
4 10.10.1.1 – 10.10.1.21 255.255.255.0 10.10.3.1
5 10.10.2.0 255.255.255.0 10.10.3.1
6 10.10.2.1 – 10.10.2.10 255.255.255.0 10.10.3.1
7 10.10.3.0 255.255.255.0 10.10.3.1
8 10.10.3.1 – 10.10.3.6 255.255.255.0 10.10.3.1

The other support is address 10.10.2.0 and mask 255.255.255.0.


Addresses of the third submersion are 10.10.3.0, submersion mask is 255.255.255.0.

The router is a server that is connected to the submersion 10.10.3.0.

The router is at address 10.10.3.1. Submersion 10.10.3.0 has a proxy server. The real IP address of this server, which is used for access to the Internet by local hosts 85.234.44.234.

The routing table is located in table 2.

Relevant addresses

Submersion mask

Forward router addresses

Interface

elements of everyday structures and windows that create channels for the flow of confidential information due to the so-called microphone effect,

telephone, radio, and other lines dartless channels(This includes mobile communication channels).

Any additional connections with other segments or connections to the Internet will give rise to new problems.

Attacks on the local network through Internet connections in order to deny access to confidential information have become increasingly widespread due to the limited implementation of the information protection system in the TCP/IP protocols. . Network attacks via the Internet can be classified as follows: Packet sniffer (sniffer – in this case, sense filtering) – an application program like a vikorist

I'll cut the map

, which operates in the promiscuous mode (do not use the capacity) mode (in which mode all packets received via physical channels are sent by the edge adapter for processing). IP spoofing (spoof - deception, hoax) - occurs when a hacker who is in the middle of a corporation or poses as an authorized profiteer. Vidmova in service (Denial of Service - DoS).

DoS attack breaks the border inaccessible to

Zvichaynogo vikoristannya

for the range of movements allowed between the functioning of the interface, operating system and programs.

Password attacks - try to select the password of a legal merchant to enter the network.

Man-in-the-Middle attacks – direct access to packets that are transmitted to the middle.

Attacks on the level of supplements.

Merezhovaya reconnaissance - collection of information about the survey with the help of secretly available data and programs.

Enchanted by trust in the middle of the border.

Unauthorized access (UNA), which can involve a different type of attack, since most third-party attacks are carried out to deny unauthorized access. Viruses and programs of the Trojan horse type. The network has a discretionary access sharing model. Within the framework of this model for the skin object, it is indicated what type of access can be made to the skin object. Based on these values, an access matrix was generated, as shown in Table 3. PS DBMS IBS AWS ABD Arm Hand.
Set. rev. 2 2 1 2 2 2 2 2 2 2
AWP program 1 2 2 0 2 2 1 0 0 0
DB zrazok. 2 2 2 2 1 1 2 2 0 2
AWS AIB 1 1 0 0 2 2 1 1 0 2
Smitty 1 0 0 0 1 1 1 0 0 0

AIB

DBA

Handling

Roserob.

Inshi.

Table 3. Organization access table.

Condensed shorthand:

AIB – information security administrator

SRK – backup server

AWP is an automated work station.

SMR - server for development.

0 – no access

1 – reading room

2 – read/write.

To protect against local attacks from the Internet, the firewall OutPost Firewall 4.0 is used.


This product provides comprehensive protection of membrane components from intrusion and harmful influxes.

6. Vartisna assessment

1 41500 41500 200 8 1600
The final stage of local boundary design is to carry out a varsity assessment of the boundary components.
34 228 7752 Installation of the bathroom 3 10902 32706 Merger adapter 3 4530 13590 Printer 1 2507 2507 DBJ 939115

Together:


2.3 Secured connection of the local network with the Internet network

As a result of the assessment, it was established that the amount of expenditure for the construction of the boundary is acceptable, and therefore allows the implementation of this project. As a result of the completion of this course project, the meta-measuring structure of the organization was formulated and described, the size and structure of the boundary, the cable system were selected, the informational and physical model of the boundary, as well as the boundary equipment, was developed. x software features

and methods of managing the network, and a comprehensive assessment of the local network was carried out.


In this manner, the head of the course project at Wikonan is in full agreement.

List of Wikorista Gerels

1. Mali V.A. Design of local TCS. Methodical additions to the completion of the course project.

Today, there is an increasing number of Internet networks, which requires the correct organization of local networks.

With the help of modern technologies, the transfer of data between other computers installed within the same business or commercial organization can be ensured.

  • Varto is aware of the fact that, at different stages, the creation of this line of communication inevitably involves a full-fledged design. It is important to note the fact that such calculation measures can be used both with the help of a wire and dartless method
  • Development of the technical department, which is formed by the core of the organization and commercial structure.
  • Warto means that at this stage it is possible to quickly follow the specific recommendations of the fachivts, which will result in an optimal result;
  • Preparation of equipment, between this stage, actual operational capabilities and various functional capabilities are strictly verified.
  • Preparation checks not only practical feasibility, but also a number of features and capabilities of the selected units;

The instructions provide clear and prompt installation of the line scrap, which operates inclusive of the introduced technology.

The songs of the mind are created for the further functioning of the boundary, if the possession that is being vicorized, the master will finish his adjustment;

possible problems

in robot systems.

In this way, simple systems and possessions in robots are established, such as the knowledge of things. There are no more problems if specialists are called in to complete the assigned task. The validity of such an operation is determined individually. The company GRIN EFFECT carries out design, installation (laying) and maintenance of SCRAP. Scrapbook will ensure guaranteed taxes
information resources and services with the necessary levels of availability, reliability, scalability, safety and durability. LOM (locally obligatory measure)
This is a set of software and hardware features, which includes a number of components and nodes. The LOM Zamovnik merezheva subsystem is designed to satisfy the needs of subscribers for secure information interaction and data exchange, direct to the Zamovnik business processes. Most often the LAN is organized on Ethernet technologies and/or Wi-Fi.

For everyday life and laying scrap, switches, routers, wireless access points (wi-fi), modems, optical fiber (VOLZ) and copper lines, etc. are used.

For
  • remote connection
  • Before LOM, VPN connections are most often used.
  • VPN is a technology that allows you to organize one or the same thing at home, in a remote office, or in a remote office.
  • merzhevih connections
  • on top of another network (Internet).
  • Selecting and priming technologies for scrap production
  • The choice of technology, architecture and equipment for scrap production is determined by the following factors:
  • supporting the quality of service delivery and service level management;
  • compliance with international standards;
  • minimal initial varnish of the scrap and varnish of further growth.

    To achieve the best results in terms of productivity, reliability, hardness, scalability, LOM requires a modular and hierarchical approach to the design of the data transmission system. This approach allows you to increase the scrap in an optimal way to add new blocks without sticking to the components of the hemstone structure, ensuring the edge high step

    The importance of the behavior of CROWBAR, which eases the search and elimination of problems.

  • LAN provides its subscribers with the following information services:
  • transmission services; service droneless connection
  • subscribers;

    audio and video conferencing services.

  • CROWBAR is formed from the offensive subsystems:
  • moderate subsystem;
  • boundary security subsystem;
  • access control and authorization subsystem;
  • monitoring and control subsystem;
  • audio-video conferencing subsystem;

    dartless survey subsystem We work with a full range of fiber optic products (FOLP), copper pairs, server cabinets, patch panels, equipment dartless measure

    (wi-fi), sockets etc. Our company is currently in possession of PZ for everyday life (laying) SCRAP.

    When submitting a scrap, a new signal is given about the testing of all laying lines.
    The life of the LAN depends on the vicissitudes of the intermediate active and passive possession of wired transmitters, such as Cisco, Hewlett-Packard, 3COM, etc.
    Designed by LOM The design division of the company GRIN EFEKT provides a new range of services for the design of LOM (local accounting measures). At the first stage of the design of the LOM, an inspection of the object is carried out, negotiations with the manager, identification of the task and the evidence that the LAN is presented.


    (wi-fi), sockets etc. Our company is currently in possession of PZ for everyday life (laying) SCRAP. Following the results of monitoring and analysis of the output data, an optimal design for creating a local calculation measure is developed until all the necessary functions of the money manager are included.
    When designing scrap, the benefits of the existing legislation and regulatory documents on ecology, protection and fire safety are covered.

    Pre-project unfastened

    The purpose of pre-project quilting lies in the designated set of approaches and the development of technical propositions with the arrangement of standard solutions.

    Based on the results of the design, our design engineers will help the Deputy to develop a competent technical specification (TOR) for the design of scrap metal.

    Technical department (TK) SCRAP Vimogi of the deputy to establish the basis technical department (TZ) SCRAP and this is why primary document , Where the work begins with the creation of a local computational measure. Cream

    technical assistance

    , at the first stages of work with the design of scrap, as output information, data is obtained, which is removed in the process of pre-design quilting.

    Any design begins with a correctly written technical specification, approved by the manager. A well-written technical specification contains the terms of design and selection of necessary equipment for scrap production, described in the technical specification. The warehouse of project documentation LOM is regulated by the Regulations of the Russian Federation “On the warehouse of sections of project documentation and possible before their replacement” dated 02/16/2008. No. 87.
    Design documentation LOM (stage “P”) The concept of the LOM is competently broken down and the technical specifications provide the basis for the creation of a preliminary plan for the LOM - a single complex solution designed to ensure the specified mode of operation of the LOM. The draft design means the optimal structure of scrap and cable routing, distribution and storage of telecommunications infrastructure elements, statements about the budget for the project, as well as
    whole row Other parameters to make it easier to choose specific solutions. LOM project documentation is text and graphic materials that indicate volumetric, planning, constructive and

    technical solution

    At the initial stage, the working documentation of the LOM is developed, which is analyzed at the operational stage.
    At this very stage, the resource intensity of the process, the labor and installation work required, the amount of materials required, and therefore the budget for the LOM project is determined.

    Working documentation for LOM is developed after the advanced design stage has been finalized.

    The meta-operation at stage “P” is based on the preparation of the exact chairs, the diagram and the table, which the installers are preparing for the hour of carrying out the work on the construction scrap.

    Working documentation will ensure detailed linking of the components of all systems to the object.

    Work documentation: crowbar placement of chairs, connection and connection tables, equipment distribution plans, postings and other documents. Koshtorisna documentation LOM (“SD”) The development of cost documentation is the final stage of designing a local accounting measure and means a new level of ownership, construction, installation and commissioning work.
  • Budivnitstvo (installation) SCRAP
  • Subject to the LAN project approved by the Deputy and purchased
  • necessary possession
  • In preparation:
  • organization of switching center
  • installation of electrical panels

    installation of cable channels
    placement of access point installation of sockets cable laying

    The GRIN EFEKT company provides a new range of services for the installation of scrap equipment.

    The accumulations in this hole allow you to complete the installation and connection of the scrap

    shortest term

    , in this type of work, the project and the proper core work. Setting up the CROWBAR After installation is completed, the LAN is subject to comprehensive testing and adjustment to verify the effectiveness of the system and identify defects. The results of testing and adjustment with explanations of the values ​​of parameters and analysis of the local computational measure are given to the controller (an example of testing for a baby).
    After completion of all work and transfer of documentation to the deputy, representatives of the Vikonavian and deputy will inspect the facility.

    Technical maintenance of scrap includes:

  • Preventive robots
  • Lovely robots.

    The obligations of technical maintenance of SCRAP lie in the minds of operation and installation warehouse.

    Preventive maintenance work for LOM:

  • checking the equipment for completeness, evidence of marking, external defects and operating conditions
  • renewal of damaged labeling of cross-dressing
  • Laying cross-cords in cable managers
  • diagnostics of ports LOM
  • updating the efficiency of damaged LOM ports
  • Instructing the Chief of Staff to carry out technical maintenance of the LOM and recommend the reconstruction of the LOM

    Diagnostics of the LOM ports depends on the verification of the parameters of the LOM ports on the correspondence of the category parameters with the different types of certification of control and vibrating devices with the results of These are the parameters that vary across all frequency ranges.

    The lack of consistency of LOM ports based on categorization is determined by the results of port diagnostics.

  • Innovative technical service robots SCRAP:
  • replacing damaged cables

    renewal of damaged cross-country equipment Malfunctions detected as a result of preventive work are addressed by Vikonavets as part of the LOM service. Depending on the nature of the malfunction, decisions are made to remove the defective item from repair and include it in the plan for the ongoing repair of scrap, or to eliminate the defect on the spot.

    Malfunctions for any needs

  • additional robots
  • those material resources that are depleted after the creation of a defective record.
  • Detections of brain damage from the operation of SCRAP are reported to representatives of the Deputy.
  • The schedule of work is carried out and the LAN is divided and confirmed by the Deputy.
  • For the results of the work, you will receive a signal before entering:

    • table of location of scrap ports at the site
    • cross table
    • act of changing the parameters of the LOM ports
    • defective information.
    • Great companies have a great deal of data of a different nature in circulation:

    text files;

    Thus, the demand for the widespread provision of electronic computing devices to all companies has come to an end.

    At the same time, it became important to combine these devices into a single complex for protection, saving and ease of moving files.

    We know how to facilitate the design of local computing (computer) measures for enterprises.

    What is CROWBAR, its functions

    This means connecting a number of computers into one closed space.

    This method is often used in great companies with production.

    • You can also create a small connection yourself using 2 – 3 accessories at home.
    • The more you add to the structure, the more it becomes folded.

    See the folded edge There are two types of connection, depending on the complexity and visibility of the central link: Equal.

    Bagatory. Equal, peer-to-peer stench, characterized by similarity in technical characteristics

    .

    However, they have a new division of function - the doctor can deny access to all hidden documents and carry out new operations.


    This can be done by ensuring automatic switching to another hub.

    Reliability.

    • Equipped with uninterruptible power supply systems and autonomous energy reserves to minimize the possibility of connection interruptions.
    • Protection from outside influences and evil.
    • The data that is saved can be protected not just with a password, but with a whole bunch of devices: a hub, a switch, a router and a remote access server. Automated and manual control. It is important to install a program that analyzes the screen state at any time and notifies about malfunctions for their quick removal.
    • An example of such software is RMON. In this case, you can use special monitoring via Internet servers. A set of technical tools for the design and development of a local network (LAN) at the enterprise
    • It is clear from the authorities that it is necessary to believe in the time of the project’s formation. The entire design process begins with the creation of a technical specification (TOR). To take revenge:
    • Standards for maintaining records.
    • Ensuring that all connected computers have access to information.
    • Productivity parameters: reaction hour from powering up the kistuvach until it's off required pages, throughput, so that the data is collected from the robot and transmission delay.

    Of course, the readiness is trivial, it seems

    permanent work

    without interruption.

    • Replacing components - expanding the mesh,
    • additional inclusions
    • or installation of equipment of a different nature.

    Support for different types of traffic: text, graphics, multimedia content.

    Ensuring centralized and remote control.


    Integration

    • different systems
    • and software packages.
    • If the technical specifications are compiled according to the exact needs of the customers, the type of inclusion of all points in one dimension is selected.

    Nedoliky:

    • A broken or damaged cable affects the operation of the entire system.
    • A small plot can be connected in this way.
    • Speed ​​code may suffer, especially since connections pass between at least 10 devices.

    "Kіltse" (Kіltseva)

    All computers are connected sequentially - from one device to another.


    Integration

    • So often it’s difficult to get rid of peer-to-peer scrapbooks.
    • In general, this technology will stagnate sooner.

    Nedoliky:

    • There is no cost for a hub, router or other lesser possessions.
    • Information can be transmitted by just a few clients.
    • The transmission speed of the whole product depends on the strength of the most powerful processor.
    • If there is a malfunction in the cable or if any element is missing, a fire will be triggered.

    It’s difficult to complete such a system.

    When connecting an additional work place, please interrupt your sleep activity.


    Integration

    • "Zirka"
    • This is in parallel with the inclusion of devices until the connection to the main device - to the server. The hub or concentrator is the most often used center. All data is transmitted through him.
    • This method can work not only with computers, but also with printers, faxes and other equipment.

    Nedoliky:

    • In modern enterprises, this is the most common method of organizing activities that become stagnant.
    • It's easy to connect another location.
    • Productivity does not lie under the influence of speed code
    • several elements

    that is lost on a stable high level.

    Just know the breakdown.

    The malfunction of the central unit affects the work of all operators.

    The number of connections is determined by the number of ports on the server device.

    A lot of cables are wasted on the network.


    Dear owner.

    Stages of software design for LOM

    • maximum voltage;
    • sequence of entries;
    • possible interruptions;
    • economical installation;
    • manual supply of electricity.

    The characteristics of the scrap material must be selected in accordance with the plan for the placement of the organization and the equipment being used.

    Parameters of computers and edge devices

    When choosing and purchasing mesh elements, it is important to consider the following factors:

    • Madness with different programs and new technologies.
    • Data transmission speed and device speed.
    • The quantity and intensity of cables must be based on the chosen topology.
    • Method of managing exchanges at the edge.
    • Protection from transients and faults in the winding of wires.
    • Wartness and tension edge adapters, transceivers, repeaters, concentrators, switches

    Principles of designing LOM using additional computer programs

    When developing a project, it is important to consider a large number of nuances.


    This will help with the security software in ZWSOFT.

    • The company is engaged in the development and sale of richly functional software for automating the work of design engineers.
    • Basic CAD is an analogue of the popular, but expensive package from Autodesk - AutoCAD, but surpasses it for the ease and reliability of licensing, as well as for a more loyal pricing policy.
    • Program advantages:
    • Intuitively intelligent, user-friendly interface in black color.
    • Wide choice of tools.
    • Work in two- and three-dimensional spaces.
    • 3D visualization.
    • Integration with files from most popular extensions.
    • Organization of scrap elements in the form of blocks.
    • Pіdrakhunok dovzhin cable lines.

    Initially reshaping the elements and knots.

    Integration

    • One-hour work with graphics and text data.
    • Possibility of installing additional programs.
    • For ZWCAD - a module that expands the functions of the basic CAD system in the field of multimedia circuit design.
    • All chairs are connected to automated cable routing, local measurement and marking.
    • automation of selection of switching systems;
    • wide library of elements;
    • parallel to the cable log;

    Help you create a project in three-dimensional view, create it in 3D.

    Intelligent tools allow you to quickly lay scrap routes to connection points, accurately identify where cables are passing, organize the crossing of lines, identify installation cuts that are connected, and technological furniture ів (including in dynamic mode).